Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

The issue lies in Zoom's "Company Directory" setting, which automatically adds other people to a user's lists of contacts if they signed up with an email address that shares the same domain.

At Home with EFF: An Online Discussion of COVID-19 and Digital Rights

At Home with EFF: An Online Discussion of COVID-19 and Digital Rights

Then, join Staff Attorney Saira Hussain, who will talk to Cindy about surveillance, the spread of coronavirus, and the need to preserve our privacy.6:00-6:30: Surveillance and the Spread of COVID-19: Protecting Privacy During a Pandemic with Staff Attorney Saira Hussain and Cindy Cohn.

Personal privacy matters during a pandemic — but less than it might at other times

Personal privacy matters during a pandemic — but less than it might at other times

Individual privacy and the risks that can come from the disclosure of personal health information — like stigma — are still critical concerns for public health officials, Lee stresses.But the actions public health officials can take, like collecting information, aren’t designed to limit privacy, Fairchild says.

Apple Watch helps cops catch man lying about synagogue stabbing

Apple Watch helps cops catch man lying about synagogue stabbing

A 26-year-old man faked his own stabbing at the West Bloomfield synagogue where he worked and then reported he was attacked because of his Jewish faith, authorities say.

Facebook, Google Fund Nonprofits Shaping Federal Privacy Debate

Facebook, Google Fund Nonprofits Shaping Federal Privacy Debate

The tech giants have “funded scores of nonprofits, including consumer and privacy groups, and academics,” said Jeffrey Chester, executive director at the Center for Digital Democracy, a public interest group that does not accept donations from Google or Facebook.

Dnsmasq-based DNS blocking

Dnsmasq-based DNS blocking

3600 IN A 104.198.14.52 ;; Query time: 155 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Mon Nov 11 18:47:14 GMT 2019 ;; MSG SIZE rcvd: 56) And successfully blocks the cancer that is Google!.

BleachBit 3.0

BleachBit 3.0

The latest release brings major improvements to the user interface, speed, cleaning thoroughness, and application reliability.Improve actual speed of application startup.(Thanks to Tobias-B-Besemer.)(Reported by Tobias-B-Besemer.)Add search="" to delete the top directory and all its contents.

Social Credit Scoring In China Extends To Foreign Businesses, Creates New Risks

Social Credit Scoring In China Extends To Foreign Businesses, Creates New Risks

Beginning next year, compliance will be enforced by China's Ministry of Public Security over access to corporate data housed on Chinese servers.Jacobson advises managers of foreign companies in China to rethink how data is collection and how it is stored.

Can you give away your fingerprints in a photo?

Can you give away your fingerprints in a photo?

Going to such lengths to protect your fingerprints might seem extreme, but incentives to bypass biometric security are growing as it increasingly shows up in everything from smartphones to door locks.“As biometrics become more prevalent in the authentication process, motivated attackers will definitely find innovative ways to bypass them,” said Vivek Chudgar, senior director at Mandiant, a consulting arm of cybersecurity firm FireEye. But some experts say harvesting fingerprints from pictures requires some specific conditions.

NSA vs. civil liberties groups on phone surveillance

NSA vs. civil liberties groups on phone surveillance

U.S. intelligence officials have asked Congress to permanently extend a controversial program that has allowed the National Security Agency to collect millions of telephone records.Since the call records program was voluntarily suspended, there’s no legal impediment to the NSA resuming collection before Section 215 of the Patriot Act expires in December.

You Know That Mobile Phone Tracking Data You Used As Evidence In Over 10,000 Court Cases? Turns Out Some Of It Was Wrong, But We're Not Sure Which Yet

You Know That Mobile Phone Tracking Data You Used As Evidence In Over 10,000 Court Cases? Turns Out Some Of It Was Wrong, But We're Not Sure Which Yet

In addition, Denmark's director of public prosecutions has ordered a two-month halt in the use of this location data in criminal cases while experts try to sort out the problems: The first error was found in an I.T. system that converts phone companies' raw data into evidence that the police and prosecutors can use to place a person at the scene of a crime.

EFF and Mozilla to Venmo: Clean Up Your Privacy Settings

EFF and Mozilla to Venmo: Clean Up Your Privacy Settings

San Francisco – The Electronic Frontier Foundation (EFF) and Mozilla have teamed up in an open letter to Venmo, telling the popular payment app to clean up its privacy settings, which leaves sensitive financial data exposed to the public.

Google and Mozilla move to stop Kazakhstan 'snooping'

Google and Mozilla move to stop Kazakhstan 'snooping'

It comes after reports internet services providers in the country have required people to install a government-issued certificate on all devices and in every browser.

Opinion | What We’ve Learned From Our Privacy Project (So Far)

Opinion | What We’ve Learned From Our Privacy Project (So Far)

It’s unnervingly easy to violate the privacy of others — purposefully or inadvertently — using surveillance tools accessible to most everyone.

DOJ and FBI Show No Signs of Correcting Past Untruths in Their New Attacks on Encryption

DOJ and FBI Show No Signs of Correcting Past Untruths in Their New Attacks on Encryption

Last week, Attorney General William Barr and FBI Director Christopher Wray chose to spend some of their time giving speeches demonizing encryption and calling for the creation of backdoors to allow the government access to encrypted data.

Police will 'struggle' to track criminals via 5G

Police will 'struggle' to track criminals via 5G

Speaking to Reuters, Europol director Catherine De Bolle said the ability to carry out surveillance via current 4G networks was "one of the most important investigative tools that police officers and services have".

Opinion | What if All Your Slack Chats Were Leaked?

Opinion | What if All Your Slack Chats Were Leaked?

Slack should give everyone the same privacy protections available to its paying enterprise customers and let all of its users decide for themselves which messages they want to keep and which messages they want to delete.

Former NSA director would support ending phone data collection program

Former NSA director would support ending phone data collection program

In an interview in March , current NSA Director and Commander of U.S. Cyber Command Gen. Paul Nakasone told CBS News the agency was in a "deliberative process" about the future of the program and would work "very, very closely with the administration and Congress on what authority should be reauthorized.".

Can the Free Market Save Privacy?

Can the Free Market Save Privacy?

In the midst of this data crisis, lawmakers have started looking to for-profit, privacy-focused companies for ideas on how the free marketplace might help with solutions. and DuckDuckGo just happen to both be search engines, but there are other examples of profitable companies that make money while still respecting user privacy.

Don't Trust the FBI to Properly Use Its Massive Facial Recognition Database

Don't Trust the FBI to Properly Use Its Massive Facial Recognition Database

"Using a series of Freedom of Information requests Big Brother Watch" found that "Metropolitan Police's facial recognition matches were 98% inaccurate, misidentifying 95 people at last year's Notting Hill Carnival as criminals," the civil liberties organization reports.

Watchdog says FBI has access to about 640M photographs

Watchdog says FBI has access to about 640M photographs

It contains about 36 million photographs, according to Gretta Goodwin of the GAO.But taking into account the bureau contracts providing access to driver’s licenses in 21 states, and its use of photos and other databases, the FBI has access to about 640 million photographs, Goodwin told lawmakers at the House oversight committee hearing.

We messed up everything. And it’s great.

We messed up everything. And it’s great.

We need more interactions, more connections between those social platforms to let users be really free. Can we get back our freedom on the internet with a secure data privacy. It’s a decentralized social networking protocol based upon the [ActivityStreams] 2.0 data format.

Heedless of warnings,people don’t change passwords

Heedless of warnings,people don’t change passwords

As said by Jan Oetjen, the Managing Director of GMX “It’s important for everyone to take the security of their email accounts seriously, as these are at the center of our digital lives.

Bernie Sanders' BERN Will Search And Target Voters

Bernie Sanders' BERN Will Search And Target Voters

by Laurie Sullivan , Staff Writer @lauriesullivan, 8 hours ago Senator and presidential hopeful Bernie Sanders during a rally on Saturday announced an online tool that allows anyone to contribute to the campaign's voter database, apparently without the opt-in of the owner of the personally identifiable information.

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

It is developed as an offensive pentration testing tool, which is used to scan memory for private keys, ips, and passwords using regexes. Scan with verbose and with a simple IP regex, scanning only heap and stack.

Modern policing: Algorithm helps NYPD spot crime patterns

Modern policing: Algorithm helps NYPD spot crime patterns

(AP Photo/Mark Lennihan) The software, dubbed Patternizr, allows crime analysts stationed in each of the department's 77 precincts to compare robberies, larcenies and thefts to hundreds of thousands of crimes logged in the 's database, transforming their hunt for crime patterns with the click of a button.

2019’s First Data Breach: It Took Less than 24 Hours

2019’s First Data Breach: It Took Less than 24 Hours

The details of an estimated 30,000 Australian civil servants were stolen when a directory was downloaded by an unauthorised third party – believed to have phished the email address of a government employee in the state of Victoria.

All computers now under govt. watch

All computers now under govt. watch

According to the order, the subscriber or service provider or any person in charge of the computer resource will be bound to extend all facilities and technical assistance to the agencies and failing to do will invite seven-year imprisonment and fine.

Facts About Facebook’s Messaging Partnerships

Facts About Facebook’s Messaging Partnerships

We worked closely with four partners to integrate messaging capabilities into their products so people could message their Facebook friends — but only if they chose to use Facebook Login.

New Release: Tor 0.3.5.6-rc

New Release: Tor 0.3.5.6-rc

Packages should be available over the coming weeks, with a new alpha Tor Browser release by early February. Minor features (fallback directory list): Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in January 2018 (of which ~115 were still functional), with a list of 157 fallbacks (92 new, 65 existing, 85 removed) generated in December 2018.