Setting the Record Straight: PinePhone Misconceptions

Setting the Record Straight: PinePhone Misconceptions

Let’s start with the Allwinner A64 SoC, which is the brains of the PinePhone; it runs mainline Linux, uses mainline ATF and u-boot and there are open source drivers for all main SoC components.

Trying to get pregnant? Period tracker apps come with privacy concerns

Trying to get pregnant? Period tracker apps come with privacy concerns

That’s the issue raised by a new review of five popular period tracker apps by Consumer Reports' Digital Lab, which tests apps to see how well they protect consumers’ privacy and data.

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.” Its aim is to create a secure communication device whose hardware can be trusted, and which does protect privacy.

Jared Kushner reportedly used WhatsApp to chat with Mohammed bin Salman, who allegedly used the same app to hack Jeff Bezos

Jared Kushner reportedly used WhatsApp to chat with Mohammed bin Salman, who allegedly used the same app to hack Jeff Bezos

New reporting alleges that Saudi Arabian crown prince Mohammed bin Salman hacked Amazon CEO Jeff Bezos‘ phone through WhatsApp. The report raises renewed concern about top White House aide Jared Kushner’s reported WhatsApp communications with bin Salman.

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) dropped plans to let iPhone users fully encrypt backups of their devices in the company’s iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters.

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

Specifically, a product called Graykey was used in a case against Baris Ali Koch to unlock Koch’s iPhone – an iPhone 11 Pro. Graykey works by bypassing the timeout functionality in iOS and allows for brute forcing of the passcode or password.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

How Twitter Misused Personal Phone Numbers for Advertising

How Twitter Misused Personal Phone Numbers for Advertising

This is in no doubt partly due to the nature of the platform – Twitter doesn’t encourage users to upload their entire lives and all associated media to the service in the way that Facebook and others do.

Open Contacts  -  F-Droid - Free and Open Source Android App Repository

Open Contacts - F-Droid - Free and Open Source Android App Repository

read the contents of your shared storage.Allows the app to read the contents of your shared storage.Allows the app to write the contents of your shared storage.Allows the app to access the phone features of the device.

US Government-funded Android phones come preinstalled with unremovable malware

US Government-funded Android phones come preinstalled with unremovable malware

An Android phone subsidized by the US government for low-income users comes preinstalled with malware that can't be removed without making the device cease to work, researchers reported on Thursday.

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

A man walks past Google offices in Beijing in 2014.Photo: Greg Baker/AFP (AP)Microsoft had “no security measures” on a program that had humans transcribe user voice recordings from its Skype video calling service and Cortana assistant, the Guardian reported on Friday, even when those workers were located in China.

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.

United States government-funded phones come pre-installed with unremovable malware

United States government-funded phones come pre-installed with unremovable malware

It’s with great frustration that I must write about yet another unremovable pre-installed malicious app found on the UMX U686CL phone: the mobile device’s own Settings app functions as a heavily-obfuscated malware we detect as Android/Trojan.

FBI asks Apple for phone data from suspected Florida naval base shooter

FBI asks Apple for phone data from suspected Florida naval base shooter

The FBI asked Apple this week to help extract data from iPhones that belonged to the Saudi aviation student who investigators say fatally shot three sailors at a U.S. naval base in Florida last month.

Washington Post Hacked into a Chevy Volt to Show How Much Cars Are Spying on Their Owners

Washington Post Hacked into a Chevy Volt to Show How Much Cars Are Spying on Their Owners

This was proven in a big way by Washington Post tech columnist Geoffrey Fowler (pictured above), who dug into just how much information his test car, a 2017 Chevrolet Volt, is collecting.

Leaked data proves just how much our phones are spying on us

Leaked data proves just how much our phones are spying on us

The investigation was coordinated by the New York Times Privacy Project and used a leak from a location data company, one of many unknown businesses from an under-reported industry dedicated to using electronic data to track every single one of us everywhere we go.

Is your photo album subversive? How border phone checks are intimidating visitors to China

Is your photo album subversive? How border phone checks are intimidating visitors to China

Yet, news reports about Chinese immigration officers conducting phone checks at border checkpoints have recently provoked concerns of privacy and fear among travellers to China.A staff member from Wing On Travel replied that their tours to China were not affected and there was no reported case of a phone check at the border.

Wyze camera data leak: How to secure your account right now

Wyze camera data leak: How to secure your account right now

Passwords and payment information weren't included in the exposed database, but to be proactive and ensure user accounts remained private, Wyze signed everyone out and reset all third-party connections to its services, such as Alexa and Google Assistant.

Trump signs Traced Act into law in bid to help put an end to robocalls

Trump signs Traced Act into law in bid to help put an end to robocalls

In addition to raising penalties and pushing for authentication, the bill also gives regulators like the FCC and the Federal Trade Commission four years to go after scammers, as opposed to the one-year statute of limitations that was previously in place.

What’s the Worst That Could Happen With My Phone Data? Our Journalists Answer Your Questions

What’s the Worst That Could Happen With My Phone Data? Our Journalists Answer Your Questions

We’ve heard this a lot throughout the Privacy Project — even from people we found in the data after we showed up on their doorstep!None of us really has a choice to participate in tracking or not — the system just serves up location data, usually without us noticing.

How to Reclaim Your Privacy

How to Reclaim Your Privacy

Go through all of your apps and turn off location for the ones that don’t need it - or change the setting so they can only get your location while you’re using the app.Don’t let apps access to your Bluetooth unless they really need it.

Wyze allegedly suffers data breach, logs out all users as a safe measure [Updated]

Wyze allegedly suffers data breach, logs out all users as a safe measure [Updated]

As it stands, Wyze Camera users will need to log back into their accounts and generate new 2-factor authentication (2FA) codes.

Opinion | Think Alexa Is Too Creepy For Your Kitchen? Don’t Give It to Aunty Mary.

Opinion | Think Alexa Is Too Creepy For Your Kitchen? Don’t Give It to Aunty Mary.

That investigation, based on a dataset provided by sources alarmed by the unchecked power of the tracking industry, offered a look at more than 50 billion location pings from the phones of more than 12 million Americans across several major cities.

A Twitter app bug was used to match 17 million phone numbers to user accounts

A Twitter app bug was used to match 17 million phone numbers to user accounts

A security researcher said he has matched 17 million phone numbers to user accounts by exploiting a flaw in Twitter’s Android app.He said Twitter’s contact upload feature doesn’t accept lists of phone numbers in sequential format — likely as a way to prevent this kind of matching.

Facebook will stop using 2FA tool to harvest phone numbers for friend suggestions

Facebook will stop using 2FA tool to harvest phone numbers for friend suggestions

Facebook says it will soon stop its practice of using phone numbers provided to the company as part of its two-factor authentication (2FA) security tool to power a friend suggestion feature, Reuters reported on Thursday.

It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool.

It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool.

ToTok is a cleverly designed tool for mass surveillance, according to the technical analysis and interviews, in that it functions much like the myriad other Apple and Android apps that track users’ location and contacts.

Opinion | You Should Be Freaking Out About Privacy

Opinion | You Should Be Freaking Out About Privacy

Like, was it my idea to go to this place for a vacation, or was it Facebook’s idea?” If being tracked by a beer company doesn’t cross the line for you, let’s see how you feel when we take it up a level.

Over 267 million Facebook users had their names, phone numbers, and profiles exposed thanks to a public database, researcher says

Over 267 million Facebook users had their names, phone numbers, and profiles exposed thanks to a public database, researcher says

An online database exposed the names, Facebook IDs, and phone numbers of more than 267 million people, said Bob Diachenko, a data-security researcher, and Comparitech, a tech website.

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

Recently, a security researcher named Bob Diachenko found a database of user account info including their name and phone numbers for 267 million Facebook users.There’s no new information about how users can find out if their data was hacked and if the database is still being shared on hacker forums.

Facebook faces another huge data leak affecting 267 million users

Facebook faces another huge data leak affecting 267 million users

More than 267 million Facebook users’ IDs, phone numbers, and names were exposed to an online database that could potentially be used for spam and phishing campaigns.