Clubhouse Security Risk Follow-up: China Is Listening

Clubhouse Security Risk Follow-up: China Is Listening

The Shanghai-based infrastructure supplier of Clubhouse called Agora Inc. raised security concerns that it may provide information to the Chinese government to identify and monitor users, especially for politically exposed personnel.

Court rules NSA phone snooping illegal — after 7-year delay

Court rules NSA phone snooping illegal — after 7-year delay

Judge Marsha Berzon's opinion, which contains a half-dozen references to the role of former NSA contractor and whistleblower Edward Snowden in disclosing the NSA metadata program, concludes that the "bulk collection" of such data violated the Foreign Intelligence Surveillance Act. The call-tracking effort began without court authorization under President George W.

Why Metadata Matters

Why Metadata Matters

Let’s take a look at how revealing metadata can actually be to the governments and companies that collect it: They know you rang a phone sex line at 2:24 am and spoke for 18 minutes.

Big Brother hasn’t won—yet

Big Brother hasn’t won—yet

In an exclusive interview for the latest New Money Review podcast, Dave Hrycyszyn, co-founder and chief technology officer at Nym, talks about the battle for internet privacy in an era of mass surveillance.

On Privacy versus Freedom

On Privacy versus Freedom

It’s also true that decentralised systems are harder to evolve than centralised ones - you can’t just push out a given feature with a single app update, but you have to agree and publish a public spec, support incremental migration, and build governance processes and community dynamics which encourage everyone to implement and upgrade.

New treaty will allow UK to request data, not backdoor, from US social media companies like WhatsApp

New treaty will allow UK to request data, not backdoor, from US social media companies like WhatsApp

He clarified WhatsApp’s official stance on this treaty forcing WhatsApp to build a backdoor for UK use:.Even in the status quo scenario where WhatsApp’s encryption isn’t broken by the UK, the metadata that will be shared will still satisfy some of the wants and needs of law enforcement.

Metadata is Data!

Metadata is Data!

Let’s use the above graph as an example and assume that A is a journalist currently working with a group of dissidents (B, C and D) and an unrelated source (E).

Everything you wanted to know about media metadata, but were afraid to ask

Everything you wanted to know about media metadata, but were afraid to ask

You can explode a flattened PDF into individual images of the pages using PDF Redact Tools, then feed the pages into Tesseract to create a text document that can be worked on with any language processing tool.

ACT police admit they unlawfully accessed metadata more than 3,000 times

ACT police admit they unlawfully accessed metadata more than 3,000 times

In the statement ACT Policing revealed it is still seeking legal advice about how to deal with two cases where invalidly obtained metadata was used in “a missing persons case and a criminal matter where the data in question may have been used in a prosecution”.

A thread written by @SarahJamieLewis

A thread written by @SarahJamieLewis

We @ OpenPriv believe that your social connections, friendship groups and patterns of life should not be monetized or sold for profit. Sex Workers and Queer People are already facing the wrath of Facebook's metadata collection. We, @ OpenPriv , are building Cwtch, a metadata resistant communication tool, (

Metadata

Metadata

Only upload files which were either created or downloaded inside the Whonix-Workstation and personally stripped of metadata. Anonymous photo sharing requires the user to consider both metadata and fingerprintable camera anomalies. MAT - Metadata Anonymisation Toolkit [ edit ]

“Do no harm” in the digital age: Privacy and security cannot be ignored

“Do no harm” in the digital age: Privacy and security cannot be ignored

As explored in our new report with the International Committee of the Red Cross - The humanitarian metadata problem: ‘Doing no harm’ in the digital era, metadata is generated by humanitarian organisations as they coordinate responses, communicate with staff, and engage with the people they serve.

New Signal privacy feature removes sender ID from metadata

New Signal privacy feature removes sender ID from metadata

Plenty of messaging apps use strong encryption to make it next to impossible for law enforcement officers or other potential adversaries to read communications sent between parties. Sealed sender, which puts most user information inside the encrypted message, uses two new devices to get around this potential privacy risk: