Cheating, Policing, and School Surveillance

Cheating, Policing, and School Surveillance

I will, however, say this: anti-cheating software, whether it’s plagiarism detection or test proctoring — is “cop shit.” And cops do not belong on school grounds.Ed-tech didn't create the "cop shit" in the classroom or launch a culture of surveillance in schools by any means.

Why everybody has something to hide

Why everybody has something to hide

Even in liberal states, there is a very different danger: manipulation .With the knowledge of what companies like Google, Facebook and Amazon get through data they can influence what you should buy, what the information, news and books are that you receive and theoretically also what information is better withheld from you.

Microsoft and OpenAI partner to propose digital transformation of export controls

Microsoft and OpenAI partner to propose digital transformation of export controls

For these reasons, restricting the problematic users and uses of these technologies is the more targeted and balanced of traditional export controls approaches, as it protects national security interests while preserving beneficial uses and tech leadership.

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

Users of pirate IPTV services in the UK and Ireland are most likely being monitored by one or more major ISPs. Secret traffic analysis, provided to the High Court in a recent blocking case involving UEFA, reveals that studies were carried out in connection with Sky which determined many subscribers were accessing pirate IPTV platforms via the ISP.Blocking of regular piracy websites has been a feature of anti-piracy enforcement in Europe for almost 15 years.

3 Questions: The price of privacy in ride-sharing app performance

3 Questions: The price of privacy in ride-sharing app performance

The study compares different methods for masking data and different levels of location data anonymization, and provides useful insights into the trade-off between user privacy and the performance of mobility-sharing applications.

You Have Nothing to Hide? We bet you do.

You Have Nothing to Hide? We bet you do.

Today, the surveillance cameras of public authorities and the data centers of advertising companies are the big bogeyman, because they create profiles of all people who move around the Internet.

Google says Android 12 will make using third-party app stores easier

Google says Android 12 will make using third-party app stores easier

The company says that “all developers selling digital goods in their apps are required to use Google Play’s billing system,” and it’s tweaking language in its payment policy to make that clear.

Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption

Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption

Zoom is facing another lawsuit alleging that the video communications company has deceived consumers by making false claims about its privacy measures.Zoom encryption claims false, watchdog alleges in lawsuit.

This Tool Could Protect Your Photos From Facial Recognition

This Tool Could Protect Your Photos From Facial Recognition

In recent years, companies have been prowling the web for public photos associated with people’s names that they can use to build enormous databases of faces and improve their facial-recognition systems, adding to a growing sense that personal privacy is being lost, bit by digital bit.

The Complete Checklist of How Google Tracks Your Browsing History

The Complete Checklist of How Google Tracks Your Browsing History

Didn’t Google get in trouble for giving marketers the ability to target kids with ads?Marketers are still allowed to serve ads to kids on websites they visit, and in the apps they use.

Don't post on Facebook unless you are prepared to face the consequences

Don't post on Facebook unless you are prepared to face the consequences

“When I saw the ads,” she writes, “I knew that Facebook had probably tagged me to receive them.” At which point I began to wonder if even such a sophisticated user of social media really understood how it works.

Unsecured Chinese companies leak users’ sensitive personal and business data

Unsecured Chinese companies leak users’ sensitive personal and business data

The Xiaoxintong database contains more than 340,000 records of:Mobile numbers, addresses and GPS locationsMobile numbers and names of users’ relatives and other “Guardians”Location tracks (including addresses and GPS coordinates)Hashed passwordsSOS records and SOS record locationsPersonal IDsMost of these (about 285,000) were for addresses, GPS coordinates and personal IDs. The second database (possibly from Shanghai Yanhua Smartech).

Political groups use “deeply spooky” protester location data, report finds

Political groups use “deeply spooky” protester location data, report finds

It's no secret that police and other law enforcement agencies have a history of using mobile phone location and other data to target or investigate individuals, and the wave of mass protests in support of black communities and against police brutality this month has provided a rich data trove for them to probe.

New Facebook Tool Allows Employers to Suppress “Unionize” in Workplace Chat

New Facebook Tool Allows Employers to Suppress “Unionize” in Workplace Chat

Facebook employees sparked a flurry of posts denouncing the feature, with several commenting in disbelief that the company would overtly pitch “unionize” as a topic to be blacklisted.

When the home is no data protection haven: addressing privacy threats from intimate relationships

When the home is no data protection haven: addressing privacy threats from intimate relationships

That’s precisely what a new paper from Karen Levy and Bruce Schneier does: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships.For example: some intimate privacy threats occur by virtue of copresence between victim, attacker, and device.

Delete the data you didn’t know the Internet has on you

Delete the data you didn’t know the Internet has on you

Around the world, our digital footprint – that is, the amount of data we’re sharing online with companies and service providers – increased between March and May 1 “by an average of 55 percent in the six countries we measured,” Ringel explains.

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge's products are used by governments and companies to assess risks such as terrorism and cyber-attacks and determine which they need to worry about; locate assets, customers and others that could be harmed; provide automated "standard operating procedures" to manage and respond to problems; and analyze how past threats were handled to create a better response for the next ones that come along, according to the CEO.In response to Covid-19, Everbridge launched a coronavirus data feed, said Meredith.

Be a Data Custodian, Not a Data Owner

Be a Data Custodian, Not a Data Owner

The organizations that succeed in protecting consumer data in the coming years will be those that build long-term, trusted relationships with customers by humanizing data and taking responsibility as its custodians.

Understanding the Benefits and Downsides of Proxies

Understanding the Benefits and Downsides of Proxies

Proxies can be used to filter unwanted pages and prevent potentially accessing them by someone unaware that the website poses a threat.Proxy servers do not offer as much as a well-optimized internet browser or a great ISP provider, but they can still improve the overall browsing experience.

Decentralized Communication: The Way of the Future

Decentralized Communication: The Way of the Future

Decentralization, as the name suggests, works by making a network run on a variety of providers rather than a single centralized network.So personally, I’m placing emphasis on self-hosted and decentralized solutions in the future to try to prepare for this eventuality.

RSA Cryptography Behind the Scenes

RSA Cryptography Behind the Scenes

Meeting the definition of a cipher, RSA follows the consistency equation being expressed as:This just means that after encrypting a message m with a public key (e, n), the message can then only be decrypted with the corresponding private key (d, n) to recover the message.

Amazon reportedly used merchant data, despite telling Congress it doesn’t

Amazon reportedly used merchant data, despite telling Congress it doesn’t

Amazon in a written statement to the WSJ agreed that "like other retailers, we look at sales and store data to provide our customers with the best possible experience," adding, "however, we strictly prohibit our employees from using nonpublic, seller-specific data to determine which private label products to launch."

Why I Deactivated Tracking in MailChimp

Why I Deactivated Tracking in MailChimp

For example, I can see: How many times you opened each email, and whenOn which links you clicked how many times, and whenYour locationAnd the whole history of your interactions with my newsletters So I asked myself some questions: Do I track regular emails like that?Do I use those stats in any meaningful way?

It's foolish to worry about privacy when data can help fight coronavirus

It's foolish to worry about privacy when data can help fight coronavirus

There are already efforts to use anonymous, real-time data from groups of participating phone users to monitor adherence to social distancing and stay-at-home policies, a critical insight to identify potential hotspots for future outbreaks.

Privacy and the Coronavirus. Why does it matter?

Privacy and the Coronavirus. Why does it matter?

Information privacy is the right to have some control over how your personal information is collected and used.” Many governments are turning to surveillance technologies that could be used to track individuals or groups of people in order to combat the spread of the coronavirus.

Zoom is a work-from-home privacy disaster waiting to happen

Zoom is a work-from-home privacy disaster waiting to happen

We reached out to Zoom in an effort to determine whether meeting participants are notified if and when hosts enable attendee attention tracking, but received no immediate response.However, there's more: That said, Zoom does use certain standard advertising tools which require Personal Data (think, for example, Google Ads and Google Analytics).

HTTPS Is A Privacy Nightmare

HTTPS Is A Privacy Nightmare

After reading NSA files, I wouldn’t be surprised if NSA already hacked some of the big CAs. I don’t see what stops governments from issuing a subpoena for the CAs in their countries to sign a certificate so they could sniff the communication of whoever they want.

Swedish Covert Surveillance of Data Act

Swedish Covert Surveillance of Data Act

In those cases where an organisation which is subject to confidentiality (see section 11) uses Mullvad as a permanent element in its operations, and if the service is used for any purpose of the operations’ activities or the service is specifically intended to be used in the operations, there is no possibility for law enforcement agencies to be granted authorisation for covert surveillance of data of data before it is encrypted by the service (or via, for example, remote control).

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GreenTunnel bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.For example, if the administrator chooses to block the hostname youtube using this feature, all Website access attempts over HTTPS that contain youtube like in the SNI would be blocked.

This is where workplace surveillance leads: towards algorithmic, automated management

This is where workplace surveillance leads: towards algorithmic, automated management

The experience of Angela, who worked in an insurance call center, points to what is likely to become an increasingly serious issue with the algorithmic management of jobs that require inter-personal skills.