Overthinking Data Privacy on Social Media

Overthinking Data Privacy on Social Media

Instead, they will feed your data to machine learning algorithms to offer you a good service and also to display personalized advertisements on linked platforms.

Adding Encrypted Group Calls to Signal

Adding Encrypted Group Calls to Signal

Today, we’re launching group calls in Signal with the latest versions of our apps.Group calls are free, private, and end-to-end encrypted — like everything else on Signal.We hope group calls are a helpful new way to connect!.

Rubenerd: We need physical audio kill switches

Rubenerd: We need physical audio kill switches

If there is any latency whatsoever between us hitting a mute button and the audio not cutting out, the hardware or software has failed.Well-engineered mute buttons on keyboards shouldn’t need to go to software, they should immediately send a signal to the motherboard’s DAC—ideally on a separate wire or connection—to say terminate this signal.

The real risk of downloading Chinese apps on to your phone

The real risk of downloading Chinese apps on to your phone

Large Chinese technology companies have attempted to dispel concerns around this law by publicly pledging to refuse Chinese government requests for data.

Disclosure of income doesn’t invade privacy of schools: Chandigarh admn to HC

Disclosure of income doesn’t invade privacy of schools: Chandigarh admn to HC

Moreover, the law was enacted following high court’s direction to regulate fee and save parents from whimsical decisions of private schools in Punjab, Haryana and Chandigarh, the administration told the court.

Serious Xbox Security Breach Allows Gamertag Spoofing

Serious Xbox Security Breach Allows Gamertag Spoofing

A major Xbox security breach allows anyone to spoof your Gamertag and send offensive messages that could get you banned.A video of this security breach in action was posted on Reddit that shows how many Xbox Live users fell victims to it already.

PrivacyBreacher for Android reveals data that apps have access to without extra permission requests

PrivacyBreacher for Android reveals data that apps have access to without extra permission requests

PrivacyBreacher demonstrates that applications may access information about a user's device without requesting any extra permissions.In the end, it is still important to know what applications may look up on a device without any extra permission requests.

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com. Scam advertisements across major media outlets originate from DoubleClick and Xandr/AppNexus.Unfortunately, other media outlets aren’t doing the same thing, and fake ads are spreading across major news sites that receive millions of visitors every month.

Is it safe to use an old Android phone?

Is it safe to use an old Android phone?

As a result, Google and the phone-makers eventually have to cut support for older handsets, usually once a device gets to be two or three years old.Those handsets then will no longer receive security updates meaning that when a threat is detected on that phone, it simply won't be fixed.

Why I Decided to Run a Tor Relay

Why I Decided to Run a Tor Relay

But then I watched this talk by the articulate, intelligent and passionate Tor Project developer Jacob Appelbaum (if you do nothing else today, watch it).Jacob couldn’t have made a better case for direct action, requesting of the audience:Raise your hand if you think anonymity is something that is good and you think is a fundamental human right that we should all have...

Can the Government Buy Its Way Around the Fourth Amendment?

Can the Government Buy Its Way Around the Fourth Amendment?

If you’ve been following privacy issues at all in recent years, you know that websites and smartphone apps are sharing your detailed location information with data brokers and advertisers.

Russia's security service tells internet firms to hand over user data: The Bell

Russia's security service tells internet firms to hand over user data: The Bell

MOSCOW (Reuters) - Russia’s Federal Security Service (FSB) has ordered some of the country’s major internet companies to give it continuous access to their systems, The Bell investigative website reported late on Tuesday, citing three sources at the firms.

Update on free software and telemetry (Updated October 24th, 2019)

Update on free software and telemetry (Updated October 24th, 2019)

On the other hand, we want to make sure that users who prefer using only free software can have a positive GitLab experience, as open source communities are important to GitLab. To make GitLab better faster, we need more data on how users are using GitLab. SaaS telemetry products, which provide analytics on user behavior inside web-based applications, have come a long way in the past few years.

Aussie ex-pat will ‘never return’ after digital strip search reveals sex tapes

Aussie ex-pat will ‘never return’ after digital strip search reveals sex tapes

“I informed the female customs officer that I have intimate material of my partner on my phone, and that I would be breaking her trust, (as well as several privacy laws) by giving anyone access to those files.”.

Simjacker: a brand new mobile vulnerability exploited by surveillance companies for espionage operation

Simjacker: a brand new mobile vulnerability exploited by surveillance companies for espionage operation

The main Simjacker attack involves a SMS containing a specific type of spyware-like code being sent to a mobile phone, which then instructs the SIM Card within the phone to ‘take over’ the mobile phone to retrieve and perform sensitive commands, exploiting the presence of a particular piece of software, called the [email protected] Browser on the SIM card .

Facebook is Changing Its Face Recognition Settings. We Have Questions.

Facebook is Changing Its Face Recognition Settings. We Have Questions.

Throughout Facebook’s deliberately vague announcement, it takes great pains to note that the change applies only to new Facebook users and people who currently have the “tag suggestions” setting.

Amazon tests Whole Foods payment system that uses hands as ID

Amazon tests Whole Foods payment system that uses hands as ID

The high-tech sensors are different from fingerprint scanners found on devices like the iPhone and don’t require users to physically touch their hands to the scanning surface.At Amazon’s budding chain of “Go” convenience stores that launched last year, customers use a phone app to check in at a turnstile.

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Starting since version 1.30 , the Mac, Linux, and Windows Private Internet Access (PIA) desktop clients have come with the ability to change the selected Name Server from PIA’s Domain Name System (DNS) servers to using one of PIA’s Handshake Name System (HNS) servers.

FBI plans to look at your social media even more than it already does

FBI plans to look at your social media even more than it already does

The Federal Bureau of Investigation (FBI) is currently looking to acquire new tools to monitor the social media accounts of individuals it believes pose a threat to national security.

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook, whose CEO in April declared, "The future is private," has applied to patent a system of coordinated finger-affixed cameras that allow wearers to live stream a panoramic view of their surroundings.

Chinese border guards put secret surveillance app on tourists' phones

Chinese border guards put secret surveillance app on tourists' phones

Chinese border police are secretly installing surveillance apps on the phones of visitors and downloading personal information as part of the government’s intensive scrutiny of the remote Xinjiang region, the Guardian can reveal.

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

He points out that the Canadian government has no law limiting the amount of cash Canadians can take into or out of the country, but that has no bearing on what any local police force inside the US would consider to be the "legal" amount of cash a person -- especially a foreign citizen -- can carry.

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Although applicants will be able to say they don’t use social media, lying about it could lead to “serious immigration consequences,” a State Department official said in an interview with the Hill.

Fly Don't Spy

Fly Don't Spy

In a congressional hearing, Secretary Kelly said they’re even considering forcing some travelers to provide their passwords to social media accounts as a condition to enter. But what isn’t a question is whether forcing travelers to give up their social media passwords is a violation of our civil liberties.

Chinese driver gets ticket for scratching his face

Chinese driver gets ticket for scratching his face

Image copyright Sina Weibo Image caption A Chinese man's face scratch landed him a traffic fine and two points on his licence A man in eastern China received a fine after a traffic camera using artificial intelligence captured him scratching his face, it's reported.

Researchers show smartwatches can figure out exactly what you are up to all day

Researchers show smartwatches can figure out exactly what you are up to all day

People usually wear such devices on their passive arm which is less engaged in everyday activity. “A wide variety of apps could be made smarter and more context-sensitive if our devices knew the activity of our bodies and hands.”.

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

For example, it has emerged that victims of crimes in the UK are being asked to hand over their mobile phones and social media accounts so that the police can download all the contents in the search for “relevant” information.

#VintageVerse | 💚 Me and Zuckerberg Down by the Schoolyard 💚

#VintageVerse | 💚 Me and Zuckerberg Down by the Schoolyard 💚

💛It was against the law. 💛Singing Me and Zuckerberg Down by the Schoolyard. 💛Singing Me and Zuckerberg Down by the Schoolyard. Me and Zuckerberg Down by the Schoolyard. Me and Zuckerberg Down by the Schoolyard.

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Some of the most nefarious strategies rely on ‘dark patterns’ — deceptive interfaces and default settings, drawing on tricks of behavioral psychology, designed to undermine user autonomy and push consumers into doing things they wouldn’t otherwise do, like hand over all of their personal data to be exploited for commercial purposes,” said U.S. Sen. Mark Warner (D-Va.), a former technology executive who is vice chairman of the Senate Select Committee on Intelligence.

Google faces surge in police requests for mobile location data

Google faces surge in police requests for mobile location data

However, people don't necessarily realize that Google keeps the info for an indefinite period, or that the history is detailed enough to provide a picture of street-by-street movements to investigators.