WhatsApp-tracking apps are letting people figure out when you're sleeping and whom you're likely talking to on the Facebook-owned app

WhatsApp-tracking apps are letting people figure out when you're sleeping and whom you're likely talking to on the Facebook-owned app

But the user data that the Facebook-owned messaging app shares publicly is allowing dozens of outside apps to track aspects of WhatsApp users' online activity — including whom they're likely talking to, when they're sleeping, and when they're using their devices.

The History of Invidious

The History of Invidious

HookTube was pretty much the same idea from a user perspective, but it was not open source and it used the YouTube API instead of scraping the site.

Clearview AI CEO says ‘over 2,400 police agencies’ are using its facial recognition software

Clearview AI CEO says ‘over 2,400 police agencies’ are using its facial recognition software

More than 2,400 police agencies have entered contracts with Clearview AI, a controversial facial recognition firm, according to comments made by Clearview AI CEO Hoan Ton-That in an interview with Jason Calacanis on YouTube.

Almost 235 Million YouTube, TikTok and Instagram Profiles Exposed Online by Unsecured Database

Almost 235 Million YouTube, TikTok and Instagram Profiles Exposed Online by Unsecured Database

Many users keep their profiles open, allowing companies such as Deep Social to collect that data and compile it further.While the database belonged to Social Data, the evidence point toward Deep Social, another company used to scrape data from online sources and has since dissolved.

Person of Interest

Person of Interest

Finch discovered that the machine sees everything, potential terrorist acts and violent crimes that involve ordinary people.Partnered with John Reese, an ex-CIA agent, the two work in secret to prevent violent crimes before they can happen.

The Self-Destructive Quest for Perfection

The Self-Destructive Quest for Perfection

This week I was reintroduced to a phrase I’m coming to love as I interact with the privacy community: “don’t let perfection be the enemy of good enough.” If you recommend Signal to someone for it’s security, someone else will complain that Signal uses phone numbers and AWS as a backbone.

Whoops, our bad, we just may have 'accidentally' left Google Home devices recording your every word, sound, sorry

Whoops, our bad, we just may have 'accidentally' left Google Home devices recording your every word, sound, sorry

Yet punters noticed their Google Homes had been recording random sounds, without any wake word uttered, when they started receiving notifications on their phone that showed the device had heard things like a smoke alarm beeping, or glass breaking in their homes – all without giving their approval.

COVID-19 contact tracing applications are privacy snares, Defcon

COVID-19 contact tracing applications are privacy snares, Defcon

COVID contact tracing apps boast the power of gathering personal data that exposes your activities, movements, and relationships.Experts believe governments must avoid this data-hungry mindset in contact tracing apps.

This Tool Could Protect Your Photos From Facial Recognition

This Tool Could Protect Your Photos From Facial Recognition

In recent years, companies have been prowling the web for public photos associated with people’s names that they can use to build enormous databases of faces and improve their facial-recognition systems, adding to a growing sense that personal privacy is being lost, bit by digital bit.

Privacy and Death

Privacy and Death

Honestly, it’s probably not a bad idea to give them access to your primary banking email account and your work email so they can inform the relevant people of your passing.

Key questions raised about algorithmic transparency by new GDPR case brought against Uber by its drivers

Key questions raised about algorithmic transparency by new GDPR case brought against Uber by its drivers

But assuming the court rules that algorithmic management must follow the GDPR, with specific privacy safeguards, then many other companies in the EU that use or are considering using office surveillance systems may find that they can do so only in circumscribed ways.

Rite Aid deployed facial recognition system in hundreds of U.S. stores

Rite Aid deployed facial recognition system in hundreds of U.S. stores

Over about eight years, the American drugstore chain Rite Aid Corp quietly added facial recognition systems to 200 stores across the United States, in one of the largest rollouts of such technology among retailers in the country, a Reuters investigation found.

Google reportedly keeps tabs on usage of rival Android apps to develop competitors

Google reportedly keeps tabs on usage of rival Android apps to develop competitors

“Since 2014, the Android App Usage Data API has been used by Google and Android developers who have been authorized by Android OEMs or users to access basic data about app usage—such as how often apps are opened—to analyze and improve services,” a company spokesperson said in an email to The Verge.

Privacy & Security 101: Compartmentalization

Privacy & Security 101: Compartmentalization

Most people might prefer a more partial compartmentalization: a VoIP number from work that’s different from their personal number, a separate email for their banking institutions, utilities, rent portal, and other important matters, a different name and number for online dating, etc.

States probe Apple for potential consumer protection violation

States probe Apple for potential consumer protection violation

Texas is among a group of states whose attorneys general are probing Apple over potential violations of a consumer protection law, according to a document obtained by the Tech Transparency Project through an open records request and shared with CNBC.

Instacart Customers’ Data Is Being Sold Online

Instacart Customers’ Data Is Being Sold Online

This data includes names, the last four digits of credit card numbers, and order histories, and appears to have affected customers who used the grocery delivery service as recently as yesterday.

The Future of Online Identity is Decentralized

The Future of Online Identity is Decentralized

Large internet corporations like Google and Facebook allow all to create an account on condition that some personally identifiable information is revealed, usually a phone number.Whether you choose authenticity or anonymity, decentralized identity proofs allow you to build a cross-platform online identity.

Amazon says it will not ban TikTok from employee phones

Amazon says it will not ban TikTok from employee phones

As first reported by The New York Times on Friday, Amazon asked employees to remove TikTok from their mobile devices, citing security risks.“Due to security risks, the TikTok app is no longer permitted on mobile devices that access Amazon email,” the company said in the initial email to employees on Friday morning.

Amazon tells employees to delete TikTok immediately—then takes it back

Amazon tells employees to delete TikTok immediately—then takes it back

In its earlier email to employees Friday morning, obtained by CNN, Amazon (AMZN) said that due to "security risks, the TikTok app is no longer permitted on mobile devices that access Amazon email.".

Google, Facebook, Microsoft Pause Hong Kong Data Requests (3)

Google, Facebook, Microsoft Pause Hong Kong Data Requests (3)

Microsoft is pausing responses to such data requests as it examines the new law, a company spokesperson said in a statement.Facebook typically works with law enforcement to follow local laws where the company operates, but said it has paused sharing user data with Hong Kong authorities while it conducts a “human-rights” assessment.

Unsecured Chinese companies leak users’ sensitive personal and business data

Unsecured Chinese companies leak users’ sensitive personal and business data

The Xiaoxintong database contains more than 340,000 records of:Mobile numbers, addresses and GPS locationsMobile numbers and names of users’ relatives and other “Guardians”Location tracks (including addresses and GPS coordinates)Hashed passwordsSOS records and SOS record locationsPersonal IDsMost of these (about 285,000) were for addresses, GPS coordinates and personal IDs. The second database (possibly from Shanghai Yanhua Smartech).

Why Facial Recognition is a Threat to Privacy: Government Going Rogue

Why Facial Recognition is a Threat to Privacy: Government Going Rogue

The facial recognition system uses a technology that is used to recognize human faces.The facial recognition technology verifies the personal identities of different people by posing a threat to privacy and human rights.

Privacy-Focused OS Wants to Know How Facebook and the FBI Hacked it

Privacy-Focused OS Wants to Know How Facebook and the FBI Hacked it

The hacking tool relied on an unknown flaw—also called a zero-day in hacker lingo—in the default video player included in Tails, a well-known Linux-based operating system that’s used by journalists, dissidents, human rights activists, and security-focused users all over the world.

Oracle's BlueKai Spilled Network Monitoring Data 'Billions of Documents'

Oracle's BlueKai Spilled Network Monitoring Data 'Billions of Documents'

An Oracle ad tech division responsible for monitoring 1 % of all web traffic has exposed billions of records through an unsecured server.By leaving a server unsecured without a password, Tech giant and data harvester Oracle has exposed billions of records of people around the globe.

China Is Collecting DNA From Tens of Millions of Men and Boys, Using U.S. Equipment

China Is Collecting DNA From Tens of Millions of Men and Boys, Using U.S. Equipment

In the report released by the Australian institute, it estimated that the authorities aimed to collect DNA samples from 35 million to 70 million men and boys, or roughly 5 percent to 10 percent of China’s male population.

When the home is no data protection haven: addressing privacy threats from intimate relationships

When the home is no data protection haven: addressing privacy threats from intimate relationships

That’s precisely what a new paper from Karen Levy and Bruce Schneier does: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships.For example: some intimate privacy threats occur by virtue of copresence between victim, attacker, and device.

The Privacy Perils of Contact Tracing in Libraries

The Privacy Perils of Contact Tracing in Libraries

Yet, as communities struggle with the COVID-19 pandemic, libraries are faced with requests or demands to institute contact tracing, monitoring who comes into the library and restricting access to those who don’t provide their personal information.

Serious Xbox Security Breach Allows Gamertag Spoofing

Serious Xbox Security Breach Allows Gamertag Spoofing

A major Xbox security breach allows anyone to spoof your Gamertag and send offensive messages that could get you banned.A video of this security breach in action was posted on Reddit that shows how many Xbox Live users fell victims to it already.

UK sets up a new inquiry into Huawei security risk

UK sets up a new inquiry into Huawei security risk

Following the US announcement of additional sanctions against Huawei, the NCSC is looking carefully at any impact they could have to the UK’s networks, the spokesperson said.

Wacom drawing tablets are spying on every app you open, and sending the data back to Wacom

Wacom drawing tablets are spying on every app you open, and sending the data back to Wacom

“In section 3.1 of their privacy policy, Wacom wondered if it would be OK if they sent a few bits and bobs of data from my computer to Google Analytics, “[including] aggregate usage data, technical session information and information about [my] hardware device.” The half of my heart that cares about privacy sank.