Victory! German Mass Surveillance Abroad is Ruled Unconstitutional

Victory! German Mass Surveillance Abroad is Ruled Unconstitutional

In its press release about the decision, the court found that the privacy rights of the German constitution also protects foreigners in other countries and that the German intelligence agency, Bundesnachrichtendienst (BND), had no authority to conduct telecommunications surveillance on them:.

Credit card companies are tracking shoppers like never before: Inside the next phase of surveillance capitalism

Credit card companies are tracking shoppers like never before: Inside the next phase of surveillance capitalism

Companies have been tapping into transaction data to sell us more things as early as the 1990s, when credit card giants such as American Express analyzed purchases to tailor special offers to cardholders.

Vac - What Would a WeChat Replacement Need?

Vac - What Would a WeChat Replacement Need?

We want something that is self-sovereign, private, censorship-resistant and open that allows individuals and groups of people to communicate and transact freely.In order to get a lot of the features WeChat provides, we need the ability to do three things: communicate, store data, and transact with people.

After blowing $100m to snoop on Americans' phone call logs for four years, what did the NSA get? Just one lead

After blowing $100m to snoop on Americans' phone call logs for four years, what did the NSA get? Just one lead

The controversial surveillance program that gave the NSA access to the phone call records of millions of Americans has cost US taxpayers $100m – and resulted in just one useful lead over four years.

LogMeIn (LastPass) to be acquired by Private Equity Firms

LogMeIn (LastPass) to be acquired by Private Equity Firms

LogMeIn announced yesterday that it will be acquired by Private Equity Firm for approximately $4.3 billion in an all-cash transaction.LogMeIn announced yesterday that it will be acquired by Private Equity Firm for approximately $4.3 billion in an all-cash transaction.

Dutch data regulator criticizes banks' use of payment data for ads — Quartz

Dutch data regulator criticizes banks' use of payment data for ads — Quartz

The bank said in an email that it was in talks with the regulator and that does not currently “send its customers personal offers for relevant ING products and services based on transaction data, and will not start these practices for the time being either.”.

Top 3 Bitcoin Wallets for Privacy and Anonymity

Top 3 Bitcoin Wallets for Privacy and Anonymity

Besides, Wasabi supports Tor connections for greater security and a Coinjoin system that completely anonymizes the coins inside a wallet by mixing them in a pool with several users and throwing the same balance for everyone in one address and the spare change in another.

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

So, if NSA didn’t want to publish anything that I thought was important to get to people in any agency, I used what was called the gray phone, you know, it’s the encrypted line.

Edward Snowden: Germany a 'primary example' of NSA surveillance cooperation

Edward Snowden: Germany a 'primary example' of NSA surveillance cooperation

In his new book, Snowden calls Germany a 'primary example' of NSA surveillance cooperation.In fact, it was because of Snowden's revelations that Germans discovered their country's foreign intelligence agency, the BND, supported NSA surveillance.

Edward Snowden’s Memoir Is Coming in September

Edward Snowden’s Memoir Is Coming in September

A Metropolitan spokeswoman declined to say how much Mr. Snowden was paid.“Permanent Record” discusses how Mr. Snowden helped create a system of mass surveillance the N.S.A. used to collect information on hundreds of millions of United States citizens and others, as well as the “crisis of conscience” that led him to rebuke the system he helped create, according to a statement from the publisher.

Privacy Matters And More For Our Trading Choices

Privacy Matters And More For Our Trading Choices

Even DEX’s fail to protect user privacy as sensitive information like receiving and sending address, and the transaction value is often saved on a public blockchain for anyone to see. Zero-knowledge proof explained with following example:Peggy knows the magic word that will open a secret door in a cave.

NSA Still Grappling With Controls to Guard Against Surveillance Abuse

NSA Still Grappling With Controls to Guard Against Surveillance Abuse

In another case, a former Senior Executive, “who at the time of the investigation was a reemployed annuitant and employee of a private company, recommended that a Senior Agency Technical Director meet with his private employer,” the report said.

Cryptocurrency in the Era of GDPR

Cryptocurrency in the Era of GDPR

This clearly means that transaction data can be considered as Personally Identifying Information when in the right hands, and that sadly many cryptocurrencies are therefore not GDPR compliant. These are known as privacy coins, and their masking of transaction data means that they are mostly untraceable.

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

The NSA’s telephone record program, conducted under Section 215 of the Patriot Act, allows it to collect metadata of phone calls, including phone numbers, time stamps, and other identifying information.

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I Scraped Millions of Venmo Payments. Your Data Is at Risk

I could see a public API endpoint that was returning the data for this feed, meaning that anyone could make a GET request (like a simple page load) to see the latest 20 transactions made on the app by anyone around the world.

NSA improperly collected US phone records in October, new documents show

NSA improperly collected US phone records in October, new documents show

The National Security Agency (NSA) improperly collected records on American phone calls and texts last year, according to new documents obtained and released by the American Civil Liberties Union (ACLU).The error occurred between Oct. 3 and Oct. 12, the documents show, and had not been previously disclosed.

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

Credit: IntelThe NSA has started assigning developers to the Coreboot project, which is an open source alternative to Windows BIOS/UEFI firmware. All Coreboot code, including all the STM contributions from the NSA, are open source, so anyone could verify that there is no backdoor in there -- in theory.

Crypto Bans & Privacy Coins

Crypto Bans & Privacy Coins

Privacy coins are cryptocurrencies that utilize features designed to mask data surrounding a transaction. It’s also worth mentioning there are a host of other privacy coins out there to choose from. The Indian government can go to hell.

Former NSA director would support ending phone data collection program

Former NSA director would support ending phone data collection program

In an interview in March , current NSA Director and Commander of U.S. Cyber Command Gen. Paul Nakasone told CBS News the agency was in a "deliberative process" about the future of the program and would work "very, very closely with the administration and Congress on what authority should be reauthorized.".

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The revelations that NSA hackers and Border Patrol data-trackers had played themselves came on the heels of potentially worse news for wired Americans: An Israeli coding firm also admitted last month that its spyware was being deployed by hackers to attack WhatsApp users and gain access to their phones.

Federal Judge Hears Challenge to NSA ‘Upstream’ Spying

Federal Judge Hears Challenge to NSA ‘Upstream’ Spying

(CN) – On remand from the Fourth Circuit, a federal judge heard arguments Thursday in a challenge to the National Security Agency’s “upstream” surveillance of international and domestic text-based communications.

"The Most Destructive Breach In History": Hackers Use NSA Code To Grind Baltimore To A Halt

"The Most Destructive Breach In History": Hackers Use NSA Code To Grind Baltimore To A Halt

Commenting on the leak in April 2017, Edward Snowden said that the " NSA just lost control of its Top Secret arsenal of digital weapons; hackers leaked it. NSA just lost control of its Top Secret arsenal of digital weapons; hackers leaked it.

Monsanto kept 'watch lists' in seven EU countries

Monsanto kept 'watch lists' in seven EU countries

German chemicals and pharmaceuticals giant Bayer said Tuesday that US seeds and pesticides maker Monsanto, which it bought last year, kept lists of key pro- or anti-pesticides figures in at least seven EU countries.

Hospital Allegedly Leaks Woman's Personal Info To Her Rapist, Leading To Second Attack

Hospital Allegedly Leaks Woman's Personal Info To Her Rapist, Leading To Second Attack

A Missouri woman who sought treatment at a Kansas hospital after a violent sexual assault has filed a lawsuit against the hospital and one of its staffers, whom she says leaked her personal information to her attacker.

The NSA says it's time to drop its massive phone-surveillance program

The NSA says it's time to drop its massive phone-surveillance program

But earlier this year, Republican congressional national security adviser Luke Murry revealed that due to compliance and technical issues, the NSA hadn't even been using the system for the previous six months, calling into question the NSA's previous insistence that such data collection is vital to national security.

Vice versa HUAWEI P30 Pro without connection with China. The point is a misunderstanding when testing

Vice versa HUAWEI P30 Pro without connection with China. The point is a misunderstanding when testing

For cases where users of Huawei P30 Pro bought in Thailand Found that the device sent data to the Chinese government server Which Huawei Thailand contacted to investigate the facts of the problem After almost inspection at night We found that the device does not connect nor sends no data directly But it is the user's own test process that caused.

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Tor Accepts Dash Donations, Advancing Privacy Initiative

Tor Accepts Dash Donations, Advancing Privacy Initiative

The Tor Project is now accepting donations in Dash and eight other cryptocurrencies to fund the initiative of increasing individuals’ privacy for “protection against tracking, surveillance, and censorship”. These features help Dash better service consumers that wish to maintain their privacy, which makes it a great pairing for Tor donations.

Your Health Data Are a Gold Mine for Advertisers

Your Health Data Are a Gold Mine for Advertisers

“We kept privacy in mind as we were building our KidsMD skills.” Privacy foregrounds the conversation as providers explore voice-enabled health care and balance legal concerns with giving sound medical advice.

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Use credit instead of debit – When running a transaction as debit and entering your PIN, you are foregoing many of the protection features of the card per your user agreement.