Ghostery’s Making a Privacy Browser—and Ad-Free Search Engine

Ghostery’s Making a Privacy Browser—and Ad-Free Search Engine

Which is why using Ghostery’s new ad-free search engine and desktop browser, even in their pre-beta form, feels at once like a throwback to a simpler internet and a glimpse of a future where browsing that puts results ahead of revenue is once again possible.

USBGuard · InfoSec Handbook – information security blog

USBGuard · InfoSec Handbook – information security blog

By default, USBGuard allows all USB devices that are currently connected to your machine.In your terminal, enter usbguard list-devices to see all USB devices that are connected to the system.If you connect another USB device to the machine, USBGuard blocks it by default.

Police Want Your Smart Speaker—Here's Why

Police Want Your Smart Speaker—Here's Why

As Orr explains, officers are getting more savvy about smart home devices, creating templates that simplify requesting data.Orr has studied the types of data police can pull from smart speakers like the Amazon Echo.

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

“They’re shocked when we give them their password and tell them where we found it, but it doesn’t hit as hard as when we tell them their entire home automation system has been potentially online and viewable for three or five or eight years,” he said.

Manhattan DA Got Innocent People's Google Phone Data Through A 'Reverse Location' Search Warrant

Manhattan DA Got Innocent People's Google Phone Data Through A 'Reverse Location' Search Warrant

Law enforcement authorities in New York are joining a nationwide trend to push Google to share phone data on anyone using its location tracking services near the time and scene of a crime.

A thread written by @bleroy

A thread written by @bleroy

More specifically, what happened is that WhatsApp rendered a rich preview of the link in my chat feed. Conclusion: WhatsApp, despite being end-to-end encrypted, still leaks private information by making non-sandboxed queries to external web sites.

Online Anonymity Guide

Online Anonymity Guide

If they ask why you need it or you are worried about asking somebody to download this for you, you can say you do some jouralism and like to keep your files safe. You need to import the public key of the user that signed the message.

Privacy is Personal

Privacy is Personal

It’s essential to recognize the personal nature of privacy, because in the online world we still lack the equivalents of shelter and clothing, so those are still on the to-be-done punch list of requirements for civilizing that world.