Privacy Talks | Interview with Hanna from Tutanota

Privacy Talks | Interview with Hanna from Tutanota

[4:40] – Some people use Tutanota as an example of a more private version of Gmail.I see that Tutanota also has a calendar now.[6:05] – What is something you, or Tutanota, are looking forward to?.Learn more about Tutanota at

Everything you wanted to know about “surveillance advertising” – and how to avoid it

Everything you wanted to know about “surveillance advertising” – and how to avoid it

Reflecting the broad-based resistance to this privacy-corrosive approach, there’s a new coalition of organizations, which is calling for a ban on what is dubs “surveillance advertising“: Surveillance advertising – the core profit-driver for gatekeepers like Facebook and Google, as well as adtech middlemen – is the practice of extensively tracking and profiling individuals and groups, and then microtargeting ads at them based on their behavioral history, relationships, and identity.

Are smartphone apps that constantly monitor a person’s movements and actions the future of parole – and parenting?

Are smartphone apps that constantly monitor a person’s movements and actions the future of parole – and parenting?

An interesting article in the Guardian points out that some parole systems are moving on to a more “humane” version of the ankle bracelet to track people, based on smartphone apps.

Algorithmic bias: how automated decision making has become an assault on privacy – and what to do about it

Algorithmic bias: how automated decision making has become an assault on privacy – and what to do about it

Even worse is a growing tendency for such automated decision-making systems to draw on highly personal data as a matter of routine.First, it is vital for people to know what classes of personal data are being used for decision making.

OnionShare 2.3 adds tabs, anonymous chat, better command line support, and quite a bit more

OnionShare 2.3 adds tabs, anonymous chat, better command line support, and quite a bit more

So with OnionShare 2.3 you can host a few websites, have your own personal anonymous dropbox, and securely send files to people whenever you want, all at the same time.When someone posts a message to an OnionShare chat room, they send it to the server through their E2EE onion connection.

Code is law: why software openness and algorithmic transparency are vital for privacy

Code is law: why software openness and algorithmic transparency are vital for privacy

The legal defense team wanted to analyze how the TrueAllele software had arrived at the conclusion that Pickett’s DNA was present in the sample.That’s true not just for specialised programs analyzing genetic material, but also for the important new class of systems that involve automated decision making (ADM).

How to hide your iPhone's unique name from apps (and why you should)

How to hide your iPhone's unique name from apps (and why you should)

The newspaper obtained a data set that linked phone location data to advertising identifiers, which, combined with other available databases, allowed the paper to link that location data to real people.

How Google can have its privacy cake while eating its data tracking, too

How Google can have its privacy cake while eating its data tracking, too

Facebook has an ad platform as big as Google's and it works the same way — collect personal data and serve ads for things you might find interesting.

Every move you make - An eye-opening look at law-enforcement surveillance

Every move you make - An eye-opening look at law-enforcement surveillance

JON FASMAN’S new book, “We See It All”, is a brisk and informative overview of one of the more pressing issues in criminal justice: the rise of surveillance technology.

Cheating, Policing, and School Surveillance

Cheating, Policing, and School Surveillance

I will, however, say this: anti-cheating software, whether it’s plagiarism detection or test proctoring — is “cop shit.” And cops do not belong on school grounds.Ed-tech didn't create the "cop shit" in the classroom or launch a culture of surveillance in schools by any means.

Why everybody has something to hide

Why everybody has something to hide

Even in liberal states, there is a very different danger: manipulation .With the knowledge of what companies like Google, Facebook and Amazon get through data they can influence what you should buy, what the information, news and books are that you receive and theoretically also what information is better withheld from you.

Microsoft and OpenAI partner to propose digital transformation of export controls

Microsoft and OpenAI partner to propose digital transformation of export controls

For these reasons, restricting the problematic users and uses of these technologies is the more targeted and balanced of traditional export controls approaches, as it protects national security interests while preserving beneficial uses and tech leadership.

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

ISPs Are Monitoring IPTV Pirates' Activities, Court Documents Reveal * TorrentFreak

Users of pirate IPTV services in the UK and Ireland are most likely being monitored by one or more major ISPs. Secret traffic analysis, provided to the High Court in a recent blocking case involving UEFA, reveals that studies were carried out in connection with Sky which determined many subscribers were accessing pirate IPTV platforms via the ISP.Blocking of regular piracy websites has been a feature of anti-piracy enforcement in Europe for almost 15 years.

3 Questions: The price of privacy in ride-sharing app performance

3 Questions: The price of privacy in ride-sharing app performance

The study compares different methods for masking data and different levels of location data anonymization, and provides useful insights into the trade-off between user privacy and the performance of mobility-sharing applications.

You Have Nothing to Hide? We bet you do.

You Have Nothing to Hide? We bet you do.

Today, the surveillance cameras of public authorities and the data centers of advertising companies are the big bogeyman, because they create profiles of all people who move around the Internet.

Google says Android 12 will make using third-party app stores easier

Google says Android 12 will make using third-party app stores easier

The company says that “all developers selling digital goods in their apps are required to use Google Play’s billing system,” and it’s tweaking language in its payment policy to make that clear.

Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption

Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption

Zoom is facing another lawsuit alleging that the video communications company has deceived consumers by making false claims about its privacy measures.Zoom encryption claims false, watchdog alleges in lawsuit.

This Tool Could Protect Your Photos From Facial Recognition

This Tool Could Protect Your Photos From Facial Recognition

In recent years, companies have been prowling the web for public photos associated with people’s names that they can use to build enormous databases of faces and improve their facial-recognition systems, adding to a growing sense that personal privacy is being lost, bit by digital bit.

The Complete Checklist of How Google Tracks Your Browsing History

The Complete Checklist of How Google Tracks Your Browsing History

Didn’t Google get in trouble for giving marketers the ability to target kids with ads?Marketers are still allowed to serve ads to kids on websites they visit, and in the apps they use.

Don't post on Facebook unless you are prepared to face the consequences

Don't post on Facebook unless you are prepared to face the consequences

“When I saw the ads,” she writes, “I knew that Facebook had probably tagged me to receive them.” At which point I began to wonder if even such a sophisticated user of social media really understood how it works.

Unsecured Chinese companies leak users’ sensitive personal and business data

Unsecured Chinese companies leak users’ sensitive personal and business data

The Xiaoxintong database contains more than 340,000 records of:Mobile numbers, addresses and GPS locationsMobile numbers and names of users’ relatives and other “Guardians”Location tracks (including addresses and GPS coordinates)Hashed passwordsSOS records and SOS record locationsPersonal IDsMost of these (about 285,000) were for addresses, GPS coordinates and personal IDs. The second database (possibly from Shanghai Yanhua Smartech).

Political groups use “deeply spooky” protester location data, report finds

Political groups use “deeply spooky” protester location data, report finds

It's no secret that police and other law enforcement agencies have a history of using mobile phone location and other data to target or investigate individuals, and the wave of mass protests in support of black communities and against police brutality this month has provided a rich data trove for them to probe.

New Facebook Tool Allows Employers to Suppress “Unionize” in Workplace Chat

New Facebook Tool Allows Employers to Suppress “Unionize” in Workplace Chat

Facebook employees sparked a flurry of posts denouncing the feature, with several commenting in disbelief that the company would overtly pitch “unionize” as a topic to be blacklisted.

When the home is no data protection haven: addressing privacy threats from intimate relationships

When the home is no data protection haven: addressing privacy threats from intimate relationships

That’s precisely what a new paper from Karen Levy and Bruce Schneier does: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships.For example: some intimate privacy threats occur by virtue of copresence between victim, attacker, and device.

Delete the data you didn’t know the Internet has on you

Delete the data you didn’t know the Internet has on you

Around the world, our digital footprint – that is, the amount of data we’re sharing online with companies and service providers – increased between March and May 1 “by an average of 55 percent in the six countries we measured,” Ringel explains.

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge's products are used by governments and companies to assess risks such as terrorism and cyber-attacks and determine which they need to worry about; locate assets, customers and others that could be harmed; provide automated "standard operating procedures" to manage and respond to problems; and analyze how past threats were handled to create a better response for the next ones that come along, according to the CEO.In response to Covid-19, Everbridge launched a coronavirus data feed, said Meredith.

Be a Data Custodian, Not a Data Owner

Be a Data Custodian, Not a Data Owner

The organizations that succeed in protecting consumer data in the coming years will be those that build long-term, trusted relationships with customers by humanizing data and taking responsibility as its custodians.

Understanding the Benefits and Downsides of Proxies

Understanding the Benefits and Downsides of Proxies

Proxies can be used to filter unwanted pages and prevent potentially accessing them by someone unaware that the website poses a threat.Proxy servers do not offer as much as a well-optimized internet browser or a great ISP provider, but they can still improve the overall browsing experience.

Decentralized Communication: The Way of the Future

Decentralized Communication: The Way of the Future

Decentralization, as the name suggests, works by making a network run on a variety of providers rather than a single centralized network.So personally, I’m placing emphasis on self-hosted and decentralized solutions in the future to try to prepare for this eventuality.

RSA Cryptography Behind the Scenes

RSA Cryptography Behind the Scenes

Meeting the definition of a cipher, RSA follows the consistency equation being expressed as:This just means that after encrypting a message m with a public key (e, n), the message can then only be decrypted with the corresponding private key (d, n) to recover the message.