rpg.pbem.online

Search

Items tagged with: Privacy

Smart doorbells 'easy target for hackers' study finds | BBC News

Major security flaws in popular smart doorbells are putting consumers at risk of being targeted by hackers inside their homes, according to Which.
The consumer group says devices being sold on marketplaces such as Amazon and eBay, could easily be hacked or switched off by criminals.
It is asking the government for new legislation to safeguard consumers.
Amazon has removed at least seven product listings in response to the findings.
#technology #tech #security #privacy #hacking #malware #SmartHome
 

Librem 5 Mass Production Phone Has Begun Shipping | Purism

Purism, a Social Purpose Company (SPC) focusing on security and privacy with its hardware and software, has begun shipping its mass-produced Librem 5 phone to customers.
The Librem 5 is a one-of-a-kind general-purpose computer in a phone form-factor that Purism has designed and built from scratch following a successful crowdfunding campaign that raised over $2.2 million. Both the hardware and software design is focused on respecting the end user’s freedom and giving them control over their privacy and security. The Librem 5 doesn’t run Android nor iOS but instead runs the same PureOS operating system as Purism’s laptops and mini PC.
#technology #tech #security #privacy #cellphone #mobile #Purism #Librem
 
#MoreOnionsPorfavor: Onionize your website and take back the internet

https://blog.torproject.org/more-onions-porfavor

#tor #privacy #onion #website #redundancy
 

LidarPhone attack converts smart vacuums into microphones | ZDNet

A team of academics has detailed this week novel research that converted a smart vacuum cleaner into a microphone capable of recording nearby conversations.
Named LidarPhone, the technique works by taking the vacuum's built-in LiDAR laser-based navigational component and converting it into a laser microphone.
The other day I managed to convert my Twitter device into a telephone.

#technology #tech #security #privacy #hacking
 

HTTPS-Only Mode in Firefox | Mozilla

Starting in Firefox version 83, you can change your preferences to HTTPS-Only Mode. This security enhancing mode forces all connections to websites to use HTTPS. Most websites already support HTTPS; some support both HTTP and HTTPS. Enabling this mode provides a guarantee that all of your connections to websites are upgraded to use HTTPS and hence secure. Learn more about the benefits and how to enable HTTPS-Only Mode.
The latest version (83.0) of Firefox web browser is out today and it features the ability to only use HTTPS secure connections. To turn it on, go into Preferences, click the Privacy & Security link, then scroll down to the bottom of the page. You can turn it on for all windows, private windows only, or turn it off.

#technology #tech #internet #browser #firefox #HTTPS #privacy #security
 
Interesting article about successful advertising done without tracking and invading user privacy. One can hope others follow suit.

#advertising #privacy #internet
 
Interesting article about successful advertising done without tracking and invading user privacy. One can hope others follow suit.

#advertising #privacy #internet
 

How the U.S. Military Buys Location Data from Ordinary Apps | Vice

A Muslim prayer app with over 98 million downloads is one of the apps connected to a wide-ranging supply chain that sends ordinary people's personal data to brokers, contractors, and the military.
#technology #tech #privacy #security #US #military
 

Don’t Blame Section 230 for Big Tech’s Failures. Blame Big Tech.


#commentary #freespeech #section230ofthecommunicationsdecencyact #privacy #competition #creativityinnovation #electronicfrontierfoundation #eff #digitalrights #digitalprivacy
posted by pod_feeder_v2
 

Macos 11: ~~Big Sur~~ Panopticon

Jeffrey Paul: Your Computer Isn't Yours


https://sneak.berlin/20201112/your-computer-isnt-yours/

MacOS phones home to Apple every time you open an application, reporting what application you opened, on what computer, at what time, where you were when you opened it, what ISP you were connected through at the time. These tattles are transmitted, unencrypted, via Akamai, and Apple gives US federal police and military full and unrestricted access to this data at any time, without a warrant.
Now, it’s been possible up until today to block this sort of stuff on your Mac using a program called Little Snitch (really, the only thing keeping me using macOS at this point). In the default configuration, it blanket allows all of this computer-to-Apple communication, but you can disable those default rules and go on to approve or deny each of these connections, and your computer will continue to work fine without snitching on you to Apple.

The version of macOS that was released today, 11.0, also known as Big Sur, has new APIs that prevent Little Snitch from working the same way. The new APIs don’t permit Little Snitch to inspect or block any OS level processes. Additionally, the new rules in macOS 11 even hobble VPNs so that Apple apps will simply bypass them.
The daemon that does this is MacOS 11's new ContentFilterExclusionList, meaning that it cannot be blocked by any user-controlled firewall or VPN. That list also includes CommCenter (the tool that lets you make phone calls from your Mac) and Maps.
Those shiny new Apple Silicon macs that Apple just announced, three times faster and 50% more battery life? They won’t run any OS before Big Sur.
[...]
Your computer now serves a remote master, who has decided that they are entitled to spy on you. If you’ve the most efficient high-res laptop in the world, you can’t turn this off.
Apple can ALSO, via online certificate checks, prevent you from launching any application it doesn't want you to open — or is told not to let you open. And the article goes on to explain how all of your iMessage traffic is captured as well, via insecure iCloud backups.

Apple products have been problematic from a privacy standpoint for a long time. I think MacOS just graduated from "problematic" to "nightmare".

Perhaps they should have called it "Big Sir".

#code #security #privacy #panopticon
 

Macos 11: ~~Big Sur~~ Panopticon

Jeffrey Paul: Your Computer Isn't Yours


https://sneak.berlin/20201112/your-computer-isnt-yours/

MacOS phones home to Apple every time you open an application, reporting what application you opened, on what computer, at what time, where you were when you opened it, what ISP you were connected through at the time. These tattles are transmitted, unencrypted, via Akamai, and Apple gives US federal police and military full and unrestricted access to this data at any time, without a warrant.
Now, it’s been possible up until today to block this sort of stuff on your Mac using a program called Little Snitch (really, the only thing keeping me using macOS at this point). In the default configuration, it blanket allows all of this computer-to-Apple communication, but you can disable those default rules and go on to approve or deny each of these connections, and your computer will continue to work fine without snitching on you to Apple.

The version of macOS that was released today, 11.0, also known as Big Sur, has new APIs that prevent Little Snitch from working the same way. The new APIs don’t permit Little Snitch to inspect or block any OS level processes. Additionally, the new rules in macOS 11 even hobble VPNs so that Apple apps will simply bypass them.
The daemon that does this is MacOS 11's new ContentFilterExclusionList, meaning that it cannot be blocked by any user-controlled firewall or VPN. That list also includes CommCenter (the tool that lets you make phone calls from your Mac) and Maps.
Those shiny new Apple Silicon macs that Apple just announced, three times faster and 50% more battery life? They won’t run any OS before Big Sur.
[...]
Your computer now serves a remote master, who has decided that they are entitled to spy on you. If you’ve the most efficient high-res laptop in the world, you can’t turn this off.
Apple can ALSO, via online certificate checks, prevent you from launching any application it doesn't want you to open — or is told not to let you open. And the article goes on to explain how all of your iMessage traffic is captured as well, via insecure iCloud backups.

Apple products have been problematic from a privacy standpoint for a long time. I think MacOS just graduated from "problematic" to "nightmare".

Perhaps they should have called it "Big Sir".

#code #security #privacy #panopticon
 

New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they're not even in use? | The Register

Google on Thursday was sued for allegedly stealing Android users' cellular data allowances though unapproved, undisclosed transmissions to the web giant's servers.
#technology #tech #Google #privacy #security #DontBeEvil
 

Does Google Maps Have Privacy Issues?

Google Maps knows everything. Not just about every street, and every cafe, bar and shop on that street, but the people who go to them. With 1 billion monthly active users, the app is embedded in people’s lives – directing them on their commute, to their friends’ and families’ homes, to doctor’s appointments and on their travels abroad.
The fact that Google Maps has the power to follow your every step doesn't automatically mean it’s misusing that power. But they could, which is an issue in and of itself, especially since Google’s headquarters are in the US, where privacy legislation is looser than in Europe and intelligence agencies have a history of surveilling private citizens (I see you, NSA)
#technology #tech #Google #Maps #navigation #privacy #security
 

Your Computer Isn't Yours

It turns out that in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.
https://sneak.berlin/20201112/your-computer-isnt-yours/

#JeffreyPaul #Apple #macOS #computers #internet #surveillance spying #privacy #security #digitalrights
 

Your Computer Isn't Yours

It turns out that in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.
https://sneak.berlin/20201112/your-computer-isnt-yours/

#JeffreyPaul #Apple #macOS #computers #internet #surveillance spying #privacy #security #digitalrights
 

Solid, the privacy project created by web inventor, takes 1st step | 9to5Mac

Currently, we all have personal data stored on servers owned by tech giants like Apple, Facebook, and Google. With Solid, all our personal data is stored in a secure repository which we control. That could be our own server at home, or a Solid supplier chosen by us – but the key is that we control our data, and we decide which websites and apps are given access to which elements of it. We can also revoke permissions at any time.
#technology #tech #internet #TimBernersLee #Solid #privacy #security #DataProtection
Web inventor Tim Berners-Lee announces first step in privacy-for-all project, Solid
 

Your Zoom calls could be hacked by...watching your shoulders | TechRadar

Security researchers claim body position could leave Zoom chats open to attack
#technology #tech #security #privacy #hacking #malware
 

youtube-dl Is Not Gone


This headline had me really worried.

https://torrentfreak.com/riaa-takes-down-popular-open-source-youtube-dl-software-201024/

However, youtube-dl is not gone. It's only gone from GitHub, which all right-thinking projects have already left, anyway. (Check out https://codeberg.org/).

We can install youtube-dl now the way we always have.
sudo curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o /usr/local/bin/youtube-dl 
sudo chmod a+rx /usr/local/bin/youtube-dl

As someone pointed out to me a while back, you can also install it in distros where ~/bin is in PATH like this.
curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o ~/bin/youtube-dl 
chmod 755 ~/bin/youtube-dl

This allows you to update youtube-dl without using sudo. We update youtube-dl with youtube-dl -U. It's necessary to update youtube-dl often.

See https://yt-dl.org/ for more info about youtube-dl.

#privacy #surveillance #freedom #youtube #youtube-dl #download #downloads #video #videos #invidious
RIAA Takes Down Popular Open Source YouTube-DL Software
 

youtube-dl Is Not Gone


This headline had me really worried.

https://torrentfreak.com/riaa-takes-down-popular-open-source-youtube-dl-software-201024/

However, youtube-dl is not gone. It's only gone from GitHub, which all right-thinking projects have already left, anyway. (Check out https://codeberg.org/).

We can install youtube-dl now the way we always have.
sudo curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o /usr/local/bin/youtube-dl 
sudo chmod a+rx /usr/local/bin/youtube-dl

As someone pointed out to me a while back, you can also install it in distros where ~/bin is in PATH like this.
curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o ~/bin/youtube-dl 
chmod 755 ~/bin/youtube-dl

This allows you to update youtube-dl without using sudo. We update youtube-dl with youtube-dl -U. It's necessary to update youtube-dl often.

See https://yt-dl.org/ for more info about youtube-dl.

#privacy #surveillance #freedom #youtube #youtube-dl #download #downloads #video #videos #invidious
RIAA Takes Down Popular Open Source YouTube-DL Software
 

youtube-dl Is Not Gone


This headline had me really worried.

https://torrentfreak.com/riaa-takes-down-popular-open-source-youtube-dl-software-201024/

However, youtube-dl is not gone. It's only gone from GitHub, which all right-thinking projects have already left, anyway. (Check out https://codeberg.org/).

We can install youtube-dl now the way we always have.
sudo curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o /usr/local/bin/youtube-dl 
sudo chmod a+rx /usr/local/bin/youtube-dl

As someone pointed out to me a while back, you can also install it in distros where ~/bin is in PATH like this.
curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o ~/bin/youtube-dl 
chmod 755 ~/bin/youtube-dl

This allows you to update youtube-dl without using sudo. We update youtube-dl with youtube-dl -U. It's necessary to update youtube-dl often.

See https://yt-dl.org/ for more info about youtube-dl.

#privacy #surveillance #freedom #youtube #youtube-dl #download #downloads #video #videos #invidious
RIAA Takes Down Popular Open Source YouTube-DL Software
 

On authors who were publishing information technology panopticon concerns in the 1980s, or earlier


A quickie dump.

Paul Baran / RAND

  • "On the Engineer's Responsibility in Protecting Privacy"
  • "On the Future Computer Era: Modification of the American Character and the Role of the Engineer, or, A Little Caution in the Haste to Number"
  • "The Coming Computer Utility -- Laissez-Faire, Licensing, or Regulation?"
  • "Remarks on the Question of Privacy Raised by the Automation of Mental Health Records"
  • "Some Caveats on the Contribution of Technology to Law Enforcement"
Largely written/published 1967--1969.

https://www.rand.org/pubs/authors/b/baran_paul.html

Willis Ware / RAND


Too numerous to list fully, 1960s --1990s. Highlights:
  • "Security and Privacy in Computer Systems" (1967)
  • "Computers in Society's Future" (1971)
  • "Records, Computers and the Rights of Citizens" (1973
  • "Privacy and Security Issues in Information Systems" (1976)
  • "Information Systems, Security, and Privacy" (1983)
  • "The new faces of privacy" (1993)
https://www.rand.org/pubs/authors/w/ware_willis_h.html

Misc


Shoshana Zuboff, In the Age of the Smart Machine: The Future of Work and Power (1988) Notably reviewed in the Whole Earth Catalog's Signal: Communication Tools for the Information Age (1988).

https://www.worldcat.org/title/in-the-age-of-the-smart-machine-the-future-of-work-and-power/oclc/60966402 https://archive.org/details/inageofsmartmach00zubo/page/n7/mode/2up

"Danger to Civil Rights?", 80 Microcomputing (1982)

https://archive.org/stream/80_Microcomputing_Issue_26_1982-02_1001001_US#page/n295/mode/2up (https://news.ycombinator.com/item?id=14329877)

"Computer-Based National Information Systems: Technology and Public Policy", NTIS (September 1981)

http://govinfo.library.unt.edu/ota/Ota_5/DATA/1981/8109.PDF

"23 to Study Computer ‘Threat’" (1970)

https://www.nytimes.com/1970/03/12/archives/23-to-study-computer-threat.html

The Stanford Encyclopedia of Philosophy


"Privacy and Information Technology" bibliography is largely 1990--present, but contains some earlier references.

https://plato.stanford.edu/entries/it-privacy/#Bib

Similarly "Privacy"

https://plato.stanford.edu/entries/privacy/

Credit Reporting / Legislation


US Privacy Act of 1974

https://www.justice.gov/opcl/privacy-act-1974

Invasion of Privacy Act 1971 - Queensland Government, Australia

https://www.legislation.qld.gov.au/view/pdf/inforce/current/act-1971-050

Arthur R. Miller, The assault on privacy: computers, data banks, and dossiers

https://archive.org/details/assaultonprivacy00mill/page/n7/mode/2up

"The Computer, the Consumer and Privacy" (1984)

https://www.nytimes.com/1984/03/04/weekinreview/the-computer-the-consumer-and-privacy.html

Richard Boeth / Newsweek


The specific item I'd had in mind:

Richard Boeth, "Is Privacy Dead", Newsweek, July 27, 1970

http://www.thedailybeast.com/articles/2013/06/11/is-privacy-dead.html%EF%BB%BF

Direct PDF: https://assets.documentcloud.org/documents/712228/1970-newsweek-coverstory-privacy.pdf

Based on an HN comment: https://news.ycombinator.com/item?id=24851736

#privacy #surveillance #panopticon #PaulBaran #WillisWare #RAND #ShoshanaZuboff #RichardBoeth #CreditReporting
 
Orders from the Top: The EU’s Timetable for Dismantling End-to-End Encryption

https://www.eff.org/deeplinks/2020/10/orders-top-eus-timetable-dismantling-end-end-encryption

#e2e #encryption #privacy #security #technology #news #EU
 
Orders from the Top: The EU’s Timetable for Dismantling End-to-End Encryption

https://www.eff.org/deeplinks/2020/10/orders-top-eus-timetable-dismantling-end-end-encryption

#e2e #encryption #privacy #security #technology #news #EU
 
Image/Photo

# Phill from GCHQ - page 90 #


Drawing - 966 × 1350 px - 362 kb PNG - Page 90 of Phill from GCHQ

I know that it has been a long, long while... But now I intend to follow trough to the end of the second album and beyond. I have used the summer to make a bit of planning, and now that I have made my website and gotten over a lot of similar "real" work I am back to doing Phill. You will probably have to go back a bit to see what happened in this terribly complex mess - there's a link to the Phill website below.

Also if you like to support the work on the comic I still have 700 copies of the first album that I need to sell so sharing that fact with others all over the internet would be a big help. Here's a link to the webshop: https://katharsisdrill.art/the-katharsisdrill-shop/phill-from-gchq/

Made with the following open source software:


Image/PhotoImage/PhotoImage/PhotoImage/Photo






The comic can also be read in French, German and Danish





Image/Photo




Image/Photo
like all other works on this profile this work is licensed under a

Creative Commons Attribution 4.0 International License.


Attribute - Katharsisdrill - Link to: https://www.datataffel.dk/u/katharsisdrill




#art #Krita #Inkscape #Gimp #Mageia #drawing #Illustration #comic #comics #bd #bande-dessinée #Phill #Phillfromgchq
#Tesco #nappy #diaper #Turing-test #HolyGrail #privacy
#mywork #ownwork #cc #creativecommons #cc-by
 
Quote of note:

"Not content to put a flying surveillance drone inside customers' homes, the surveillance behemoth on Tuesday announced a plan to scan and store the "unique palm signature" of an untold number of Americans. Dubbed Amazon One, the company hopes the network of scanners will one day serve as an all-purpose form of identification."

"You should absolutely not participate."

via Amazon wants a copy of your 'palm signature.' You should pass.

#privacy #surveillance #dystopia
 
Does anyone use #Brave #Browser? Any opinions or recommendations on its functionality, #privacy friendliness and so on? Thanks.

#Chrome
 
Important comment on #privacy settings for Strava running app.
 

Proton Mail: If you want private mail away from Big Tech you're either going to have to pay or have some limitations such 500MB in Proton's case


We should all know by now that the free blogging, e-mail, calendaring etc from the Big Tech companies does come at the cost of our privacy and browsing habits being mined for profit through advertising. That is why if you searched or mailed someone about teddy bears, you'll probably be seeing adverts about Teddy Bears soon enough.

Proton Mail is free for up to 500MB of storage and a limit of 150 messages per day (IMAP is also a paid account). Need to note though that the header info such as addressee and subject line is not encrypted and this can be handed over to Swiss Authorities if there is a court order. E-mail is an old protocol so there is no standard to send and receive fully encrypted e-mail between different mail systems (yes I know you can use PGP but then so must the receiver use it, and believe me when I say most ordinary users struggle with that) and Proton gets around this by the user clicking on the message and having to enter a password on their site to view the mail and reply. It works seamlessly but is the only way to do it easily.

The service is hosted in Switzerland so this means user data is protected by Swiss law, which generally provides for better privacy than the USA or EU law. Proton cannot access the contents of your mail so this does mean firstly if you lose your password you've lost the contents of your mail, and secondly you cannot search messages for anything in the contents. You either have security or you don't have any security! They have been independently audited.

There are Android an iOS apps available.

There are alternatives such as Tutanota in Germany (free up to 1GB storage but they don't support PGP encryption and are using AES 128 / RSA 2048 but do encrypt subject lines as well). I'm going to still compare Tutanota.

See ProtonMail review: Is secure email really secure?

#technology #privacy #email


If you want to protect your email from prying eyes, but don’t need the kind of protection that keeps spies and whistleblowers alive, ProtonMail could be the secure email service for you. It utilizes PGP encryption standards, is based in Switzerland, and has a solid reputation in the privacy community.. Editor’s Note: Guest author Sven Taylor...

https://gadgeteer.co.za/proton-mail-if-you-want-private-mail-away-big-tech-youre-either-going-have-pay-or-have-some
 

Proton Mail: If you want private mail away from Big Tech you're either going to have to pay or have some limitations such 500MB in Proton's case


We should all know by now that the free blogging, e-mail, calendaring etc from the Big Tech companies does come at the cost of our privacy and browsing habits being mined for profit through advertising. That is why if you searched or mailed someone about teddy bears, you'll probably be seeing adverts about Teddy Bears soon enough.

Proton Mail is free for up to 500MB of storage and a limit of 150 messages per day (IMAP is also a paid account). Need to note though that the header info such as addressee and subject line is not encrypted and this can be handed over to Swiss Authorities if there is a court order. E-mail is an old protocol so there is no standard to send and receive fully encrypted e-mail between different mail systems (yes I know you can use PGP but then so must the receiver use it, and believe me when I say most ordinary users struggle with that) and Proton gets around this by the user clicking on the message and having to enter a password on their site to view the mail and reply. It works seamlessly but is the only way to do it easily.

The service is hosted in Switzerland so this means user data is protected by Swiss law, which generally provides for better privacy than the USA or EU law. Proton cannot access the contents of your mail so this does mean firstly if you lose your password you've lost the contents of your mail, and secondly you cannot search messages for anything in the contents. You either have security or you don't have any security! They have been independently audited.

There are Android an iOS apps available.

There are alternatives such as Tutanota in Germany (free up to 1GB storage but they don't support PGP encryption and are using AES 128 / RSA 2048 but do encrypt subject lines as well). I'm going to still compare Tutanota.

See ProtonMail review: Is secure email really secure?

#technology #privacy #email


If you want to protect your email from prying eyes, but don’t need the kind of protection that keeps spies and whistleblowers alive, ProtonMail could be the secure email service for you. It utilizes PGP encryption standards, is based in Switzerland, and has a solid reputation in the privacy community.. Editor’s Note: Guest author Sven Taylor...

https://gadgeteer.co.za/proton-mail-if-you-want-private-mail-away-big-tech-youre-either-going-have-pay-or-have-some
 

New Bluetooth flaw leaves devices vulnerable to man-in-the-middle attacks | Appleinsider

A new Bluetooth vulnerability could allow an attacker to downgrade or bypass Bluetooth encryption keys, opening the door to man-in-the-middle attacks or other types of malicious exploits.
#technology #tech #Bluetooth #security #privacy #hacking
 
Amazon PR demanding we correct an article because we referred to an Echo as a "microphone"
-- Jason Koebler / Vice

https://nitter.net/jason_koebler/status/1303383712160190469#m

#privacy #surveillance #amazon #AlexaIsAMicrophone #Alexa

The article:

https://www.vice.com/en_us/article/qj45kx/amazon-wants-alexa-to-move-into-your-apartment-before-you-do

Context:
While it’s natural to be chiefly concerned about privacy when your apartment comes with an Amazon microphone pre-installed...
 

#NSA Warns #Cellphone Location Data Could Pose National-Security Threat


Source: https://www.wsj.com/articles/nsa-warns-cellphone-location-data-could-pose-national-security-threat-11596563156

#security #mobile #privacy #technology #news #warning
 

#NSA Warns #Cellphone Location Data Could Pose National-Security Threat


Source: https://www.wsj.com/articles/nsa-warns-cellphone-location-data-could-pose-national-security-threat-11596563156

#security #mobile #privacy #technology #news #warning
 

Researchers Can Duplicate Keys from the Sounds They Make in Locks | Kottke.org

The next time you unlock your front door, it might be worth trying to insert your key as quietly as possible; researchers have discovered that the sound of your key being inserted into the lock gives attackers all they need to make a working copy of your front door key.
How Soundarya Ramesh and her team accomplished this is a fascinating read.
A bit of nominative determinism going on with that researcher? Anyway, this article leads to a couple of other worrying facts.

#technology #tech #security #privacy
 

#Privacy isn't a Luxury


#Google respond to our low-cost tech campaign. There's some good news, some bad news, and some mediocre news.
Key points
  • Google responded to our campaign.
  • We're pleased to hear that Google are exploring ways to establish clearer standards for pre-installed apps and look forward to finding out more about this going forward.
  • They broadly agreed with us that people should be able to uninstall apps - but we still think they failed to really engage with their role in the sector.
  • Google seem to have misunderstood our points on update mechanisms.
  • Google failed to acknowledge our point about their certification process at all.
https://privacyinternational.org/news-analysis/4118/our-response-google-privacy-isnt-luxury

#privacyinternational
 

#Privacy isn't a Luxury


#Google respond to our low-cost tech campaign. There's some good news, some bad news, and some mediocre news.
Key points
  • Google responded to our campaign.
  • We're pleased to hear that Google are exploring ways to establish clearer standards for pre-installed apps and look forward to finding out more about this going forward.
  • They broadly agreed with us that people should be able to uninstall apps - but we still think they failed to really engage with their role in the sector.
  • Google seem to have misunderstood our points on update mechanisms.
  • Google failed to acknowledge our point about their certification process at all.
https://privacyinternational.org/news-analysis/4118/our-response-google-privacy-isnt-luxury

#privacyinternational
 
Leaked Documents Reveal What TikTok Shares with Authorities — in the U.S.

https://theintercept.com/2020/08/10/blueleaks-tiktok-law-enforcement-privacy/

What data TikTok shares with us gov't is less compared to what facebook shares with us gov't. Seems all foreign gov't should ban facebook. facebook is like the surveillance gateway for usa gov't.

#TikTok #data #us #privacy #technology #news #unitedstates #lawenforcement #facebook #security #surveillance
 
Leaked Documents Reveal What TikTok Shares with Authorities — in the U.S.

https://theintercept.com/2020/08/10/blueleaks-tiktok-law-enforcement-privacy/

What data TikTok shares with us gov't is less compared to what facebook shares with us gov't. Seems all foreign gov't should ban facebook. facebook is like the surveillance gateway for usa gov't.

#TikTok #data #us #privacy #technology #news #unitedstates #lawenforcement #facebook #security #surveillance
 

Now that Tik Tok is under threat of banning what about Facebook and others who have been definitely linked to intelligence gathering such as PRISM? Or do we see them decentralising?


It's quite concerning when companies are banned without any real evidence actually being seen. I was just glancing through some of the history around the PRISM operation on Wikipedia where for example Facebook (and others) are explicitly mentioned as well as records of how many government requests they accede to for information.

From a global perspective I can see why Russia and others are demanding that data be stored in their own locations. It can be partly to remove that data from the control of a US based operation (although there is now the US CLOUD Act that nullifies that) or it could be for the other country to exert its control over obtaining the data themselves.

I'm wondering if the future is not going to then see many more social networks banned in other countries? Will a network like Facebook otherwise be split up into country nodes where each country has a say over users and data stored in their own country? I'm certainly hoping social networks go down a more decentralised and federated route as it is lessens the centralised power of a single country over global communications. Different countries have different cultures and laws, and these are not easily understood and appreciated by any foreign country.

The image is an excerpt from a set of PRISM slides that were liberated and published on the Internet - source "PRISM (surveillance program)' on Wikipedia.

Image/Photo

#technology #socialnetworking #privacy
https://gadgeteer.co.za/now-tik-tok-under-threat-banning-what-about-facebook-and-others-who-have-been-definitely-linked
 

Now that Tik Tok is under threat of banning what about Facebook and others who have been definitely linked to intelligence gathering such as PRISM? Or do we see them decentralising?


It's quite concerning when companies are banned without any real evidence actually being seen. I was just glancing through some of the history around the PRISM operation on Wikipedia where for example Facebook (and others) are explicitly mentioned as well as records of how many government requests they accede to for information.

From a global perspective I can see why Russia and others are demanding that data be stored in their own locations. It can be partly to remove that data from the control of a US based operation (although there is now the US CLOUD Act that nullifies that) or it could be for the other country to exert its control over obtaining the data themselves.

I'm wondering if the future is not going to then see many more social networks banned in other countries? Will a network like Facebook otherwise be split up into country nodes where each country has a say over users and data stored in their own country? I'm certainly hoping social networks go down a more decentralised and federated route as it is lessens the centralised power of a single country over global communications. Different countries have different cultures and laws, and these are not easily understood and appreciated by any foreign country.

The image is an excerpt from a set of PRISM slides that were liberated and published on the Internet - source "PRISM (surveillance program)' on Wikipedia.

Image/Photo

#technology #socialnetworking #privacy
https://gadgeteer.co.za/now-tik-tok-under-threat-banning-what-about-facebook-and-others-who-have-been-definitely-linked
 

Twitter: Android users' direct messages may have been exposed | CNBC

Twitter on Wednesday disclosed a new security vulnerability that may have exposed the direct messages of users who access the service using Android devices.
Specifically, the vulnerability could have exposed the private data of Twitter users running devices with Android OS versions 8 and 9, the company said.
“This vulnerability could allow an attacker, through a malicious app installed on your device, to access private Twitter data on your device (like Direct Messages) by working around Android system permissions that protect against this,” the company said in a blog post.
#technology #tech #security #privacy #hacking #Android
 

No to Blockchain Credentials of COVID-19 Test Results for Entry to Public Spaces


#privacy #electronicfrontierfoundation #eff #digitalrights #digitalprivacy
posted by pod_feeder_v2
 

No to Blockchain Credentials of COVID-19 Test Results for Entry to Public Spaces


#privacy #electronicfrontierfoundation #eff #digitalrights #digitalprivacy
posted by pod_feeder_v2
 
Later posts Earlier posts