New Spotify Patent Involves Monitoring Users’ Speech to Recommend Music

New Spotify Patent Involves Monitoring Users’ Speech to Recommend Music

The patent filing outlines how Spotify currently uses a decision tree—showing users different artists, genres, and more—to help refine its recommendation algorithm for the user.

GitHub - google/differential-privacy: Google's differential privacy library.

GitHub - google/differential-privacy: Google's differential privacy library.

In order to run the differential private library, you need to install Bazel, if you don't have it already.Once you've installed Bazel and Git, open a Terminal and clone the differential privacy directory into a local folder:.

WireGuard® on PIA is out of beta and available to use on Windows, Mac, Linux, Android, and iOS

WireGuard® on PIA is out of beta and available to use on Windows, Mac, Linux, Android, and iOS

In March, Private Internet Access rolled out WireGuard® support to our beta testers on PIA desktop clients and mobile apps.WireGuard is officially a go on our Windows, Mac, Linux desktop clients as well as our Android & iOS mobile apps.

Google will make file manager devs submit a form to get broad file storage access in Android 11

Google will make file manager devs submit a form to get broad file storage access in Android 11

This means that file managers will have to ask Google for permission to access the external storage, much like how apps requesting SMS/Call Log permissions have to ask Google.

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

Starting in late September 2019, DNS over HTTPS (DoH) is going to be rolled out to Firefox users in the United States.Starting in late September 2019, DNS over HTTPS (DoH) is going to be rolled out to Firefox users in the United States.

The $199 PineBook Pro Linux Laptop Gets An Awesome Privacy Feature And July Pre-Order Date

The $199 PineBook Pro Linux Laptop Gets An Awesome Privacy Feature And July Pre-Order Date

Pine64 just posted its July Update, and it's a welcome flood of information that includes a previously unannounced feature and the long-awaited pre-order date for the $199 PineBook Pro Linux laptop.

17-Year-Old Weakness in Firefox Let HTML File Steal Other Files From Device

17-Year-Old Weakness in Firefox Let HTML File Steal Other Files From Device

Except for phishing and scams, downloading an HTML attachment and opening it locally on your browser was never considered as a severe threat until a security researcher today demonstrated a technique that could allow attackers to steal files stored on a victim's computer.

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative

Credit: IntelThe NSA has started assigning developers to the Coreboot project, which is an open source alternative to Windows BIOS/UEFI firmware. All Coreboot code, including all the STM contributions from the NSA, are open source, so anyone could verify that there is no backdoor in there -- in theory.

Will Business Lose Its Cookies Over These New Privacy Laws?

Will Business Lose Its Cookies Over These New Privacy Laws?

While New York and California should be applauded for taking steps to protect the privacy and data of their citizens, having multiple sets of requirements for websites and businesses alike (as we have witnessed with more than 50 U.S. jurisdictions' having individual and not necessarily complementary breach notification laws) will necessarily lead to widespread difficulty in their implementation and accessibility.

ProtonMail now offers elliptic curve cryptography for advanced security and faster speeds

ProtonMail now offers elliptic curve cryptography for advanced security and faster speeds

For several months, we have been working to implement support for new cryptographic methods in ProtonMail that give users a faster experience with equal or better security. Using elliptic curve cryptography, the processes of key generation, encryption, and decryption become dramatically faster.

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Fingerprinting TLS clients with JA3

Fingerprinting TLS clients with JA3

This article is a short guide to using JA3 for fingerprinting TLS clients, with possible use cases and a simple demo. At the implementation level this can translate to: advertising dummy future ciphers each time in order to create unique fingerprints.

P2P mesh routing

P2P mesh routing

It would be impossible to implement one these protocols in order to create and maintain such a net as Netsukuku is, where every each node is a router by itself, because the map of all the routes would require a space, on each pc connected to the net, of about 10GB.

Modern Alternatives to PGP

Modern Alternatives to PGP

But the most widespread uses of PGP are machine-oriented, for needs like package signing and local file encryption. Original need: Linux distributions and many other software update mechanisms use PGP signatures to prevent malicious mirrors or network attackers from altering the contents of their packages.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation.

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

In a report published today, Selianin described how someone could exploit the Avastar firmware (based on a custom implementation of the ThreadX real-time operating system) to execute malicious code without any user interaction.

Eldridgea/erised: Adblocking DNS-Over-TLS Proxy

Eldridgea/erised: Adblocking DNS-Over-TLS Proxy

ERISED A project to only see what you want to see. This is a project with the goal of blocking unwanted ads, trackers, etc across an entire operating system (web and apps). Note: This currently deploys the Caddy container using a Caddy install using a Personal License.

Internet Privacy Laws All Over The World

Internet Privacy Laws All Over The World

The United Kingdom has the main law of GDPR which is also the basic data regulation for the European Union. The Broadcasting Services Act of Australia is the main regulation that encompasses the rules regarding internet privacy.

PeterCxy/Shelter: Isolate your Big Brother Apps

PeterCxy/Shelter: Isolate your Big Brother Apps

Shelter is a Free and Open-Source (FOSS) app that leverages the “Work Profile” feature of Android to provide an isolated space that you can install or clone apps into.

F-Droid - Free and Open Source Android App Repository

F-Droid - Free and Open Source Android App Repository

Shelter is a Free and Open-Source (FOSS) app that leverages the “Work Profile” feature of Android to provide an isolated space that you can install or clone apps into. Backdoors installed in your Android system (so please use an open-source ROM if you are concerned about this)

Schneier on Security

Schneier on Security

By applying our framework, which generates a comprehensive set of test cases covering various web mechanisms, we identify several flaws in the policy implementations of the 7 browsers and 46 browser extensions that were evaluated.