Bookmark
Now Apps Can Track You Even After You Uninstall Them
https://www.bloomberg.com/news/articles/2018-10-22/now-apps-can-track-you-even-after-you-uninstall-them, posted 2018 by peter in android apple google mobile privacy
Uninstall tracking exploits a core element of Apple Inc.’s and Google’s mobile operating systems: push notifications. Developers have always been able to use so-called silent push notifications to ping installed apps at regular intervals without alerting the user—to refresh an inbox or social media feed while the app is running in the background, for example. But if the app doesn’t ping the developer back, the app is logged as uninstalled, and the uninstall tracking tools add those changes to the file associated with the given mobile device’s unique advertising ID, details that make it easy to identify just who’s holding the phone and advertise the app to them wherever they go.
The tools violate Apple and Google policies against using silent push notifications to build advertising audiences, says Alex Austin, CEO of Branch Metrics Inc., which makes software for developers but chose not to create an uninstall tracker. “It’s just generally sketchy to track people around the internet after they’ve opted out of using your product,” he says, adding that he expects Apple and Google to crack down on the practice soon. Apple and Google didn’t respond to requests for comment.
Bookmark
Intel x86s hide another CPU that can take over your machine (you can't audit it) / Boing Boing
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html, posted 2016 by peter in crapification hardware privacy security toread
When you purchase your system with a mainboard and Intel x86 CPU, you are also buying this hardware add-on: an extra computer that controls the main CPU. This extra computer runs completely out-of-band with the main x86 CPU meaning that it can function totally independently even when your main CPU is in a low power state like S3 (suspend).
Bookmark
A Government Error Just Revealed Snowden Was the Target in the Lavabit Case | WIRED
www.wired.com/2016/03/government-error-just-revealed-snowden-target-lavabit-case/, posted 2016 by peter in humor law privacy transparency usa
But federal authorities recently screwed up and revealed the secret themselves when they published a cache of case documents but failed to redact one identifying piece of information about the target: his email address, Ed_Snowden@lavabit.com. With that, the very authorities holding the threat of jail time over Levison’s head if he said anything have confirmed what everyone had long ago presumed: that the target account was Snowden’s.
Bookmark
Free Web Analytics Software
https://piwik.org/, posted 2016 by peter in free opensource privacy software statistics webdesign
Piwik is the leading open-source analytics platform that gives you more than just powerful analytics: * Free open-source software * 100% data ownership * User privacy protection * User-centric insights * Customisable and extensible
Bookmark
Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key
https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/, posted 2015 by peter in crapification microsoft privacy security toread transparency
As Green puts it, “Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”
Bookmark
Congress Drops All Pretense: Quietly Turns CISA Into A Full On Surveillance Bill | Techdirt
https://www.techdirt.com/articles/20151215/06470133083/congress-drops-all-pretense-quietly-turns-cisa-into-full-surveillance-bill.shtml, posted 2015 by peter in opinion politics privacy transparency usa
Remember CISA? The "Cybersecurity Information Sharing Act"? It's getting much, much worse, with Congress and the administration looking to ram it through -- in the process, dropping any pretense that it's not a surveillance bill.
Bookmark
Mass Surveillance Isn’t the Answer to Fighting Terrorism - NYTimes.com
mobile.nytimes.com/2015/11/18/opinion/mass-surveillance-isnt-the-answer-to-fighting-terrorism.html?_r=1&referer=, posted 2015 by peter in fascism opinion privacy security terrorism usa war
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low.
Speaking less than three days after coordinated terrorist attacks in Paris killed 129 and injured hundreds more, Mr. Brennan complained about “a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists.”
Bookmark
Firefox will scan your browsing history to suggest advertiser sites
www.digitaltrends.com/computing/firefox-will-scan-your-browsing-history-to-suggest-advertiser-sites/, posted 2015 by peter in advertising firefox privacy
In an attempt to sell advertising space in a user’s new tab page within the Firefox browser, Mozilla is launching a new platform called “Suggested Tiles” specifically for advertisers. Similar to Google using your Web search history to load related advertisements within Google Adsense placements, Mozilla will look through your visited sites within Firefox to suggest an advertiser site to visit and display it on the new tab page.
However, there are user protections built into the new feature as detailed on Mozilla’s Advancing Content blog. Users will be able to flip off the Suggested Tiles function by toggling a check box within the browser’s settings. Users can also completly avoid site suggestions by opting for a blank page when opening up a new tab within Firefox.
Bookmark
Secure Secure Shell
https://stribika.github.io/2015/01/04/secure-secure-shell.html, posted 2015 by peter in communication howto privacy security toread
You may have heard that the NSA can decrypt SSH at least some of the time. If you have not, then read the latest batch of Snowden documents now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.
TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.
|< First < Previous 11–20 (153) Next > Last >|