Tracking the Global Response to COVID-19

Tracking the Global Response to COVID-19

Tech companies, governments, and international agencies have all announced measures to help contain the spread of the COVID-19 virus.Many of those measures are based on extraordinary powers, only to be used temporarily in emergencies.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Bill

Protect our Speech and Security Online: Reject the Graham-Blumenthal Bill

It doesn’t equip law enforcement agencies with resources to investigate claims of child exploitation or training in how to use online platforms to catch perpetrators.

The EARN IT Act Is a Sneak Attack on Encryption

The EARN IT Act Is a Sneak Attack on Encryption

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms.

Brave Goes to War Against Google [EXPLAINED]

Brave Goes to War Against Google [EXPLAINED]

Following up on that case, Brave has now come out with criticism and recommendations on how the failure to enact GDPR (General Data Protection Regulation) regulation has allowed Google to seize the advertising market, to the detriment of end users.

Congress, Not the Attorney General, Should Decide the Future of Encryption

Congress, Not the Attorney General, Should Decide the Future of Encryption

The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the “best practices” that will give Section 230 immunity for child exploitation suits.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

The Graham-Blumenthal bill would finally give Barr the power to demand that tech companies obey him or face overwhelming liability from lawsuits based on their users’ activities.

A new bill could punish web platforms for using end-to-end encryption

A new bill could punish web platforms for using end-to-end encryption

If companies don’t follow these rules, they could lose some protection under Section 230 of the Communications Decency Act, which largely shields companies from liability over users’ posts.Under the EARN IT Act, though, a committee could require Facebook and other companies to add a backdoor for law enforcement.

Apple scans photos to check for child abuse

Apple scans photos to check for child abuse

Speaking at the Consumer Electronics Show in Las Vegas, Ms Horvath said removing encryption was “not the way we’re solving these issues” but added: “We have started, we are, utilising some technologies to help screen for child sexual abuse material.”.

Google says hackers have put ‘monitoring implants’ in iPhones for years

Google says hackers have put ‘monitoring implants’ in iPhones for years

An unprecedented iPhone hacking operation, which attacked “thousands of users a week” until it was disrupted in January, has been revealed by researchers at Google’s external security team.Google said it had reported the security issues to Apple on 1 February.

Still have Windows 7? 32 Security Reasons to Move to Windows 10

Still have Windows 7? 32 Security Reasons to Move to Windows 10

Windows 10 supports additional LSA Protection, allowing LSASS to run as a Protected Process, protecting the credentials it stores from malware without a malicious kernel mode component.10.

The government uses images of vulnerable people to test facial recognition software.

The government uses images of vulnerable people to test facial recognition software.

When a company, university group, or developer wants to test a facial recognition algorithm, it sends that software to NIST, which then uses the full set of photograph collections to determine how well the program performs in terms of accuracy, speed, storage and memory consumption, and resilience.

Report: From Oppression to Liberation: Reclaiming the Right to Privacy

Report: From Oppression to Liberation: Reclaiming the Right to Privacy

In this report we take a hard look at the right to privacy and its reality for women, trans and gender diverse people. We hope this report will be read as a call for action: privacy needs to be reclaimed by women, trans and gender diverse people.

Data Privacy Week: Working Towards Change

Data Privacy Week: Working Towards Change

Innovations in surveillance and data exploitation present challenges in the fight to protect personal data across the world. It is also important that there is a diversity of organisations joining the global movement for data protection.

Data Privacy Week: Confronting the Corporate Gaze

Data Privacy Week: Confronting the Corporate Gaze

The Privacy International Network is working to expose companies that fail to protect their customers’ data, analysing their terms of service and practices, exploring how users perceive social media platforms, and studying how these platforms are being leveraged for intelligence purposes. They researched the existing legal framework on telecommunications and privacy to explore how companies were protecting their customers’ data.

WhatsApp has an encrypted child porn problem

WhatsApp has an encrypted child porn problem

A report from two Israeli NGOs reviewed by TechCrunch details how third-party apps for discovering WhatsApp groups include “Adult” sections that offer invite links to join rings of users trading images of child exploitation.

The internet war on sex is here

The internet war on sex is here

While we were all distracted by the moist dumpster fire of Tumblr announcing its porn ban, Facebook updated its startling, wide-ranging anti-sex policy that is surely making evangelicals and incels cream their jeans (let's just hope they don't post about that).

Thoughts and choices on sale!

Thoughts and choices on sale!

But now, It is not the laws or taxes that we are trading but the power of choice and thought that is what makes it scary. It is not that these tech giants are all that bad, it is their business model that hinges on the user data exploitation that makes them scary.

I asked an online tracking company for all of my data and here's what I found

I asked an online tracking company for all of my data and here's what I found

The fact that countless companies are tracking millions of people around the web and on their phones is disturbing enough, but what is even more disturbing about my Quantcast data is the extent to which the company relies on data brokers, credit referencing agencies, and even credit card companies in ways that are impossible for the average consumer to know about or escape.

Invisible Manipulation: 10 ways our data is being used against us

Invisible Manipulation: 10 ways our data is being used against us

As society heads toward an ever more connected world, the ability for individuals to protect and manage the invisible data that companies and third parties hold about them, becomes increasingly difficult.

Important Security Update for the Android (Beta) & iOS Apps.

Important Security Update for the Android (Beta) & iOS Apps.

We are currently reviewing our development process to adjust our methods to further maximize the probability of finding security relevant issues prior to releasing new app versions.