NL Provice of Utrecht buys citizen Facebookprofiles for marketing by offering free WiFi.

The Dutch province Utrecht has signed a deal with City Wireless that allows people free wireless. They can log in with their Facebook profile, which is then harvested for information for marketing purposes. City Wireless has since changed its’ homepage, removing the grizly details, but the Dutch paper still has the screencaps. Article in Dutch. Read more about NL Provice of Utrecht buys citizen Facebookprofiles for marketing by offering free WiFi.[…]

BitHammer – Ban BitTorrent clients

Free up shared wifi spots! Over a year of traveling, I’ve consistently struggled with broken wifi spots overloaded with torrent traffic. After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners. This program: Listens for BitTorrent clients on the network, Adds their IPs and MACs Read more about BitHammer – Ban BitTorrent clients[…]

Banks harvest callers’ voiceprints without their knowledge

A recent AP survey of 10 leading voice biometric vendors found that more than 65 million people worldwide have had their voiceprints taken, and that several banks, including Barclays PLC in Britain and Minneapolis-based U.S. Bancorp, are in the process of introducing their customers to the technology. via Banks harvest callers' voiceprints to fight fraud. Read more about Banks harvest callers’ voiceprints without their knowledge[…]

Hackers own 80% of all South Korean ID data

The South Korean government is considering a complete overhaul of its national identity number computer system – after hackers comprehensively ransacked it and now hold the ID codes for as much as 80 per cent of the population. Each South Korean citizen is issued with a lifetime unique ID number. This number is used in Read more about Hackers own 80% of all South Korean ID data[…]

Open Source Security Testing Methodology Manual (OSSTMM)

Fact does not come from the grand leaps of discovery but rather from the small, careful steps of verification. That is the premise of the Open Source Security Testing Methodology Manual also known as the OSSTMM (pronounced as "awstem") It is a peer-reviewed manual of security testing and analysis which result in verified facts. These Read more about Open Source Security Testing Methodology Manual (OSSTMM)[…]

PrintScreen: print touch screens on anything, including paper

PrintScreen is an enabling technology for digital fabrication of customized flexible displays using thin-film electroluminescence (TFEL). It enables inexpensive and rapid fabrication of highly customized displays in low volume, in a simple lab environment, print shop or even at home. We show how to print ultra-thin (120 um) segmented and passive matrix displays in greyscale Read more about PrintScreen: print touch screens on anything, including paper[…]

Not on a Social Network? You’ve Still Got a Privacy Problem

They found that if Friendster had used certain state-of-the-art prediction algorithms, it could have divined sensitive information about non-members, including their sexual orientation. “At the time, it was possible for Friendster to predict the sexual orientation of people who did not have an account on Friendster,” [….] The problem Garcia identifies lies in something called Read more about Not on a Social Network? You’ve Still Got a Privacy Problem[…]

Adobe spies on readers: EVERY page you turn, EVERY book you own leaked back to base

Adobe’s Digital Editions 4 ebook reader software is collecting detailed information about the reading habits of its users – and sending it back to the company in a format that’s easy for others to slurp. An investigation by Nate Hoffelder of The Digital Reader blog showed that ADE 4 was collecting telemetry on which pages Read more about Adobe spies on readers: EVERY page you turn, EVERY book you own leaked back to base[…]

Using the Windows 10 Technical Preview? Microsoft might be watching your every move to “help with feedback”

Microsoft collects information about you, your devices, applications and networks, and your use of those devices, applications and networks. Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage. This isn’t the only thing Read more about Using the Windows 10 Technical Preview? Microsoft might be watching your every move to “help with feedback”[…]

UK Conservatives want to get rid of pesky EU Human Rights

Conservative policy towards the Human Rights Act has serious consequences for privacy and freedom of expressionAccording to most of the broadsheets, if there is a Conservative Government after the next General Election, the European Court of Human Rights will no longer be able to overrule British courts. via Conservative policy towards the Human Rights Act Read more about UK Conservatives want to get rid of pesky EU Human Rights[…]

fernapp – libreoffice in the browser

Are you looking for an easy way to access Linux desktop applications LibreOffice, Evolution etc remotely?fernapp makes it possible to run a GUI application on a Linux server and access it from anywhere via web browser!It’s not an ordinary remote desktop. It focuses on the application windows and integrates them nicely. via fernapp. In the Read more about fernapp – libreoffice in the browser[…]