The Capitol Attack Doesn’t Justify Expanding Surveillance

The Capitol Attack Doesn’t Justify Expanding Surveillance

Right now, a growing chorus is demanding we use facial recognition, cellphone tower data, and every manner of invasive surveillance to punish the mob.Rather than responding to these attacks with a new mandate for expanded policing powers, we need to expand our civilian oversight.

Humble Book Bundle: Hacking 101 by No Starch Press

Humble Book Bundle: Hacking 101 by No Starch Press

Get ebooks like Metasploit, Web Security for Developers, Real-World Bug Hunting, and Black Hat Go. Plus, your purchase will support the National Coalition Against Censorship and the No Starch Press Foundation!

3 Questions: The price of privacy in ride-sharing app performance

3 Questions: The price of privacy in ride-sharing app performance

The study compares different methods for masking data and different levels of location data anonymization, and provides useful insights into the trade-off between user privacy and the performance of mobility-sharing applications.

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Toyota has expanded its collaboration with Amazon Web Services in ways that will see many of its models upload performance data into the Amazonian cloud to expand the services the auto-maker offers to drivers and fleet owners.

Almost 17,000 Protesters Had No Idea A Tech Company Was Tracing Their Location

Almost 17,000 Protesters Had No Idea A Tech Company Was Tracing Their Location

Datta said that he and a few Mobilewalla employees chose locations where they expected protests would occur — including the George Floyd memorial site in Minneapolis, and Gracie Mansion in New York — and analyzed data from mobile devices in those areas collected between May 29 and May 31.

COVID-19 Community Mobility Report

COVID-19 Community Mobility Report

Each Community Mobility Report is broken down by location and displays the change in visits to places like grocery stores and parks.Visit Google's Privacy Policy to learn more about how we keep your data private, safe and secure.

Your mobile network broke the law by selling location data and may be fined millions... or maybe not, shrugs FCC

Your mobile network broke the law by selling location data and may be fined millions... or maybe not, shrugs FCC

The chair of the House Energy and Commerce Committee – which oversees the FCC – Frank Pallone (D-NJ) issued a statement: “Following our longstanding calls to take action, the FCC finally informed the Committee today that one or more wireless carriers apparently violated federal privacy protections by turning a blind eye to the widespread disclosure of consumers’ real-time location data.

Let’s take back control of our events! #JoinMobilizon

Let’s take back control of our events! #JoinMobilizon

At this point, we are not talking about software, code or graphics yet: we are still focusing on the uses, the reality of organizing events and the real problems faced by the people who set them up.

Congress to FCC: Where’s the damn report on mobile companies selling location data?

Congress to FCC: Where’s the damn report on mobile companies selling location data?

The situation blew up in May 2018 when it was revealed that a company called Securus Tehnologies was buying real-time location data on American phone users and selling it to the police with no oversight through an online portal.

Why India wants to track WhatsApp messages

Why India wants to track WhatsApp messages

Image copyright Getty Images Image caption Privacy activists are worried that the new rules could be misused to curb free speech India's plan to try to mandate the monitoring, interception and tracing of messages on social media has alarmed users and privacy activists - as well as the companies running the platforms.

Millions of smartphones vulnerable to SimJacker mobile phone exploit

Millions of smartphones vulnerable to SimJacker mobile phone exploit

At its core, SimJacker works by an attacker sending an SMS message to the target containing special code that is then automatically processed by the SIM card which then allows the attacker to take over the phone through the SIM card’s [email protected] Browser.

Somebody’s Watching You: The Surveillance of Self-driving Cars

Somebody’s Watching You: The Surveillance of Self-driving Cars

As self-driving cars develop further, autonomous vehicles will play a much larger role in the digital economy as car companies and others harness personalized customer information through geospatial and navigation technologies, combining it with existing financial consumer profiles, according to a study in Surveillance and Society .

Let’s retake control of our events! #JoinMobilizon

Let’s retake control of our events! #JoinMobilizon

We asked professional designers to help us develop our vision for Mobilizon. We asked two designers to work with us on this project, so that Mobilizon would, right from its conception, fit the needs and uses of the people who are going to use it.

Report: Smart Transportation Systems Pose ‘Profound’ Privacy Risks

Report: Smart Transportation Systems Pose ‘Profound’ Privacy Risks

As Americans hand over more of their personal data to use public transportation systems, the government must do more to ensure their privacy is being protected, according to a recent report.

Mobilizon: let’s finance a software to free our events from Facebook! – Framablog

Mobilizon: let’s finance a software to free our events from Facebook! – Framablog

Less than 60 days to promote our project of a free and federated alternative to Facebook events ; and to know how much we need to invest ourselves in it.

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

For example, it has emerged that victims of crimes in the UK are being asked to hand over their mobile phones and social media accounts so that the police can download all the contents in the search for “relevant” information.

Cities Can See Where You’re Taking That Scooter

Cities Can See Where You’re Taking That Scooter

Historically, cities do not receive information at this level of specificity for origins, destinations, and routes of individual trips; ride-hailing companies like Lyft and Uber have insisted on aggregating data before sharing it, if they do so at all.

Data Breaches

Data Breaches

Stationary Device (STAT) Stationary computer loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility) Unintended Disclosure (DISC) Unintended disclosure (not involving hacking, intentional breach or physical loss – for example: sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax) Unknown

What was that P word? Ah. Privacy. Yes, we'll think about privacy, says FCC mulling cellphone location data overhaul

What was that P word? Ah. Privacy. Yes, we'll think about privacy, says FCC mulling cellphone location data overhaul

It would be relatively easy for the FCC to closely define what is allowed to be done with the more accurate location data it is arguing for: it can specifically designate that data and put rules around it that would, for example, require mobile operators to only grant access to approved providers.

How Xiaomi collect huge data from it’s devices and how to stop it

How Xiaomi collect huge data from it’s devices and how to stop it

Cheetah Ads offers diverse, global reach with over 600 million users from 200+ countries and regions across Cheetah Mobile’s owned and operated inventory, including Clean Master, CM Security, Cheetah Keyboard.

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their phone — before the person on the other end has accepted or rejected the incoming call.

Purism 'PureOS Store' will be for both desktop and mobile apps, and that's a mistake

Purism 'PureOS Store' will be for both desktop and mobile apps, and that's a mistake

"Purism is pleased to announce PureOS Store, a secure alternative to proprietary app stores that respects your privacy and freedom. PureOS Store will be a vibrant hub for both mobile and desktop apps.

Facebook data could end up in China's hands

Facebook data could end up in China's hands

China, unlike Russia, is also well positioned to exploit social-media data. Because data is only as useful as the analytic tools one has to hand, these unparalleled investments mean that China is uniquely positioned to exploit social media data.

Sorry, your data can still be identified even if it’s anonymized

Sorry, your data can still be identified even if it’s anonymized

In other words, as urban planners, tech companies, and governments collect and share data, we now know that “it’s anonymized” is never a guarantee of privacy.

Necuno Mobile: An open phone with Plasma Mobile

Necuno Mobile: An open phone with Plasma Mobile

Necuno Solutions is working with open source mobile communities and intends to make their hardware a welcoming platform for Free and open source operating systems in the mobile ecosystem.

US intel budget soars under Trump

US intel budget soars under Trump

Notorious Boston mobster Whitey Bulger dead at 89 Read more Kanye West says he's been 'used' in world of politics Read more Unseasonal snowstorms sweep across central France Read more Earth’s animal population plummets 60 percent in 44 years, says WWF Read more

US, UK and others push for mandatory access to encrypted data

US, UK and others push for mandatory access to encrypted data

The countries said any measures would honor privacy and oversight laws, but also contended that the same laws allowing them to search homes and cars also gave them permission to obtain any private data they deemed legally necessary. "Privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute," the group said in its statement.

Surviving 1984 — Don’t let them watch you! – Sherif Gamal – Medium

Surviving 1984 — Don’t let them watch you! – Sherif Gamal – Medium

All these are big brothers, and they are watching every single thing you do, they log every action you do on the internet, and every action you don’t, they log when you move your mouse.

Spyware in browser extensions — it’s worse than you think

Spyware in browser extensions — it’s worse than you think

54.86.66.252 - - [19/Aug/2018:20:37:26 +0200] "GET /clearly-this-is-a-honeypot-for-big-star-labs/ HTTP/1.1" 200 257 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.1.25 (KHTML, like Gecko) Version/8.0 Safari/600.1.25" 54.86.66.252 - - [19/Aug/2018:20:37:26 +0200] "GET /clearly-this-is-a-honeypot-for-big-star-labs/ HTTP/1.1" 200 257 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.1.25 (KHTML, like Gecko) Version/8.0 Safari/600.1.25"