TikTok tracks you even if you never made an account

TikTok tracks you even if you never made an account

VICE reporter Riccardo Coluccini – who has used the app but had never made a TikTok account before in his life – sent a GDPR request to TikTok to find out what information the social media giant had gathered on him.

WhatsApp loses millions of users after terms update

WhatsApp loses millions of users after terms update

The shift to more privacy-focused messaging apps had been building before WhatsApp’s public relations disaster, Ghodrati said.Apps like Signal, Telegram, Wickr, and WhatsApp offer privacy features ranging from end-to-end encrypted data transfer to ‘self-destructing messages’.”.

Opinion  -  With Online Terms of Service, What Happens When You Click 'Agree'? - The New York Times

Opinion - With Online Terms of Service, What Happens When You Click 'Agree'? - The New York Times

Ever since a 1996 ruling upholding this notion, companies have tested the limits of so-called shrink-wrap agreements through increasingly creative means, like hiding terms of service behind layers of hyperlinks, burying them in small print, forcing users to agree before they can get access to a previously downloaded app or making the terms binding when a customer simply opens a webpage.

How law enforcement gets around your smartphone’s encryption

How law enforcement gets around your smartphone’s encryption

At this point an attacker could find and exploit certain types of security vulnerabilities in iOS to grab encryption keys that are accessible in memory and decrypt big chunks of data from the phone.

A preliminary look at privacy labels in iOS VPN apps

A preliminary look at privacy labels in iOS VPN apps

Apple has split the privacy labels into two types depending on whether the information collected is used to track you, or is not linked to you and used for things like app functionality.VPN Apps Privacy Labels: Data used to track you and Data linked to you.

What You Should Know Before Leaking a Zoom Meeting

What You Should Know Before Leaking a Zoom Meeting

Zoom meetings present a unique set of challenges for source protection, but these challenges can be minimized by following best practices and taking care not to publish raw meeting materials unless there is high confidence that the recordings were not watermarked and have been thoroughly reviewed to make sure no other potentially identifying features are present in the audio or video.

Privacy On Social Media - It's Time to Stop Overthinking — Facts Overflow

Privacy On Social Media - It's Time to Stop Overthinking — Facts Overflow

Machine learning algorithms on these social media platforms are doing two tasks: displaying advertisements based on the user’s behavior and saving the user’s time by automatically doing what the user expects to do.

Eoin's Articles

Eoin's Articles

Now not only will it be impossible for users to log into your server (youself included) unless they know your SSH private key but anyone who does try will be banned for a day.

How Law Enforcement Gets Around Your Smartphone's Encryption

How Law Enforcement Gets Around Your Smartphone's Encryption

“It just really shocked me, because I came into this project thinking that these phones are really protecting user data well,” says Johns Hopkins cryptographer Matthew Green, who oversaw the research.

Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole

Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole

According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to collect unique identifiers from millions of mobile devices, data that allows the app to track users online without allowing them to opt out.

Big brother: Germany's foreign intelligence service under pressure

Big brother: Germany's foreign intelligence service under pressure

The European Court of Human Rights (ECHR) has admitted a Reporters Without Borders (RWB) complaint claiming that people are not properly protected against groundless and unjustified mass surveillance by Germany's foreign intelligence service, the BND.

Salaat First: Another Popular Muslim Prayer App Sells Location Data to FBI, ICE

Salaat First: Another Popular Muslim Prayer App Sells Location Data to FBI, ICE

A popular Muslim prayer app, named Salaat First, found selling users' location data to its partner that has customers with the US government agencies including the FBI and the ICE.Salaat First, which reminds its users about Muslim prayer timings, has been downloaded over 10 million times on Android.

Skype say: we respects your privacy. We are committed to keeping your personal data private

Skype say: we respects your privacy. We are committed to keeping your personal data private

For several days now, WhatsApp users have been invited to accept a new condition for using the instant messaging service: the company explains that from February 8, data will be shared with Facebook, otherwise the service will be inaccessible.

Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen

Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen

Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them.This begs the question: Who gets reprimanded if a robot improperly harrasses an innocent person, or calls the police on them?

Privacy, schmivacy: 2 in 3 Americans don’t care if their smart devices are recording them

Privacy, schmivacy: 2 in 3 Americans don’t care if their smart devices are recording them

Privacy issues are a constant concern when it comes to digital technology, but a new survey finds many Americans are simply accepting they may not be alone in their own home.

Exfiltrating Remaining Private Information from Donated Devices

Exfiltrating Remaining Private Information from Donated Devices

Here is a breakdown of all the devices I purchased: Device Type Number of Devices Bought Desktop or laptop computer 41 Removable media (such as flash drives and memory cards) 27 Hard disk 11 Cell phone 6 After buying the devices, I took them to my command center (a cool name for my basement) and began the data extraction process.

No, Cellebrite cannot 'break Signal encryption.'

No, Cellebrite cannot 'break Signal encryption.'

Last week, Cellebrite posted a pretty embarrassing (for them) technical article to their blog documenting the “advanced techniques” they use to parse Signal on an Android device they physically have with the screen unlocked.

Iranian RANA Android Malware Also Spies On Instant Messengers

Iranian RANA Android Malware Also Spies On Instant Messengers

Formally linking the operations of APT39 to Rana, the FBI detailed eight separate and distinct sets of previously undisclosed malware used by the group to conduct their computer intrusion and reconnaissance activities, including an Android spyware app called "" with information-stealing and remote access capabilities.

Privacy News Online | Weekly Review: December 4, 2020

Privacy News Online | Weekly Review: December 4, 2020

Goodbye, Ajit Pai. The Senate should reject Nathan Simington and let the FCC get back to work.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device—over Wi-Fi, with no user interaction required at all.

Microsoft apologises for feature criticised as workplace surveillance

Microsoft apologises for feature criticised as workplace surveillance

The company says it will now make changes to the service, which lets IT administrators “help their people get the most” from its products, in order to limit the amount of information about individual employees that is shared with managers.

Twitter now supports hardware security keys for iPhones and Android

Twitter now supports hardware security keys for iPhones and Android

Now anyone with a security key set up on their Twitter account can use that same key to log in from their mobile device, so long as the key is supported.

Paladin Deception Services

Paladin Deception Services

Paladin Deception Services is here to assist you in obtaining the fictitious reference, the little white lie, or the alibi that you need.We will provide the white lie or alibi that you need regardless the reason, as long as it's important to you.

Amazon Sidewalk shares your home WiFi network with other Amazon devices unless you opt out

Amazon Sidewalk shares your home WiFi network with other Amazon devices unless you opt out

Amazon Sidewalk turns your home’s Amazon Alexa device into a bridge device – a router that takes a chunk of your home’s WiFi bandwidth and gives it to neighboring “Sidewalk-enabled” devices such as the Amazon Echo and Amazon Ring devices.

Amazon faces a privacy backlash for its Sidewalk feature, which turns Alexa devices into neighborhood WiFi networks that owners have to opt out of

Amazon faces a privacy backlash for its Sidewalk feature, which turns Alexa devices into neighborhood WiFi networks that owners have to opt out of

Amazon customers are being automatically opted in to Sidewalk, a feature set to launch later this year that the company says will connect Alexa devices to nearby WiFi networks, even those owned by someone else.

The ones who brought you Let's Encrypt, bring you: Tools for gathering anonymized app usage metrics from netizens

The ones who brought you Let's Encrypt, bring you: Tools for gathering anonymized app usage metrics from netizens

The Internet Security Research Group (ISRG) has a plan to allow companies to collect information about how people are using their products while protecting the privacy of those generating the data.

'Smart' doorbells for sale on Amazon, eBay came stocked with security vulnerabilities

'Smart' doorbells for sale on Amazon, eBay came stocked with security vulnerabilities

In this case, researchers bought another device from Amazon and eBay that was vulnerable to KRACK, a three-year-old bug that attackers could use to eavesdrop on wireless networks.

No Safety without (Cyber-)Security!

No Safety without (Cyber-)Security!

It’s a common experience: I talk to people developing safety-critical embedded systems, be it cars or medical devices, and, while clearly serious about product safety, they show little interest in security.

Official Trump 2020 App collected phone numbers from contact lists without consent and could sell that data

Official Trump 2020 App collected phone numbers from contact lists without consent and could sell that data

It’s worth noting that the official campaign app from President elect Joe Biden – Team Joe and later Vote Joe – also collected IP addresses, location information, and even contact lists; however if the user declined to consent to sharing this information, the app would respect that request as opposed to siphoning the information anyways with invisible code.

Charities Urged To Stop Sharing Data With Adtech Industry

Charities Urged To Stop Sharing Data With Adtech Industry

In an open letter, ProPrivacy and other groups say that that many charity pages dealing with extremely sensitive issues such as mental health, debt, end-of-life care, and disability contained various trackers allowing advertisers to profile vulnerable users based on the topic of the page – for example, alcohol addiction or mental health issues.