Facial Recognition, Social Media Scouring Used to Vet National Guard

Facial Recognition, Social Media Scouring Used to Vet National Guard

With 25,000 National Guard members set to protect D.C. for Joe Biden 's inauguration, each member has been subject to a heavy vetting, which includes high-tech facial recognition.FBI vetting -- which is normal for high-security events -- begins by checking social media accounts, looking for connections to extremist groups.

Apple Responds to macOS Privacy Concerns, Explains Why Apps Were Slow to Launch

Apple Responds to macOS Privacy Concerns, Explains Why Apps Were Slow to Launch

On top of this, Apple says “over the next year we will introduce several changes to our security checks,” specifically: a new encrypted protocol for Developer ID certificate revocation checks strong protections against server failure a new preference for users to opt out of these security protections Apple also gave some further technical information on the situation to iPhone in Canada.

New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they're not even in use?

New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they're not even in use?

"Google designed and implemented its Android operating system and apps to extract and transmit large volumes of information between Plaintiffs’ cellular devices and Google using Plaintiffs’ cellular data allowances," the complaint claims.

How can “interoperability” strengthen our choices and privacy online?

How can “interoperability” strengthen our choices and privacy online?

An equivalent technical interoperability requirement for the largest social media and messaging platforms would enable interconnection between very large services (such as Facebook/WhatsApp/Instagram) and services run by other organisations and even individuals that wish to.

Urbit is for Communities

Urbit is for Communities

When I think of the places in the physical world where people seem to feel the most at home, they’re places that have evolved over long periods of time and are owned by the communities that inhabit them.

French bar owners arrested for offering free WiFi but not keeping logs

French bar owners arrested for offering free WiFi but not keeping logs

The law No. 2006-64 extends the traditional ISP logging requirements “to all persons who, in respect of an activity primary or secondary professional, offer the public a connection allowing on-line communication via network access, including free of charge.” Violating this crime means that the owner of a small cafe that offers WiFi to patrons could face up to one year in prison and up to a 75,000 euro fine.

Decentricity:

Decentricity:

Wireless internet is broadcast out of every node in the meshnet, and provides connectivity for other devices in the network that aren't nodes.Commotion Wireless is a meshnet implementation that aims to create community wireless networks from the outset.

Signal >> Blog >> Your next upgrade deserves an upgrade

Signal >> Blog >> Your next upgrade deserves an upgrade

Signal iOS now includes a new feature that makes it possible to switch to a brand-new iPhone or iPad while securely transferring Signal information from your existing iOS device.Look for the migration prompt on your existing device, and confirm whether or not you want to initiate the transfer process.

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

The VPN bypass bug in iOS 13.3.1 and later causes some internet connections to continue with their original, unencrypted connection – which is a security and privacy concern.Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization.

Private Internet Access announces Wireguard VPN Beta

Private Internet Access announces Wireguard VPN Beta

Private Internet Access has long had established server-client connection best practices for all of our VPN connection types such as OpenVPN and IPSec. We have added these best practices to our WireGuard implementation to ensure the same no logging VPN service that our users expect and will always get.

Popular Android phones can be tricked into snooping on their owners

Popular Android phones can be tricked into snooping on their owners

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption,” said Syed Rafiul Hussain and Imtiaz Karim, two co-authors of the research, in an email to TechCrunch.

Facebook wants to manage Wi-Fi on your phone

Facebook wants to manage Wi-Fi on your phone

If the current Wi-Fi connection is considered undesirable, users are given options to send network feedback: “Connection is too slow”, “Network isn’t secure” and/or “Connection drops off”.For now, with this feature turned on, the app will periodically send your geolocation to Facebook’s server to get a list of nearby recommended networks.

5G Is Here—and Still Vulnerable to Stingray Surveillance

5G Is Here—and Still Vulnerable to Stingray Surveillance

Pencils Up. The researchers disclosed the issues to the telecom standards body GSMA and hopes to work with carriers to encourage 5G implementations that apply security and data protections to the cell tower connection process as early in the interaction as possible.

What a No-Carrier Phone Could Look Like

What a No-Carrier Phone Could Look Like

You could flip the Cellular Modem Hardware Kill Switch (HKS) on your Librem 5 and still call or text from your primary phone number while at that coffee-shop WiFi. This would offer you the ability to have a no-carrier phone–in either form–that now you only have when on WiFi–which means no triangulation-location tracking from cellular towers.

FasterChrome speeds up Chrome browsing

FasterChrome speeds up Chrome browsing

FasterChrome is a new browser extension for Google Chrome that speeds up browsing in the web browser by preloading certain pages. FasterChrome works automatically on any page you visit in the Chrome web browser and on most links.

Kaspersky VPN Now Blocks 'Pirate' Sites in Russia

Kaspersky VPN Now Blocks 'Pirate' Sites in Russia

As a result, if tools with the ability to circumvent the blacklist don’t play ball by respecting its contents, they also face being blocked by ISPs. This proposal came to head earlier this year when telecoms watchdog Roscomnadzor wrote to several major VPN providers – NordVPN, ExpressVPN, TorGuard, IPVanish, VPN Unlimited, VyprVPN, Kaspersky Secure Connection, HideMyAss!, Hola VPN, and OpenVPN – demanding compliance .

London’s Tube network to switch on wi-fi tracking by default in July

London’s Tube network to switch on wi-fi tracking by default in July

To deliver data of the required detail, TfL says detailed digital mapping of all London Underground stations was undertaken to identify where wi-fi routers are located so it can understand how commuters move across the network and through stations.

Slicing onions: Part 1 - Myth-busting Tor.

Slicing onions: Part 1 - Myth-busting Tor.

When the exit node receives its packet, it will remove the last layer of encryption with its key, and find the destination address that the user wanted to connect to, and forward the packet to that address.

Facebook Expects to Be Fined Up to $5 Billion by F.T.C. Over Privacy Issues

Facebook Expects to Be Fined Up to $5 Billion by F.T.C. Over Privacy Issues

SAN FRANCISCO — Facebook said on Wednesday that it expected to be fined up to $5 billion by the Federal Trade Commission for privacy violations, in what would be a record penalty by the agency against a technology company.

Impact of 5G on Location technology

Impact of 5G on Location technology

In the modern world, it means that 5G is stepping up, bringing entirely new techniques that improve and speed the location technology. The fifth generation of mobile connectivity brings everyone the chance to see the exact routes and up-to-date location information.

Encrypt that SNI: Firefox edition

Encrypt that SNI: Firefox edition

As promised, our friends at Mozilla landed support for ESNI in Firefox Nightly, so you can now browse Cloudflare websites without leaking the plaintext SNI TLS extension to on-path observers (ISPs, coffee-shop owners, firewalls, …).

Fingerprinting TLS clients with JA3

Fingerprinting TLS clients with JA3

This article is a short guide to using JA3 for fingerprinting TLS clients, with possible use cases and a simple demo. At the implementation level this can translate to: advertising dummy future ciphers each time in order to create unique fingerprints.

Recode Daily: Another day, another Facebook privacy scandal

Recode Daily: Another day, another Facebook privacy scandal

The data was uploaded by third-party Facebook app developers: Mexican media company Cultura Colectiva and an app called At the Pool. Sign up for our Recode Daily newsletter to get the top tech and business news stories delivered to your inbox.

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

A team of four researchers from South Korea’s KAIST, the country’s premier tech institution, have discovered 36 new vulnerabilities in 4G LTE that have wide ranging security and privacy implications.

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

AS SMARTPHONE brands try and outdo each other with the craziest new designs and cutting edge technology, to keep us glued to our phones, a Swiss company called Punkt is taking a decidedly different tack.

University of Michigan Internet-Wide Scanning Research

University of Michigan Internet-Wide Scanning Research

The data collected through these connections consists only of information that is already publicly visible on the Internet. It helps computer scientists study the deployment and configuration of network protocols and security technologies.

The Mystery of That Taylor Swift Face Recognition Kiosk Has Been Solved

The Mystery of That Taylor Swift Face Recognition Kiosk Has Been Solved

When asked if ISM Connect had supplied its kiosk to Swift’s Rose Bowl show, Becker responded: “Yes, Taylor Swift’s tour used ISM Connect technology to improve the fan experience and the safety and security of the event.” Becker also detailed how the surveillance system, called FanGuard, worked: “We positioned large screens at each of the entrance points in the venues that hosted Taylor’s tour.

NIST Round 2 and Post-Quantum Cryptography (part 1)

NIST Round 2 and Post-Quantum Cryptography (part 1)

This means that a breakdown of the asymmetric session at the beginning of the connection, leads to the attacker being able to read the secret key for AES, which breaks the encryption for the rest of the connection.

OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019

OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019

Here is what the OpenVPN Community is working on: Hallmark Feature: Plugin support for Pluggable Transports.

Rate My VPN

Rate My VPN

For the first part of the test, information about your regular connection will be collected, which will make rating your VPN so much easier for you and me. Current download speed estimate: Mbit/s Generating results... RateMyVPN.org gives your VPN a rating of points.