GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

The Belgian Data Protection Authority (APD-GBA) has found serious GDPR infringements in the system Google and others use to legitimise online tracking.

Mozilla study reaffirms that internet history can be used for “reidentification”

Mozilla study reaffirms that internet history can be used for “reidentification”

Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.This type of “history based profiling” is undoubtedly being used to build ad profiles on internet users around the world.

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

The Indian government has acknowledged “potential security issues” in the Aarogya Setyu contact-tracing app which its opposition labels as a ‘surveillance system with no oversight,’ but says the code issues are not that big a deal.

GitHub - tg12/bad_packets_blocklist: A blocklist based on sources from Bad Packets Report

GitHub - tg12/bad_packets_blocklist: A blocklist based on sources from Bad Packets Report

A blocklist for use in iptables, firewalls, IDS and IDP etc.THE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.

Surveillance Firm Says It’s Selling ‘Coronavirus-Detecting’ Cameras in US

Surveillance Firm Says It’s Selling ‘Coronavirus-Detecting’ Cameras in US

Athena's new system claims to do much the same but for people exhibiting a fever, with the system designed to send an alert if it detects someone with a higher than normal body temperature, a company representative told Motherboard in an email.

The EARN IT Act Is a Sneak Attack on Encryption

The EARN IT Act Is a Sneak Attack on Encryption

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

The Graham-Blumenthal bill would finally give Barr the power to demand that tech companies obey him or face overwhelming liability from lawsuits based on their users’ activities.

A new bill could punish web platforms for using end-to-end encryption

A new bill could punish web platforms for using end-to-end encryption

If companies don’t follow these rules, they could lose some protection under Section 230 of the Communications Decency Act, which largely shields companies from liability over users’ posts.Under the EARN IT Act, though, a committee could require Facebook and other companies to add a backdoor for law enforcement.

Edward Snowden says Facebook is just as untrustworthy as the NSA

Edward Snowden says Facebook is just as untrustworthy as the NSA

The former NSA systems engineer said to better protect people from being exploited by the data collection of major tech companies, the US should have software liability laws.

GitHub - tg12/RUBC: R U Been being censored?

GitHub - tg12/RUBC: R U Been being censored?

Are you being censored by your government or your ISP? Is your ISP censoring you because someone told them to? Use this tool to check. Is your free speech at stake by a repressive regime or government. Why not check with this free tool.

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

The parents of G.S. have brought suit against the website that sold the drug to G.S., the service provider that created the network through which G.S. was able to access the website on the dark web (Tor), and the mail service that sent the drug to G.S. Plaintiffs have brought claims for strict products liability, negligence, abnormally dangerous activity, and civil conspiracy.

United Airlines Covers Creepy Cameras On Its Seatback Screens Following Outcry

United Airlines Covers Creepy Cameras On Its Seatback Screens Following Outcry

In a statement, a United Airlines spokesperson said: “As with many other airlines, some of our premium seats have in-flight entertainment systems that came with cameras installed by the manufacturer.

At hearing on federal data-privacy law, debate flares over state rules

At hearing on federal data-privacy law, debate flares over state rules

The IAB, which represents companies including Google, Amazon, Verizon, Facebook and Twitter, said Congress shouldn't model a federal data-privacy law on the GDPR or on California's privacy law.

Unearthed emails could be smoking gun in epic GDPR battle: Google, adtech giants 'know they break Euro privacy law'

Unearthed emails could be smoking gun in epic GDPR battle: Google, adtech giants 'know they break Euro privacy law'

“As it is technically impossible for the user to have prior information about every data controller involved in a real-time bidding (RTB) scenario, programmatic trading, the area of fastest growth in digital advertising spend, would seem, at least prima facie, to be incompatible with consent under GDPR,” the IAB said.

Google and IAB ad category lists show “massive leakage of highly intimate data”, GDPR complaint claims

Google and IAB ad category lists show “massive leakage of highly intimate data”, GDPR complaint claims

The individuals filing the complaints have now submitted additional evidence showing lists of ad categories used by Google and online ad industry association, the Internet Advertising Bureau (IAB), that they say show sensitive inferences are systematically made.

The Case For Blind Key Rotation

The Case For Blind Key Rotation

The fediverse has settled on using not one but two types of cryptographic signature: Signatures and Deniability When we refer to deniability, what we're talking about is forensic deniability, or put simply the ability to plausibly argue in a court or tribunal that you did not sign a given object.

Advertisers Will Spend More Than Ever On Third-Party Data, Despite Privacy Concerns

Advertisers Will Spend More Than Ever On Third-Party Data, Despite Privacy Concerns

That’s a 17.5% year-over-year increase in spend on third-party data and related infrastructure – despite regulatory headwinds, namely the General Data Protection Regulation in Europe and the California Consumer Privacy Act on tap for 2020 in the United States.

You Could Be Kicked Offline For Piracy If This Music Industry Lawsuit Succeeds

You Could Be Kicked Offline For Piracy If This Music Industry Lawsuit Succeeds

The entertainment industry is waging a major legal campaign to turn ISPs into copyright cops authorized to kick broadband users offline—based on what’s often flimsy to nonexistent evidence of wrongdoing.