Facebook’s creepy patens reveal its aim to control every aspect of private lives

Sahil Chinoy of the New York Times looked at some of the patents Facebook has applied for and the results he discovered are very creepy. One of the patents describes the use of the forward-facing camera in your cell phone to figure out how you feel from your expressions while you’re reading your Facebook feed. According to the article, their review of hundreds of patent applications filed by Facebook “reveals that the company has considered tracking almost every aspect of its users’ lives: where you are, who you spend time with, whether you’re in a romantic relationship, which brands and politicians you’re talking about.

Framasoft : "102% to fund #PeerTube v1. Y'all are wonderful cr…"

Framasoft utilise framapiaf.org . Vous pouvez læ suivre et interagir si vous possédez un compte quelque part dans le "fediverse". Si ce n’est pas le cas, vous pouvez en créer un ici

Why This Activist Believes We Urgently Need A Universal Declaration Of Digital Rights

1. Jean has worked on software solutions for data protection while volunteering at NGOs “I was volunteering full time at a Philippines organisation called Communities First.” Jean told Jireh’s Hope. "When it comes to Malaysia, it is undeniable that a new phase just begun and we perceive an opportunity to approach policy makers so that we can render them more sensible towards an active legal defence of Digital Rights in the regulations to come," Jean said. 6. Jean hopes that society will also realise the importance of Digital Rights before it’s too late.

A hacker figured out how to brute force iPhone passcodes

He explained that when an iPhone or iPad is plugged in and a would-be-hacker sends keyboard inputs, it triggers an interrupt request, which takes priority over anything else on the device. "If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," he explained. That's thought to have been one of the reasons why Apple is rolling out a new feature called USB Restricted Mode in its upcoming iOS 12 update, which is said to make it far more difficult for police or hackers to get access to a person's device -- and their data.

New GDPR tool targets Google, Facebook with ‘automated’ right to be forgotten requests

The new tool allows users to search a database of 5,000 organizations for appropriate contact details of personnel or departments responsible for erasure requests. However, some of the newest GDPR tools have inverted the target market and are helping users partly automate the process of sending erasure requests, colloquially referred to as “the right to be forgotten,” to organizations that store their data. One such tool, available at opt-out.eu, allows users to search a database of 5,000 organizations for appropriate contact details of personnel or departments responsible for erasure requests.

Can Internet Be Censored?

Recently, the EU attempted to shoot for a specific copyright legislation to protect the rights of unique content creators by addressing the issues of licensing in particular. The Directive is a follow up to the EU’s Digital Single Market Strategy, the main aim of which was to level the differences in copyright regulation across EU member states. In particular, they aim to do so through the negotiations between rightholders and online platforms via obtaining access to the user-uploaded content. The regulation also addresses the issues of online licensing of the content to provide the authors with a fair remuneration of their investment and the enforcement of their rights.

Maybe “smart” devices are too clever: they know all about your Facebook friends, and can spy on you and your family

The Cambridge Analytica scandal revealed the power of psychological profiling and hyper-targeted advertising based on personal data collected and stored by Facebook. However, in a further blow to Facebook’s reputation as a trustworthy guardian of the personal data of billions, the New York Times has revealed that for years, precisely the same kind of deep access has been available to most of the leading hardware manufacturers: we found a flaw in this wireless security camera’s app (provided by a company called Sricam), which meant that we could access more than 200,000 passwords and device IDs for other ieGeek cameras.

Supreme Court restricts police on cellphone location data

WASHINGTON (Reuters) - The U.S. Supreme Court on Friday imposed limits on the ability of police to obtain cellphone data pinpointing the past location of criminal suspects in a major victory for digital privacy advocates and a setback for law enforcement authorities. In the ruling written by conservative Chief Justice John Roberts, the court decided in favor of Timothy Carpenter, who was convicted in several armed robberies at Radio Shack and T-Mobile stores in Ohio and Michigan with the help of past cellphone location data that linked him to the crime scenes. Roberts stressed that the ruling did not resolve other hot-button digital privacy fights, including whether police need warrants to access real-time cellphone location information to track criminal suspects.

Freelance Programmer

This time, Twitter Inc. bought the well known online service Smyte. Many customers were totally dependent on this provider’s API which suddenly disappeared off the radar after Twitter Inc. acquired them yesterday. Similarly, Twitter was also filled today with tweets of complains from existing Smyte customers who have suddenly stopped receiving any communication from their service provider: 2. Technology giants become a bit more empathetic to the needs of smaller businesses and understand that just acquiring other services isn’t a solution to the innovation problem.

30 Days After GDPR

GUEST Rob Beeler, AdMonsters Chairman & Founder of Beeler.Tech Rob has 20 plus years of ad operations and AdTech experience and is the Chairman of AdMonsters and Founder of Beeler.Tech. GUEST Alexandra Isenegger, CEO and co-founder of Linkilaw Alexandra Isenegger is featured in Forbes 30 under 30 and is the CEO and co-founder of Linkilaw – the legal platform for startups and SMEs. HOST Eyal Katz, Senior Marketing Manager at Namogoo Eyal is the founder of the Facebook group GDPR Compliance for Digital Publishers. He has over 5 years experience in AdTech and is Senior Marketing Manager for Namogoo.

AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties — Krebs on Security

By that time, Sen. Ron Wyden (D-Ore.) had already sent letters to AT&T, Sprint, T-Mobile and Verizon, asking them to detail any agreements to share real-time customer location data with third-party data aggregation firms. T-Mobile and Verizon each said they both share real-time customer data with two companies — LocationSmart and another firm called Zumigo, noting that these companies in turn provide services to a total of approximately 75 other customers. Update, 5:20 p.m. ET: Shortly after Verizon’s letter became public, AT&T and Sprint have now said they, too, will start terminating agreements to share customer location data with third parties.

Memoirs of a Wannabe Hacker

TOR is an anonymizing program that allows users to get privacy and anonymity by hopping through different nodes. There will be a post on TOR and how to use it soon. But sometimes the Google Captcha makes me pretty much paranoid, so I kept checking my IP using ifconfig.co. #!/bin/bash DISPLAY=:0; XAUTHORITY=~owner_of:0/.Xauthority; export DISPLAY XAUTHORITY ; curl -s ifconfig.co/json > ~/.torNotify #fetching response into file notify-send “IP Status” “`cat ~/.torNotify | jq ‘.’`” I use ifconfig.co – (ifconfig.co/json for json format including country) Simple, I use to see what country I am browsing from and what are the details.

SSL/TLS for dummies part 1 : Ciphersuite, Hashing,Encryption

Those who already know Asymmetric and Symmetric key encryption can skip this section and go to the next part. So, let’s understand the symmetric encryption by means of a shift algorithm. This is one of the oldest and basic symmetric key encryption algorithm and its first usage was reported during the time of Julius Caesar. But, the client and server needs to agree upon a key and exchange it before starting to encrypt the data, right? Thereafter symmetric key encryption comes into play and further data transmission makes use of this technique.

True Story: The Case of a Hacked Baby Monitor (Gwelltimes P2P Cloud)

The device is brande as “FREDI” and is offered via Amazon.com, Amazon.de et al. Like most consumer grade surveillance products this device has a “P2P cloud” feature that is enabled by default. Everything points to a China-based company called Shenzhen Gwelltimes Technology Co., Ltd. This company is an OEM that develops the camera firmware, designs the hardware and operates the cloud service. In the South Carolina case the most likely scenario is that someone is scanning for valid device IDs with insecure/default passwords and then spies on the owners of the device, possibly based on the information released by Security Research Labs in November 2017.

Brave starts opt-in Ads trial that rewards users and publishers

Brave, the Chromium-based web browser by former Mozilla CEO Brendan Eich, just entered the next stage of the master plan to change how websites and publishers earn money on the Internet. Brave wanted to establish its own system that shares the advertisement revenue between publishers, users, and the company. BAT, Basic Attention Tokens, has been integrated into Brave Payments last year and some users started to use it to distribute BAT to publishers and creators anonymously. Brave could change that as users can earn the money that they want to give to publishers they like when they browse the Internet.

Amazon employees protest sale of facial recognition software to police

Workers at Amazon have demanded that their employer stop the sale of facial recognition software and other services to the US government. In a letter addressed to Amazon CEO Jeff Bezos and posted on the company’s internal wiki, employees said that they “refuse to contribute to tools that violate human rights,” citing the mistreatment of refugees and immigrants by ICE and the targeting of black activists by law enforcement. The employees call out two specific businesses that Amazon should end: the sale of facial recognition software to law enforcement (marketed as Amazon Web Services Rekognition), and the sale of AWS cloud services to Palantir (a data analytics firm that provides “mission critical” software to ICE).

Supreme court bans police access to phone data without a warrant

Court bars police from accessing data such as call listings and location without a warrant, a landmark decision for privacy rights A US supreme court ruling issued Friday barred police from accessing cell phone data such as call listings and location data without first obtaining a search warrant, in a landmark decision in favor of privacy protections. Advocates hailed the 5-4 ruling as a victory for personal privacy rights in an age when digital technology and the widespread use of mobile devices could create easy paths for law enforcement or other state bodies into the most intimate corners of private life.

Supreme Court Rules that Warrants Generally Are Required to Collect Cellphone Data

WASHINGTON — In a major statement on privacy in the digital age, the Supreme Court ruled on Friday that the government generally needs a warrant to collect troves of location data about the customers of cellphone companies. The 5-to-4 decision has implications for all kinds of personal information held by third parties, including email and text messages, internet searches, and bank and credit card records. But Chief Justice John G. “We hold only that a warrant is required in the rare case where the suspect has a legitimate privacy interest in records held by a third party,” the chief justice wrote.

In Major Privacy Win, Supreme Court Rules Police Need Warrant To Track Your Cellphone

In Major Privacy Win, Supreme Court Rules Police Need Warrant To Track Your Cellphone In a major win for privacy rights, the U.S. Supreme Court ruled Friday that police must obtain a search warrant in order to get access to cellphone location information. Chief Justice Roberts wrote the 5-to-4 decision, joining the court's four liberals. The majority declared that the Fourth Amendment guarantees an expectation of privacy and that allowing police to obtain moment-by-moment tracking of an individual's cellphone location is a kind of surveillance that the framers of the Constitution did not want to occur without a search warrant.

Supreme Court decides against warrantless location searches in a major privacy decision

In a major decision on privacy in the digital age, the Supreme Court ruled 5-4 today that police must generally obtain a warrant to seize cellphone tower location records. United States, centered on whether there was a reasonable expectation of privacy when location records were held by a third party, like a phone carrier, and was closely watched for its Fourth Amendment implications. “Given the unique nature of cell phone location records, the fact that the information is held by a third party does not by itself overcome the user’s claim to Fourth Amendment protection,” the majority opinion, written by Chief Justice John Roberts, reads.

© 2018 Privacy News Aggregator