Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

Have issues with Facebook collecting your data? Privacy-first alternative MeWe surges to 9M users

Have issues with Facebook collecting your data? Privacy-first alternative MeWe surges to 9M users

Our personal information is shared and sold across data companies used to target and manipulate us through marketing from social media companies, advertisers and politicians.

Facebook is a social network monopoly that buys, copies or kills competitors, antitrust committee finds

Facebook is a social network monopoly that buys, copies or kills competitors, antitrust committee finds

Among the findings was a 2018 internal company document titled the Cunningham Memo in which Facebook Senior Data Scientist Thomas Cunningham informed CEO Mark Zuckerberg and Vice President of Growth Javier Olivan that Instagram could hit a "tipping point" where its growth could ultimately come at the expense of all users leaving Facebook's blue app.

Urbit for Normies

Urbit for Normies

Inside will be a super clean interface with all the functionality you might want from your computer, in one place and with one login (think document creation, email, social media access, accounting) — but it will run on your virtual Urbit computer, so it will be safe from corporate prying and data leaks, available on any device, and all inside one simple interface.

The privacy perils of using a mesh network – and why we urgently need one that is robust and open source

The privacy perils of using a mesh network – and why we urgently need one that is robust and open source

In the meantime, there is a real need for an easy-to-use, robust and truly secure mesh network system that can be used by people taking part in demonstrations and protests, or in places where there is no Internet connection.

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

In a blog post, the company said an 'error' in its 'Tailored Audiences and Partner Audiences advertising system' inadvertently used the information provided by users for security reasons to run targeted ads based on the advertisers' own marketing lists.

Jordan uses internet throttling instead of internet shutdowns and blocks to censor websites

Jordan uses internet throttling instead of internet shutdowns and blocks to censor websites

In an interview with Netzpolitik, Access Now employee Berhan Taye explained that internet throttling is a new method that governments are using as part of their censorship toolkit – and explained why a government like Jordan might prefer internet throttling to straight up internet blocking:.

Famous iOS apps are snooping on the Pasteboard

Famous iOS apps are snooping on the Pasteboard

The results show that many famous iOS apps frequently snooping around and having access to the pasteboard and read its content without user consent, albeit only text-based data.

Popular iPhone and iPad Apps Snooping on the Pasteboard

Popular iPhone and iPad Apps Snooping on the Pasteboard

The results show that many apps frequently access the pasteboard and read its content without user consent, albeit only text-based data.There are games and apps that do not provide any UI that deals with text, yet they read the text content of the pasteboard every time they’re opened.

Big Brother hasn’t won—yet

Big Brother hasn’t won—yet

In an exclusive interview for the latest New Money Review podcast, Dave Hrycyszyn, co-founder and chief technology officer at Nym, talks about the battle for internet privacy in an era of mass surveillance.

WikiTribune: Wikipedia founder's Facebook rival passes 200,000 users just days after launching

WikiTribune: Wikipedia founder's Facebook rival passes 200,000 users just days after launching

WT:Social, or WikiTribune, says it has ditched the data-driven business model popularised by Facebook, which monetises its users by serving them targeted ads.Facebook acquired Instagram in April 2012 for $1 billion, consolidating its position as the world's leading social network.

Windows will improve user privacy with DNS over HTTPS

Windows will improve user privacy with DNS over HTTPS

There are now several public DNS servers that support DoH, and if a Windows user or device admin configures one of them today, Windows will just use classic DNS (without encryption) to that server.

Browsers and privacy

Browsers and privacy

The following browsers were tested: Firefox 70.0.1 (Mozilla Binaries from MX Linux) Firefox ESR 68.2.0 (Debian package) Chromium 78.0.3904.97 (Debian Package) Brave Browser 1.0.0 (Package from Brave web site) Epiphany 3.32.1.2 (Debian package) Midori 7.0 (Debian package) The method itself was relatively simple.

Why you need to use a VPN when using WiFi at coworking spaces like WeWork

Why you need to use a VPN when using WiFi at coworking spaces like WeWork

According to CNET, examples of documents that have been found readily available via WeWork’s WiFi network include lots of personal identification records, account usernames and passwords, and more.This is important even on more public WiFi networks such as at private offices or in private homes.

Amazon's new eero mesh Wi-Fi system collects your data and you shouldn't buy it

Amazon's new eero mesh Wi-Fi system collects your data and you shouldn't buy it

Enable the eero Alexa skill to pause WiFi for specific profiles when screen time is over, you want the family to gather for dinner, or to find connected devices like phones—all with just your voice," says Amazon.

Private Instagram Posts Aren’t Exactly Private

Private Instagram Posts Aren’t Exactly Private

The hack works even when images and videos in a private Instagram story expire or are deleted.

Ad Industry Slams Texas Privacy Proposal

Ad Industry Slams Texas Privacy Proposal

by Wendy Davis @wendyndavis, Yesterday The ad industry is weighing in against a new privacy proposal in Texas that would require companies to obtain consumers' opt-in consent before drawing on data about them, including information used for ad targeting.

Protecting yourself from the ‘things’ on your home network

Protecting yourself from the ‘things’ on your home network

Sivan Rauscher, co-founder and CEO of the Israeli-based B2B startup SAM Seamless Network, said in a telephone interview, that hackers target IoT devices because they are easy to hack: As more of our daily lives become more connected and dependent on the web, the sheer number of devices and endpoints in your home makes likely it likely that some of these attacks will succeed.

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Brian Krebs of security news website cited an unnamed Facebook source as saying the internal investigation had so far indicated that as many as 600 million users of the social network had account passwords stored in plain text files searchable by more than 20,000 employees.

Mark Zuckerberg discovers privacy

Mark Zuckerberg discovers privacy

Milking Facebook’s stewardship of WhatsApp for all it’s worth, Zuckerberg was intentional about pitching his new centralized yet private future for Facebook around the model of the encrypted messaging app, a platform so antithetical to Facebook’s broad mission that its founders left in disgust after cashing their checks.

Facebook Knows How to Track You Using the Dust on Your Camera Lens

Facebook Knows How to Track You Using the Dust on Your Camera Lens

In patent speak, this is “Associating received contact information with user profiles stored by a social networking system.” Here’s how Facebook describes the process of figuring out everyone you’ve ever met.

The Beginner’s Guide to VPN Port Forwarding

The Beginner’s Guide to VPN Port Forwarding

As you might already know, you need an IP address to connect to the internet. To be able to access another computer on the internet, a device will need to connect to the router and use the router’s routable IP address.

LinkedIn cuts off email address exports with new privacy setting

LinkedIn cuts off email address exports with new privacy setting

Now LinkedIn confirms to TechCrunch that “This is a new setting that gives our members even more control of their email address on LinkedIn. If you take a look at the setting titled ‘Who can download your email’, you’ll see we’ve added a more detailed setting that defaults to the strongest privacy option.

Computer Security Education

Computer Security Education

There are few options available that are truly "free" (open-source), affordable, and provide suitable processing power to run "secure" operating systems like Qubes-Whonix, because specific hardware requirements like VT-d and VT-x are necessary for compatibility with future software releases.

Hardware Acceleration is Here for Routers Using OpenVPN

Hardware Acceleration is Here for Routers Using OpenVPN

This article focuses on a VPN router that likely has hardware acceleration enabled (the Asus RT-AC86U 2018), and tests various configurations to make sure that the feature is working.

When it comes to Windows 10 privacy, don't trust amateur analysts

When it comes to Windows 10 privacy, don't trust amateur analysts

The raw numbers come out as follows: in an eight hour period Windows 10 tried to send data back to 51 different Microsoft IP addresses over 5500 times.