Location tracking apps and privacy implications

Location tracking apps and privacy implications

Through the app employed in the study - published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies - researchers were able to identify which kind of personal information the app extracted and its privacy sensitivity according to users.

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

In the paper Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (PDF), the researchers explain how they determine decryption keys for mathematically-secure cryptographic schemes by capturing information about secret values inside the computation taking place in the computer.

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

According to a researcher, though, these icons can also be a security vulnerability that could let websites track your movement and bypass VPNs, incognito browsing status, and other traditional methods of cloaking your movement online.

College Students Are Learning Hard Lessons About Anti-Cheating Software

College Students Are Learning Hard Lessons About Anti-Cheating Software

Molina didn’t think much of the company until he started using its monitoring software for a business administration course over the summer and his webcam became a device to observe, record and study him during an exam.

Exam surveillance software sparks global student revolt

Exam surveillance software sparks global student revolt

Khan began to suspect that it was his dark skin tone that rattled Examplify, a test proctoring platform adopted by New York state's law exams board during the COVID-19 pandemic.

Proctorio used DMCA to take down a student’s critical tweets – ProWellTech

Proctorio used DMCA to take down a student’s critical tweets – ProWellTech

But six weeks later, Johnson received an email from Twitter saying that three of those tweets had been removed from his account in response to a Proctorio request filed under the Digital Millennium Copyright Act. Proctoring software isn’t new, but its use has skyrocketed due to the pandemic.

After CovidSafe, QR codes spark privacy concerns

After CovidSafe, QR codes spark privacy concerns

Graham Greenleaf, professor of law and information systems at the University of New South Wales summed up the dilemma: “We've got a genuinely voluntary CovidSafe app with Australia's strongest privacy policy protections, but it's now largely ignored because it's been shown to be ineffective.

Zoom Deleted Events Discussing Zoom “Censorship”

Zoom Deleted Events Discussing Zoom “Censorship”

23 cancellation, a group of academics organized a series of events across the country, as well as in Canada and the UK, which were meant to highlight the issue.“Campuses across North America are joining in the campaign to resist corporate and university silencing of Palestinian narratives and Palestinian voices,” said the day of action event description, which was meant to be held on Oct. 23) The follow-up events did not include Khalid presenting.

What AI College Exam Proctors Are Really Teaching Our Kids

What AI College Exam Proctors Are Really Teaching Our Kids

When Haley, a sophomore at Indiana University, took a test for an accounting class in September, she—like many college students during this pandemic—was sitting not in a classroom but in her bedroom.

Auckland University's 'bizarre' files on students' social media posts

Auckland University's 'bizarre' files on students' social media posts

A University of Auckland statement sent to Craccum said: "We know that students communicate about and respond to issues via social media and looking at what is being posted is one of the ways that the university listens to the student voice and gets a sense of the student sentiment in real time.

GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

The Belgian Data Protection Authority (APD-GBA) has found serious GDPR infringements in the system Google and others use to legitimise online tracking.

Becoming Virtually Untraceable #16_9.20_pr1v4cy_1s_no7_d34d.pst

Becoming Virtually Untraceable #16_9.20_pr1v4cy_1s_no7_d34d.pst

Some of these affronts to personal freedom like the First Amendment right to say whatever you want are being stripped away from Americans by the exploiting apps for their privacy exposures.

Kids' Smartwatches Are a Security Nightmare Despite Years of Warnings

Kids' Smartwatches Are a Security Nightmare Despite Years of Warnings

Several of the watches had even more severe vulnerabilities, allowing hackers to send voice and text messages to children that appear to come from their parents, to intercept communications between parents and children, and even to record audio from a child's surroundings and eavesdrop on them.

China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal

China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal

A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.

The Pandemic Is No Excuse to Surveil Students

The Pandemic Is No Excuse to Surveil Students

Later, when athletes at many universities were forced to download tracking apps, I have little doubt that some of them did the equivalent of “no Facebook, no phone” parties with these apps: sent their phone along to class with a friend, or left it in their dorm, “sleeping,” while they socialized elsewhere.

Michigan College Will Digitally Track Students’ Movements At All Times

Michigan College Will Digitally Track Students’ Movements At All Times

Returning students must also sign a form authorizing the disclosure of their test results to the county, state, or "any other governmental entity as may be required by law"—though the school told the Free Beacon that state and county officials are not collecting information from the app.

New machine learning method allows hospitals to share patient data -- privately

New machine learning method allows hospitals to share patient data -- privately

While the approach could potentially be used to answer many different medical questions, Penn Medicine researchers have shown that federated learning is successful specifically in the context of brain imaging, by being able to analyze magnetic resonance imaging (MRI) scans of brain tumor patients and distinguish healthy brain tissue from cancerous regions.

Study confirms companies with poor privacy practices are more likely to suffer data breach

Study confirms companies with poor privacy practices are more likely to suffer data breach

To back up the intuitive conclusion that companies with poorer privacy practices are more likely to suffer a data breach, Osana first started by assigning a privacy score to over 11,000 companies and organizations.

Twitter is Testing End-to-End Encrypted Direct Messages

Twitter is Testing End-to-End Encrypted Direct Messages

Secret Conversation appears to allow Twitter users to send encrypted direct messages and beef up the security of their conversation.Select 'Start a secret text message,' and a new window will open where you can send encrypted messages.

Turkish privacy watchdog launches probe into TikTok

Turkish privacy watchdog launches probe into TikTok

The Personal Data Protection Board (KVKK) has acted on its own motion to open an investigation against TikTok after security flaw reports appeared on media, the authority said in a statement on July 3.

HongKongers prepare for China and new national security law by scrubbing digital footprint

HongKongers prepare for China and new national security law by scrubbing digital footprint

As China takes over Hong Kong with a new national security law, Hongkongers prepare by cleaning up their social media presence.The Nikkei Asian Review reports that prominent pro-democracy Hong Kongers have been warned that they will be targeted by the national security laws once they are enacted.

How is NSA breaking so much crypto?

How is NSA breaking so much crypto?

While the documents make it clear that NSA uses other attack techniques, like software and hardware “implants,” to break crypto on specific targets, these don’t explain the ability to passively eavesdrop on VPN traffic at a large scale.

A Former Google Executive Takes Aim at His Old Company With a Start-Up

A Former Google Executive Takes Aim at His Old Company With a Start-Up

After that, Mr. Ramaswamy said he aimed to charge a monthly subscription of less than $10 and he hopes to bring the price down over time as more users sign up.

Government drones and aircraft are being used to surveil the ongoing protests in American cities

Government drones and aircraft are being used to surveil the ongoing protests in American cities

The Predator drone is large enough that its flight data is available to the public – and that’s the only reason we know that it was used on the protests; However, local law enforcement and other government agencies are able to use smaller drones to conduct surveillance, too.

Class action lawsuit against Google says internet giant tracks private internet use

Class action lawsuit against Google says internet giant tracks private internet use

Google is being sued for 5 billion USD in a class action lawsuit over the tracking of private internet activity.

To work together with law enforcement, Zoom won’t provide end-to-end encryption for free users

To work together with law enforcement, Zoom won’t provide end-to-end encryption for free users

Zoom CEO Eric Yuan has admitted that he won’t provide end-to-end encryption to free users in favor of being able to work with law enforcement.Because we also want to work together, say, with FBI, with local law enforcement in case some people that use Zoom for a bad purpose, right?”.

Private Internet Access is the fastest VPN according to Top10VPN Speed Test Tool

Private Internet Access is the fastest VPN according to Top10VPN Speed Test Tool

That’s why the team at Top10VPN has created an automated tool that runs speed tests both with and without a VPN and stores the historical data to be displayed in a handy chart for users to view.

Tech Expert: Privacy Is a Myth, so We Might as Well Contact-trace

Tech Expert: Privacy Is a Myth, so We Might as Well Contact-trace

Kevin Warwick, a cybernetics professor emeritus at the University of Reading, argues that while contact-tracing apps should be secure, people skittish about giving up privacy ought to adjust their priorities.

Germany’s highest court rules individual right to privacy applies to everyone, even non-Germans

Germany’s highest court rules individual right to privacy applies to everyone, even non-Germans

Germany’s Federal Court of Justice (Bundesgerichtshof), the highest court in the country, has ruled that parts of a 2016 law that allowed monitoring of the internet activity of foreign targets outside of Germany are unconstitutional.

UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

All in all, approximately 9 million customers were affected by the EasyJet hack.The EasyJet disclosure also revealed that 2,208 of the 9 million affected customers had their credit card information accessed but nobody had their passport records accessed.easyJet breach affects 9 million customers.