Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police
https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police, posted Sep '22 by peter in law mobile privacy transparency usa
In materials provided to law enforcement, Fog states that it has access to a “near real-time” database of billions of geolocation signals derived from smartphones. It sells subscriptions to a service, which the company usually billed as “Fog Reveal,” that lets law enforcement look up location data in its database through a website. The smartphone signals in Fog’s database include latitude, longitude, timestamp, and a device ID. The company can access historical data reaching back to at least June 2017.
Australia is becoming a surveillance state
https://ia.acs.org.au/article/2021/australia-is-becoming-a-surveillance-state.html, posted Aug '21 by peter in fascism law opinion politics privacy terrorism toread
The government's approach to technological surveillance is leading us down a dark path, experts warn, as it prepares to give law enforcement agencies new hacking powers.
Currently before parliament's Intelligence and Security Committee, the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 is the government's latest attempt to gain a watchful eye over cyber space.
Once the bill passes, it will dish out extra power to the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC), giving the agencies access to new warrants that will let them modify and delete data, collect intelligence from online communities, and even take over the online accounts of supposed criminals.
I want a Computer that I Own
misc-stuff.terraaeon.com/articles/computer-i-own.html, posted 2021 by peter in crapification opensource opinion privacy
Instead, I have a computer that is designed largely to maximize the profits of the computer industry. Except for a handful of very over-priced models that I can't afford to buy, our computers are increasingly designed to be little more than advertising platforms and vehicles for maximizing the cloud revenues of their true owners: online data gatherers, advertisers, and cloud companies. Our computers have numerous hardware and software back doors that are designed to allow governments and corporations to spy on and track us around the Internet.
Privacy Tools - Encryption Against Global Mass Surveillance
https://www.privacytools.io/, posted 2019 by peter in free list privacy security software
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
WhatsApp voice calls used to inject Israeli spyware on phones | Financial Times
archive.is/kDz13#selection-1922.0-1956.1, posted 2019 by peter in android apple fascism messaging mobile privacy security
WhatsApp, which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function.
The malicious code, developed by the secretive Israeli company NSO Group, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs, said the spyware dealer, who was recently briefed on the WhatsApp hack.
NSO’s flagship product is Pegasus, a program that can turn on a phone’s microphone and camera, trawl through emails and messages and collect location data.
NSO advertises its products to Middle Eastern and Western intelligence agencies, and says Pegasus is intended for governments to fight terrorism and crime.
But mostly to spy on people said governments don't particularly like, of course.
Study Again Finds That Most VPNs Are Shady As Hell | Techdirt
https://www.techdirt.com/articles/20190122/10263541441/study-again-finds-that-most-vpns-are-shady-as-hell.shtml, posted 2019 by peter in communication crapification privacy
Top10VPN, for example, recently took a closer look at 150 VPN apps being offered in the Android marketplace and found that 90% of them violated consumer privacy in some fashion, either by the inclusion of DNS leaks, a failure to adequately secure and store user data, or by embedding malware:
"Simon Migliano, the head of this research, reports that at over 38 VPN apps tested positive for DNS leaks, exposing private data to hundreds of insecure links. Also, over 27 VPN apps were flagged as potential sources of malware when tested by VirusTotal.
Apart from this, the research also found intrusive permissions in over 99 apps. These permissions included user location, device information, use of the microphone, camera access and more."
Cops hate encryption but the NSA loves it when you use PGP â€¢ The Register
https://www.theregister.co.uk/2016/01/27/nsa_loves_it_when_you_use_pgp/, posted 2018 by peter in communication email privacy security
"To be honest, the spooks love PGP," Nicholas Weaver, a researcher at the International Computer Science Institute, told the Usenix Enigma conference in San Francisco on Wednesdy. "It's really chatty and it gives them a lot of metadata and communication records. PGP is the NSA's friend."
Now Apps Can Track You Even After You Uninstall Them
https://www.bloomberg.com/news/articles/2018-10-22/now-apps-can-track-you-even-after-you-uninstall-them, posted 2018 by peter in android apple google mobile privacy
Uninstall tracking exploits a core element of Apple Inc.’s and Google’s mobile operating systems: push notifications. Developers have always been able to use so-called silent push notifications to ping installed apps at regular intervals without alerting the user—to refresh an inbox or social media feed while the app is running in the background, for example. But if the app doesn’t ping the developer back, the app is logged as uninstalled, and the uninstall tracking tools add those changes to the file associated with the given mobile device’s unique advertising ID, details that make it easy to identify just who’s holding the phone and advertise the app to them wherever they go.
The tools violate Apple and Google policies against using silent push notifications to build advertising audiences, says Alex Austin, CEO of Branch Metrics Inc., which makes software for developers but chose not to create an uninstall tracker. “It’s just generally sketchy to track people around the internet after they’ve opted out of using your product,” he says, adding that he expects Apple and Google to crack down on the practice soon. Apple and Google didn’t respond to requests for comment.
Intel x86s hide another CPU that can take over your machine (you can't audit it) / Boing Boing
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html, posted 2016 by peter in crapification hardware privacy security toread
When you purchase your system with a mainboard and Intel x86 CPU, you are also buying this hardware add-on: an extra computer that controls the main CPU. This extra computer runs completely out-of-band with the main x86 CPU meaning that it can function totally independently even when your main CPU is in a low power state like S3 (suspend).
A Government Error Just Revealed Snowden Was the Target in the Lavabit Case | WIRED
www.wired.com/2016/03/government-error-just-revealed-snowden-target-lavabit-case/, posted 2016 by peter in humor law privacy transparency usa
But federal authorities recently screwed up and revealed the secret themselves when they published a cache of case documents but failed to redact one identifying piece of information about the target: his email address, Ed_Snowden@lavabit.com. With that, the very authorities holding the threat of jail time over Levison’s head if he said anything have confirmed what everyone had long ago presumed: that the target account was Snowden’s.