I Asked Reddit’s “r/privacy” What Tools They Use to Protect Themselves— Here’s What They Said.

I Asked Reddit’s “r/privacy” What Tools They Use to Protect Themselves— Here’s What They Said.

Reddit User, rabicanwoosley suggests uMatrix, described as: “Point & click to forbid/allow any class of requests made by your browser.Do we really need 500 lists going over the same ground again and again ?And beyond some basics, much of your security and privacy is more dependent on your behavior, and that of your friends and family, than on tools.

Europe can win global battle for industrial data, says EU industry chief

Europe can win global battle for industrial data, says EU industry chief

Vast troves of data from how fast we drive our cars to how much time a robot needs to churn out products will open a new front in the battle for digital dominance, said Thierry Breton, the European Commissioner in charge of the bloc’s single market.

How Big Companies Spy on Your Emails

How Big Companies Spy on Your Emails

Motherboard has also obtained documentation that provides more specifics about how two other popular apps—Cleanfox and Slice—sell products based on users' emails to corporate clients.

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

The proposal, which includes reining in big online platforms and could still be tweaked ahead of their presentation on Feb. 19, underlines the EU’s determination to break U.S. tech giants’ stranglehold on vast troves of data and better compete with Chinese rivals.

Technical analysis of client identification mechanisms

Technical analysis of client identification mechanisms

The other versioning scheme, Last-Modified, suffers from the same issue: servers can store at least 32 bits of data within a well-formed date string, which will then be echoed back by the client through a request header known as If-Modified-Since.

The California DMV Is Making $50M a Year Selling Drivers’ Personal Information

The California DMV Is Making $50M a Year Selling Drivers’ Personal Information

The California Department of Motor Vehicles is generating revenue of $50,000,000 a year through selling drivers’ personal information, according to a DMV document obtained by Motherboard.Lawmakers introduced the Driver's Privacy Protection Act (DPPA) in 1994 after a private investigator hired by a stalker obtained the address of actress Rebecca Schaeffer from the DMV.

How cash is becoming a thing of the past | DW Documentary (Banking documentary)

How cash is becoming a thing of the past | DW Documentary (Banking documentary)

And digital payment companies like Paypal or Visa simply want to profit from money transactions and collect as much financial data about consumers as they can.But as our financial behavior becomes more and more transparent, states are also using payment data to find out more about us.

Sidewalk Labs document reveals company’s early vision for data collection, tax powers, criminal justice

Sidewalk Labs document reveals company’s early vision for data collection, tax powers, criminal justice

Fred Lum. A confidential Sidewalk Labs document from 2016 lays out the founding vision of the Google-affiliated development company, which included having the power to levy its own property taxes, track and predict people’s movements and control some public services.

Beyond Aadhaar: India wants to create a giant centralized facial recognition database

Beyond Aadhaar: India wants to create a giant centralized facial recognition database

As that indicates, the idea is that any kind of image – whether a photograph, a drawing, or a CCTV feed capture – can be run against the database to search for matches.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

Embetty displays remote content like tweets or videos without compromising your privacy.yarn add @heise/embetty.: $ git clone $ cd embetty $ yarn $ yarn build Supported embed types.The Embetty server component does not proxy video data .

TSA Testing Face Recognition at Security Entrances, Opening Door to Massive Expansion of the Technology

TSA Testing Face Recognition at Security Entrances, Opening Door to Massive Expansion of the Technology

If widely deployed, the TSA's program would (as we said of the CBP program) socialize people to accept face recognition and normalize the technology, inevitably be subject to mission creep, and expose people to the judgments of unreliable and biased algorithms.

Netflix’s new documentary “The Not So Surprising Hack”

Netflix’s new documentary “The Not So Surprising Hack”

Earlier this month, Facebook got fined with 5 billion dollars.“The Great Hack” unfolds the true story of the data and privacy scandal in a narrative that is thrilling, but foremost frightening.Will they actually listen when, as mentioned in the documentary, data has surpassed oil in value?

Everything you wanted to know about media metadata, but were afraid to ask

Everything you wanted to know about media metadata, but were afraid to ask

You can explode a flattened PDF into individual images of the pages using PDF Redact Tools, then feed the pages into Tesseract to create a text document that can be worked on with any language processing tool.

Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

CVE-2019-9849 : This vulnerability, which you can fix by installing the latest available update, could allow the inclusion of remote arbitrary content within a document even when 'stealth mode' is enabled.

Police facial recognition could target 'literally anybody', senior MP says

Police facial recognition could target 'literally anybody', senior MP says

According to internal documents uncovered by Sky News, South Wales Police - the force leading the Home Office-backed trial of the controversial technology - places "persons where intelligence is required" on its watchlists, alongside wanted suspects and missing people.

Google executive refuses to commit to independent audit during Senate hearing

Google executive refuses to commit to independent audit during Senate hearing

Karan Bhatia , Google vice president of global government affairs and public policy, demurred when pressed by senators to undergo an independent audit of the company’s content management practices, as both Facebook and Twitter have done, saying his company is in a “very different situation.”.

Chilling undercover footage taken inside China's most oppressive region shows it's virtually impossible to escape the paranoid police state

Chilling undercover footage taken inside China's most oppressive region shows it's virtually impossible to escape the paranoid police state

A chilling new documentary created by two undercover reporters reveals the paranoia at the heart of China's 21st-century police state in Xinjiang, the western frontier region where authorities are cracking down on millions of Muslims.

Insider Blows Whistle & Exec Reveals Google Plan to Prevent “Trump situation” in 2020 on Hidden Cam

Insider Blows Whistle & Exec Reveals Google Plan to Prevent “Trump situation” in 2020 on Hidden Cam

An additional document Project Veritas obtained, titled “Fair is Not the Default” says “People (like us) are programmed” after the results of machine learning fairness.

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of exploits.

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

In the second version, the Council of the EU is much more assertive: The rulings of the European Court of Justice in the cases Digital Rights Ireland and Tele 2, which set out the criteria for the lawful retention of data and access thereof are of fundamental importance in this context.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

“The deceptive_news domain blacklist is going to be used by many search features to filter problematic sites that violate the good neighbor and misrepresentation policies,” the policy document says.

Updates to our Terms of Service and Privacy Policy

Updates to our Terms of Service and Privacy Policy

FamilyTreeDNA’s Terms of Service and Privacy Statement have been updated to require law enforcement, as well as any authorized representative working on behalf of law enforcement, to register all genetic files through a separate process prior to uploading to the database.

Open Source Hardware Could Defend Against Next Generation Hacking

Open Source Hardware Could Defend Against Next Generation Hacking

Shane Oberloier and Joshua Pearce , CC BY-ND The future of distributed manufacturing Making open-source hardware systems more available increases regular people’s security by giving them verifiably secure options.

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

The Timeline feature of Windows 10 makes it easier to work on multiple computers by synchronizing activity so you can move between machines and pick up from where you left off -- although it can also prove useful on a single computer.

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

More than 7,000 vulnerable temperature controlled systems , manufactured by U.K.-based firm Resource Data Management, are accessible from the internet and can be controlled by simply plugging in its default password found in documentation on the company’s website, according to Noam Rotem, one of the security researchers who found the vulnerable systems.

Dozens of Cities Have Secretly Experimented With Predictive Policing Software

Dozens of Cities Have Secretly Experimented With Predictive Policing Software

The documents obtained by Motherboard—which include PredPol contract documents, instructional manuals and slide presentations for using the software, and PredPol contract negotiation emails with government officials—were obtained from the police departments of South Jordan, UT; Mountain View, CA; Atlanta, GA; Haverhill, GA; Palo Alto, CA; Modesto, CA; Merced, CA; Livermore, CA; Tacoma, WA; and the University of California, Berkeley using public records requests.

Why Security Expectations Matter: Hidden Content is Readable in Shared Google Sheets

Why Security Expectations Matter: Hidden Content is Readable in Shared Google Sheets

In summary: contrary to the expectation set by the UI, both hidden columns and hidden sheets in shared Google Sheets documents can be viewed by anyone who can access the document, even by read-only users when exports are disabled.

Defining the tracking practices that will be blocked in Firefox

Defining the tracking practices that will be blocked in Firefox

In support of this effort, today we are releasing an anti-tracking policy that outlines the tracking practices that Firefox will block by default. With the release of our new policy, we’ve defined the set of tracking practices that we think users need to be protected against.

The National Security Agency Is A Criminal Organization

The National Security Agency Is A Criminal Organization

They just aren’t getting violent yet that we know of — internally in the US, outside is another story.” “Everybody’s afraid because all this data that’s about them, the central agencies — the intelligence agencies — they have it.” As Binney had no documents to give to the media, blowing the whistle had no consequence for NSA.