Can the Government Buy Its Way Around the Fourth Amendment?

Can the Government Buy Its Way Around the Fourth Amendment?

If you’ve been following privacy issues at all in recent years, you know that websites and smartphone apps are sharing your detailed location information with data brokers and advertisers.

Russia's security service tells internet firms to hand over user data: The Bell

Russia's security service tells internet firms to hand over user data: The Bell

MOSCOW (Reuters) - Russia’s Federal Security Service (FSB) has ordered some of the country’s major internet companies to give it continuous access to their systems, The Bell investigative website reported late on Tuesday, citing three sources at the firms.

Update on free software and telemetry (Updated October 24th, 2019)

Update on free software and telemetry (Updated October 24th, 2019)

On the other hand, we want to make sure that users who prefer using only free software can have a positive GitLab experience, as open source communities are important to GitLab. To make GitLab better faster, we need more data on how users are using GitLab. SaaS telemetry products, which provide analytics on user behavior inside web-based applications, have come a long way in the past few years.

Aussie ex-pat will ‘never return’ after digital strip search reveals sex tapes

Aussie ex-pat will ‘never return’ after digital strip search reveals sex tapes

“I informed the female customs officer that I have intimate material of my partner on my phone, and that I would be breaking her trust, (as well as several privacy laws) by giving anyone access to those files.”.

Simjacker: a brand new mobile vulnerability exploited by surveillance companies for espionage operation

Simjacker: a brand new mobile vulnerability exploited by surveillance companies for espionage operation

The main Simjacker attack involves a SMS containing a specific type of spyware-like code being sent to a mobile phone, which then instructs the SIM Card within the phone to ‘take over’ the mobile phone to retrieve and perform sensitive commands, exploiting the presence of a particular piece of software, called the [email protected] Browser on the SIM card .

Facebook is Changing Its Face Recognition Settings. We Have Questions.

Facebook is Changing Its Face Recognition Settings. We Have Questions.

Throughout Facebook’s deliberately vague announcement, it takes great pains to note that the change applies only to new Facebook users and people who currently have the “tag suggestions” setting.

Amazon tests Whole Foods payment system that uses hands as ID

Amazon tests Whole Foods payment system that uses hands as ID

The high-tech sensors are different from fingerprint scanners found on devices like the iPhone and don’t require users to physically touch their hands to the scanning surface.At Amazon’s budding chain of “Go” convenience stores that launched last year, customers use a phone app to check in at a turnstile.

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Starting since version 1.30 , the Mac, Linux, and Windows Private Internet Access (PIA) desktop clients have come with the ability to change the selected Name Server from PIA’s Domain Name System (DNS) servers to using one of PIA’s Handshake Name System (HNS) servers.

FBI plans to look at your social media even more than it already does

FBI plans to look at your social media even more than it already does

The Federal Bureau of Investigation (FBI) is currently looking to acquire new tools to monitor the social media accounts of individuals it believes pose a threat to national security.

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook, whose CEO in April declared, "The future is private," has applied to patent a system of coordinated finger-affixed cameras that allow wearers to live stream a panoramic view of their surroundings.

Chinese border guards put secret surveillance app on tourists' phones

Chinese border guards put secret surveillance app on tourists' phones

Chinese border police are secretly installing surveillance apps on the phones of visitors and downloading personal information as part of the government’s intensive scrutiny of the remote Xinjiang region, the Guardian can reveal.

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

He points out that the Canadian government has no law limiting the amount of cash Canadians can take into or out of the country, but that has no bearing on what any local police force inside the US would consider to be the "legal" amount of cash a person -- especially a foreign citizen -- can carry.

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Although applicants will be able to say they don’t use social media, lying about it could lead to “serious immigration consequences,” a State Department official said in an interview with the Hill.

Fly Don't Spy

Fly Don't Spy

In a congressional hearing, Secretary Kelly said they’re even considering forcing some travelers to provide their passwords to social media accounts as a condition to enter. But what isn’t a question is whether forcing travelers to give up their social media passwords is a violation of our civil liberties.

Chinese driver gets ticket for scratching his face

Chinese driver gets ticket for scratching his face

Image copyright Sina Weibo Image caption A Chinese man's face scratch landed him a traffic fine and two points on his licence A man in eastern China received a fine after a traffic camera using artificial intelligence captured him scratching his face, it's reported.

Researchers show smartwatches can figure out exactly what you are up to all day

Researchers show smartwatches can figure out exactly what you are up to all day

People usually wear such devices on their passive arm which is less engaged in everyday activity. “A wide variety of apps could be made smarter and more context-sensitive if our devices knew the activity of our bodies and hands.”.

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

For example, it has emerged that victims of crimes in the UK are being asked to hand over their mobile phones and social media accounts so that the police can download all the contents in the search for “relevant” information.

#VintageVerse | 💚 Me and Zuckerberg Down by the Schoolyard 💚

#VintageVerse | 💚 Me and Zuckerberg Down by the Schoolyard 💚

💛It was against the law. 💛Singing Me and Zuckerberg Down by the Schoolyard. 💛Singing Me and Zuckerberg Down by the Schoolyard. Me and Zuckerberg Down by the Schoolyard. Me and Zuckerberg Down by the Schoolyard.

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Some of the most nefarious strategies rely on ‘dark patterns’ — deceptive interfaces and default settings, drawing on tricks of behavioral psychology, designed to undermine user autonomy and push consumers into doing things they wouldn’t otherwise do, like hand over all of their personal data to be exploited for commercial purposes,” said U.S. Sen. Mark Warner (D-Va.), a former technology executive who is vice chairman of the Senate Select Committee on Intelligence.

Google faces surge in police requests for mobile location data

Google faces surge in police requests for mobile location data

However, people don't necessarily realize that Google keeps the info for an indefinite period, or that the history is detailed enough to provide a picture of street-by-street movements to investigators.

Handshake: a peculiar chat experiment

Handshake: a peculiar chat experiment

This is primarily a design for out-of-band communication in which communicating parties aim to mitigate potential compromises in asymmetric encryption methodology ranging from CA poisoning to reliance on trusted centralized service providers for communications technology, and it can even be used to explore patterns in post-quantum readiness.

How Big Tech plans to pre-empt California’s tough Consumer Privacy Act

How Big Tech plans to pre-empt California’s tough Consumer Privacy Act

Industry lobbyists are putting a lot of pressure on Congress to come up with a set of Federal privacy regulations that are less stringent in their demands for personal data protection and less destructive to existing business models than the Golden State legislation.

LG’s latest flagship uses your hand veins to unlock

LG’s latest flagship uses your hand veins to unlock

And a few weeks back, LG made the whole camera rig official, announcing that the handset would be getting a ToF image sensor on its front-facing camera, bring, among other things, advanced face unlock technology.

Aadhaar Operator's Biometrics Stolen & Misused, UIDAI Documents Prove

Aadhaar Operator's Biometrics Stolen & Misused, UIDAI Documents Prove

Now Sheokhand’s case, UIDAI error reports and email correspondence, indicate that Sheokhand’s stolen credentials were probably plugged into this malicious software and then used to fraudulently enrol new users to the Aadhaar database.

What if Facebook was a brick and mortar company

What if Facebook was a brick and mortar company

This only comes to about 50 people so to avoid looking like a loner in front of Darren you start listing people who aren't really friends but rather people you know.

Google wins U.S. approval for radar-based hand motion sensor

Google wins U.S. approval for radar-based hand motion sensor

REUTERS/Shannon Stapleton The Federal Communications Commission (FCC) said in an order late on Monday that it would grant Google a waiver to operate the Soli sensors at higher power levels than currently allowed.

Data privacy and cybersecurity

Data privacy and cybersecurity

“We can say that in general, companies really only make an effort and really only get serious about cybersecurity once they’ve been breached,” explained Chandler Hall, a CyberSecurity Expert from Sentar. You can watch our entire interview with Chandler Hall below.

Border Agents Fail to Delete Personal Data of Travelers After Electronic Searches, Watchdog Says

Border Agents Fail to Delete Personal Data of Travelers After Electronic Searches, Watchdog Says

The Department of Homeland Security’s internal watchdog, known as the Office of the Inspector General (OIG), released a new report yesterday detailing CBP’s many failures at the border. Customs officials can conduct two kinds of electronic device searches at the border for anyone entering the country.

New Release: Tor Browser 8.0.4

New Release: Tor Browser 8.0.4

Tor Browser 8.0.4 contains updates to Tor (0.3.4.9), OpenSSL (1.0.2q) and other bundle components. setting back the sandboxing level to 5 on Windows (the Firefox default), after working around some Tor Launcher interference causing a broken Tor Browser experience.

Walmart patents biometric shopping cart to track your vitals

Walmart patents biometric shopping cart to track your vitals

It’s one thing if you want to track the speed of a cart or its route through a store for marketing purposes but a desire to collect a user’s vital signs under the guise that you’re doing so to help sick or elderly shoppers or otherwise improve customer service is outright disturbing.