Google Chrome Incognito Mode Can Still Be Detected by These Methods

Google Chrome Incognito Mode Can Still Be Detected by These Methods

When Google made it so that Incognito mode uses a temporary filesystem using the computer's RAM, it opened up a new method of detecting it based on the amount of storage set aside for the internal filesystem used by the browser.

You Have Just Given FaceApp a Perpetual And Royalty Free License to do What They Want With Your Selfies

You Have Just Given FaceApp a Perpetual And Royalty Free License to do What They Want With Your Selfies

When you post or otherwise share User Content on or through our Services, you understand that your User Content and any associated information (such as your [username], location or profile photo) will be visible to the public,” is the subsequent piece of text.

Academics steal data from air-gapped systems via a keyboard's LEDs

Academics steal data from air-gapped systems via a keyboard's LEDs

The research team behind this exfiltration method says it tested the CTRL-ALT-LED technique with various optical capturing devices, such as a smartphone camera, a smartwatch's camera, security cameras, extreme sports cameras, and even high-grade optical/light sensors.

New BitLocker attack puts laptops storing sensitive data at risk

New BitLocker attack puts laptops storing sensitive data at risk

Image: Denis Andzakovic A security researcher has come up with a new method of extracting BitLocker encryption keys from a computer's Trusted Platform Module (TPM) that only requires a $27 FPGA board and some open-sourced code.

Don’t look now: why you should be worried about machines reading your emotions

Don’t look now: why you should be worried about machines reading your emotions

The labelling process that Affectiva and other emotion detection companies use to train algorithms can only identify what Barrett calls “emotional stereotypes”, which are like emojis, symbols that fit a well-known theme of emotion within our culture.

Script Blocking Exceptions Update

Script Blocking Exceptions Update

We found that blocking certain third-party scripts broke many sites, so predicated on our cookie blocking and fingerprinting protection, we hardcoded some exceptions to ensure the best possible user experience.

Call for testing: 3.12~rc1

Call for testing: 3.12~rc1

:) Changes Known issues How to test Tails 3.12~rc1? First download the USB image: Tails 3.12~rc1 USB image OpenPGP signature Tails 3.12~rc1 USB image torrent Then follow the new installation instructions. Tails 3.12~rc1 ISO image OpenPGP signature Tails 3.12~rc1 ISO image torrent What's coming up?

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

"The people who are doing that are getting a lot of money and are doing that [full time]." Dubbed "AirHopper" by the researchers at Cyber Security Labs at Ben Gurion University , the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone.

Call for testing: simplified installation method

Call for testing: simplified installation method

USB images instead of ISO images We need your help to test the simplified installation methods of Tails that we will release with 3.12 on January 29.

Is FIDO the future instrument to prove our identity?

Is FIDO the future instrument to prove our identity?

Posted: by Pieter Arntz FIDO, short for Fast IDentity Online, is an industry consortium started in 2013 to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords.

How to Set a Strong Passcode on Your Mobile Device

How to Set a Strong Passcode on Your Mobile Device

Next, convert the phrase into a secure code using letters (both upper and lowercase), special characters, and numbers: Connect these two words with a random action and, as with the memorable sentence technique, convert it into a secure code.

What is Pretty Good Privacy (PGP)?

What is Pretty Good Privacy (PGP)?

Similarly, if someone gains access to your computer, they won’t be able to read the encrypted content unless they have the private key. You’ll also need to generate public and private keys.

China has started ranking citizens with a creepy 'social credit' system — here's what you can do wrong, and the embarrassing, demeaning ways they can punish you

China has started ranking citizens with a creepy 'social credit' system — here's what you can do wrong, and the embarrassing, demeaning ways they can punish you

The Chinese state is setting up a vast ranking system system that will monitor the behavior of its enormous population, and rank them all based on their "social credit." Like private credit scores, a person's social score can move up and down depending on their behavior.

Ancestry Sites Could Soon Expose Nearly Anyone's Identity, Researchers Say

Ancestry Sites Could Soon Expose Nearly Anyone's Identity, Researchers Say

Thanks to new technology, the investigators in the Golden State Killer case isolated the genetic material that’s now collected by consumer genetic testing companies from the suspected killer’s DNA left behind at a crime scene.

PMKID Dumping: WiFi Password Attacks are Easier Than Previously Thought

PMKID Dumping: WiFi Password Attacks are Easier Than Previously Thought

Previously, the primary method for cracking passwords for wireless networks using WPA2 encryption, was for an attacker to capture a four-way handshake between a wireless device and the router.