An insecure mess: How flawed JavaScript is turning web into a hacker's playground

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

Overall, 87 percent of the Alexa sites and 46.5 percent of the .com sites use one of the 72 libraries.Additionally, 9.7 percent of the sites in the study use two or more vulnerable library versions.

Poland made an app that forces coronavirus patients to take regular selfies to prove they're indoors or face a police visit

Poland made an app that forces coronavirus patients to take regular selfies to prove they're indoors or face a police visit

Poland on Friday released an app which requires people in quarantine for COVID-19 to periodically send selfies of themselves on request to prove they're sticking to their quarantine."People in quarantine have a choice: either receive unexpected visits from the police, or download this app," a spokesman for Poland's Digital Ministry told the AFP.

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.

GreenTunnel bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.For example, if the administrator chooses to block the hostname youtube using this feature, all Website access attempts over HTTPS that contain youtube like in the SNI would be blocked.

La aplicación de autoevaluación de la Comunidad de Madrid para COVID-19: es oficial, da acceso a tus datos a empresas privadas y no los anonimiza

La aplicación de autoevaluación de la Comunidad de Madrid para COVID-19: es oficial, da acceso a tus datos a empresas privadas y no los anonimiza

Según el Aviso de Privacidad, las empresas participantes tienen acceso a los datos que damos a la aplicación, igual que las fuerzas y cuerpos de seguridad del estado.

Israel Passes Emergency Law to Track and Trace Mobile Users With Suspected COVID-19

Israel Passes Emergency Law to Track and Trace Mobile Users With Suspected COVID-19

Israel has passed emergency measures that will allow security agencies to track the smartphone data of people with suspected COVID-19 and find others they may have come into contact with (via BBC News).

Activision Subpoenas Reddit to Identify Call of Duty Warzone ‘Leaker’

Activision Subpoenas Reddit to Identify Call of Duty Warzone ‘Leaker’

According to documents obtained by TorrentFreak, the gaming giant has also obtained a DMCA subpoena from a US court, which compels Reddit to hand over the personal details of a user who allegedly posted a leaked image to the site.

Meet the Guy Selling Wireless Tech to Steal Luxury Cars in Seconds

Meet the Guy Selling Wireless Tech to Steal Luxury Cars in Seconds

A 2017 video released by the West Midlands Police in the U.K. showed two men approach a Mercedes Benz parked in the owner's driveway; similar to Evan's video, one man stood next to the target vehicle with a handheld device, while another positioned a larger piece of tech near the home, hoping to pick up the signal emitting from the car keys stored inside.

Facebook Is More Concerned With the Appearance of Privacy, According to Mark Zuckerberg

Facebook Is More Concerned With the Appearance of Privacy, According to Mark Zuckerberg

One of the more interesting insights that comes from Mark Zuckerberg's lost journal pages, as reported by Wired's Steven Levy, is that even early on, the Facebook founder clearly wanted people to feel like they are having a private experience.

Congress, Not the Attorney General, Should Decide the Future of Encryption

Congress, Not the Attorney General, Should Decide the Future of Encryption

The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the “best practices” that will give Section 230 immunity for child exploitation suits.

Everything you need to know about the “Right to be forgotten”

Everything you need to know about the “Right to be forgotten”

Of course, given competing interests and the hyper-connected nature of the Internet, the right to be forgotten is much more complicated than an individual simply requesting that an organization erase their personal data.

The New Control Center Empowers Ring Customers to Manage Important Privacy and Security Settings

The New Control Center Empowers Ring Customers to Manage Important Privacy and Security Settings

That’s why today we’re launching the new Control Center, a feature in the Ring app that lets customers manage important privacy and security settings from one simple, easy-to-use dashboard.

Thread by @kmlefranc: I had to get a background check for my job, and it turns out the report is a 300+ page pdf of every single tweet I’ve ever liked with the wo…

Thread by @kmlefranc: I had to get a background check for my job, and it turns out the report is a 300+ page pdf of every single tweet I’ve ever liked with the wo…

"mr qian, if you don't mind me saying—"."uh, kun."uh, kun.for what it's worth, you're raising some really great kids.".kun sighs."are you kidding?!"johnny exclaims."you're, like, super dad!"."super dad?".johnny splutters.

‘Techlash’ Hits College Campuses

‘Techlash’ Hits College Campuses

Then, a Google recruiter came to campus and, Ms. Stapleton said, she “won ‘American Idol.’” The company flew her out to Mountain View, Calif., which felt to her “like the promised land” — 15 cafeterias, beach volleyball courts, Zumba classes, haircuts and laundry on-site.

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Army Research Lab has previously publicized research in this area, but these contracts, which started at the end of September 2019 and run until 2021, indicate the technology is now being actively developed for use in the field.“Sensors should be demonstrable in environments such as targets seen through automotive windshield glass, targets that are backlit, and targets that are obscured due to light weather (e.g., fog),” the Department of Defense indicated when requesting proposals.

Your Right to Know: Don’t block anonymous requests

Your Right to Know: Don’t block anonymous requests

An anonymous requester sued the Madison Metropolitan School District in November for refusing to release records unless the requester revealed his or her identity.The anonymity provision is crucial to the state open records law.

Mozilla will soon delete Telemetry data when users opt-out in Firefox

Mozilla will soon delete Telemetry data when users opt-out in Firefox

The next stable version of the Firefox web browser, Firefox 72, includes a new option to have collected Telemetry data deleted.The next stable version of the Firefox web browser, Firefox 72, includes a new option to have collected Telemetry data deleted.

California's groundbreaking privacy law takes effect in January. What does it do?

California's groundbreaking privacy law takes effect in January. What does it do?

The California Consumer Privacy Act will go into action 1 January 2020, giving residents of the state a whole new arsenal of tools to protect their data and personal information online – and saddling businesses with a lot more responsibility.

How to Revert Your Windows 10 Account to a Local One (After the Windows Store Hijacks It)

How to Revert Your Windows 10 Account to a Local One (After the Windows Store Hijacks It)

Not only is this an annoyance but if you end up in some comedy-of-errors situation where someone who isn’t you logs into the Windows Store then it converts your local user account to a Microsoft account with their login credentials.

What do you get if you put DNA and facial recognition together? Today, it’s China; tomorrow, maybe everywhere else

What do you get if you put DNA and facial recognition together? Today, it’s China; tomorrow, maybe everywhere else

A story in the New York Times means we don’t have to guess, because China is already doing it: Chinese scientists are trying to find a way to use a DNA sample to create an image of a person’s face.

Google Now Bans Some Linux Web Browsers From Their Services

Google Now Bans Some Linux Web Browsers From Their Services

Google is now banning the popular Linux browsers named Konqueror, Falkon, and Qutebrowser from logging into Google services because they may not be secure.When attempting to do so, we were told to try a different browser as Konqueror or Falkon may not be secure.

How Apple personalizes Siri without hoovering up your data

How Apple personalizes Siri without hoovering up your data

Though Apple has been using differential privacy since 2017, it’s been combined with federated learning only as of iOS 13, which rolled out to the public in September of this year.

Ring reportedly outed camera owners to police with a heat map

Ring reportedly outed camera owners to police with a heat map

While police can request videos from users through Ring, the company has denied that it provides information to law enforcement on who, specifically, owns their products.

China is using DNA samples to try to re-create the faces of Uighurs

China is using DNA samples to try to re-create the faces of Uighurs

The news: Chinese researchers are using blood taken from Uighurs to try to work out how to use a DNA sample to re-create an image of a person’s face, according to an investigation by the New York Times.

Opinion | We Hate Data Collection. That Doesn’t Mean We Can Stop It.

Opinion | We Hate Data Collection. That Doesn’t Mean We Can Stop It.

And does it even matter that we do not want to be watched — or is it of no consequence, because they know we’re trapped, and so do we.And more than 80 percent feel like they have very little or no control over the data being collected about them.

Dnsmasq-based DNS blocking

Dnsmasq-based DNS blocking

3600 IN A 104.198.14.52 ;; Query time: 155 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Mon Nov 11 18:47:14 GMT 2019 ;; MSG SIZE rcvd: 56) And successfully blocks the cancer that is Google!.

Is your Airbnb host spying on you with a hidden camera? Use this simple trick to find out.

Is your Airbnb host spying on you with a hidden camera? Use this simple trick to find out.

Alex Heid, chief research and development officer at SecurityScorecard, has developed a simple method for detecting whether an Airbnb host is watching guests live on a hidden camera.Here's how to find out if your Airbnb host is discreetly watching you on a live security camera.

Configuring DNS-Over-HTTPS on Pi-hole

Configuring DNS-Over-HTTPS on Pi-hole

This means that the connection from the device to the DNS server is secure and can not easily be snooped, monitored, tampered with or blocked.In the following sections we will be covering how to install and configure this tool on.

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

These contracts, combined with revelations surrounding the military’s massive biometric database initiatives, paint an alarming picture: A large and quickly growing network of surveillance systems operated by the U.S. military and present anywhere the U.S. has deployed troops, vacuuming up biometric data on millions of unsuspecting individuals.

UK Plans to Give All Children Full Genome Sequence at Birth

UK Plans to Give All Children Full Genome Sequence at Birth

Health Secretary Matt Hancock sees the future ubiquity of genetic sequencing as a way to offer “predictive, personalized” care for children who have rare diseases and other genetic conditions, according to The Telegraph.

Edward Snowden says 'the most powerful institutions in society have become the least accountable'

Edward Snowden says 'the most powerful institutions in society have become the least accountable'

Former NSA contractor Edward Snowden speaks via video link at the Web Summit technology conference in Lisbon, Portugal on November 4, 2019.