Trading more than horses: Threats to privacy, net neutrality in international trade negotiations

While many of us are aware of domestic threats to fair dealing, privacy, and net neutrality, including regulator proposals and proposed legislation, it’s also important to consider the role that international trade can play in influencing policy on a global scale. This concern has been a recent theme for citizens of North American countries, as the US, Canada, and Mexico continue to discuss a renegotiation of the North American Free Trade Agreement (NAFTA). The NAFTA renegotiations highlight the reality that even with strong domestic support for net neutrality and fair intellectual property policy, countries may be vulnerable to demands made by major trade partners.

Useful 7 Facebook Privacy Safety Tips for Teens

If in-case you have put your fake age in order to get the Facebook account and in an attempt if you caught then your account will be terminated along with your pictures and content. This gesture really harms you badly, the criminals who are always looking for young kids to kidnap through social media.It is parent’s duty to keep an eye on their loved ones andTherefore, don't ever post a status that you are alone in your house and along with the exact location.

Why use OpenStreetMap instead of Google Maps ?

The latest change (June 2018) has much more impact : Google decided to reduce the limit of free requests (25000 map display per day to 28000 per month - that's around 1000 map display per day, so 25 times less) but also made it mandatory to give your credit card number even if you do not go over the free limit ! That's probably the easiest way to switch from Google Maps to OpenStreetMap : Mapbox libraries and API allow you to have all the function provided by Google Maps (basemap - you can even style your own -, directions, geocoding, ...) and are all based on OpenStreetMap data.

Why You Need an Anonymous Social Media Account

And it’s not an anonymous account that allows you to spew hatred and make racist comments without recourse, or creep on an ex. My Tumblr, which I’ve had for many years and has always been anonymous (even as a naive college freshman, I recognized the embarrassment inherent in posts on the platform), is a place I can reblog Sylvia Plath quotes and sepia-tinted photos of pens and journals strategically placed on a rustic writing desk and not worry about what anyone else thinks. Then there’s my anonymous Instagram, which I use to follow accounts dedicated to interior design, fashion, inspirational quotes, Bachelorette contestants and all other forms of “embarrassing” content I actually really love.

Judge jails defendant for failing to unlock phones

Again, Montanez said no, so detectives got a warrant -- which brought us to this constitutional challenge in court. "There is no information that the state can show, until I can challenge the warrant itself, that says, ‘Hey, what’s on these two cell phones are directly related to a possession of misdemeanor marijuana,’" argued Leduc. Judge Holder then had Montanez try to unlock the second cell phone, but it was the same result. Recently, the U.S. Supreme Court ruled law enforcement must get a warrant to search cell phones in most cases. Judge Holder also ruled if Montanez suddenly remembers his passwords then he will be released from jail.

Google paying users to track 100% of their Web usage via little black box

Google quietly started up the Screenwise data collection program Tuesday night, taking the e-mail addresses of people who are interested in "add[ing] a browser extension that will share with Google the sites you visit and how you use them." For their participation, Google offers the extension users a $5 Amazon gift card for signing up and another $5 gift card for every three months they stay with the program. According to legal agreements displayed during signup, Google will share the aggregated data with third parties, including "academic institutions, advertisers, publishers, and programming networks." The agreement notes that the data collected will be personally identifiable, with some exceptions: https addresses and private browsing windows of people using the router will not be tracked.

Elizabeth Denham: ‘Data crimes are real crimes’

In a week that has seen Britain near-implode under the twin psychic assaults of a World Cup semi-final and a Donald Trump visit, the UK information commissioner offered a rare moment of poise as she explained in her clear, calm voice – on Radio 4’s Today programme – that she had notified Facebook of her intention to serve it the maximum possible fine for breaking the law and misusing data – £500,000. Because this was an interim report of an investigation into the Brexit referendum that Denham launched in February last year – triggered by our first Observer article on Cambridge Analytica – and which in May broadened out to become a wider inquiry into the use of data in politics.

Why going cashless is discriminatory – and what's being done to stop it

The Cashless Retailers Prohibition Act of 2018 would make it illegal for restaurants and retailers not to accept cash or charge a different price to customers depending on the type of payment they use. By denying patrons the ability to use cash as a form of payment, businesses are effectively telling lower-income and young patrons that they are not welcome David Grasso By denying patrons the ability to use cash as a form of payment, businesses are effectively telling lower-income and young patrons that they are not welcome.” The restaurant offers its customers lots of cashless choices – like preordering online and accepting mobile payments.

My Health Record: Your questions answered on cybersecurity, police and privacy

But if your doctor accesses your record first before you make the selection yourself, this data will be uploaded automatically — unless you've opted to have no record at all. Australian organisations (and some overseas, in certain circumstances), including Australian pharmaceutical companies, will be able to apply to access My Health Record data for approved secondary purposes. Is a record automatically generated if a doctor uploads a document during the opt-out period, even if you did not create one yourself? According to the ADHA, doctors can't upload any clinical documents to the My Health Record system unless the patient record exists.

Dark Patterns: How Tech Companies Use Interface Design to Undermine Online Privacy

The new “Deceived by Design” report reveals in detail the gulf between what the GDPR is trying to achieve in terms of giving people meaningful control over their personal data, and the reality of what major online companies offer. As Privacy News Online reported last month, the data protection expert Max Schrems has already filed four complaints against Google, Facebook, WhatsApp and Instagram over “forced consent” – the fact that users don’t have a real choice about whether to agree to the new terms and conditions.

Smart TVs are invading privacy and should be investigated, senators say

Markey and Blumenthal said federal law hasn't been updated to account for the potential privacy problems raised by smart TVs. While Congress imposed privacy rules on cable and satellite TV companies long ago, "these protections do not cover data companies using Internet connectivity, rather than cable or satellite systems, to track smart TV users' viewing habits," they wrote. Recent reports suggest that Samba TV, one of the largest companies tracking smart TV users' viewing behavior, offers consumers the opportunity to enable their tracking service, but does not provide sufficient information about its privacy practices to ensure users can make truly informed decisions.

Campaign For Net Neutrality Escalates

The coalition for net neutrality, which internet campaign, Protect Our Internet and Popular Resistance are part of, is increasing pressure on the House of Representatives to support a Resolution of Disapproval under the Congressional Review Act. We have passed the resolution in the Senate and are getting closer in the House with 176 votes out of the 218 needed. Each Thursday in July, activists are driving calls to Congress urging them to sign the petition to force a vote to restore #NetNeutrality. Each Thursday in July, activists are flooding Congress with calls, urging them to sign the petition to force a vote to restore #NetNeutrality — c all today!

Alexa alternatives have a secret weapon: Privacy

Hindi wants decentralization of assistants to become the norm, and for smart speakers to go the way of messaging apps, where end-to-end encryption and increased concern about privacy drove the popularity of services like WhatsApp and Telegram Messenger. The option of a decentralized assistant, Hindi said, where users are assured their data won’t be shared, makes possible a different type of thinking about what a home assistant and the voice apps it provides can or should do. “I think that usage will grow with the adoption of voice [computing] as a platform, and in order for that to happen, people need to not worry about privacy,” Hindi said.

Microsoft calls for facial recognition technology rules given 'potential for abuse'

Microsoft has called for facial recognition technology to be regulated by government, with for laws governing its acceptable uses. “It seems especially important to pursue thoughtful government regulation of facial recognition technology, given its broad societal ramifications and potential for abuse,” he wrote. Smith said the need for government action “does not absolve technology companies of our own ethical responsibilities”. He said Microsoft, which supplies face recognition to some businesses, has already rejected some customers’ requests to deploy the technology in situations involving “human rights risks”.

Rights group questions DEA exploit of encrypted cellphones

Human Rights Watch called on the Drug Enforcement Administration to explain whether the technique — employed in a 2012 southern California case involving a Canadian operating out of Puerto Vallarta, Mexico — is still being employed and whether its use is widespread. "I believe that, since the (Blackberries) had encryption technology on them, Krokos felt relatively safe in communicating over the devices," a DEA agent who provided the phones to ring members said in an affidavit. The DEA also prevented the defendants from buying non-compromised encrypted BlackBerry devices from other sellers, including by arranging for their interception in Mexico, court papers show.

Senators call on FTC to investigate smart TVs tracking viewers' data

Edward Markey and Richard Blumenthal asked the Federal Trade Commission to investigate whether internet-connected smart TVs are invading consumer privacy. The two senators expressed concern about how smart TVs track user viewing history and use that data to target ads toward consumers. Smart TVs are so good at tracking users that they can allegedly identify users' political affiliations and views, according to the letter. "The content consumers watch is private, and it should not be assumed that customers want companies to track and use information on their viewing habits," the senators wrote.

A Buyers’ Market: Healthcare Data in Underground Markets

Criminals could send malicious phishing emails, targeting patients or other healthcare employees from a hospital domain, as well as potentially unleashing malware on networked hospital machines. But healthcare records contain personally identifiable information, insurance and policy numbers, medical diagnoses, social security numbers, billing information and more; the type of data that is harder to cancel and/or recover once stolen. Phishing attacks can lead to stolen usernames and passwords, giving hackers access to EHR systems, servers and databases of sensitive patient data records that can be sold on the black market forums.

How to Use Private Internet Access and Tor: Tor over VPN or VPN over Tor?

A big question for those who consider internet privacy essential is how to best use Tor in combination with a VPN service provider like Private Internet Access. It’s also impossible to avoid D and E, but the use of Tor or a VPN is of course designed to make it impossible to tie D and E to one another in this threat model. In this configuration, the user first connects to the VPN service, then to Tor. This allows you to hide the fact that your home IP address is connecting to Tor but requires trusting your VPN provider who can see the connection to Tor. Below is more detail on the threat models.

How to use PGP Encryption

If your concerned about the security of your messages you may have heard of PGP encryption, but what is it and how do you use it? To use PGP you need to install GNU Privacy Guard (Sometimes simply GnuPG) which is free open-source software available on Windows, Mac and Linux for you to download and start encrypting. When you’re done, simply click to encrypt it, then select your key from the list, and there you go, your encrypted message. If we want to send encrypted messages to others we need to use their key instead. You’ll then need to click import key, and select the file you just saved using notepad.

Anonymous woman whose chance interaction on an airplane was shared with millions of social media users speaks out about privacy

The woman's every interaction with a man she met by chance on an airplane was photographed, and published without her consent to Twitter, by two strangers who took an interest in her conversation. A woman whose chance interaction with a male on an airplane was subject to a real-time commentary published to millions of prying social media users has referred to the incident as a “digital-age cautionary tale about privacy, identity, ethics and consent”. The subjects were unaware their interaction was being monitored and at no point did Blair ask for consent to publish their private interaction to millions of social media users.

© 2018 Privacy News Aggregator