Going Against Google Analytics With Plausible’s Co-Founder [Interview]

Going Against Google Analytics With Plausible’s Co-Founder [Interview]

Google has created many useful products that improved the lives of many people all around the world but in recent years Google has changed their priorities and now it’s all about optimizing value for their shareholders, squeezing even more money and further dominating the web.

Whistleblower: Ubiquiti Breach “Catastrophic” — Krebs on Security

Whistleblower: Ubiquiti Breach “Catastrophic” — Krebs on Security

[NYSE:UI] — a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders and security cameras — disclosed that a breach involving a third-party cloud provider had exposed customer account credentials.

Signal Server is effectively closed source software right now

Signal Server is effectively closed source software right now

I have been somewhat of a “Signal apologist” thus far (I almost always defend them & I think a lot of criticism they get it very unfair) but yeah I’m over Signal now.

Congressional hearing investigates role of cryptocurrencies in domestic terrorism financing

Congressional hearing investigates role of cryptocurrencies in domestic terrorism financing

A recent Congressional hearing held by the Subcommittee on National Security, International Development, and Monetary Policy sought to examine the use of cryptocurrencies in financing domestic terrorism such as the Capitol Insurrection as well as the way privacy rights make investigations harder.

GitHub - ultrafunkamsterdam/AnonSurf: Change your IP address instantly - easy small GUI tool for Windows (linux soon)

GitHub - ultrafunkamsterdam/AnonSurf: Change your IP address instantly - easy small GUI tool for Windows (linux soon)

It changes your traffic's source origin address, which makes it harder to trace traffic to you.Change your IP address instantly - easy small GUI tool for Windows (linux soon).Please respect their work and do not misuse the tool.

K-9 Mail is looking for funding

K-9 Mail is looking for funding

Only a few developers working on the project in their spare time wasn’t enough to keep up with the pace of the Android platform.Since right now there’s mainly one person working on the app this is currently not an issue for the K-9 Mail project.

Accused murderer wins right to check source code of DNA testing kit used by police

Accused murderer wins right to check source code of DNA testing kit used by police

A New Jersey appeals court has ruled that a man accused of murder is entitled to review proprietary genetic testing software to challenge evidence presented against him.

Opinion | They Stormed the Capitol. Their Apps Tracked Them.

Opinion | They Stormed the Capitol. Their Apps Tracked Them.

But to think that the information will be used against individuals only if they’ve broken the law is naïve; such data is collected and remains vulnerable to use and abuse whether people gather in support of an insurrection or they justly protest police violence, as happened in cities across America last summer.

The Most Popular Programming Languages

The Most Popular Programming Languages

Python is a programming language first published almost 30 years ago, in 1991.The source of the starting data is the video and the calculation made by Data is Beautiful which has realized a popularity index on GitHub and other national surveys.

What You Should Know Before Leaking a Zoom Meeting

What You Should Know Before Leaking a Zoom Meeting

Zoom meetings present a unique set of challenges for source protection, but these challenges can be minimized by following best practices and taking care not to publish raw meeting materials unless there is high confidence that the recordings were not watermarked and have been thoroughly reviewed to make sure no other potentially identifying features are present in the audio or video.

T-Mobile rounds out this awful year with another data breach, affecting hundreds of thousands of subscribers

T-Mobile rounds out this awful year with another data breach, affecting hundreds of thousands of subscribers

T-Mobile has confirmed to Android Police it has shut down a data breach operation that may have harvested a small group of customers' phone numbers, number of lines per account, and call diagnostic metrics.

SolarWinds hackers accessed Microsoft source code, the company says

SolarWinds hackers accessed Microsoft source code, the company says

It is not clear how much or what parts of Microsoft’s source code repositories the hackers were able to access, but the disclosure suggests that the hackers who used software company SolarWinds as a springboard to break into sensitive U.S. government networks also had an interest in discovering the inner workings of Microsoft products as well.

In Celebration of Becoming Open Source, Threema Is 50% Off

In Celebration of Becoming Open Source, Threema Is 50% Off

Threema’s cryptographic procedures have been thoroughly documented from the outset, the proper application of the encryption library could always be verified independently, and external audits have repeatedly confirmed the apps’ security.

The Legislation We Need Right Now To Protect Our Online Privacy

The Legislation We Need Right Now To Protect Our Online Privacy

Any information used by a large online company to target users for advertising purposes must be explicitly approved by the Government/relevant regulatory authority of the country.

DuckDuckGo's privacy abuses-- current, historic, and by proxy

DuckDuckGo's privacy abuses-- current, historic, and by proxy

A place to discuss privacy and freedom in the digital world.In this community everyone is welcome to post links and discuss topics related to privacy.

Walmart Exclusive Wi-Fi Router Contains Backdoor To Control Devices

Walmart Exclusive Wi-Fi Router Contains Backdoor To Control Devices

A Walmart exclusive Wi-Fi router, and others sold on Amazon & eBay contain hidden backdoors to control devices reports CyberNews.CyberNews researchers also discovered that ‘Wavlink’ branded routers, often sold on Amazon or eBay, contain similar backdoors (source).

The Network: How a Secretive Phone Company Helped the Crime World Go Dark

The Network: How a Secretive Phone Company Helped the Crime World Go Dark

Motherboard spoke to over half a dozen sources around Phantom, including family members of Ramos, distributors who sold Phantom phones in multiple countries on his behalf, and people with knowledge of the company's operations.

Your Smart TV is probably ignoring your PiHole

Your Smart TV is probably ignoring your PiHole

We’re going to create two Port Forward NAT rules - one to redirect any DNS queries originating from devices on the LAN to PiHole, and another to allow PiHole to commmunicate with external DNS servers.

Perhaps Mozilla Should Unfck Itself Before “Unfcking The Internet”

Perhaps Mozilla Should Unfck Itself Before “Unfcking The Internet”

Yet, people get laid off because there’s no money, despite the “fellowships & awards” category at Mozilla’s blog showing an at least +$10 million spending (With help of other funds) on these social activities and other web projects just in the last two months.

Build Your Own Alexa With Raspberry Pi — CyberPunks.com

Build Your Own Alexa With Raspberry Pi — CyberPunks.com

The Raspberry Pi was created to run open source code on open source hardware and goddamn it, that’s what we’re going to do.For us, the easiest option was to download a customized Mycroft/Raspbian image file with the rather cute name of Picroft and flash it to the Pi’s MicroSD card.

Cookieviz 2: new features to observe hidden web practices

Cookieviz 2: new features to observe hidden web practices

CookieViz is the first software for the general public developed in-house by the CNIL.The source code of the Cookieviz software is freely accessible and can be improved by developers.

Read Twitter privately with Nitter RSS feeds

Read Twitter privately with Nitter RSS feeds

I'm going to outline how you can read Twitter privately, by using a RSS feed reader and Nitter RSS feeds."Nitter is a free and open source alternative Twitter front-end focused on privacy".The feed can be retrieved for a single user (e.g. nitter.decent.social/lexfridman/rss) and contains their last 20 tweets.

Surveillance Company Explains How to Keep Facebook From Detecting Fake Accounts in Leaked Manual

Surveillance Company Explains How to Keep Facebook From Detecting Fake Accounts in Leaked Manual

But a leaked user manual obtained by Motherboard shows that, in reality, the company teaches customers how to create fake Facebook and LinkedIn accounts to gather information about people that is normally protected by their privacy settings on those platforms.

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

“The data collected about individuals and institutions and the overlaid analytic tools from social media platforms provide China enormous benefit in opinion formation, targeting, and messaging.”.

Privacy News Online | Weekly Review: September 11, 2020

Privacy News Online | Weekly Review: September 11, 2020

The United States Court of Appeals for the Ninth Circuit has ruled what many of us knew for a long time: that the NSA program to spy on American phone records was completely illegal.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

The History of Invidious

The History of Invidious

HookTube was pretty much the same idea from a user perspective, but it was not open source and it used the YouTube API instead of scraping the site.

Facebook to take board seat at Linux Foundation after signing as Platinum member

Facebook to take board seat at Linux Foundation after signing as Platinum member

As part of its membership, that the company's head of open source, Kathy Kam, will have a seat on the Foundation's board.In a blog post announcing the membership, the Linux Foundation commended a number of Facebook projects that "leverage open source to unlock the potential of open innovation".

Huge Data Breach: Promo Marketing Video Maker

Huge Data Breach: Promo Marketing Video Maker

It includes the following data that got leaked in Promo Data Breach: Email addresses: The breached database contains the email addresses of the users of this platform.IP Addresses: The breached database contains the IP addresses of the users of the Promo video maker platform.

Indian Govt wants Tech Giants Google, Amazon and Facebook to Provide Source Code and algorithms

Indian Govt wants Tech Giants Google, Amazon and Facebook to Provide Source Code and algorithms

India’s government is working on a policy which include tough rule that will require tech giants like Google, Amazon and Facebook to provide source code and algorithms, said a report by Bloomberg.

Kindmetrics

Kindmetrics

Kindmetrics is a strictly privacy-focused, lightweight alternative to Google Analytics.It is the most privacy-focused analytics out there, and it is also straightforward to use with its one-page dashboard.Kindmetrics is built on being kind to you and your visitor`s privacy and data.