Zoom is a work-from-home privacy disaster waiting to happen

Zoom is a work-from-home privacy disaster waiting to happen

We reached out to Zoom in an effort to determine whether meeting participants are notified if and when hosts enable attendee attention tracking, but received no immediate response.However, there's more: That said, Zoom does use certain standard advertising tools which require Personal Data (think, for example, Google Ads and Google Analytics).

HTTPS Is A Privacy Nightmare

HTTPS Is A Privacy Nightmare

After reading NSA files, I wouldn’t be surprised if NSA already hacked some of the big CAs. I don’t see what stops governments from issuing a subpoena for the CAs in their countries to sign a certificate so they could sniff the communication of whoever they want.

Swedish Covert Surveillance of Data Act

Swedish Covert Surveillance of Data Act

In those cases where an organisation which is subject to confidentiality (see section 11) uses Mullvad as a permanent element in its operations, and if the service is used for any purpose of the operations’ activities or the service is specifically intended to be used in the operations, there is no possibility for law enforcement agencies to be granted authorisation for covert surveillance of data of data before it is encrypted by the service (or via, for example, remote control).

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GreenTunnel bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.For example, if the administrator chooses to block the hostname youtube using this feature, all Website access attempts over HTTPS that contain youtube like in the SNI would be blocked.

This is where workplace surveillance leads: towards algorithmic, automated management

This is where workplace surveillance leads: towards algorithmic, automated management

The experience of Angela, who worked in an insurance call center, points to what is likely to become an increasingly serious issue with the algorithmic management of jobs that require inter-personal skills.

Cryptocurrency is the Second Amendment of the Internet

Cryptocurrency is the Second Amendment of the Internet

My conclusion, which I cover in this article, is that platforms based on cryptocurrency tech are uniquely good at one thing in particular: not being shut down, a property known more formally as “censorhip-resistance.” And I will argue in this post that this property alone causes cryptocurrency tech to act as a “second amendment of the internet,” providing a check against information-based oppression that is analogous to how the right to bear arms acts as a check against physical oppression.

Feds Find Fourth Amendment Workaround, Buy Phone Locations From Marketing Firms

Feds Find Fourth Amendment Workaround, Buy Phone Locations From Marketing Firms

DHS uses the data purchased from private marketing companies to generate law enforcement leads and search for undocumented immigrants, according to the Journal, which first broke news of the arrangements on Friday.

The fractured future of browser privacy

The fractured future of browser privacy

That existing model allows companies and advertisers at least some access to marketing data; one argument for preserving it is that if browsers become too restrictive, those parties will pull content from the open web and move it to mobile apps instead.

What kind of data is my new car collecting about me? Nearly everything it can, apparently

What kind of data is my new car collecting about me? Nearly everything it can, apparently

The car itself is collecting driving data such as speed and braking patterns, but the built-in navigation and entertainment services are also collecting information of a more personal nature, she says.

#EthicalWebDev – guide for ethical website development and maintenance

#EthicalWebDev – guide for ethical website development and maintenance

For example, it has become more and more common for web developers to take “free” resources, such as fonts and scripts and use them on the websites that they design.Ethical Web Dev – Guide for ethical website development and maintenance.

Stanford Law’s Jen King on California’s New Privacy Law

Stanford Law’s Jen King on California’s New Privacy Law

In the discussion that follows, Dr. Jennifer King, Director of Privacy at Stanford’s CIS, explains the new law and how far it may go to protect consumer personal data.

Privacy guide for MyAnalytics users

Privacy guide for MyAnalytics users

Note that these insights are derived from data that is already available to you in the following places: your Exchange Online mailbox your activity in OneDrive and SharePoint documents your chat and call history from Teams and from Skype for Business MyAnalytics simply applies some basic calculations and rules to make this data more actionable.

NitroPad: Secure Laptop With Unique Tamper Detection

NitroPad: Secure Laptop With Unique Tamper Detection

Thanks to the combination of the open source solutions Coreboot, Heads and Nitrokey USB hardware, you can verify that your laptop hardware has not been tampered with in transit or in your absence (so-called evil maid attack).

Why GoatCounter ignores Do Not Track

Why GoatCounter ignores Do Not Track

Again, you can’t expect every consumer to be deeply invested in the issue, and as mentioned before, it’s not even easy to find out what exactly is being tracked in the first place so it’s not all that clear what you’re consenting to.

What do you get if you put DNA and facial recognition together? Today, it’s China; tomorrow, maybe everywhere else

What do you get if you put DNA and facial recognition together? Today, it’s China; tomorrow, maybe everywhere else

A story in the New York Times means we don’t have to guess, because China is already doing it: Chinese scientists are trying to find a way to use a DNA sample to create an image of a person’s face.

No, GDPR Can’t Be Blamed For Everything

No, GDPR Can’t Be Blamed For Everything

You’ve probably already opened the original article so I’ll just list the mentioned issues and explain why it’s not a GDPR problem per se.“Amazon sent 1,700 Alexa voice recordings to the wrong user following data request” — the allusion here is that GDPR is bad because it forced a company to make a mistake.

How contextual targeting will replace cookies in the privacy age

How contextual targeting will replace cookies in the privacy age

Furthermore, while consumers might opt out of cookie-based targeting, a website with watch content can share insights with a brand about the type of customers visiting their site.Diving deeper into contextual targeting also enables a brand to measure consumer approaches to specific content.

What We Learned About the Technology That Times Journalists Use

What We Learned About the Technology That Times Journalists Use

Many editors and reporters also talked about how tech had transformed the industries they cover.And in the entertainment world, video streaming has opened doors to a wealth of new content — so much that reporting on movies and TV shows has become an art of curation.

Smile as you buy your holiday goods in a store – you are probably being watched, tracked and analyzed

Smile as you buy your holiday goods in a store – you are probably being watched, tracked and analyzed

For example, AiFi works in the same way as Amazon Go, but is designed to scale: the company claims its Autonomous Store Platform can track up to 500 people, and tens of thousands of products.

Facebook Will Now Use Oculus VR Data for Ads Just as Everyone Expected

Facebook Will Now Use Oculus VR Data for Ads Just as Everyone Expected

As far as what data the company is going to collect and use, here’s the official statement:Facebook will now use information about your Oculus activity, like which apps you use, to help provide these new social features and more relevant content, including ads.

Internet freedom is declining around the world—and social media is to blame

Internet freedom is declining around the world—and social media is to blame

The news: Governments worldwide are increasingly using social media to manipulate elections and spy on citizens, think tank Freedom House has warned in its latest report.

Our Data Future

Our Data Future

She said the programme would walk me through the basics of data property and that I could ask all my questions in real time, receive feedback and get simulations based on the data analysis that was running in the background on my devices.

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

For example, pluralities of adults say it is acceptable for poorly performing schools to share data about their students with a nonprofit group seeking to help improve educational outcomes or for the government to collect data about all Americans to assess who might be a potential terrorist.

HuffPost is now a part of Verizon Media

HuffPost is now a part of Verizon Media

We (Verizon Media) and our partners need your consent to access your device, set cookies, and use your data, including your location, to understand your interests, provide relevant ads and measure their effectiveness.Verizon Media will also provide relevant ads to you on our partners' products.

Tutanota is blocked in Egypt. Here's what you can do.

Tutanota is blocked in Egypt. Here's what you can do.

Whenever a site is blocked in your country or by your Internet Service Provider (ISP), you can access this site with the help of the Tor browser or via a VPN.

Inexpensive, unpatched phones put billions of users’ privacy at risk

Inexpensive, unpatched phones put billions of users’ privacy at risk

Billions of users in both developing and mature economies to whom the price tag puts a high-end phone out of reach still have access to lower-spec devices.Nearly all of the lower-end phones available worldwide run Android, giving Google's OS a greater than 80% market share globally.

The Open Letter from the Governments of US, UK, and Australia to Facebook is An All-Out Attack on Encryption

The Open Letter from the Governments of US, UK, and Australia to Facebook is An All-Out Attack on Encryption

But the letter to Facebook goes much further: law enforcement and national security agencies in these three countries are asking for nothing less than access to every conversation that crosses every digital device.

Rivals aim to document Facebook, Google strong-arming

Rivals aim to document Facebook, Google strong-arming

The big picture: The news comes a day ahead of a critical Senate Judiciary Committee hearing in Washington that will examine the market dominance of companies like Google, Facebook, Amazon and Apple.

Now is the time to defend the final haven for privacy: your brain

Now is the time to defend the final haven for privacy: your brain

Glyn Moody is a freelance journalist who writes and speaks about privacy, surveillance, digital rights, open source, copyright, patents and general policy issues involving digital technology.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

Embetty displays remote content like tweets or videos without compromising your privacy.yarn add @heise/embetty.: $ git clone $ cd embetty $ yarn $ yarn build Supported embed types.The Embetty server component does not proxy video data .