Inside the French government’s mission to develop an encrypted messaging platform

Inside the French government’s mission to develop an encrypted messaging platform

Although DINUM wasn’t looking for an open source solution specifically, it discovered Matrix; a decentralised communication protocol developed with interoperability and privacy in mind.

Microsoft and OpenAI partner to propose digital transformation of export controls

Microsoft and OpenAI partner to propose digital transformation of export controls

For these reasons, restricting the problematic users and uses of these technologies is the more targeted and balanced of traditional export controls approaches, as it protects national security interests while preserving beneficial uses and tech leadership.

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Red alert: The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the security cameras, including Amazon Ring cameras, of participating residents.

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Whether you are living and working in a high-threat environment or period of civil unrest, worry about being vulnerable to hacking of your financial data or online profiles, or are simply an advocate for personal privacy and liberty, it’s important to understand the methods by which you are tracked, and by whom, and for what purpose.

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Zoom and the Federal Trade Commission (FTC) have come to a tentative settlement agreement regarding the video conferencing company’s false advertising of end-to-end encryption along with other issues.

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

picture alliance via Getty Images The Director of Identity Security at Microsoft has been warning about the inefficacy of passwords and more recently about standard Multi-Factor Authentication or MFA.He should know: the team he works with at Microsoft defends against hundreds of millions of password-based attacks every day.

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

Given that this bucket belongs to LimitChat, which we believe is a product of FaceChance, then LimitChat users have just had their most sensitive, explicit moments leaked online for anyone who knows where to look.

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

A leaked draft resolution from the Council of the European Union highlights that the government is planning to crack down on the end-to-end (e2e) encryption used by messaging apps such as Signal and WhatsApp. What the EU is calling for is a “balance” between regular encryption use and lawful access to encrypted data.

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

In other cases where the personal data breach appears to be more a matter of ignorance and one-time mistakes, fines in the similar range as Grabcar Pte Ltd [2020] SGPDPC 14 were imposed.

Should You Use Biometric Locks on Your Devices?

Should You Use Biometric Locks on Your Devices?

As such, many cybersecurity experts actually recommend biometric locks like fingerprint, face scan, or retina scan instead.No matter what protection you go with for your devices – be it password, PIN, or biometric lock – make sure that you’ve done your research.

ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure

ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure

The ICO’s investigation found that there were failures by Marriott to put appropriate technical or organisational measures in place to protect the personal data being processed on its systems, as required by the General Data Protection Regulation (GDPR).

Why You Need Multi-Factor Authentication (MFA)

Why You Need Multi-Factor Authentication (MFA)

This is a piece of information or a device that is given to you to confirm your identity at the time of accessing your account like a one-time password or a push notification from an app.

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

Quest 2 Jailbreak Effort Reports Success Bypassing Facebook Services

A researcher from the XR community has gained root access to Oculus Quest 2 and is able to bypass Facebook Login.XRSI wants to help extend the same to AR/VR headsets, which would including protecting the right of users to jailbreak devices like Quest 2.

Researchers demonstrate how link previews in apps can expose data from users

Researchers demonstrate how link previews in apps can expose data from users

However, security researchers Talal Haj Bakry and Tommy Mysk have discovered that these link previews can expose user data in both iOS and Android apps.

Why Are There So Many Data Breaches?

Why Are There So Many Data Breaches?

Object Stores have many uses such as:Providing a location for the upload or download of dataStore process inputs, outputs, temporary and data filesStoring, transcoding and playing audiovisual mediaStoring data backupsStoring website contentHosting static websitesTwo of the largest cloud Object Store services are Azure Storage and AWS S3.What security options are available.

Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

Singapore’s world-first face scan plan sparks privacy fears

Singapore’s world-first face scan plan sparks privacy fears

“We want to be innovative in applying technology for the benefit of our citizens and businesses,” Kwok Quek Sin, who works on digital identification at Singapore’s technology agency GovTech, told AFP.

If you used Firefox to access Twitter, your non-public info may have been exposed

If you used Firefox to access Twitter, your non-public info may have been exposed

This means that if you accessed Twitter from a shared or public computer via Mozilla Firefox and took actions like downloading your Twitter data archive or sending or receiving media via Direct Message, this information may have been stored in the browser’s cache even after you logged out of Twitter.

Thousands of infected IoT devices used in for-profit anonymity service

Thousands of infected IoT devices used in for-profit anonymity service

The code further uses a lib2p-based network stack to interact with the Interplanetary File System, which is often abbreviated at IPFS.

8 Privacy Features iOS 14 Users Need to Know

8 Privacy Features iOS 14 Users Need to Know

Certain apps will request local network access the first time you launch them after the update.Some apps will try to use your camera or microphone for certain reasons even when they don’t need that access.

Undocumented backdoor that covertly takes snapshots found in kids’ smartwatch

Undocumented backdoor that covertly takes snapshots found in kids’ smartwatch

Harrison Sand, a researcher at Norwegian security company Mnemonic, said that commands exist for surreptitiously reporting the watch’s real-time location, taking a snapshot and sending it to an Xplora server, and making a phone call that transmits all sounds within earshot.

DOJ formalizes request for encryption back-doors

DOJ formalizes request for encryption back-doors

The US Department of Justice, in conjunction with the "Five Eyes" nations, has issued a statement asking Apple and other tech companies to effectively create backdoors that will weaken encryption strength overall to provide law enforcement access to data.

School-Issued Chromebooks and Privacy

School-Issued Chromebooks and Privacy

If I get issued a Chromebook and use it at home, can the school/Google see other devices and network traffic?

Apple's T2 Security Chip Has an Unfixable Flaw

Apple's T2 Security Chip Has an Unfixable Flaw

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access.

Comcast TV Remote Hack Opens Homes to Snooping

Comcast TV Remote Hack Opens Homes to Snooping

“Few people think of their television remote controls as ‘connected devices,’ fewer still would guess that they can be vulnerable to attackers, and almost no one would imagine that they can jeopardize their privacy,” said researchers with Guardicore, in a Wednesday post.

Urbit for Normies

Urbit for Normies

Inside will be a super clean interface with all the functionality you might want from your computer, in one place and with one login (think document creation, email, social media access, accounting) — but it will run on your virtual Urbit computer, so it will be safe from corporate prying and data leaks, available on any device, and all inside one simple interface.

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Decent is an ad-free, privacy-first Twitter reading experience Join 22 others in the waiting list!.The problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems (the disclosure of personal information or surveillance) and not others.

Losing the Right to Encryption Means Losing Business

Losing the Right to Encryption Means Losing Business

Every time a government passes a law that affects the Internet, tech companies must ask themselves a critical question: can they still properly provide their services while protecting user privacy under the new rules?

Tor In 2020, What Changed?

Tor In 2020, What Changed?

The press is still one of the most threatening things for Tor. It's often portrayed to only be used by criminals and the like, even though most people use it for regular browsing in the hope of not being tracked.

Fashion retailer BrandBQ exposes 1 TB of customers, contractors data

Fashion retailer BrandBQ exposes 1 TB of customers, contractors data

The data exposed amounts to over 1 TB numbering 1 billion records and includes a range of personally identifiable information(PII) of the company’s customers such as full names, email addresses, phone numbers, and payment details without card numbers.