There is more than only black and white in information security and privacy

There is more than only black and white in information security and privacy

When it comes to information security and privacy, some people specialized in spreading black and white thinking.The new filter bubble, inflated by black and white thinking of like-minded people, is proclaimed as the only truth.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

Data isn't the new oil, it's the new CO2

Data isn't the new oil, it's the new CO2

The line of inquiry defending pervasive surveillance in the name of “individual freedom” and individual consent is tired and should be retired.But first let’s all admit that the line of inquiry defending pervasive surveillance in the name of “individual freedom” and individual consent gets us nowhere closer to understanding the threats we are facing.

Siri records fights, doctor’s appointments, and sex (and contractors hear it)

Siri records fights, doctor’s appointments, and sex (and contractors hear it)

One of the contract workers told The Guardian that Siri did sometimes record audio after mistaken activations. Apple, along with Google and Amazon, all have similar policies for the contract workers it hires to review those audio snippets.

Google will pay just $13 million to settle long-running Street View data collection lawsuit

Google will pay just $13 million to settle long-running Street View data collection lawsuit

The Street View cars also collect information about local WiFi networks, and a 2010 lawsuit alleged Google grabbed too much data. Google settled with 38 states for $7 million in 2013 to end a case stemming from the same issues.

Trustworthy vs Trustless Apps

Trustworthy vs Trustless Apps

A trustless app is an app whose code is open source, so that the community can see for themselves that the code has few bugs and no malicious code. Trustless apps are cryptographically signed by the developers so that users know that the application they download corresponds to the open source code.

Qwant Maps : opensource and privacy-preserving map

Qwant Maps : opensource and privacy-preserving map

Idunn : the highlighting on the map of all the information existing in the tiles is provided by Idunn, a Python web API that exploits different data sources (OpenStreetMap, Wikipedia ...) to provide the user with the most useful information.

Umbrella: Security made easy

Umbrella: Security made easy

★How do I send a secure email?. ★What is the latest information about security problems in my area?. Whether you are sending sensitive emails, attending a protest or dealing with a kidnapping, Umbrella is your one stop shop for the latest security tools and information.

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

Credit: IntelThe NSA has started assigning developers to the Coreboot project, which is an open source alternative to Windows BIOS/UEFI firmware. All Coreboot code, including all the STM contributions from the NSA, are open source, so anyone could verify that there is no backdoor in there -- in theory.

Yahoo! Japan’s new system looks suspiciously like a social credit score

Yahoo! Japan’s new system looks suspiciously like a social credit score

Japan defended the “opt-out” model – but the company also promised that only the rating score, and not any personal data, would be shared with third parties.

Genius hid a Morse code message in song lyrics to prove Google was copying them

Genius hid a Morse code message in song lyrics to prove Google was copying them

The report notes that Google partnered with LyricFind in 2016, but the company’s chief executive Darryl Ballantyne told The Journal that it doesn’t source its lyrics from Genius, relying on its own content team for the lyrics.

Microsoft: The open source company

Microsoft: The open source company

Stallman, who liked to be called by his initials, RMS, in tribute to the way he logged on to the computer, used the Hacker Ethic as a guiding principle for his best-known work, an editing program called EMACS which allowed users to limitlessly customize it its wide-open architecture encouraged people to add to it, improve it endlessly.

It's Getting Way Too Easy to Create Fake Videos of People's Faces

It's Getting Way Too Easy to Create Fake Videos of People's Faces

Researchers at the Samsung AI Center in Moscow developed a way to create "living portraits" from a very small dataset—as few as one photograph, in some of their models. The researchers call this few- and one-shot learning, where the model can be trained using just one image to create a convincing, animated portrait.

Exclusive: Google suspends some business with Huawei after Trump blacklist - source

Exclusive: Google suspends some business with Huawei after Trump blacklist - source

NEW YORK (Reuters) - Alphabet Inc’s Google has suspended business with Huawei that requires the transfer of hardware, software and technical services except those publicly available via open source licensing, a source familiar with the matter told Reuters on Sunday, in a blow to the Chinese technology company that the U.S. government has sought to blacklist around the world.

Why Using a Privacy Coin Preserves Our Rights as Global Citizens

Why Using a Privacy Coin Preserves Our Rights as Global Citizens

Now, even more treacherous than standard online environments is the land of crypto. And by using a privacy coin, you’re not transacting your way through crypto networks with a giant target on your back. However, there’s more to privacy than keeping your finances out of the wrong hands.

Samsung Investigates Massive Data Leak -- What You Need To Know

Samsung Investigates Massive Data Leak -- What You Need To Know

That app has now been updated by Samsung, but Hussein says that he had the private token of a user with "full access to all 135 projects on that GitLab."

Online Privacy Is Getting Worse: Data Breaches in 2019 on Track to Top Last Year’s Total

Online Privacy Is Getting Worse: Data Breaches in 2019 on Track to Top Last Year’s Total

The second-largest breach so far in 2019 was the loss of personal data from nearly 203 million job applicants that was exposed as a result of a misconfigured database.

Exclusive: New privacy oversight on the table for Facebook, Zuckerberg

Exclusive: New privacy oversight on the table for Facebook, Zuckerberg

Facebook and the Federal Trade Commission are negotiating a possible settlement that would require the company to place privacy-minded executives at the company's highest levels, a source close to the talks told POLITICO on Wednesday — in addition to paying the expected multibillion-dollar fine it disclosed last week.

How to use a FreedomBox running open source software to regain control of your online privacy

How to use a FreedomBox running open source software to regain control of your online privacy

Even more impressive is the fact that Moglen also had a solution back then: to move people to a world of distributed Internet services, with no one controller that had privileged access to our personal data.

Huawei Could Rebuild Trust in Their Products Through Open Source

Huawei Could Rebuild Trust in Their Products Through Open Source

Open source code for Huawei equipment would allow nations, companies, and individuals alike to verify that the code is free of malware, and that it contains no obvious security problems.

French government releases in-house IM app to replace WhatsApp and Telegram use

French government releases in-house IM app to replace WhatsApp and Telegram use

Online security 101: How to protect your privacy from hackers, spies, and the government Source code of Iranian cyber-espionage tools leaked on Telegram Microsoft loses control over Windows Tiles subdomain Failed student jailed for Silk Road, dark web drug profiteering The app, named Tchap, was launched yesterday, April 18, and is available on the official iOS and Android app stores.

Hacker Breaks Into French Government's New Secure Messaging App

Hacker Breaks Into French Government's New Secure Messaging App

Dubbed " Tchap ," the end-to-end encrypted, open source messaging app has been created by the French government with an aim to keep their officials, parliamentarians and ministers data on servers inside the country over concerns that foreign agencies could use other services to spy on their communications.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

But the issue is much worse than previously reported, with the hackers able to access email content from a large number of Outlook, MSN, and Hotmail email accounts, according to a source who witnessed the attack in action and described it before Microsoft’s statement, as well as screenshots provided to Motherboard.

China’s AI-based prisons – both indoors and outdoors – offer a warning of how privacy may die elsewhere

China’s AI-based prisons – both indoors and outdoors – offer a warning of how privacy may die elsewhere

A future development might be to marry this new machine-learning approach with the surveillance systems found in places like Xinjiang. Glyn Moody is a freelance journalist who writes and speaks about privacy, surveillance, digital rights, open source, copyright, patents and general policy issues involving digital technology.

Facebook’s latest mishap involves bizarre messages printed on Oculus controllers

Facebook’s latest mishap involves bizarre messages printed on Oculus controllers

Oculus cofounder Nate Mitchell, whose company is of course owned by Facebook, acknowledged on Twitter Friday that weird secret messages were “accidentally” hidden in “tens of thousands” of the virtual reality controllers.

Thousands of Amazon employees are listening to your Alexa conversations

Thousands of Amazon employees are listening to your Alexa conversations

An investigation by Bloomberg has revealed that Amazon has a global team that transcribes and annonates Alexa recordings from around to world to "eliminate gaps in Alexa's understanding of human speech" and allow the assistant to serve up better responses to your queries.

The Challenges Facing Privacy Apps

The Challenges Facing Privacy Apps

Using software that is open source is a critical piece of the puzzle, because this allows peer review to verify that the developer isn’t collecting unnecessary data to make the app or service work, and that the developers have considered all of the external privacy threats.

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Decompiling the app also allows an adversary to understand how the app detects jailbroken mobile devices, which, once vulnerabilities (such as API keys, private keys, and credentials) are found in the source code, results in theft of money through banking trojans, username/password theft or account takeover using overlay screens, and the theft of confidential data."

GrapheneOS is an Android-based, security-hardened, open source operating system

GrapheneOS is an Android-based, security-hardened, open source operating system

It’s called GrapheneOS, and it comes from Daniel Micay, the former lead developer of another security-based Android fork called CopperheadOS. Since it’s an open source project, independent developers may be able to port the operating system to run on additional devices.

More