Block ads on your mobile device with DNS over HTTPS

Block ads on your mobile device with DNS over HTTPS

If you don’t, double check to make sure the configuration profile is installed, and then check Settings > VPN & Network > DNS to make sure that your device knows to use your new AdGuard Home server for DNS queries.

I2PChat - Instant Messenger

I2PChat - Instant Messenger

July, 2020 Set ECIES and ED25519 as default sigtype/encryption Add support for optional web page to display user profile at .b32 address Remove insecure DSA_SHA1 from Signature Types Add ECIES (Ratchet) encryption type to new profiles (UI option coming soon!)

Intention to issue € 10 million fine to Grindr LLC

Intention to issue € 10 million fine to Grindr LLC

- Our preliminary conclusion is that Grindr has shared user data to a number of third parties without legal basis, said Bjørn Erik Thon, Director-General of the Norwegian Data Protection Authority.

TikTok tracks you even if you never made an account

TikTok tracks you even if you never made an account

VICE reporter Riccardo Coluccini – who has used the app but had never made a TikTok account before in his life – sent a GDPR request to TikTok to find out what information the social media giant had gathered on him.

Privacy-focused search engine DuckDuckGo grew by 62% in 2020

Privacy-focused search engine DuckDuckGo grew by 62% in 2020

The search engine also told BleepingComputer that high-profile privacy news, such as the recent concerns regarding data sharing between WhatsApp and Facebook, lead to increased traffic for the search engine.

How to stop Amazon from sharing your private information

How to stop Amazon from sharing your private information

From adding others in your family to getting a cheaper student or Medicaid rate, tap or click here to save big on your Amazon Prime account.To control what is visible on your public profile, follow these steps:Sign in to your Amazon account.

The latest Nintendo Switch update secretly turns on User data sharing

The latest Nintendo Switch update secretly turns on User data sharing

System update version 11.0.0 for Nintendo Switch is secretly enabling User data sharing via Google Analytics for all users, and it is raising some privacy concerns among fans.

How To: Privacy-centric DNS

How To: Privacy-centric DNS

After that is out of the way (please don’t reboot now because you won’t have the necessary other bits configured, please be patient), edit your local /etc/dnscrypt-proxy/ configuration file to set up the upstream server you want to use.

Here’s how to get all the data that Google has on you

Here’s how to get all the data that Google has on you

But while another company with questionable privacy practices Facebook occupies the social level of human behavior, Google with its Search can reach the deepest personal layers of a person.Step 2: Go to the to use the new Google Takeout feature.Be aware that extracting your data and deleting it are two different processes.

On Instagram, 'Unlink Account' Won't Unlink a Facebook Account

On Instagram, 'Unlink Account' Won't Unlink a Facebook Account

The spokesperson said that Facebook collects and connects this information about users’ activities in order to give users a “personalized experience” across all of the apps under the company’s umbrella, like more precisely targeted ads or in-app recommendations based on an amalgamation of the user’s cross-platform activities.

Study shows which messengers leak your data, drain your battery, and more

Study shows which messengers leak your data, drain your battery, and more

As the chart below shows, both apps download and copy a linked file in its entirety—even if it’s gigabytes in size.Meanwhile, when the Line app opens an encrypted message and finds a link, it appears to send the link to the Line server to generate a preview.

HostsFileHijack : Microsoft Defender falsely reports you are infected if you try and block Microsoft telemetry and ads

HostsFileHijack : Microsoft Defender falsely reports you are infected if you try and block Microsoft telemetry and ads

The latest versions of Microsoft Defender for Windows 10 will detect if you are adding entries to your host file which would block Microsoft’s servers and refuse to allow you to save the file, claiming it is a severe security risk.

Google’s new web standard could disable your ad-blocker

Google’s new web standard could disable your ad-blocker

According to Snyder, Web Bundles would allow malicious actors to evade privacy and security measures via a number of different avenues, including concealing dangerous URLs within the .wbn file and randomizing URLs for unwanted resources.

ThreatSpike Blog: Zoom still don't understand GDPR

ThreatSpike Blog: Zoom still don't understand GDPR

During the last month, Threatspike EDR detected the widely used Zoom Windows client accessing the Google Chrome cookie file during the uninstall process.The file is seen accessing the user's Chrome Cookies file and reading parts of the file that do not contain Zoom related information.

How to completely self host Standard Notes - Part 1

How to completely self host Standard Notes - Part 1

This part will cover setting up your own self-hosted Standard Notes instance and routing your instance through nginx to allow for public exposure.Nginx is a reverse proxy that allows you to point incoming web traffic to your new Standard Notes syncing server.

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Visiting a clearnet website that logs your IP address when trying to torrent privately is bad enough, knowing that your logs will actually be given up to copyright infringement lawyers and end up being used against you in legal proceedings is a real life and ongoing worst case scenario for torrenters around the world.

How to Set Up a Pi-Hole Ad Blocking VPN Server on Google Cloud’s Always Free Usage Tier

How to Set Up a Pi-Hole Ad Blocking VPN Server on Google Cloud’s Always Free Usage Tier

To remove that step, let’s use a daily cron job to check to see if a restart is required and restart the VM as necessary.In nano, add the following lines of code which check to see if the reboot-required token file is present, restarting the VM if so:#!/bin/sh.

Unsecured Social Data database leaks 235 million public profiles from TikTok, Instagram, and YouTube

Unsecured Social Data database leaks 235 million public profiles from TikTok, Instagram, and YouTube

These public records were scraped from these social media platforms by Deep Social, a now defunct company that seems to have sold the data to Social Data.The database has since been secured, and affected users won’t be notified because the leaked information is technically public.

Now-fixed exploit used Microsoft Office macros to hack macOS

Now-fixed exploit used Microsoft Office macros to hack macOS

A now-fixed exploit in the macOS version of Microsoft Office may have allowed attackers to hack a Mac user just by getting them to open a document.

Why I Chose Dropbox Despite All the Privacy Scandals

Why I Chose Dropbox Despite All the Privacy Scandals

Wanting to move away from Google both because of privacy issues, and horrible apps, I was looking for suitable cloud storage provider alternatives.If you search the web for privacy-friendly cloud storage services, Dropbox won’t make the list.

Tips to control privacy and manage advertising preferences on Amazon.

Tips to control privacy and manage advertising preferences on Amazon.

From adding others in your family to getting a cheaper student or Medicaid rate, tap or click here to save big on your Amazon Prime account.If you’re spending more money and time on Amazon than ever before, let’s make sure your public profile is locked down:.

Darknet forum leaks Telegram database with millions of Russian users’ information

Darknet forum leaks Telegram database with millions of Russian users’ information

A darknet forum has released a database with the telephone numbers and unique identifiers of millions of users of the messaging app Telegram, reports the IT news site .

When Your Office Scanner Is Framed for Phishing

When Your Office Scanner Is Framed for Phishing

The phishing campaign attempts to leverage the 'scan to email' functionality of modern office document-handling equipment as the bait text to lure users into opening an attachment which contains a credential-harvesting phishing page.

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

A recent high-profile forensic investigation reported that “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file] to determine if it contained any malicious code in addition to the delivered video.”.

Mozilla installs Scheduled Telemetry Task on Windows with Firefox 75

Mozilla installs Scheduled Telemetry Task on Windows with Firefox 75

Mozilla installs Scheduled Telemetry Task on Windows with Firefox 75.Observant Firefox users on Windows who have updated the web browser to Firefox 75 may have noticed that the upgrade brought along with it a new scheduled tasks.

Browse the Telemetry that Firefox collects

Browse the Telemetry that Firefox collects

The Mozilla Firefox web browser, like the majority of browsers available today, collects Telemetry data which Mozilla introduced in Firefox 7 in 2011,.Firefox collects only "non-personal information" such as "performance, hardware, usage, and customizations" according to Mozilla.

The Secret History of Facial Recognition

The Secret History of Facial Recognition

When his son Lance arrived at the house in Austin, Texas, that morning in early 1995, Woody immediately began to issue instructions in dry-erase ink.When Lance got back, Woody motioned to two large file cabinets inside the garage.

IWantClips Admits Performer Data Breach

IWantClips Admits Performer Data Breach

In this isolated incident, there was a minor inadvertent data release that affected a very small number of our artists (483 United States based artists out of our community of more than 30,000 artists) who had previously received a 1099 from us in the year 2017.

Release v1.3.2 & v1.2.2 - Fix for persistent XSS vulnerability in filenames of attached files

Release v1.3.2 & v1.2.2 - Fix for persistent XSS vulnerability in filenames of attached files

This release includes an improved solution, which addresses the issue on a broader scope, avoiding this to reoccur in other areas of the code in the future.

Please Mozilla, don't touch the user.js functionality in Firefox

Please Mozilla, don't touch the user.js functionality in Firefox

One of the main advantages over Firefox's preferences file is that it has priority and that it is a user-owned file that is left untouched when Mozilla makes changes to the browser.