Strategic autonomy in danger: European Tech companies warn of lowering data protection levels in the EU.

Strategic autonomy in danger: European Tech companies warn of lowering data protection levels in the EU.

In the course of the initiative "Fighting child sexual abuse: detection, removal, and reporting of illegal content", the European Union plans to abolish the digital privacy of correspondence.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Constitutional court bans bulk Internet surveillance in South Africa

Constitutional court bans bulk Internet surveillance in South Africa

The minister of state security had appealed an earlier high court judgment on the legality of bulk communication surveillance The concourt held that section 2 of the National Strategic Intelligence Act of 1994 is ambiguous, and should be interpreted in a manner that best promotes the right to privacy, and does not contradict the prohibition of communication interceptions without interception directions contained in Rica, the legislation that governs the lawful interception of communications.

No, Cellebrite cannot 'break Signal encryption.'

No, Cellebrite cannot 'break Signal encryption.'

Last week, Cellebrite posted a pretty embarrassing (for them) technical article to their blog documenting the “advanced techniques” they use to parse Signal on an Android device they physically have with the screen unlocked.

The pandemic has taken surveillance of workers to the next level

The pandemic has taken surveillance of workers to the next level

Monitoring what people are doing is not the same thing as measuring their work output.

Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

"Together", the new version of Jami and a new step forward

"Together", the new version of Jami and a new step forward

Jami undergoes continuous ongoing development and release, so you can experience improvements and new features as we implement them.However, organizations wishing to use Jami require a higher level of control over users of their network, so we have created Jami Account Management Server (JAMS).

EU laws may not require general and indiscriminate data retention

EU laws may not require general and indiscriminate data retention

On the plus side, the CJEU does say that information and evidence obtained as a result of indiscriminate retention of traffic and location data in breach of EU law should be disregarded in court cases.

The Why and How of Privacy and Security

The Why and How of Privacy and Security

Server-side means that only information stored on said server is encrypted.This means that the company has the encryption key, and therefore can access your communication (yes, including your nudes).

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Toyota has expanded its collaboration with Amazon Web Services in ways that will see many of its models upload performance data into the Amazonian cloud to expand the services the auto-maker offers to drivers and fleet owners.

The Self-Destructive Quest for Perfection

The Self-Destructive Quest for Perfection

This week I was reintroduced to a phrase I’m coming to love as I interact with the privacy community: “don’t let perfection be the enemy of good enough.” If you recommend Signal to someone for it’s security, someone else will complain that Signal uses phone numbers and AWS as a backbone.

Welcome to Element!

Welcome to Element!

Welcome to a whole new beginning for Riot: welcome to your new Element, one where mainstream Matrix users will enjoy themselves too - and which will pave the way for wider adoption of open, secure, decentralised communication via Matrix throughout the world.- Matthew, Amandine, and the whole Element team.

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The Pakistan Telecommunications Authority (PTA) has issued a reminder that all VPN users need to register their VPN tunnel with their internet service provider (ISP) by June 30th, 2020.

Why Metadata Matters

Why Metadata Matters

Let’s take a look at how revealing metadata can actually be to the governments and companies that collect it: They know you rang a phone sex line at 2:24 am and spoke for 18 minutes.

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

'New IP' proposal is said to theoretically offers more proficient and well-organised network management and addressing capabilities than the current TCP/IP standard, but it also seems to have features that could allow authoritarian regimes, such as China, to censor their residents.

NASA under 'significantly increasing' hacking, phishing attacks

NASA under 'significantly increasing' hacking, phishing attacks

NASA has seen "significantly increasing" malicious activity from both nation-state hackers and cybercriminals targeting the US space agency's systems and personnel working from home during the COVID-19 pandemic.

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption for Windows, Linux, macOS, Android and iOS.Any instant messaging protocol that uses a cloud-based connection, aka a server, is a centralized service.

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

“They’re shocked when we give them their password and tell them where we found it, but it doesn’t hit as hard as when we tell them their entire home automation system has been potentially online and viewable for three or five or eight years,” he said.

Secure Messaging: A Spy Primer

Secure Messaging: A Spy Primer

When I choose a secure messaging app, I pick apps that protect the most important thing to me… my personal data.Terms of Use/Service offer little/no data protection because they assume a user is engaging in a free service with the company.

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

On January 18, the government issued a new order relaxing the ban a teeny-weeny bit by allowing people in two districts of the Valley to access a limited number of “whitelisted” sites on post-paid mobile connections at 2G speed.

New security system to revolutionise privacy

New security system to revolutionise privacy

A new uncrackable security system created by researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) is set to revolutionise communications privacy.

How to Reclaim Your Privacy

How to Reclaim Your Privacy

Go through all of your apps and turn off location for the ones that don’t need it - or change the setting so they can only get your location while you’re using the app.Don’t let apps access to your Bluetooth unless they really need it.

Wire Business Update

Wire Business Update

Wire stands by its mission to best protect communication data with state-of-the-art technology and practice: All source code has been and will be available for inspection on GitHub ().Wire believes that data protection is best achieved through state-of-the-art encryption and continues to innovate in that space with Messaging Layer Security (MLS).

Tutanota is blocked in Egypt. Here's what you can do.

Tutanota is blocked in Egypt. Here's what you can do.

Whenever a site is blocked in your country or by your Internet Service Provider (ISP), you can access this site with the help of the Tor browser or via a VPN.

South African court rules that mass surveillance by the government is illegal

South African court rules that mass surveillance by the government is illegal

Previously, the South African government has used a law called RICA (Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002) to justify mass surveillance programs.

New Protest Tactics in Hong Kong

New Protest Tactics in Hong Kong

A banner used by a Hong Kong protester.Hong Kong protesters turn to Uber and Pokemon.In late July, Hong Kong protesters returning from a demonstration were attacked by a group of men wearing white shirts.

Facebook learned about Cambridge Analytica as early as September 2015, new documents show

Facebook learned about Cambridge Analytica as early as September 2015, new documents show

Facebook said the scraping of public profiles is distinct from the data Cambridge Analytica reportedly used from users' friends who did not consent to sharing their data.Still, the documents show that Facebook was aware of potential policy violations by Cambridge Analytica as early as September 2015.

US20090237236A1 - Tooth located gps person tracking and location method and apparatus - Google Patents

US20090237236A1 - Tooth located gps person tracking and location method and apparatus - Google Patents

a microchip including a transceiver for transmitting a wireless signal containing geographic information relating to the physical location of a person, the microchip adapted to be mounted in a tooth of a person;.

Attack by Chinese hacker group targeted high-profile individuals around the world

Attack by Chinese hacker group targeted high-profile individuals around the world

A hacker attack of impressive magnitude targeted specific individuals of interest to the Chinese government as they moved around the world, in what appears to be the first such operation in the history of cyberespionage.

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

The NSA’s telephone record program, conducted under Section 215 of the Patriot Act, allows it to collect metadata of phone calls, including phone numbers, time stamps, and other identifying information.