Private Internet Access Android App is ioXt-Certified

Private Internet Access Android App is ioXt-Certified

As part of our efforts to increase the level of security and transparency in our apps and service, Private Internet Access partnered with the ioXt Alliance to test and certify our Android mobile VPN application.

Privacy Talks | Interview with Alex Kehaya from Orchid VPN

Privacy Talks | Interview with Alex Kehaya from Orchid VPN

[7:04] – One question that I have, is why wouldn’t an average user just set up their own VPN if trust is such an issue?[13:20] – You mentioned those curated lists, that also allows people to choose from servers that provide them certain functionality, like Netflix in the US for instance.

Opinion | America, Your Privacy Settings Are All Wrong

Opinion | America, Your Privacy Settings Are All Wrong

Lawmakers in at least a dozen other states have proposed legislation addressing user privacy, almost entirely with rights provisions only to opt out of data collection.

B.C. couple 'furious' restaurant used phone number from contact tracing list to send promotional offers

B.C. couple 'furious' restaurant used phone number from contact tracing list to send promotional offers

And the only way we can think of was from contact tracing,” McCartney told CTV News Tuesday.But secondly, it undermines the trust that customers will have in your business,” B.C. Privacy Commissioner Michael McEvoy told CTV News.

Xayn Blog  -  IOTA as a trust anchor

Xayn Blog - IOTA as a trust anchor

With the help of complete decentralisation, user control and open-source transparency, we're also fighting AI misuse.Now, Xayn is going one step further in its fight against AI misuse by i ncorporating IOTA's Tangle technology as a trust anchor into XayNet .

Cybersecurity company finds hacker selling info on 186 million U.S. voters

Cybersecurity company finds hacker selling info on 186 million U.S. voters

But the fact that so many names, email addresses, phone numbers and voter registration records were found for sale in bulk on the so-called dark web underscores how easily criminals and foreign adversaries can deploy it as the FBI said Iran has done recently, by sending emails designed to intimidate voters.

Facebook and UK Privacy Regulator ICO Complicit in subverting democracy

Facebook and UK Privacy Regulator ICO Complicit in subverting democracy

Responding to Channel 4’s latest revelations about the massive cache of voter data used by the Trump campaign, Jim Killock, Executive Director of Open Rights Group said: “This latest revelations lays bare two key problems.

'I monitor my staff with software that takes screenshots'

'I monitor my staff with software that takes screenshots'

Image copyright Shibu Philip Image caption Shibu Philip's firm has used the software Hubstaff for the last year and a half Shibu Philip admits he knows what it's like to "maybe waste a bit of time at work".Shibu is the founder of Transcend - a small London-based firm that buys beauty products wholesale and re-sells them online.

Don’t trust Cloudflare with your personal data

Don’t trust Cloudflare with your personal data

Despite promising an investigation and a response from their Data Protection Office – I’ve received no assurance that they have respected my rights.At the end of August this year – well over 12 months after I unsubscribed – I received another email from Cloudflare.

Microsoft leaks 6.5TB in Bing search data via unsecured Elastic server. *Insert 'Wow... that much?' joke here*

Microsoft leaks 6.5TB in Bing search data via unsecured Elastic server. *Insert 'Wow... that much?' joke here*

Microsoft earlier this month exposed a 6.5TB Elastic server to the world that included search terms, location coordinates, device ID data, and a partial list of which URLs were visited.

Contact tracing: why some people are giving false contact details to bars and restaurants

Contact tracing: why some people are giving false contact details to bars and restaurants

While many bars, pubs and restaurants didn’t have to worry too much about data scandals before, reports of staff using people’s personal details to try and hook up with customers is potentially highly damaging – not just for those businesses, but for the whole hospitality sector.

Stalkers are using video doorbells and other 'smart' devices to harass victims, say police chiefs

Stalkers are using video doorbells and other 'smart' devices to harass victims, say police chiefs

Stalkers hacked into smart devices including video doorbells to target their victims in their own homes during the Covid-19 lockdown, police chiefs have said.

Questioning the usefulness and future of Citizen

Questioning the usefulness and future of Citizen

Citizen, a community safety app that tracks and notifies users of 911 police alerts, was downloaded roughly 440,000 times on smartphones in the last week according to Sensor Tower.As of May 2020, Citizen shares coronavirus updates in its app from local authorities to keep people informed.

Be a Data Custodian, Not a Data Owner

Be a Data Custodian, Not a Data Owner

The organizations that succeed in protecting consumer data in the coming years will be those that build long-term, trusted relationships with customers by humanizing data and taking responsibility as its custodians.

Cross-signing and End-to-end Encryption by Default is HERE!!!

Cross-signing and End-to-end Encryption by Default is HERE!!!

Three years have passed since we first announced End-to-end Encryption in Matrix and started to beta test it in Riot - and after an enormous amount of polishing and refinement on its user experience, we are finally declaring it out of beta and enabling it by default for all new private conversations in Riot.

The Verge Tech Survey 2020: how people feel about Apple, Google, Facebook, and more

The Verge Tech Survey 2020: how people feel about Apple, Google, Facebook, and more

The Verge conducted its first national tech survey in the hangover of the 2016 US presidential election, when Americans were beginning to come to grips with the vast reach and influence of big tech platforms.Microsoft leads big tech companies in the number of Americans who say they trust it, at 75 percent of survey respondents.

Opinion | How the ‘Sharing’ Economy Erodes Both Privacy and Trust

Opinion | How the ‘Sharing’ Economy Erodes Both Privacy and Trust

But it is being cynically manipulated by the “sharing” or “trust” economy — where we trade homes, cars or belongings through third-party administrators such as Airbnb — in ways that threaten our privacy.It’s also a model of consumerism that makes our traditional idea of trust irrelevant.

Armed and Ready: How Your Data Is Being 'Weaponized' Against You

Armed and Ready: How Your Data Is Being 'Weaponized' Against You

All new Android users are asked if they would like to switch on Google Now. According to the product page, Google Now gives you the “right information at just the right time” and the “information that you need throughout your day, before you even ask.” Based on usage, Google Now aims to pre-empt your consciousness and present to you the data it thinks you will look for before you ask for it.

Cutting the Wire

Cutting the Wire

A previous version of the policy (July 18, 2017) stated it would only share user data when required by law.This change doesn’t leave the user with much confidence as to when the company may share your data.

Don’t Trust. Verify.

Don’t Trust. Verify.

We don’t want you to blindly trust us, so now you can verify.

Most Facebook employees wouldn’t trust it with their financial data: survey

Most Facebook employees wouldn’t trust it with their financial data: survey

Between Facebook’s Libra project and Google’s new Google Pay-linked checking accounts, Big Tech is demonstrating big plans to integrate itself into the world of digital finance.The survey, released today, polled more than 5,000 professionals working at various companies, including Apple, Google, Amazon, Facebook, and Uber.

The Lingering Trauma of Stasi Surveillance

The Lingering Trauma of Stasi Surveillance

Do I still have friends?” He is smiling, but the truth is, he says, life in the GDR harmed his ability to trust and form lasting relationships.

Global Consumers Reject Government-Mandated Encryption Backdoors

Global Consumers Reject Government-Mandated Encryption Backdoors

However, 64% of respondents told Venafi that they don’t believe government access to private data would make society any safer from terrorists.The Venafi poll also revealed that, perhaps unsurprisingly, just 22% of consumers believe social media companies can be trusted to protect their personal and private data.

Why Your Health Startup Should Prioritize Privacy And Data Security

Why Your Health Startup Should Prioritize Privacy And Data Security

Companies that prioritize being HITRUST-certified, put their users before monetization strategy or revenue, and invest in clinical, evidence-based research will go the distance and, most importantly, help the most people.

Political Confessional: The Man Who Thinks Mass Surveillance Can Work

Political Confessional: The Man Who Thinks Mass Surveillance Can Work

People should be able to say what they want without thinking, “The government is going to get me,” unless I’m talking seriously about committing violence.

Google and Mozilla move to stop Kazakhstan 'snooping'

Google and Mozilla move to stop Kazakhstan 'snooping'

It comes after reports internet services providers in the country have required people to install a government-issued certificate on all devices and in every browser.

Trustworthy vs Trustless Apps

Trustworthy vs Trustless Apps

A trustless app is an app whose code is open source, so that the community can see for themselves that the code has few bugs and no malicious code. Trustless apps are cryptographically signed by the developers so that users know that the application they download corresponds to the open source code.

ISPA announces finalists for 2019 Internet Heroes and Villains: Trump and Mozilla lead the way as Villain nominees

ISPA announces finalists for 2019 Internet Heroes and Villains: Trump and Mozilla lead the way as Villain nominees

While, the Villain nominees take in the impact of new technical standards on existing online protections, the balance between freedom of expression and copyright online and the global telecoms supply chain.

Passbase  -  Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

Passbase - Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

In today's hyper-connected world, aspects that cover user verification, reducing fraud, checking identity theft and enabling identity checking services are some of the main focus points for businesses, regulators and government bodies. For businesses, identity theft means losses, highlighting the need for companies to cautiously leverage identity checking services and identity card checking for user verification.

The Salmon Project: How To Effectively Fight Online Censorship Using A Proxy With Trust Levels

The Salmon Project: How To Effectively Fight Online Censorship Using A Proxy With Trust Levels

The main idea behind the method is that censors might have agents that use the circumvention system in the same way that regular users do in order to find out the IP addresses of proxy servers so as to easily block them.