WA to electronically track COVID-19 patients who defy isolation orders

WA to electronically track COVID-19 patients who defy isolation orders

The WA government will spend $3 million on GPS monitoring devices to help police track citizens who flout directions to quarantine or self-isolate at home.

Houseparty’s Terms of Service and Privacy Policy Analyzed

Houseparty’s Terms of Service and Privacy Policy Analyzed

Log Data may include information such as your IP address, browser type, operating system, location, your mobile carrier, device and application IDs, the Users with whom you video chat, access date and time spent on features of the Services and other statistics and Cookie information… [emphasis added].Why you should care: While you’re using Houseparty’s app, you’re being surveilled and analyzed.

Zoom Removes Code That Sends Data to Facebook

Zoom Removes Code That Sends Data to Facebook

On Friday video-conferencing software Zoom issued an update to its iOS app which stops it sending certain pieces of data to Facebook.

Coursicle  -  Loginless – A New Standard for User Identification

Coursicle - Loginless – A New Standard for User Identification

Option D (most convenient): if the user has ever provided us with their email or phone number, they can re-enter that PII and we'll send them a link they can use to associate their device with their UUID.

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

A site to site VPN is usually used to connect an outside device to a network and is often used for commercial purposes.Examples of personal VPNs include Private Internet Access (a personal VPN service provider) – and Streisand VPN, a personal VPN that you can set up between two of your own devices.

Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account

Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account

What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app.

ReadyNAS Duo v2 Upgrade to Debian Buster

ReadyNAS Duo v2 Upgrade to Debian Buster

Put them both on an usb stick, plug it into the NAS' front port and restart it with the whole procedure.If you still get an output on the serial port you might be able to unbrick the NAS with re-flashing the uboot image.

Study ranks the privacy of major browsers. Here are the findings

Study ranks the privacy of major browsers. Here are the findings

The study found the default Brave settings provided the most privacy, with no collection of identifiers allowing the tracking of IP addresses over time and no sharing of the details of webpages visited with backend servers.

Microsoft Edge has more privacy-invading telemetry than other browsers

Microsoft Edge has more privacy-invading telemetry than other browsers

Concluding the paper, Leith writes: From a privacy perspective Microsoft Edge and Yandex are qualitatively different from the other browsers studied.Edge also sends the hardware UUID of the device to Microsoft and Yandex similarly transmits a hashed hardware identifier to back end servers.

Amazon’s Echo wants you to get rid of privacy for good

Amazon’s Echo wants you to get rid of privacy for good

Ring, the home security camera company owned by Amazon, is very open about sharing user data with police.However, knowing how Amazon shares its Echo recordings, it would be highly inappropriate to handle personal health information in the same way.

Amazon's Ring logs every doorbell press and app action

Amazon's Ring logs every doorbell press and app action

These included: a motion being detected by the cameras' sensors a "ding" of the doorbell, when its button had been pressed by a visitor a remote "on-demand" action by the user to get a live video and audio feed and/or remotely speak to a visitor Image caption A sample of the "event" database, which has been edited to obscure the device IDs In each case, the length of time the equipment was activated was also logged.

Removing a GPS tracking device from your car isn’t theft, court rules

Removing a GPS tracking device from your car isn’t theft, court rules

The search warrant was based on the idea that the man had "stolen" a GPS tracking device belonging to the government.Last Thursday, Indiana's highest court made it official, ruling that the search warrant that allowed police to recover Heuring's meth was illegal.

Airbnb Just Launched New Surveillance Bugs To Make Sure Guests Behave

Airbnb Just Launched New Surveillance Bugs To Make Sure Guests Behave

Airbnb needs to do something to keep listings risk-free, this includes monitoring social media and screening guests for those most likely to use properties to host parties that run the risk of getting out of control.

Windows 10 Privacy Guide: Settings Everyone Should Use

Windows 10 Privacy Guide: Settings Everyone Should Use

In the General privacy settings, Windows 10 allows you to turn off that advertising ID and also the ads that you see in the Start menu and other places.Microsoft will occasionally display suggestions/ads/promotions in the Windows Start menu for new apps or products that they have released.

Former Amazon executive says he switches off Alexa for "private moments"

Former Amazon executive says he switches off Alexa for "private moments"

In April last year, it was reported that Amazon employs thousands of contractors and full-time workers around the world to listen to voice recordings captured by Echo devices.

Meet the Guy Selling Wireless Tech to Steal Luxury Cars in Seconds

Meet the Guy Selling Wireless Tech to Steal Luxury Cars in Seconds

A 2017 video released by the West Midlands Police in the U.K. showed two men approach a Mercedes Benz parked in the owner's driveway; similar to Evan's video, one man stood next to the target vehicle with a handheld device, while another positioned a larger piece of tech near the home, hoping to pick up the signal emitting from the car keys stored inside.

Wearable Microphone Jamming

Wearable Microphone Jamming

Furthermore, by arranging the transducers in a ring layout, our wearable jams in multiple directions and protects the privacy of its user’s voice, anywhere and anytime, without requiring its user to manually point the jammer to the eavesdropping microphones.

There's a privacy bracelet that jams smart speakers and, hell yeah, bring it

There's a privacy bracelet that jams smart speakers and, hell yeah, bring it

What's more, the study authors note that because of the way people tend to "speak" with their hands while speaking with their actual mouths, the wearable jammer is extra effective at blocking hidden microphones at is moves around.

Say Goodbye to most Desktop and Mobile Adwares

Say Goodbye to most Desktop and Mobile Adwares

Thus, once you connected your device to the latter—note that you have to do this process on each WiFi network which you want to change the DNS values of — , just go in the WiFI settings and long press on “MyPrettyWiFi”.

Watching you watch: the tracking system of over-the-top TV streaming devices

Watching you watch: the tracking system of over-the-top TV streaming devices

Our measurements showed that tracking is prevalent on the OTT platforms we studied, with traffic to known trackers present on 69% of Roku channels and 89% of Amazon Fire TV channels.

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

If you have no patch available yet or your device is not supported anymore, you can try to mitigate the impact by some generic behavior rules: Only enable Bluetooth if strictly necessary.

Weather.com Has Become the Pawn of A Huge Data Theft Scheme

Weather.com Has Become the Pawn of A Huge Data Theft Scheme

Don’t visit to find out, especially if you’re on a mobile device: the website has been compromised by a malicious advertising (malvertising) attack that is scraping personal information from its mobile users.

Android User Warning: Here Are 24 ‘Dangerous’ Apps With A Dark Secret—And 382 Million Installs

Android User Warning: Here Are 24 ‘Dangerous’ Apps With A Dark Secret—And 382 Million Installs

And so the team says it decided to investigate, finding links to a Chinese company called Shenzhen HAWK that is “secretly” behind Hi Security as well as four other app developers.

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.” Its aim is to create a secure communication device whose hardware can be trusted, and which does protect privacy.

Police arrested an innocent man for murder using Google location data

Police arrested an innocent man for murder using Google location data

Police then turned to Google to help them crack the case, issuing a warrant for geofence information on all the active accounts in the area at the time of the crime, according to a report from the Phoenix New Times.

Scottish police debuts portable 'cyber kiosks' that lets officers scan smartphones and laptops

Scottish police debuts portable 'cyber kiosks' that lets officers scan smartphones and laptops

The current process for reviewing on-device data could last for several months as devices were retrieved at crime scenes and sent to special labs for further analysis, which would leave both suspects, victims, and witnesses subject to the same frustrating wait times.‘The introduction of cyber kiosks will enable us to quickly identify if a device contains material related to an investigation,’ a video from the Scotland Police explains.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

Open Contacts  -  F-Droid - Free and Open Source Android App Repository

Open Contacts - F-Droid - Free and Open Source Android App Repository

read the contents of your shared storage.Allows the app to read the contents of your shared storage.Allows the app to write the contents of your shared storage.Allows the app to access the phone features of the device.

US Government-funded Android phones come preinstalled with unremovable malware

US Government-funded Android phones come preinstalled with unremovable malware

An Android phone subsidized by the US government for low-income users comes preinstalled with malware that can't be removed without making the device cease to work, researchers reported on Thursday.

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.