DuckDuckGo's privacy abuses-- current, historic, and by proxy

DuckDuckGo's privacy abuses-- current, historic, and by proxy

A place to discuss privacy and freedom in the digital world.In this community everyone is welcome to post links and discuss topics related to privacy.

Walmart Exclusive Wi-Fi Router Contains Backdoor To Control Devices

Walmart Exclusive Wi-Fi Router Contains Backdoor To Control Devices

A Walmart exclusive Wi-Fi router, and others sold on Amazon & eBay contain hidden backdoors to control devices reports CyberNews.CyberNews researchers also discovered that ‘Wavlink’ branded routers, often sold on Amazon or eBay, contain similar backdoors (source).

The Network: How a Secretive Phone Company Helped the Crime World Go Dark

The Network: How a Secretive Phone Company Helped the Crime World Go Dark

Motherboard spoke to over half a dozen sources around Phantom, including family members of Ramos, distributors who sold Phantom phones in multiple countries on his behalf, and people with knowledge of the company's operations.

Your Smart TV is probably ignoring your PiHole

Your Smart TV is probably ignoring your PiHole

We’re going to create two Port Forward NAT rules - one to redirect any DNS queries originating from devices on the LAN to PiHole, and another to allow PiHole to commmunicate with external DNS servers.

Perhaps Mozilla Should Unfck Itself Before “Unfcking The Internet”

Perhaps Mozilla Should Unfck Itself Before “Unfcking The Internet”

Yet, people get laid off because there’s no money, despite the “fellowships & awards” category at Mozilla’s blog showing an at least +$10 million spending (With help of other funds) on these social activities and other web projects just in the last two months.

Build Your Own Alexa With Raspberry Pi — CyberPunks.com

Build Your Own Alexa With Raspberry Pi — CyberPunks.com

The Raspberry Pi was created to run open source code on open source hardware and goddamn it, that’s what we’re going to do.For us, the easiest option was to download a customized Mycroft/Raspbian image file with the rather cute name of Picroft and flash it to the Pi’s MicroSD card.

Cookieviz 2: new features to observe hidden web practices

Cookieviz 2: new features to observe hidden web practices

CookieViz is the first software for the general public developed in-house by the CNIL.The source code of the Cookieviz software is freely accessible and can be improved by developers.

Read Twitter privately with Nitter RSS feeds

Read Twitter privately with Nitter RSS feeds

I'm going to outline how you can read Twitter privately, by using a RSS feed reader and Nitter RSS feeds."Nitter is a free and open source alternative Twitter front-end focused on privacy".The feed can be retrieved for a single user (e.g. nitter.decent.social/lexfridman/rss) and contains their last 20 tweets.

Surveillance Company Explains How to Keep Facebook From Detecting Fake Accounts in Leaked Manual

Surveillance Company Explains How to Keep Facebook From Detecting Fake Accounts in Leaked Manual

But a leaked user manual obtained by Motherboard shows that, in reality, the company teaches customers how to create fake Facebook and LinkedIn accounts to gather information about people that is normally protected by their privacy settings on those platforms.

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

“The data collected about individuals and institutions and the overlaid analytic tools from social media platforms provide China enormous benefit in opinion formation, targeting, and messaging.”.

Privacy News Online | Weekly Review: September 11, 2020

Privacy News Online | Weekly Review: September 11, 2020

The United States Court of Appeals for the Ninth Circuit has ruled what many of us knew for a long time: that the NSA program to spy on American phone records was completely illegal.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

The History of Invidious

The History of Invidious

HookTube was pretty much the same idea from a user perspective, but it was not open source and it used the YouTube API instead of scraping the site.

Facebook to take board seat at Linux Foundation after signing as Platinum member

Facebook to take board seat at Linux Foundation after signing as Platinum member

As part of its membership, that the company's head of open source, Kathy Kam, will have a seat on the Foundation's board.In a blog post announcing the membership, the Linux Foundation commended a number of Facebook projects that "leverage open source to unlock the potential of open innovation".

Huge Data Breach: Promo Marketing Video Maker

Huge Data Breach: Promo Marketing Video Maker

It includes the following data that got leaked in Promo Data Breach: Email addresses: The breached database contains the email addresses of the users of this platform.IP Addresses: The breached database contains the IP addresses of the users of the Promo video maker platform.

Indian Govt wants Tech Giants Google, Amazon and Facebook to Provide Source Code and algorithms

Indian Govt wants Tech Giants Google, Amazon and Facebook to Provide Source Code and algorithms

India’s government is working on a policy which include tough rule that will require tech giants like Google, Amazon and Facebook to provide source code and algorithms, said a report by Bloomberg.

Kindmetrics

Kindmetrics

Kindmetrics is a strictly privacy-focused, lightweight alternative to Google Analytics.It is the most privacy-focused analytics out there, and it is also straightforward to use with its one-page dashboard.Kindmetrics is built on being kind to you and your visitor`s privacy and data.

Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations

Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations

It gets across well the idea of how sending data in a particular form allows it to be useful in aggregate, but immune to further interrogation about each separate source: Let’s say that Rakshita wants to know how often her friends Emily and Zheng have listened to a particular song.

Aarogya Setu, India’s contact-tracing app, goes open-source

Aarogya Setu, India’s contact-tracing app, goes open-source

According to Kant, 98% of Aarogya Setu installs are on Android devices, which explains the initial release of the Android client source code for the app.

OpenSAFELY: more proof that tackling the coronavirus pandemic does not require privacy to be compromised

OpenSAFELY: more proof that tackling the coronavirus pandemic does not require privacy to be compromised

For example, Vint Cerf, widely recognized as one of the creators of the Internet, has recently written an article for the Indian site Medianama entitled “Internet Lessons from COVID19“, in which he warns: Variations of the European Union’s General Data Protection Regulation (GDPR) are propagating around the world with good intent although implementation has shown some unintended consequences, not least of which may be the ability to share health information that would assist in finding a vaccine against SARS-COV-2.

Qubes awarded MOSS Mission Partners grant!

Qubes awarded MOSS Mission Partners grant!

We’re proud to announce that the Qubes OS Project has been awarded a Mozilla Open Source Support (MOSS) awards program grant in the amount of 128,000 USD.

Scoop: Facebook to buy Giphy for $400 million

Scoop: Facebook to buy Giphy for $400 million

Facebook has agreed to buy Giphy, the popular platform of sharable animated images, Axios has learned from multiple sources.Yes, but: Facebook is facing enormous blowback over its previous acquisitions, which means that this deal, however small by comparison, is likely to face a lot of antitrust scrutiny by regulators.

German EPP delegation want special treatment for app users

German EPP delegation want special treatment for app users

MEPs belonging to Germany’s CDU/CSU outfit have published a wish list for a European digital response to the corona pandemic, featuring recommendations for the lifting of quarantine restrictions for people who install contact tracing apps.

Private Internet Access announces third year of WireGuard® sponsorship

Private Internet Access announces third year of WireGuard® sponsorship

Private Internet Access believes in sponsorship as a way of giving back to the community and is proud to sponsor WireGuard.Because it is a free and open source software (FOSS) project, WireGuard development is supported by developers that donate their time, as well as companies that donate funds.

Open Source Code – The Future of User Privacy

Open Source Code – The Future of User Privacy

Here’s why open source code is the only way to enjoy true privacy, and why you should use an open source VPN client if you want to secure your online data.

Tracking the Global Response to COVID-19

Tracking the Global Response to COVID-19

Tech companies, governments, and international agencies have all announced measures to help contain the spread of the COVID-19 virus.Many of those measures are based on extraordinary powers, only to be used temporarily in emergencies.

Npm is joining GitHub

Npm is joining GitHub

We will work to improve the everyday experience of developers and maintainers, and support the great work already started on the npm v7 CLI, which will remain free and open source.

AT&T’s Ad Exchange is Overrun With Data Stealing Malware

AT&T’s Ad Exchange is Overrun With Data Stealing Malware

In the end, I analyzed about 10,000 web sessions, and found that nearly 2 out of every 100 ads from AppNexus are infected by malicious code .This is nearly double the average rate of malvertising for other ad networks, which ranges from 0.5 - 1%, depending on the source.

The De-Googled Android Fork is Making Good Progress

The De-Googled Android Fork is Making Good Progress

Therefore, an idea came to mind: why not fork Android, remove all the Google features, even low level, such as connectivity check, DNS…, replace default apps with more virtuous apps, add basic online services, and integrate all this into a consistent form that could be used by Mum and Dad and any people without tech or expert knowledge?

Why You Should Avoid Using Google Chrome

Why You Should Avoid Using Google Chrome

If you’re concerned about Google using this information to serve you creepy ads all over the place, you should try a private browser and a private search engine.Google uses the data it collects from Chrome and other products to target ads served on its ad networks.

Once Again, Two New Election App Breaches Exposed Personal Data on Millions of Israelis

Once Again, Two New Election App Breaches Exposed Personal Data on Millions of Israelis

In addition to the personal details of almost 6.5 million Israelis which leaked for the second time, the new flaws also revealed correspondence between activists and potential voters as well as the app’s source code, according to activist hacker Noam Rotem and Ran Bar-Zik, a senior developer at Verizon Media, who discovered the leaks.