Releases · xwiki-labs/cryptpad

Releases · xwiki-labs/cryptpad

We identified and fixed a number of issues which caused shared folders that were protected with access lists to fail to load due to race conditions between loading the document and authenticating with the server as a user or member of a team.

Google to restrict Android apps from viewing other apps installed on the same device

Google to restrict Android apps from viewing other apps installed on the same device

After that date, Android app developers won’t be able to upload new apps on the Play Store that target Android 11 (API level 30) or later and which use the “ QUERY_ALL_PACKAGES ” function.

Backblaze Appoints Chief Information Security Officer

Backblaze Appoints Chief Information Security Officer

Backblaze provides businesses and consumers with cloud services to store and use their data in an easy and affordable manner, serving as a foundation for developers, IT professionals, and individuals to back up & archive data, host content, manage media, build their applications, and more.

This AI Uses Your Brain Activity to Create Fake Faces It Knows You’ll Find Attractive

This AI Uses Your Brain Activity to Create Fake Faces It Knows You’ll Find Attractive

Developed by a team from the University of Helsinki and Copenhagen University, the artificially intelligent system was able to generate images of fake faces that it knew particular users would find attractive—because those same users’ brain activity played a part in training the AI.

WhatsApp will eventually delete your account if you don’t accept new privacy policy

WhatsApp will eventually delete your account if you don’t accept new privacy policy

WhatsApp has confirmed that users that don’t accept their controversial new privacy policy will eventually have their accounts deleted.When the privacy policy was first announced, a flurry of users migrated from WhatsApp to other end-to-end encrypted messaging apps such as Signal and Telegram.

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft has developed an artificial intelligence for its Teams videoconferencing software that aims to put people presenting a remote talk more at ease by highlighting the most positive audience reactions.

Can anyone moderate podcasts?

Can anyone moderate podcasts?

It’s reasonable to want Apple to not benefit from clearly harmful voices, but the incident speaks to how unprepared the podcast industry is to moderate: companies face huge challenges in even finding infringing content, and there’s little to no transparency from the big players in how they monitor the listings in their apps.

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

In the paper Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (PDF), the researchers explain how they determine decryption keys for mathematically-secure cryptographic schemes by capturing information about secret values inside the computation taking place in the computer.

Element on Google Play Store

Element on Google Play Store

In order to enforce our terms of use on the Matrix servers we run as Element, we have a formal Trust and Safety team hired full-time who are dedicated to investigating and tracking abuse reports sent to or reported from the app.

The Irrevocable SSL certificates of CloudFlare

The Irrevocable SSL certificates of CloudFlare

The difference is that uses Let’s Encrypt, which would allow me to revoke their SSL certificate for this website.Basically, it is a case of pay CloudFlare $10 per month or they get 100% control over your SSL certificate and will deny your requests to revoke.

Meet Hyper, The World's First Completely Private, Decentralized Instant Messenger

Meet Hyper, The World's First Completely Private, Decentralized Instant Messenger

Elastos, a decentralized internet platform built with the security of Bitcoin's hashpower, today launched the world's first completely private, decentralized messaging app on its network, Hyper IM.The Hyper team said that the app will soon be available on desktop (like WhatsApp web and Telegram), and that file transfer functions for non-text messages.

Nintendo Conducted Invasive Surveillance Operation Against Homebrew Hacker

Nintendo Conducted Invasive Surveillance Operation Against Homebrew Hacker

Leaked Nintendo documents have revealed a frightening surveillance operation carried out against a hacker who was researching exploits for the 3DS handheld.Unfortunately for Nintendo, leaked documents are now revealing how frightening things can get for console hackers in their crosshairs, even when those targets have already declared that their work isn’t designed for piracy purposes.

Privacy matters even if "you have nothing to hide"

Privacy matters even if "you have nothing to hide"

The overwhelming majority of people do not seem to care about privacy.The question about privacy is not about hiding, it is about sharing.Increasingly, Big Tech, the likes of Facebook, Amazon and Microsoft, are sharing more and more information with governments.

'It's a free-for-all': how hi-tech spyware ends up in the hands of Mexico's cartels

'It's a free-for-all': how hi-tech spyware ends up in the hands of Mexico's cartels

An investigation by the Cartel Project can reveal that a 10th Mexican journalist – editor of the country’s foremost investigative magazine – was targeted with the “Pegasus” spyware sold by the Israeli company NSO Group, according to technical analysis by Amnesty International.

Eyes in the sky

Eyes in the sky

Kumar and his team are in the Integrated Command and Control Center (ICCC) overlooking operations for this year’s Magh Mela, an annual Hindu pilgrimage and festival that draws millions of people in a single day.

Tesla Hacked and Stolen Again Using Key Fob

Tesla Hacked and Stolen Again Using Key Fob

The key fob for the Model X key uses Bluetooth Low Energy (BLE) to interface with a smartphone app to allow for keyless entry, which is where the vulnerabilities lie, researchers said in a press release published online about the hack.

Facebook Is Going After Its Critics in the Name of Privacy

Facebook Is Going After Its Critics in the Name of Privacy

Facebook has threatened legal action against the Ad Observatory team, claiming that the Ad Observer plug-in violates its terms of service.Even more of a stretch: Facebook's claims that it is only acting to protect its users' privacy.

Russia blocks mailbox.org again

Russia blocks mailbox.org again

I'm not quite sure whether you are aware or not, but Russian authorities put IPs and hostnames in the country-wide block list (22-Sep-2020).2) Unofficial web-site with aggregated data about blocked IPs and hostnames.

Surveillance company harassed female employees using its own facial recognition technology

Surveillance company harassed female employees using its own facial recognition technology

After the Slack incident was reported to HR, Verkada CEO Filip Kaliszan gave employees in the Slack channel a choice: leave the company or have their stock options reduced.

CDO Question to Ask About Data Protection

CDO Question to Ask About Data Protection

Unless you know what data your organization holds, you can’t track and protect it.Mapping how data is transferred from one system to another helps you understand how personal data moves inside your organization and identify critical privacy compliance issues such as cross-border transfers.

Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

Sales Calls Have Gone Virtual, and AI Is Listening In

Sales Calls Have Gone Virtual, and AI Is Listening In

Some companies are making the most of this shift by using tools powered by artificial intelligence to track and analyze their salesforce’s virtual pitches.“You definitely miss the lunch, the dinner, the happy hour,” says Jeramee Waldum, vice president of global sales at MavenLink, a maker of project management software whose dozens of once-traveling salespeople are now stuck behind webcams.

The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland

The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland

An official familiar with the Portland operation said the email was facetious in intent and maintained that there was no difference between the legal authorities governing the Fly Team and those that applied to local agents.

What Facebook Did to American Democracy

What Facebook Did to American Democracy

The Trump campaign was working to suppress “idealistic white liberals, young women, and African Americans,” and they’d be doing it with targeted, “dark” Facebook ads.“I wouldn’t have come aboard, even for Trump, if I hadn’t known they were building this massive Facebook and data engine,” Bannon told them.

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four former eBay employees will plead guilty to carrying out a targeted cyberstalking campaign against bloggers critical of the e-commerce giant, prosecutors said Wednesday, including sending items such as a bloody pig mask and a box of live cockroaches to a suburban Boston couple.

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

“The data collected about individuals and institutions and the overlaid analytic tools from social media platforms provide China enormous benefit in opinion formation, targeting, and messaging.”.

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Updated: January 5, 2019 — Additional testing was performed against Skype that revealed that URL previews were still working.Slack was happy to generate URL previews and identified itself with the following User-Agent:.

Web browsing histories are private personal data - now what

Web browsing histories are private personal data - now what

In 2009-2011 we did some research work motivated with a positive aim of educating web users about certain risks of browsing history leaks.The authors replicated also the theoretical potential for third-party resource providers (i.e. trackers) to reidentify users based on web browsing history fingerprints.

Ex-Uber chief security officer charged, accused of covering up theft of personal info from databases by hackers

Ex-Uber chief security officer charged, accused of covering up theft of personal info from databases by hackers

As Uber's chief security officer, Joe Sullivan broke the law by hushing up the theft of millions of people's details from the app maker's databases by hackers, prosecutors say.

Fawkes tool protects your image from being identified by facial recognition software

Fawkes tool protects your image from being identified by facial recognition software

Try out Fawkes the new pixel blurring tool to avoid artificial intelligence and deep learning facial recognition software.The researcher have noted that during experiments, Fawkes provided high levels of protection against facial recognition models, the team said, regardless of how the models were trained.