Privacy is not free

Privacy is not free

How Google or any company that offers free products to its users is generating revenue?You get a free product and no company is there to target you with ads or sell your data or other shenanigans.

Warning: Zoom Sends Encryption Keys To China (Sometimes)

Warning: Zoom Sends Encryption Keys To China (Sometimes)

When Citizen Lab looked at where their U.S.- and Canada-based Zoom conversations were being routed, the researchers discovered encryption keys were sometimes sent to Beijing, though would be handled by servers in other countries, too.

Zoom's CEO apologizes for its many security issues as daily users balloon to 200 million

Zoom's CEO apologizes for its many security issues as daily users balloon to 200 million

In a blog post published Wednesday, Yuan said usage had increased by 1,900%, with 200 million daily free and paying users in March, up from 10 million at the end of December.

​People In Kentucky Are Getting Ankle Monitors For Breaking Quarantine Measures

​People In Kentucky Are Getting Ankle Monitors For Breaking Quarantine Measures

As many parts of the world remain on lockdown to help stop the spread of the novel coronavirus, authorities in Kentucky have introduced news measures to ensure people are following orders - by making them wear ankle monitors.

Baltimore board OKs surveillance planes amid opposition

Baltimore board OKs surveillance planes amid opposition

BALTIMORE -- Baltimore officials determined to reduce violent crime have approved an eyes-in-the-sky program that uses surveillance planes to create a visual record of everything that can be seen in the streets below.

Saudi Arabia Exploiting Wireless SS7 Flaw to Track Targets In The United States

Saudi Arabia Exploiting Wireless SS7 Flaw to Track Targets In The United States

U.S. carriers like AT&T, Verizon, and T-Mobile routinely receive Provide Subscriber Information (PSI) messages from foreign phone companies to help them track roaming costs for users on foreign cell plans traveling abroad.

Memento Labs, the Reborn Hacking Team, Is Struggling

Memento Labs, the Reborn Hacking Team, Is Struggling

"There’s only two developers left, and none of them are competent enough to keep up certain projects," a former Hacking Team and Memento Labs employee, who asked to remain anonymous to discuss internal issues, told Motherboard.

Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing

Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing

This is known as transport encryption, which is different from end-to-end encryption because the Zoom service itself can access the unencrypted video and audio content of Zoom meetings.

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

The company has already taken the step of disabling the passwords of Marriott Bonvoy members who had their information potentially exposed in the incident, and they will be notified to change their passwords during the next login, as well as prompted to enable multi-factor authentication.

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

The issue lies in Zoom's "Company Directory" setting, which automatically adds other people to a user's lists of contacts if they signed up with an email address that shares the same domain.

New York Attorney General Looks Into Zoom’s Privacy Practices

New York Attorney General Looks Into Zoom’s Privacy Practices

Last week, after an article on the news site Motherboard reported that software inside the Zoom iPhone app was sending user data to Facebook, the company said it was removing the tracking software.

HTTPS Is A Privacy Nightmare

HTTPS Is A Privacy Nightmare

After reading NSA files, I wouldn’t be surprised if NSA already hacked some of the big CAs. I don’t see what stops governments from issuing a subpoena for the CAs in their countries to sign a certificate so they could sniff the communication of whoever they want.

Restrictions Are Slowing Coronavirus Infections, New Data Suggest

Restrictions Are Slowing Coronavirus Infections, New Data Suggest

Harsh measures, including stay-at-home orders and restaurant closures, are contributing to rapid drops in the numbers of fevers — a signal symptom of most coronavirus infections — recorded in states across the country, according to intriguing new data produced by a medical technology firm.

Telecoms across Europe are sharing phone location data with governments as a result of the COVID-19 pandemic

Telecoms across Europe are sharing phone location data with governments as a result of the COVID-19 pandemic

The European Data Protection Supervisor (EDPS) has stated that no privacy laws are being breached – as long as there are safeguards.A potential new norm that is not good for privacy: Telecoms sharing “anonymized” location data with governments.

Microsoft pulls out of facial recognition startup AnyVision

Microsoft pulls out of facial recognition startup AnyVision

James Martin/CNET Microsoft has pulled its minority investment out of a facial recognition startup that made headlines last year for allegedly surveilling Palestinians, the tech giant said Friday.

Trolls exploit Zoom privacy settings as app gains popularity

Trolls exploit Zoom privacy settings as app gains popularity

Working and socialising from home has brought new risks to everyday life, as webcam meetings and chatroom cocktail hours contend with privacy invasions, phishing attacks and “zoombombings” – uninvited guests abusing the popular video service to broadcast shocking imagery to all.

Employees at home are being photographed every 5 minutes by an always-on video service to ensure they're actually working — and the service is seeing a rapid expansion since the coronavirus outbreak

Employees at home are being photographed every 5 minutes by an always-on video service to ensure they're actually working — and the service is seeing a rapid expansion since the coronavirus outbreak

Sneek's user base has rapidly expanded in recent weeks as companies transition en masse to work-from home — signups have increased tenfold in in the past few weeks, cofounder Del Currie told Business Insider.

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

A site to site VPN is usually used to connect an outside device to a network and is often used for commercial purposes.Examples of personal VPNs include Private Internet Access (a personal VPN service provider) – and Streisand VPN, a personal VPN that you can set up between two of your own devices.

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption for Windows, Linux, macOS, Android and iOS.Any instant messaging protocol that uses a cloud-based connection, aka a server, is a centralized service.

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

Overall, 87 percent of the Alexa sites and 46.5 percent of the .com sites use one of the 72 libraries.Additionally, 9.7 percent of the sites in the study use two or more vulnerable library versions.

The Right to Anonymity is Vital to Free Expression: Now and Always

The Right to Anonymity is Vital to Free Expression: Now and Always

And yet, our right to anonymity online remains at risk.But most importantly, there are myriad reasons why anonymity and pseudonymity remain vital tools for free expression and safety.EFF was able to successfully appeal in District Court, however, and Darkspilver’s anonymity remains protected.

Microsoft discloses new Windows vulnerability that’s being actively exploited

Microsoft discloses new Windows vulnerability that’s being actively exploited

Microsoft disclosed a new remote code execution vulnerability today that can be found in all supported versions of Windows and is currently being exploited in “limited targeted attacks” (via TechCrunch).Microsoft patches Windows 10 security flaw discovered by the NSA.

How China built facial recognition for people wearing masks

How China built facial recognition for people wearing masks

The company now says its masked facial recognition program has reached 95 percent accuracy in lab tests, and even claims that it is more accurate in real life, where its cameras take multiple photos of a person if the first attempt to identify them fails.

The Mysterious Printer Code That Could Have Led the FBI to Reality Winner

The Mysterious Printer Code That Could Have Led the FBI to Reality Winner

If Winner wasn’t found the way the complaint claims, the mysterious dot code is one other way the FBI could have found her, as the research blog Errata Security spelled out in detail.

Reject the "EARN IT Act" (s. 3398) which threatens free speech, encryption, privacy, and the nation's cybersecurity.

Reject the "EARN IT Act" (s. 3398) which threatens free speech, encryption, privacy, and the nation's cybersecurity.

We the people call upon Congress & this administration to protect our liberties, privacy, and security online as a nation by rejecting the EARN IT Act.

Surveillance Firm Says It’s Selling ‘Coronavirus-Detecting’ Cameras in US

Surveillance Firm Says It’s Selling ‘Coronavirus-Detecting’ Cameras in US

Athena's new system claims to do much the same but for people exhibiting a fever, with the system designed to send an alert if it detects someone with a higher than normal body temperature, a company representative told Motherboard in an email.

Federal government in talks with tech groups to use phone location data to track coronavirus: report

Federal government in talks with tech groups to use phone location data to track coronavirus: report

The federal government is in talks with Facebook, Google and other tech companies about ways to use smartphone location data to tackle the coronavirus, The Washington Post reported Tuesday.

Brave accuses Google of using 'hopelessly vague' privacy policies that breach GDPR

Brave accuses Google of using 'hopelessly vague' privacy policies that breach GDPR

Google has been accused of breaching one of the General Data Protection Regulation's (GDPR) principles surrounding consent that requires companies to provide a specific purpose for collecting and processing user personal data.

Google, other companies get your data if you used Verily's coronavirus site

Google, other companies get your data if you used Verily's coronavirus site

The site, designed by Verily, the life sciences arm of Google parent Alphabet, was first made public Friday at a White House press conference by President Donald Trump, who said the search giant was working with the US government to provide preliminary screening and information about coronavirus testing.

Smart home developers raise concerns about Alexa and Google Assistant security

Smart home developers raise concerns about Alexa and Google Assistant security

"[Status update] data gives platforms [like Google and Amazon] a privileged position that no one manufacturer enjoys," said Brad Russell, the Research Director of smart home devices at research firm Parks Associates Inc. Tyler Lizenby/CNET While Amazon says it doesn't sell the data it gathers to third parties or uses it for targeted advertising, that data is still of tremendous value to the company.