Update on beta testing payments in Signal

Update on beta testing payments in Signal

Signal has often been asked if we can build something to support this kind of payments use case for a better alternative future (one that isn’t dominated by big tech).

• Chart: Personal Data: Instagram Is a Real Tattletale

• Chart: Personal Data: Instagram Is a Real Tattletale

As the following chart shows, Instagram is most likely to share your personal information with third parties for advertising purposes.

No, Cellebrite cannot 'break Signal encryption.'

No, Cellebrite cannot 'break Signal encryption.'

Last week, Cellebrite posted a pretty embarrassing (for them) technical article to their blog documenting the “advanced techniques” they use to parse Signal on an Android device they physically have with the screen unlocked.

Should we worry about the possibility of police surveillance using autonomous drones with added AI ? Too late: it’s already here

Should we worry about the possibility of police surveillance using autonomous drones with added AI ? Too late: it’s already here

As an article in Vice reports, the local police were less than honest about what they were up to: The Baltimore Police Department told the public and a federal appeals court that the surveillance images would only be stored for 45 days, that the planes would only be used for limited tracking of individuals to and from known crime scenes, and that the Aerial Investigation Research (AIR) program couldn’t be used to gather identifying information like license plate numbers.

This AI automagically creates fake faces for privacy-safe photo sharing

This AI automagically creates fake faces for privacy-safe photo sharing

John Koetsier: So, a couple questions that come up — and we’re going to get into the questions around I want to share pictures of myself, maybe my family, or something like that, and I want to do that in a privacy safe way.

Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

How do you decide who to trust with your data? Professor Robin Mansell from LSE on why protecting privacy online is so difficult

How do you decide who to trust with your data? Professor Robin Mansell from LSE on why protecting privacy online is so difficult

That said, and this has been true for the last decade or more, people express concerns about their data privacy in surveys but will then go and use these apps or platforms without thinking about the consequences.

Can we really call this democracy? We ask Amnesty International’s Matt Mahmoudi

Can we really call this democracy? We ask Amnesty International’s Matt Mahmoudi

What do you think are the biggest risks to online data privacy at the moment?I think the contact tracing debate has opened a lot more discourse around this issue, but it’s not at the same level as the response to the Cambridge Analytica scandal or the Snowden revelations.

A self-erasing chip for security and anti-counterfeit tech

A self-erasing chip for security and anti-counterfeit tech

Che-Hsuan Cheng, a doctoral student in material science and engineering in Deotare’s group and the first author on the study in Advanced Optical Materials, is most interested in its application as self-erasing invisible ink for sending secret messages.

Mark Zuckerberg says Facebook won't remove anti-vaccine posts despite Covid concerns

Mark Zuckerberg says Facebook won't remove anti-vaccine posts despite Covid concerns

Parker Molloy, a writer and cultural critic at Media Matters for America, said Facebook had proved itself an echo chamber when it allowed hundreds of inaccurate ads funded by pro-Trump organizations.

Kindle Collects a Surprisingly Large Amount of Data

Kindle Collects a Surprisingly Large Amount of Data

Every page that is read sends the following information:Time a page was opened (when you turn to a new page, a timestamp is generated)The first character on the page (This might be something like character 7705 in the book, which is the exact location)The last character on the pageIf the page is images or textHere's a sample record that is sent with every page read:.

With this new sensor, Blackjack drones can monitor an entire city at once

With this new sensor, Blackjack drones can monitor an entire city at once

Blackjack drones already host a number of sophisticated sensors, including full-motion video, infrared marker, laser range finder and a communications relay package, but Cardcounter offers a new capability: the ability to view a city-sized area.

Kindmetrics

Kindmetrics

Kindmetrics is a strictly privacy-focused, lightweight alternative to Google Analytics.It is the most privacy-focused analytics out there, and it is also straightforward to use with its one-page dashboard.Kindmetrics is built on being kind to you and your visitor`s privacy and data.

When the home is no data protection haven: addressing privacy threats from intimate relationships

When the home is no data protection haven: addressing privacy threats from intimate relationships

That’s precisely what a new paper from Karen Levy and Bruce Schneier does: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships.For example: some intimate privacy threats occur by virtue of copresence between victim, attacker, and device.

Google and Facebook are using aggregated location data to track lockdown effectiveness

Google and Facebook are using aggregated location data to track lockdown effectiveness

Google explained the process on Friday: The reports use aggregated, anonymized data to chart movement trends over time by geography, across different high-level categories of places such as retail and recreation, groceries and pharmacies, parks, transit stations, workplaces, and residential.

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

The company has already taken the step of disabling the passwords of Marriott Bonvoy members who had their information potentially exposed in the incident, and they will be notified to change their passwords during the next login, as well as prompted to enable multi-factor authentication.

Virgin Media data breach affects 900,000 people

Virgin Media data breach affects 900,000 people

Image copyright Getty Images A Virgin Media database containing the personal details of 900,000 people was left unsecured and accessible online for 10 months, the company has admitted.

Schools Are Spying on Students – But Students Can Fight Back

Schools Are Spying on Students – But Students Can Fight Back

In the new guide, EFF shows students and concerned parents what kind of technologies to watch for, how they can track you, and what it means for privacy.

Amazon: How Bezos built his data machine

Amazon: How Bezos built his data machine

Once a week they too delved into individuals' behaviour.“We had to make it actionable,” Selinger continues.“So to do that, we would project on the wall this view [of a] single customer and try to understand who she was.Weigend and Selinger moved on, but Amazon continued to hire talent to find innovative ways to turn data into dollars.

Chinese state 'likely' linked to cyber spies targeting human rights workers

Chinese state 'likely' linked to cyber spies targeting human rights workers

The espionage group, dubbed Bronze President, deployed malware against its alleged victims to monitor their activities and steal documents, according to the assessment released on Sunday by Secureworks , a US-based cyber security company.

Opinion | You Should Be Freaking Out About Privacy

Opinion | You Should Be Freaking Out About Privacy

Like, was it my idea to go to this place for a vacation, or was it Facebook’s idea?” If being tracked by a beer company doesn’t cross the line for you, let’s see how you feel when we take it up a level.

Smile as you buy your holiday goods in a store – you are probably being watched, tracked and analyzed

Smile as you buy your holiday goods in a store – you are probably being watched, tracked and analyzed

For example, AiFi works in the same way as Amazon Go, but is designed to scale: the company claims its Autonomous Store Platform can track up to 500 people, and tens of thousands of products.

Are You One Of Avast’s 400 Million Users? This Is Why It Collects And Sells Your Web Habits.

Are You One Of Avast’s 400 Million Users? This Is Why It Collects And Sells Your Web Habits.

As a final assurance, Vlcek told Forbes he recognizes customers use Avast to protect their information and so it can’t do anything that might “circumvent the security of privacy of the data including targeting by advertisers.”.

Mozilla Foundation

Mozilla Foundation

What you may not know is that this button allows Facebook to track what sites you’re browsing in order to target ads to you.We’re calling on Facebook to turn off the default use of cross-site tracking tools - such as the like button on external sites - that target advertising based on people’s browsing.

Privacy and Edward Snowden’s “Permanent Record” book

Privacy and Edward Snowden’s “Permanent Record” book

One thing I found when reading the book was that the NSA technically follows the law, just interprets it in such a way as to make it meaningless.

Senator proposes mandatory labeling for products with mics, cameras

Senator proposes mandatory labeling for products with mics, cameras

A rule such as the regulation Gardner proposes would close the gap that, for example, led owners of Nest Secure devices to the unpleasant discovery earlier this year that the products had shipped with undisclosed microphones.

Hundreds of exposed Amazon cloud backups found leaking sensitive data

Hundreds of exposed Amazon cloud backups found leaking sensitive data

He said that all too often cloud admins don’t choose the correct configuration settings, leaving EBS snapshots inadvertently public and unencrypted.Morris found dozens of snapshots exposed publicly in one region alone, he said, including application keys, critical user or administrative credentials, source code and more.

Facebook Sues Over 'Ad Fraud' Apps On Google Play, But Google Keeps Apps In Place (Updated)

Facebook Sues Over 'Ad Fraud' Apps On Google Play, But Google Keeps Apps In Place (Updated)

Just a few days later and Facebook has announced that is has filed its first lawsuit against two Asian developers for "click injection fraud—where developers made apps available on the Google Play store to infect their users’ phones with malware [which] created fake user clicks on Facebook ads that appeared on the users’ phones, giving the impression that the users had clicked on the ads.".

What can we learn from Palantir’s secret user manual for police users of its big data software?

What can we learn from Palantir’s secret user manual for police users of its big data software?

A Bloomberg article last year gave some details of how the Los Angeles Police Department uses Palantir’s Gotham product for Operation Laser, a program to identify and deter people likely to commit crimes: Information from rap sheets, parole reports, police interviews, and other sources is fed into the system to generate a list of people the department defines as chronic offenders, says Craig Uchida, whose consulting firm, Justice & Security Strategies Inc., designed the Laser system.

GitHub - tg12/slow_the_bots: Slow the bot's by spoofing what they are looking for!

GitHub - tg12/slow_the_bots: Slow the bot's by spoofing what they are looking for!

Slow the bot's by spoofing what they are looking for! This is a honeypot project. Are you sick of this in your log files? Install Ubuntu and Apache, (Default log directory /var/www/html/). */5 * * * * python3 /path/to/slow_the_ >/dev/null 2>&1.