Dissidence Recommendation and Interview with Matthew Brdlik

Dissidence Recommendation and Interview with Matthew Brdlik

Brdlik: “The number one response I get is that it’s like Black Mirror.It’s almost like the new benchmark of quality for this type of film.THiNC: “Having just re-watched the film, it’s all becoming more clear!

Urbit is for Communities

Urbit is for Communities

When I think of the places in the physical world where people seem to feel the most at home, they’re places that have evolved over long periods of time and are owned by the communities that inhabit them.

Cookieviz 2: new features to observe hidden web practices

Cookieviz 2: new features to observe hidden web practices

CookieViz is the first software for the general public developed in-house by the CNIL.The source code of the Cookieviz software is freely accessible and can be improved by developers.

When you tell Chrome to wipe private data about you, it spares two websites from the purge: Google.com, YouTube

When you tell Chrome to wipe private data about you, it spares two websites from the purge: Google.com, YouTube

While cookies are typically used to identify you and store some of your online preferences when visiting websites, site data is on another level: it includes, among other things, a storage database in which a site can store personal information about you, on your computer, that can be accessed again by the site the next time you visit.

Mark Zuckerberg reportedly signed off on a Facebook algorithm change that throttled traffic to progressive news sites — and one site says that quiet change cost them $400,000 to $600,000 a year

Mark Zuckerberg reportedly signed off on a Facebook algorithm change that throttled traffic to progressive news sites — and one site says that quiet change cost them $400,000 to $600,000 a year

Mark Zuckerberg signed off on a Facebook algorithm change in 2017 that throttled traffic to progressive news sites, costing journalism outlet Mother Jones hundreds of thousands of dollars, according to a report by The Wall Street Journal and comments by Mother Jones senior staff published Friday.

Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

Pakistan bans TikTok; calls videos “immoral and indecent”

Pakistan bans TikTok; calls videos “immoral and indecent”

The Pakistan Telecommunications Authority (PTA) has officially banned TikTok for providing access to “immoral and indecent” videos – though it remains to be seen how permanent this ban will be.

Why Are There So Many Data Breaches?

Why Are There So Many Data Breaches?

Object Stores have many uses such as:Providing a location for the upload or download of dataStore process inputs, outputs, temporary and data filesStoring, transcoding and playing audiovisual mediaStoring data backupsStoring website contentHosting static websitesTwo of the largest cloud Object Store services are Azure Storage and AWS S3.What security options are available.

The EU is investigating Instagram for allegedly exposing the contact data of up to 5 million underage users

The EU is investigating Instagram for allegedly exposing the contact data of up to 5 million underage users

It follows a complaint from a US data scientist, who last year said that Instagram allowed underage users to publicly display their phone numbers and email addresses by switching to "business" accounts.

Police chiefs, community denounce 'hateful' video comparing Ottawa chief to Hitler

Police chiefs, community denounce 'hateful' video comparing Ottawa chief to Hitler

César Ndéma-Moussa, seen here in 2017, says he is 'strongly convinced' the fact Ottawa Police Service Chief Peter Sloly is Black played a role in the decision to create the video.

Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

Users of pirate IPTV services in the UK and Ireland are most likely being monitored by one or more major ISPs. Secret traffic analysis, provided to the High Court in a recent blocking case involving UEFA, reveals that studies were carried out in connection with Sky which determined many subscribers were accessing pirate IPTV platforms via the ISP.Blocking of regular piracy websites has been a feature of anti-piracy enforcement in Europe for almost 15 years.

Chrome exempts Google sites from user site data settings

Chrome exempts Google sites from user site data settings

Support this blog: Link Unshortener, StopTheMadness, Underpass, PayPal. In Google Chrome's "Cookies and site data" settings, accessible via the Preferences menu item or directly with.Chrome respects the "Clear cookies and site data when you quit Chrome" setting for but not entirely for .

Ottawa police conducting internal investigation into online video targeting chief, Sloly says

Ottawa police conducting internal investigation into online video targeting chief, Sloly says

“I have no idea if any member of the Ottawa Police Service or any other police service was involved in the creation or distribution of that,” Sloly said.Sloly said the service “would investigate any incident that affects our community and any incident that could affect the reputation of our service.

Singapore’s world-first face scan plan sparks privacy fears

Singapore’s world-first face scan plan sparks privacy fears

“We want to be innovative in applying technology for the benefit of our citizens and businesses,” Kwok Quek Sin, who works on digital identification at Singapore’s technology agency GovTech, told AFP.

Why privacy matters - Glenn Greenwald

Why privacy matters - Glenn Greenwald

The "Nothing to hide" argument follows the idea that there are two kinds of people: good and bad.The only people who care about privacy are by definition "bad people".An implicit bargain: if you're untreatening and harmless to those who have political power, then and only then can you be free of the dangers of surveillance.

If you used Firefox to access Twitter, your non-public info may have been exposed

If you used Firefox to access Twitter, your non-public info may have been exposed

This means that if you accessed Twitter from a shared or public computer via Mozilla Firefox and took actions like downloading your Twitter data archive or sending or receiving media via Direct Message, this information may have been stored in the browser’s cache even after you logged out of Twitter.

Police get access to people told to self-isolate by NHS test and trace

Police get access to people told to self-isolate by NHS test and trace

Police forces will be able to access information about people “on a case-by-case” basis, so they can learn whether an individual has been told to self-isolate, the Department of Health and Social Care (DHCS) said.

Why Monopolies Make Spying Easier

Why Monopolies Make Spying Easier

If history is any guide, the longer that companies like Facebook and Google stay dominant, the more likely it becomes that they will serve as intelligence partners to the United States and other governments.

Thousands of infected IoT devices used in for-profit anonymity service

Thousands of infected IoT devices used in for-profit anonymity service

The code further uses a lib2p-based network stack to interact with the Interplanetary File System, which is often abbreviated at IPFS.

"Together", the new version of Jami and a new step forward

"Together", the new version of Jami and a new step forward

Jami undergoes continuous ongoing development and release, so you can experience improvements and new features as we implement them.However, organizations wishing to use Jami require a higher level of control over users of their network, so we have created Jami Account Management Server (JAMS).

Interacting With Non-Privacy People

Interacting With Non-Privacy People

I often see people ask “how do I get my family/friends/significant other/coworkers/etc to care about privacy,” but I rarely see anyone ask “should you get them to care at all?” It’s an important question.

Twitter abruptly changes hacked-materials policy after blocking Biden story

Twitter abruptly changes hacked-materials policy after blocking Biden story

Twitter has changed its policy on sharing hacked materials after facing criticism of its decision to block users from tweeting links to a New York Post article that contained Hunter Biden emails allegedly retrieved from a computer left at a repair shop.

Auckland University's 'bizarre' files on students' social media posts

Auckland University's 'bizarre' files on students' social media posts

A University of Auckland statement sent to Craccum said: "We know that students communicate about and respond to issues via social media and looking at what is being posted is one of the ways that the university listens to the student voice and gets a sense of the student sentiment in real time.

Read Twitter privately with Nitter RSS feeds

Read Twitter privately with Nitter RSS feeds

I'm going to outline how you can read Twitter privately, by using a RSS feed reader and Nitter RSS feeds."Nitter is a free and open source alternative Twitter front-end focused on privacy".The feed can be retrieved for a single user (e.g. nitter.decent.social/lexfridman/rss) and contains their last 20 tweets.

Privacy News Online | Weekly Review: October 16, 2020

Privacy News Online | Weekly Review: October 16, 2020

Location data shouldn’t be accessible to government agencies without a warrant thanks to a 2017 Supreme Court ruling.Court documents from an arson case have revealed that Google regularly gives information to law enforcement on anyone who has searched a particular keyword, including physical addresses.

GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

GDPR watchdog’s investigation finds that tracking and consent pop-ups used by Google and other major websites and apps are unlawful.

The Belgian Data Protection Authority (APD-GBA) has found serious GDPR infringements in the system Google and others use to legitimise online tracking.

How do you decide who to trust with your data? Professor Robin Mansell from LSE on why protecting privacy online is so difficult

How do you decide who to trust with your data? Professor Robin Mansell from LSE on why protecting privacy online is so difficult

That said, and this has been true for the last decade or more, people express concerns about their data privacy in surveys but will then go and use these apps or platforms without thinking about the consequences.

3 Million Dickey Customers’ Credit Card Data Posted Online

3 Million Dickey Customers’ Credit Card Data Posted Online

He also stated that the breach was discovered this week right after the criminals started to advertise a huge bunch of payment card details called the “Bleeding Sun”.

Have issues with Facebook collecting your data? Privacy-first alternative MeWe surges to 9M users

Have issues with Facebook collecting your data? Privacy-first alternative MeWe surges to 9M users

Our personal information is shared and sold across data companies used to target and manipulate us through marketing from social media companies, advertisers and politicians.

More