Andrew Yang proposes that your digital data be considered personal property

Andrew Yang proposes that your digital data be considered personal property

2020 Democratic presidential candidate Andrew Yang may not be at the top of the race when it comes to polling (Politico currently has him ranked as the 7th most-popular Democratic contender), but his policies, including support for universal basic income, have made him popular among a subset of young, liberal-leaning, tech-savvy voters.

What Facebook Did to American Democracy

What Facebook Did to American Democracy

The Trump campaign was working to suppress “idealistic white liberals, young women, and African Americans,” and they’d be doing it with targeted, “dark” Facebook ads.“I wouldn’t have come aboard, even for Trump, if I hadn’t known they were building this massive Facebook and data engine,” Bannon told them.

When coffee makers are demanding a ransom, you know IoT is screwed

When coffee makers are demanding a ransom, you know IoT is screwed

Once the device connects to a home network, this ad hoc SSID required to configure the coffee maker and initiate any updates is no longer available.

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Updated: January 5, 2019 — Additional testing was performed against Skype that revealed that URL previews were still working.Slack was happy to generate URL previews and identified itself with the following User-Agent:.

Alexa hack granted attackers access to an Echo user's smart home network

Alexa hack granted attackers access to an Echo user's smart home network

A number of vulnerabilities have been revealed in Amazon's Alexa, highlighting the need for providers of smart home platforms, such as Apple's HomeKit, to maintain security as part of the service.

Court finds UK police use of facial recognition technology breaches privacy rights, data protection laws and equality laws

Court finds UK police use of facial recognition technology breaches privacy rights, data protection laws and equality laws

A year ago UK human rights campaigners described the increasing use of automated facial recognition systems by the police as putting “arsenic in the water of democracy “.

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

“While DSP chips provide a relatively economical solution that allows mobile phones to provide end users with more functionality and enable innovative features—they do come with a cost,” researchers from security firm Check Point wrote in a brief report of the vulnerabilities they discovered.

TikTok: Logs, Logs, Logs

TikTok: Logs, Logs, Logs

Every 5 minutes, TikTok sent a network request with an encrypted content.Now, I can use Frida to intercept the call of this method and see the content of the request before encryption.

Omar Roth

Omar Roth

In either case, I consider myself extremely lucky to have people that can manage the project in future, and can only imagine what it would be like for someone without that luxury.

Don't post on Facebook unless you are prepared to face the consequences

Don't post on Facebook unless you are prepared to face the consequences

“When I saw the ads,” she writes, “I knew that Facebook had probably tagged me to receive them.” At which point I began to wonder if even such a sophisticated user of social media really understood how it works.

Twitter aims to limit people sharing articles without reading

Twitter aims to limit people sharing articles without reading

Twitter is attempting to prevent individuals from sharing articles they have not read, in analysis, the organization's expectations will "promote informed discussion" via social media.

Google and Facebook are using aggregated location data to track lockdown effectiveness

Google and Facebook are using aggregated location data to track lockdown effectiveness

Google explained the process on Friday: The reports use aggregated, anonymized data to chart movement trends over time by geography, across different high-level categories of places such as retail and recreation, groceries and pharmacies, parks, transit stations, workplaces, and residential.

Big Tech Is Testing You

Big Tech Is Testing You

But, as Luca and Bazerman recount, eBay’s marketing group defended the millions of dollars spent on the ads each year, noting that many people who clicked on them ended up buying things on eBay. An experiment was in order.

Reviving Sandstorm

Reviving Sandstorm

While Sandstorm had had a healthy community of folks using it and building apps, there had been fewer contributions to Sandstorm itself from outside the company, and no one but Sandstorm employees had been doing major core development on a regular basis.

Why the UK is banning default passwords in IoT devices

Why the UK is banning default passwords in IoT devices

So today I’ve announced we are developing new legislation to hold firms manufacturing and stocking internet-connected devices to account to stop hackers threatening people’s privacy and safety.

Opinion | Banning Facial Recognition Isn’t Enough

Opinion | Banning Facial Recognition Isn’t Enough

The problem is that we are being identified without our knowledge or consent, and society needs rules about when that is permissible.Discrimination based on protected characteristics like race and gender is already illegal, but those rules are ineffectual against the current technologies of surveillance and control.

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok, a mobile video app popular with teens, was vulnerable to SMS spoofing attacks that could have led to the extraction of private information, according to infosec researchers.Research from Israeli outfit Check Point found that an attacker could send a spoofed SMS message to a user containing a malicious link.

No, GDPR Can’t Be Blamed For Everything

No, GDPR Can’t Be Blamed For Everything

You’ve probably already opened the original article so I’ll just list the mentioned issues and explain why it’s not a GDPR problem per se.“Amazon sent 1,700 Alexa voice recordings to the wrong user following data request” — the allusion here is that GDPR is bad because it forced a company to make a mistake.

How a Chinese Company Built a $250 Million Search Hijacking Empire

How a Chinese Company Built a $250 Million Search Hijacking Empire

However, while TikTok hosts fun and light-hearted content, the Genimous search hijacker extensions are marketed toward users who are seeking a private search engine and who may be surprised that their most sensitive searches are being stored by a Chinese company making promises that it cannot legally keep.

Is Data Collection Evil?

Is Data Collection Evil?

In Cliqz’s case, XXX is a search engine and a privacy-preserving browser .Evilness does not necessarily come out of the data itself but rather from how and why it is collected.

Opinion | I Invented the World Wide Web. Here’s How We Can Fix It.

Opinion | I Invented the World Wide Web. Here’s How We Can Fix It.

Projects like Wikipedia, OpenStreetMap and the world of open source software are the kinds of constructive tools that I hoped would flow from the web.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S. Interest in data privacy has skyrocketed to the highest level in history since data started being gathered in 2004.Google Trends’ levels represent the search interest relative to the highest point in a specific date range.

Facial recognition protesters put smartphones on their heads to scan the faces of 13,000 Washington DC inhabitants

Facial recognition protesters put smartphones on their heads to scan the faces of 13,000 Washington DC inhabitants

Three activists wandered around busy spots in Washington DC on Thursday using cameraphones to run people's faces through facial recognition software in protest against growing use of the technology.Protesters against facial recognition donned white hazmat suits and cameras to collect face scans of more than 13,000 people.

Andrew Yang wants you to make money off your data by making it your personal property

Andrew Yang wants you to make money off your data by making it your personal property

Democratic presidential candidate Andrew Yang released his comprehensive plan to regulate the tech industry in a blog post Thursday.Regulating the tech industry has become a popular talking point among Democrats in the 2020 primary race, with candidates like Elizabeth Warren proposing breaking up tech giants.

How to Set Your Google Data to Self-Destruct

How to Set Your Google Data to Self-Destruct

While there have been tools we can use to manually purge our Google search histories, few of us remember to do so.In May, the company introduced an option that lets us automatically delete data related to our Google searches, requests made with its virtual assistant and our location history.

Facebook wants to manage Wi-Fi on your phone

Facebook wants to manage Wi-Fi on your phone

If the current Wi-Fi connection is considered undesirable, users are given options to send network feedback: “Connection is too slow”, “Network isn’t secure” and/or “Connection drops off”.For now, with this feature turned on, the app will periodically send your geolocation to Facebook’s server to get a list of nearby recommended networks.

Google and Amazon approved home speaker apps that spied on users

Google and Amazon approved home speaker apps that spied on users

"To prevent 'Smart Spies' attacks, Amazon and Google need to implement better protection, starting with a more thorough review process of third-party Skills and Actions made available in their voice app stores," the SLR researchers concluded.

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

So, if NSA didn’t want to publish anything that I thought was important to get to people in any agency, I used what was called the gray phone, you know, it’s the encrypted line.

Google Has My Dead Grandpa’s Data And He Never Used The Internet

Google Has My Dead Grandpa’s Data And He Never Used The Internet

Was it collecting addresses I put into services across the web even though I didn’t tell Google to store this information?Other questions I have: What other information does Google have about me/my family/others that I don’t know about.

Google says: “Privacy is paramount to us, in everything we do”; here’s why that can’t be true

Google says: “Privacy is paramount to us, in everything we do”; here’s why that can’t be true

This has understandably led many people – around a third of all users according to some estimates – to block cookies in order to prevent persistent stores of their online activity and thus their lives being created by sites and advertisers.