You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

In a blog post, the company said an 'error' in its 'Tailored Audiences and Partner Audiences advertising system' inadvertently used the information provided by users for security reasons to run targeted ads based on the advertisers' own marketing lists.

Hello, Noteworthy

Hello, Noteworthy

For now, by default when you install Noteworthy it will use the free (as in beer) Decentralabs operated Gateway and Hub so you'll need to reach out to [email protected] to get an invite code.

TikTok: Logs, Logs, Logs

TikTok: Logs, Logs, Logs

Every 5 minutes, TikTok sent a network request with an encrypted content.Now, I can use Frida to intercept the call of this method and see the content of the request before encryption.

This Billion Dollar Company Considers Privacy Laws a Threat to Its Business

This Billion Dollar Company Considers Privacy Laws a Threat to Its Business

ZoomInfo, a data broker that collects contact information by harvesting it from peoples' email inboxes, sees increased attention on privacy legislation as a core risk to its billion dollar business, according to public records.

This device keeps Alexa and other voice assistants from snooping on you

This device keeps Alexa and other voice assistants from snooping on you

Researchers hack Siri, Alexa, and Google Home by shining lasers at themBesides detecting inadvertent audio transmissions, the device will spot virtually any activation of a voice assistant, including those that are malicious.

New German law would force ISPs to allow secret service to install trojans on user devices

New German law would force ISPs to allow secret service to install trojans on user devices

The new law would force internet service providers (ISPs) to install government hardware at their data centers which would reroute data to law enforcement, and then on to its intended destination so the target is blissfully unaware that their communications and even software updates are being proxied.

When Police Are Hackers: Hundreds Charged as Encrypted Network Is Broken

When Police Are Hackers: Hundreds Charged as Encrypted Network Is Broken

PARIS — The police in Europe said Thursday they had arrested hundreds of people on suspicion of drug trafficking and other crimes after successfully hacking into an encrypted phone network being used by organized criminals around the world.

Law enforcement arrests hundreds after compromising encrypted chat system

Law enforcement arrests hundreds after compromising encrypted chat system

The UK’s National Crime Agency (NCA) has made 746 arrests and dismantled dozens of organized crime groups after intercepting millions of encrypted text messages, BBC reports.

Hundreds arrested as crime chat network cracked

Hundreds arrested as crime chat network cracked

Media captionThe BBC's Tom Symonds is shown how a customised Android phone with EncroChat installed works A top-secret communications system used by criminals to trade drugs and guns has been "successfully penetrated", says the National Crime Agency.

Private Internet Access to temporarily remove Mexico VPN exit gateway

Private Internet Access to temporarily remove Mexico VPN exit gateway

Mexico has been a highly requested VPN exit gateway location and our users can rest assured that we will bring the exit gateway back with a reliable data center partner as soon as possible.

Private Internet Access Next Generation Network comes out of beta

Private Internet Access Next Generation Network comes out of beta

Private Internet Access users will soon be able to access our Next Generation network of hardened VPN servers – which will be exiting a recently announced beta .Private Internet Access releases Next Generation VPN servers with security and speed improvements.

I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

AddShoppers has a program named "Email Retargeting® Co-op + SafeOpt® Consumer Rights Management Integrated Platform".Let them explain it to you in their own words: The Problem: Customers Don't Always Want To Give Their Email..

Private Internet Access reveals physical locations of 35 geo-located regions

Private Internet Access reveals physical locations of 35 geo-located regions

Private Internet Access made the decision to start offering geo-located regions as a way to re-enter regions like Russia and Brazil that we have previously had to leave due to regulatory reasons as well as a way to offer quality VPN exit nodes in regions where we were unable to source high quality VPN servers.List of Private Internet Access geo-located regions and their physical locations.

Private Internet Access Next Generation Network now available for beta preview

Private Internet Access Next Generation Network now available for beta preview

Private Internet Access beta users are now able to access Next Generation VPN servers on the PIA network using out beta desktop clients and mobile apps.Try out these exciting new updates to the Private Internet Access today and see why we’re the most trusted brand in the VPN industry.

What facial recognition steals from us

What facial recognition steals from us

Now that facial recognition algorithms exist, they can be effectively linked to any digital camera and any database of labeled faces to surveil any given population of people.And join the Open Sourced Reporting Network to help us report on the real consequences of data, privacy, algorithms, and AI.

UK sets up a new inquiry into Huawei security risk

UK sets up a new inquiry into Huawei security risk

Following the US announcement of additional sanctions against Huawei, the NCSC is looking carefully at any impact they could have to the UK’s networks, the spokesperson said.

Private Internet Access is the fastest VPN according to Top10VPN Speed Test Tool

Private Internet Access is the fastest VPN according to Top10VPN Speed Test Tool

That’s why the team at Top10VPN has created an automated tool that runs speed tests both with and without a VPN and stores the historical data to be displayed in a handy chart for users to view.

Private Internet Access now offers 24/7 live chat customer support

Private Internet Access now offers 24/7 live chat customer support

Private Internet Access is proud to announce the launch of 24/7 live chat coverage by our customer support team.Private Internet Access has been taking many steps to provide the best no log VPN service for the world and 24/7 live chat is just a part of that.

Facebook to surround all of Africa in optical fibre and tinfoil

Facebook to surround all of Africa in optical fibre and tinfoil

The cable will use Spatial Division Multiplexing and up to 16 fiber pairs, delivering capacity that Facebook says will “provide nearly three times the total network capacity of all the subsea cables serving Africa today.” Helping that along is aluminium conductors instead of copper, an innovation developed by Facebook and Alcatel as a way of reducing voltage drop along the very long transmission distances required of submarine cables.

Decentralized Communication: The Way of the Future

Decentralized Communication: The Way of the Future

Decentralization, as the name suggests, works by making a network run on a variety of providers rather than a single centralized network.So personally, I’m placing emphasis on self-hosted and decentralized solutions in the future to try to prepare for this eventuality.

Enterprise Security Woes Explode with Home Networks in the Mix

Enterprise Security Woes Explode with Home Networks in the Mix

The work-from-home (WFH) paradigm that has become the new normal in the age of coronavirus comes with exacerbated network security risk – as evidenced by growing a number of botnets and automated attacks that are taking advantage of known vulnerabilities in both consumer and corporate IT gear.

Is The Australian Government’s App COVIDSAFE, Safe for Me? This Person Says Most Likely.

Is The Australian Government’s App COVIDSAFE, Safe for Me? This Person Says Most Likely.

TL;DR — After a review of the application permissions, sign up form, and as well a PCAP Dump of the entire process and a review of the architecture.So for those not aware, during the sign-up process of COVIDSAFE you are asked a few questions.

This is what end-to-end encryption should look like!

This is what end-to-end encryption should look like!

HIPS is about using a new Chrome WebRTC API called “Insertable Streams” to add a second layer of end-to-end encryption to media streams in a way that would make them inaccessible to the video router.The important part is: end-to-end encryption is on its way to protect your Jitsi Meetings.

PIA adds ten new server locations as part of VPN Network Expansion Plan

PIA adds ten new server locations as part of VPN Network Expansion Plan

Private Internet Access is expanding our VPN network coverage with a new VPN Network Expansion Plan.Private Internet Access takes the security of its VPN server network very seriously and will never allow other VPN services or any other services to run on the same servers.

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Decade of Chinese RATs. This new research adds to that concern, claiming that a concerted effort involving five Chinese advanced persistent threat (APT) groups has been focused on the Linux servers that "comprise the backbone of the majority of large data centers responsible for the some of the most sensitive enterprise network operations."

China’s “New IP” proposal to replace TCP/IP has a built in “shut up command” for censorship

China’s “New IP” proposal to replace TCP/IP has a built in “shut up command” for censorship

In it, the Chinese government and its state controlled telecommunications service and hardware providers (i.e. Huawei) make the case that TCP/IP is broken and won’t scale for use in the future internet which will include things like holographs and space-terrestrial communications.

Experts warn of privacy risk as US uses GPS to fight coronavirus spread

Experts warn of privacy risk as US uses GPS to fight coronavirus spread

Additionally, legal safeguards on location data in the UK mean that the government only receives information from mobile carriers in aggregated form, which prevents individuals from being identified.

Announcing the Results of the 1.1.1.1 Public DNS Resolver Privacy Examination

Announcing the Results of the 1.1.1.1 Public DNS Resolver Privacy Examination

Except for randomly sampled network packets captured from at most 0.05% of all traffic sent to Cloudflare’s network infrastructure, Cloudflare will not retain the source IP from DNS queries to the public resolver in non-volatile storage (more on that below).

Try our latest Test Pilot, Firefox for a Better Web, offering privacy and faster access to great content

Try our latest Test Pilot, Firefox for a Better Web, offering privacy and faster access to great content

Today we are launching a new Test Pilot initiative called Firefox Better Web with Scroll.We’ve combined Firefox and Scroll’s growing network of ad-free sites to offer users a fast and private web experience that we believe can be our future.

Jordan uses internet throttling instead of internet shutdowns and blocks to censor websites

Jordan uses internet throttling instead of internet shutdowns and blocks to censor websites

In an interview with Netzpolitik, Access Now employee Berhan Taye explained that internet throttling is a new method that governments are using as part of their censorship toolkit – and explained why a government like Jordan might prefer internet throttling to straight up internet blocking:.