Poland made an app that forces coronavirus patients to take regular selfies to prove they're indoors or face a police visit

Poland made an app that forces coronavirus patients to take regular selfies to prove they're indoors or face a police visit

Poland on Friday released an app which requires people in quarantine for COVID-19 to periodically send selfies of themselves on request to prove they're sticking to their quarantine."People in quarantine have a choice: either receive unexpected visits from the police, or download this app," a spokesman for Poland's Digital Ministry told the AFP.

No, Facebook is not telling you everything

No, Facebook is not telling you everything

This is an issue we see both at the back end (in the download your informaiton tool) and the front end in the ads that we see , where there is a lack of transparency from Facebook on how advertisers target you.

Private Internet Access updates Linux desktop client to prevent against [CVE-2019-14899]

Private Internet Access updates Linux desktop client to prevent against [CVE-2019-14899]

[CVE-2019-14899] affects many different types of VPN protocols including OpenVPN, WireGuard, and IKEv2/IPSec. Private Internet Access has released an update to its Linux client that mitigates [CVE-2019-14899] from being used to infer any information about our users’ VPN connections.

New version of OnionShare makes it easy for anyone to publish anonymous, uncensorable websites

New version of OnionShare makes it easy for anyone to publish anonymous, uncensorable websites

It worked like this: OnionShare zips up the files, starts a local web server on your computer with a link to this zip file, makes this website accessible as a Tor onion service, and shows you the URL of the web server.

IoT Information Exposure (IMC ’19)

IoT Information Exposure (IMC ’19)

Dubois, David Choffnes (Northeastern University); Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi (Imperial College London) Venue: Internet Measurement Conference (IMC) 2019 Download Full Text (PDF) Download Presentation (will be published here on October 22, 2019) Citation: @inproceedings{ren-imc19, title={{Information Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach}}, author={Ren, Jingjing and Dubois, Daniel J.

How to stop Apple from listening to your Siri recordings

How to stop Apple from listening to your Siri recordings

On your iPhone or iPad, head to GitHub to download the “Prevent server-side logging of Siri commands.mobileconfig” Swith to the Raw view, tap Allow to download the profile Complete the profile installation in Settings by reviewing it and tapping Install Kaiser is also encouraging users to let Apple know if they want a more transparent option in Setting to turn off server-side Siri response logging.

GitHub - jankais3r/Siri-NoLoggingPLS: Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad

GitHub - jankais3r/Siri-NoLoggingPLS: Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad

Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad. 4 commits 1 branch 0 releases 1 contributor MIT Branch: master. Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad. Installation steps: Open the.

Just because sex toy apps can count calories doesn’t mean they should

Just because sex toy apps can count calories doesn’t mean they should

And with that firmly in mind, we turn to the matter of the day: calorie counting features in sex toy apps. And we reckon it’s unlikely this feature will make its way onto every synced-up sex toy app, largely thanks to the number of female founders heading up popular sextech startups that firmly have pleasure in mind.

No Sweat Tech: 9 Easy Ways to Create an Avatar

No Sweat Tech: 9 Easy Ways to Create an Avatar

Start by specifying whether you want to build a male or female avatar, and you’ll get basic options for face, eyes, hair, and clothes, with some subcategories of options for things like glasses, eye shape, nose, eyebrows, etc.

Proven Methods to Enjoy iTunes Audiobook on Sonos

Proven Methods to Enjoy iTunes Audiobook on Sonos

Sometimes Sonos is not so powerful to play all the audio files you want like iTunes Audiobooks. Step 2, Click the Add button and select the audiobook files you want to convert from iTunes library.

Untochat

Untochat

NOTE: If you do not have PGP/GPG software, you can verify the Untochat installation ISO-image by comparing SHA1 and SHA256 hashes, but be warned: DOING SO COULD BE LESS SECURE!

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

In this tutorial, we will learn how to boot or start Tails with different configurations and security metrics. Tails OS is mainly provided in two formats named ISO and USB image. We can set the Keyboard Layout of the Tails by click to the.

Android developers can now force app updates

Android developers can now force app updates

Half a year ago, at the Android Dev Summit, Google announced a new way for developers to force their users to update their apps when they launch new features or important bug fixes. Android developers can now force users to update their apps.

Online Anonymity Guide

Online Anonymity Guide

If they ask why you need it or you are worried about asking somebody to download this for you, you can say you do some jouralism and like to keep your files safe. You need to import the public key of the user that signed the message.

Is Apple really better about privacy? Here's what we found out

Is Apple really better about privacy? Here's what we found out

Unlike Facebook and Google, Apple says it scrambles this information and looks at patterns of usage, not at who it’s coming from.

Google and Privacy, a Trust Issue | One Step Closer to the Black Mirror.

Google and Privacy, a Trust Issue | One Step Closer to the Black Mirror.

Now that you can access my activity page here you can see how much Google has kept track of your data. As explained earlier the only possible answer to the question is that Google uses all this data to cater to businesses.

GitHub - tg12/OpenMailRelayFuzzer: Fuzzer for finding Open Mail Relays

GitHub - tg12/OpenMailRelayFuzzer: Fuzzer for finding Open Mail Relays

Launching GitHub Desktop... Launching GitHub Desktop... If nothing happens, download GitHub Desktop and try again. If nothing happens, download GitHub Desktop and try again. If nothing happens, download the GitHub extension for Visual Studio and try again. Latest commit 967870c.

Future Android ‘system updates’ could be initiated from the Google Play Store [APK Insight]

Future Android ‘system updates’ could be initiated from the Google Play Store [APK Insight]

If Google Play is indeed referring to OS updates, the strings — at the very least — suggest that users could initiate downloads and installs for new versions of Android right from the Play Store.

UC Browser for Android, Desktop Exposes 500+ Million Users to MiTM Attacks

UC Browser for Android, Desktop Exposes 500+ Million Users to MiTM Attacks

The extremely popular UC Browser and UC Browser Mini Android applications with a total of over 600 million installs expose their users to MiTM attacks by downloading and installing extra modules from their own servers using unprotected channels and bypassing Google Play's servers altogether.

MailStack - Multi Domain Temporary Mail

MailStack - Multi Domain Temporary Mail

MailStack Provide You Temporary E-mails, You can create Unlimited E-mail without Deleting Previous one, MailStack have number of white listed domain names that can use to Sing-up anywhere Check the mails in any mailbox in seconds. - No need to create mailbox!

Mesibo/messenger-app-android: Open Source Messenger App For Android

Mesibo/messenger-app-android: Open Source Messenger App For Android

Mesibo Messenger for Android Mesibo Messenger is an open-source app with real-time messaging, voice and video call features. To download, open a terminal and issue following commands: $ mkdir Messenger $ cd Messenger $ git clone

Checksum checking server

Checksum checking server

It is also usable in west countries because with cooperation of telecom companies software publisher can know if a IT company is downloading or ordinary user which cannot detect an unknown spyware this system can also be P2P but without a fully decentralized protocol it doesn't make any effect in being lobby-proof.

Japan plans to hack into millions of its citizens’ connected devices

Japan plans to hack into millions of its citizens’ connected devices

The Japanese government will try to hack into internet-connected devices in homes and offices around the country starting from next month as part of efforts to improve cybersecurity, NHK World-Japan reports . It will be conducted by Japan’s National Institute of Information and Communications Technology (NICT).

The 8 Best Private Browsers for Phones and Tablets

The 8 Best Private Browsers for Phones and Tablets

Red Onion Available on: iPhone and iPad Let’s switch tack and have a look at some browsers that let you access the Tor network and the dark web.

Thank You Google!! For Sharing my data

Thank You Google!! For Sharing my data

We depend on most of things from our personal to professional life on Google and it’s app. The usage and intervention of Google apps are so high in our life that we don’t even think for a second before sharing our Personal and sensitive data with Google.

Blocking Unwanted Connections with a Hosts File

Blocking Unwanted Connections with a Hosts File

Select a Tip HostsNews blog & Updates To contribute a listing for our resources, or any other comments: Contact If you find the MVPS HOSTS file useful ... These updates are posted to most major security related sites, Newsgroups, and mailing lists, blogs etc.

Call for testing: 3.12~rc1

Call for testing: 3.12~rc1

:) Changes Known issues How to test Tails 3.12~rc1? First download the USB image: Tails 3.12~rc1 USB image OpenPGP signature Tails 3.12~rc1 USB image torrent Then follow the new installation instructions. Tails 3.12~rc1 ISO image OpenPGP signature Tails 3.12~rc1 ISO image torrent What's coming up?

Websites can steal browser data via extensions APIs

Websites can steal browser data via extensions APIs

The researcher also created a tool that lets users test if their extensions also contain vulnerable APIs that can be exploited by malicious websites. More details about Somé's work are available in a research paper entitled "EmPoWeb: Empowering Web Applications with Browser Extensions," available for download in a PDF format from here or here .

How to Delete Your Online Accounts but Keep Your Data

How to Delete Your Online Accounts but Keep Your Data

Advertisement Deleting your data: Click on the triple-dot icon in the upper-right corner on Pinterest’s home page, and then select “Edit settings.” Scroll down a bit and click on “Deactivate Account” to start the process, which lets you either deactivate your account (giving you the option to come back to it later) or close it permanently.

How Facebook tracks you on Android

How Facebook tracks you on Android

WebM Download 1080p 410 MB Download 576p 144 MB Download 576p 252 MB These files contain multiple languages. The files available for download contain all languages as separate audio-tracks. Please look for "audio tracks" in your desktop video player.