Many users will move from Google to DuckDuckGo due to privacy

Many users will move from Google to DuckDuckGo due to privacy

The moment people started to realize how their private data should be saved they started to use the DuckDuckGo search engine.Finally, if you privacy-minded person, this is the time to move to DuckDuckGo private search engine.

The EU must protect the right to privacy and not attack end-to-end encryption

The EU must protect the right to privacy and not attack end-to-end encryption

In response, these four leading European technology companies reject any attempts to use legal instruments to violate citizens’ privacy and stand up to protect the rights of people and businesses choosing end-to-end encryption.

Capella Space's new satellite is eerily observant

Capella Space's new satellite is eerily observant

Like other hunks of metal currently orbiting Earth, The Capella-2 satellite's onboard radar system makes it capable of producing ludicrously high-resolution visuals from its data.

A New Satellite Can Peer Inside Buildings, Day or Night

A New Satellite Can Peer Inside Buildings, Day or Night

A few months ago, a company called Capella Space launched a satellite capable of taking clear radar images of anywhere in the world, with incredible resolution — even through the walls of some buildings.

How anti-fingerprinting extensions tend to make fingerprinting easier

How anti-fingerprinting extensions tend to make fingerprinting easier

Fingerprinting can now use two data points instead of one: not merely the real display resolution but also the fake one.As anti-fingerprinting functionality in browser extensions is rather invasive, it is prone to breaking websites.

Inside the French government’s mission to develop an encrypted messaging platform

Inside the French government’s mission to develop an encrypted messaging platform

Although DINUM wasn’t looking for an open source solution specifically, it discovered Matrix; a decentralised communication protocol developed with interoperability and privacy in mind.

Threema Multi-Device: An Architectural Overview

Threema Multi-Device: An Architectural Overview

If, however, the multi-device protocol is required to meet Threema standards, things get complicated.In order to fulfill Threema’s requirements, a multi-device solution must, of course, provide full end-to-end encryption.

USBGuard · InfoSec Handbook – information security blog

USBGuard · InfoSec Handbook – information security blog

By default, USBGuard allows all USB devices that are currently connected to your machine.In your terminal, enter usbguard list-devices to see all USB devices that are connected to the system.If you connect another USB device to the machine, USBGuard blocks it by default.

The privacy perils of using a mesh network – and why we urgently need one that is robust and open source

The privacy perils of using a mesh network – and why we urgently need one that is robust and open source

In the meantime, there is a real need for an easy-to-use, robust and truly secure mesh network system that can be used by people taking part in demonstrations and protests, or in places where there is no Internet connection.

The Self-Destructive Quest for Perfection

The Self-Destructive Quest for Perfection

This week I was reintroduced to a phrase I’m coming to love as I interact with the privacy community: “don’t let perfection be the enemy of good enough.” If you recommend Signal to someone for it’s security, someone else will complain that Signal uses phone numbers and AWS as a backbone.

Digital Signage solutions for Retail to Surplus Inventory

Digital Signage solutions for Retail to Surplus Inventory

By updating audio-video digital signage content throughout business hours, retailers can regulate inventory and support marketing activities utilizing in-store signage targeted throughout the day directly to consumers.Digital Signage solution provides a customizable and flexible platform directly to market to customers on premise with messaging directly correlated with sales goals and inventory.

Axel Voss, in an Interview: anyone Who has the App, is the first to be allowed to return to the Restaurant

Axel Voss, in an Interview: anyone Who has the App, is the first to be allowed to return to the Restaurant

Would not be a pan-European App better?A pan-European App would have a great advantage: The citizens would identify more closely with the EU.Of course, privacy must be ensured, in the opinion of the European data protection supervisor, but this is also the case of Central systems.

Going private and minimal, for our own good.

Going private and minimal, for our own good.

However, by doing this, we can cause a "virtual personality crisis" because for Twitter we are this awesome developer who just talks about tech and stuff, and for Google we are just some pervert who only want to watch naked women after 11 PM.

Qubes Architecture Next Steps: The GUI Domain

Qubes Architecture Next Steps: The GUI Domain

There were two big issues in the previous Qubes architecture that needed to be handled for an effective approach to a GUI domain: how the GUI protocol relied on dom0-level privileges and how managing anything in the system required dom0-level access to the hypervisor.

Coronavirus Phishing Attacks Aim to Spread Malware Infection

Coronavirus Phishing Attacks Aim to Spread Malware Infection

“The sole intention of these threat actors is to play on the public’s genuine fear to increase the likelihood of users clicking on an attachment or link delivered in a malicious communication, to cause infection, or for monetary gain.

Giant surveillance balloons are lurking at the edge of space

Giant surveillance balloons are lurking at the edge of space

On any given day, the altitude of the stratollite might change by as much as 25,000 feet depending on the wind patterns.The idea is to use long-lasting stratospheric balloons to collect high-resolution images of Earth and sell this data to the government and private companies.

FBI warns that smart TV you just bought may be spying on you

FBI warns that smart TV you just bought may be spying on you

In addition to outlining how new advanced technological features risk allowing television manufacturers and app developers to snoop on consumers, the bureau says malicious cyber actors can also take control of unsecured smart TVs and potentially wreak havoc on unsuspecting owners.

This Ring Uses a Fake Fingerprint to Protect Your Biometric Data

This Ring Uses a Fake Fingerprint to Protect Your Biometric Data

Consumers increasingly rely on fingerprint and facial scans to unlock their electronic devices, but what happens if their biometric data ends up in the wrong hands?According to Kaspersky, a more ideal solution is to build protections inside electronic devices to prevent fingerprint or facial data from ever leaking.

Exclusive: Interpol plans to condemn encryption spread, citing predators, sources say

Exclusive: Interpol plans to condemn encryption spread, citing predators, sources say

Echoing a joint letter last month from the top law enforcement officials in the United States, United Kingdom and Australia, the larger group will cite difficulties in catching child sexual predators as grounds for companies opening up user communications to authorities wielding court warrants.

ProtonMail, Israel, and Radware relationship

ProtonMail, Israel, and Radware relationship

However, as discussed above, even IF the traffic did pass through Israel, the DDoS protection technology we have selected means there would be no compromise to ProtonMail email privacy.

Why Google and Facebook Should Be Treated Like Banks

Why Google and Facebook Should Be Treated Like Banks

Some people might be of the opinion that the exchange they're personally getting is a fair one -- the services of some amazing social networking, business and search tools in return for a possession that until recently would have seemed too cryptic for us to consider a source of value.

Google says: “Privacy is paramount to us, in everything we do”; here’s why that can’t be true

Google says: “Privacy is paramount to us, in everything we do”; here’s why that can’t be true

This has understandably led many people – around a third of all users according to some estimates – to block cookies in order to prevent persistent stores of their online activity and thus their lives being created by sites and advertisers.

A Third of Known Computer Security Flaws Have No Solution

A Third of Known Computer Security Flaws Have No Solution

In the first half of 2019, analysts at computer security firm Risk Based Security (RBS) enumerated a total of 11,092 flaws in computer systems (known as vulnerabilities) that could be exploited by a hacker to take unauthorized actions in another person’s or organization’s system.

Cybersecurity Protections for SMBs Found to Be Lacking

Cybersecurity Protections for SMBs Found to Be Lacking

The ransom demand is also likely to be considerably higher than the cost of cybersecurity protections for SMBs to prevent ransomware attacks.

Eyes in the sky will soon see everything – even what happened in the past; is it too late to worry about privacy?

Eyes in the sky will soon see everything – even what happened in the past; is it too late to worry about privacy?

Last year, a company called EarthNow announced that it planned to deploy a large constellation of advanced imaging satellites that would deliver real-time, continuous video of almost anywhere on Earth.

Social Media

Social Media

Instead of an employee threaten the integrity of your group’s online security, it is in your best interests to implement an Internet filtering solution from TitanHQ.

German schools ban Microsoft Office 365 amid privacy concerns

German schools ban Microsoft Office 365 amid privacy concerns

Pointing out that the use of cloud applications in itself is not the problem as long as pupils’ consent and the security of the data processing is guaranteed, HBDI’s Michael Ronellenfitsch raised concerns about whether schools can store personal data of children in the cloud.

ITWire - Microsoft Office 365 and Windows 10 barred from use in German schools

ITWire - Microsoft Office 365 and Windows 10 barred from use in German schools

Ronellenfitsch adds, "As soon as, in particular, the possible third-party access to the data in the cloud and the issue of telemetry data have been resolved in a comprehensible and data protection-compliant manner, Office 365 can be used as a cloud solution by schools."

As Privacy Regulations Tighten, There May Be An SDK-Based Solution For Ad Tech And RTB

As Privacy Regulations Tighten, There May Be An SDK-Based Solution For Ad Tech And RTB

The United Kingdom’s Information Commissioner's Office (ICO) recently put the ad tech industry on notice that its real-time bidding (RTB) practices for handling consumer data are not compatible with European regulations.

Amazon patent reveals drone surveillance as a service

Amazon patent reveals drone surveillance as a service

A new patent granted to Amazon suggests the retail giant is exploring ways in which drone surveillance could be packaged up as a new business solution.