China puts continuous consent at the center of data protection law

[…] The new “Personal Information Protection Law of the People’s Republic of China” comes into effect on November 1st, 2021, and comprises eight chapters and 74 articles […] The Cyberspace Administration of China (CAC) said, as translated from Mandarin using automated tools: On the basis of relevant laws, the law further refines and perfects the Read more about China puts continuous consent at the center of data protection law[…]

Sensitive Data On Afghan Allies Collected By The US Military Is Now In The Hands Of The Taliban

The problem with harvesting reams of sensitive data is that it presents a very tempting target for malicious hackers, enemy governments, and other wrongdoers. That hasn’t prevented anyone from collecting and storing all of this data, secure only in the knowledge this security will ultimately be breached. […] The Taliban is getting everything we left Read more about Sensitive Data On Afghan Allies Collected By The US Military Is Now In The Hands Of The Taliban[…]

Distributed Denial of Secrets – the new wikileaks

Distributed Denial of Secrets is a journalist 501(c)(3) non-profit devoted to enabling the free transmission of data in the public interest. We aim to avoid political, corporate or personal leanings, to act as a beacon of available information. As a transparency collective, we don’t support any cause, idea or message beyond ensuring that information is Read more about Distributed Denial of Secrets – the new wikileaks[…]

Apple’s Not Digging Itself Out of This One: scanning your pictures is dangerous and flawed

Online researchers say they have found flaws in Apple’s new child abuse detection tool that could allow bad actors to target iOS users. However, Apple has denied these claims, arguing that it has intentionally built safeguards against such exploitation. It’s just the latest bump in the road for the rollout of the company’s new features, Read more about Apple’s Not Digging Itself Out of This One: scanning your pictures is dangerous and flawed[…]

Your Credit Score Should Be Based On Your Web History, IMF Says

In a new blog post for the International Monetary Fund, four researchers presented their findings from a working paper that examines the current relationship between finance and tech as well as its potential future. Gazing into their crystal ball, the researchers see the possibility of using the data from your browsing, search, and purchase history Read more about Your Credit Score Should Be Based On Your Web History, IMF Says[…]

How to Stop Apple From Scanning Your iPhone Photos Before iOS 15 Arrives – disable photo backups. No alternative offered, sorry.

Photos that are sent in messaging apps like WhatsApp or Telegram aren’t scanned by Apple. Still, if you don’t want Apple to do this scanning at all, your only option is to disable iCloud Photos. To do that, open the “Settings” app on your iPhone or iPad, go to the “Photos” section, and disable the Read more about How to Stop Apple From Scanning Your iPhone Photos Before iOS 15 Arrives – disable photo backups. No alternative offered, sorry.[…]

Zoom to pay $85M for lying about encryption and sending data to Facebook and Google

Zoom has agreed to pay $85 million to settle claims that it lied about offering end-to-end encryption and gave user data to Facebook and Google without the consent of users. The settlement between Zoom and the filers of a class-action lawsuit also covers security problems that led to rampant “Zoombombings.” The proposed settlement would generally give Read more about Zoom to pay $85M for lying about encryption and sending data to Facebook and Google[…]

Game Dev Turns Down $500k Exploitative Contract, explains why – looks like music industry contracts

Receiving a publishing deal from an indie publisher can be a turning point for an independent developer. But when one-man team Jakefriend was approached with an offer to invest half a million Canadian dollars into his hand-drawn action-adventure game Scrabdackle, he discovered the contract’s terms could see him signing himself into a lifetime of debt, Read more about Game Dev Turns Down $500k Exploitative Contract, explains why – looks like music industry contracts[…]

Stop using Zoom, Hamburg’s DPA warns state government – The US does not safeguard EU citizen data

Hamburg’s state government has been formally warned against using Zoom over data protection concerns. The German state’s data protection agency (DPA) took the step of issuing a public warning yesterday, writing in a press release that the Senate Chancellory’s use of the popular videoconferencing tool violates the European Union’s General Data Protection Regulation (GDPR) since Read more about Stop using Zoom, Hamburg’s DPA warns state government – The US does not safeguard EU citizen data[…]

How to Limit Spotify From Tracking You, Because It Knows Too Much – and sells it

Most Spotify users are likely aware the streaming service tracks their listening activity, search history, playlists, and the songs they like or skip—that’s all part of helping the algorithm figure out what you like, right? However, some users may be less OK with how much other data Spotify and its partners are logging. According to Spotify’s Read more about How to Limit Spotify From Tracking You, Because It Knows Too Much – and sells it[…]

Apple’s iPhone computer vision has the potential to preserve privacy but also break it completely

[…] an AI on your phone will scan all those you have sent and will send to iPhotos. It will generate fingerprints that purportedly identify pictures, even if highly modified, that will be checked against fingerprints of known CSAM material. Too many of these – there’s a threshold – and Apple’s systems will let Apple Read more about Apple’s iPhone computer vision has the potential to preserve privacy but also break it completely[…]

Rockstar Begins A War On Modders For ‘GTA’ Games For Totally Unclear Reasons

[…]Rockstar Games has previously had its own run-in with its modding community, banning modders who attempted to shift GTA5’s online gameplay to dedicated servers that would allow mods to be used, since Rockstar’s servers don’t allow mods. What it’s now doing in issuing copyright notices on modders who have been forklifting older Rockstar assets into Read more about Rockstar Begins A War On Modders For ‘GTA’ Games For Totally Unclear Reasons[…]

Senators ask Amazon how it will use palm print data from its stores

If you’re concerned that Amazon might misuse palm print data from its One service, you’re not alone. TechCrunch reports that Senators Amy Klobuchar, Bill Cassidy and Jon Ossoff have sent a letter to new Amazon chief Andy Jassy asking him to explain how the company might expand use of One’s palm print system beyond stores Read more about Senators ask Amazon how it will use palm print data from its stores[…]

The End Of Ownership: How Big Companies Are Trying To Turn Everyone Into Renters

We’ve talked a lot on Techdirt about the end of ownership, and how companies have increasingly been reaching deep into products that you thought you bought to modify them… or even destroy them. Much of this originated in the copyright space, in which modern copyright law (somewhat ridiculously) gave the power to copyright holders to Read more about The End Of Ownership: How Big Companies Are Trying To Turn Everyone Into Renters[…]

Boffins propose Pretty Good Phone Privacy to end pretty invasive location data harvesting by telcos

[…] In “Pretty Good Phone Privacy,” [PDF] a paper scheduled to be presented on Thursday at the Usenix Security Symposium, Schmitt and Barath Raghavan, assistant professor of computer science at the University of Southern California, describe a way to re-engineer the mobile network software stack so that it doesn’t betray the location of mobile network Read more about Boffins propose Pretty Good Phone Privacy to end pretty invasive location data harvesting by telcos[…]

Apple App Store, Google Play Store Targeted by Open App Markets Act

The Open App Markets Act, which is being spearheaded by Sens. Richard Blumenthal, and Marsha Blackburn, is designed to crack down on some of the scummiest tactics tech players use to rule their respective app ecosystems, while giving users the power to download the apps they want, from the app stores they want, without retaliation. Read more about Apple App Store, Google Play Store Targeted by Open App Markets Act[…]

Amazon Drops Policy claiming ownership of Games made by employees After Work Hours

Amazon.com Inc. withdrew a set of staff guidelines that claimed ownership rights to video games made by employees after work hours and dictated how they could distribute them, according to a company email reviewed by Bloomberg. […] The old policies mandated that employees of the games division who were moonlighting on projects would need to Read more about Amazon Drops Policy claiming ownership of Games made by employees After Work Hours[…]

China stops networked vehicle data going offshore under new infosec rules

China has drafted new rules required of its autonomous and networked vehicle builders. Data security is front and centre in the rules, with manufacturers required to store data generated by cars – and describing their drivers – within China. Data is allowed to go offshore, but only after government scrutiny. Manufacturers are also required to Read more about China stops networked vehicle data going offshore under new infosec rules[…]

Have you made sure you have changed these Google Pay privacy settings?

Google Pay is an online paying system and digital wallet that makes it easy to buy anything on your mobile device or with your mobile device. But if you’re concerned about what Google is doing with all your data (which you probably should be), Google doesn’t make it easy for Google Pay has some secret Read more about Have you made sure you have changed these Google Pay privacy settings?[…]

create virtual cards to pay with online with Privacy

Protect your card details and your money by creating virtual cards at each place you spend online, or for each purchase Create single-use cards that close themselves automatically browser extension to create and auto-fill card numbers at checkout Privacy Cards put the control in your hands when you make a purchase online. Business or personal, Read more about create virtual cards to pay with online with Privacy[…]

Post-implementation review of the repeal of section 52 of the CDPA 1988 and associated amendments – Call for views – GOV.UK

The Copyright, Designs and Patents Act 1988 (CDPA) sets the term of protection for works protected copyright. For artistic works, the term of protection is life of the author plus 70 years. For more information on the term of copyright, see our Copyright Notice: Duration of copyright (term) on this subject. Section 52 CDPA previously Read more about Post-implementation review of the repeal of section 52 of the CDPA 1988 and associated amendments – Call for views – GOV.UK[…]

Ancestry.com Gave Itself the Rights to Your Family Photos

The Blackstone-owned genealogy giant Ancestry.com raised a ton of red flags earlier this month with an update to its terms and conditions that give the company a bit more power over your family photos. From here on out, the August 3 update reads, Ancestry can use these pics for any reason, at any time, forever. Read more about Ancestry.com Gave Itself the Rights to Your Family Photos[…]

WhatsApp head says Apple’s child safety update is a ‘surveillance system’

One day after Apple confirmed plans for new software that will allow it to detect images of child abuse on users’ iCloud photos, Facebook’s head of WhatsApp says he is “concerned” by the plans. In a thread on Twitter, Will Cathcart called it an “Apple built and operated surveillance system that could very easily be Read more about WhatsApp head says Apple’s child safety update is a ‘surveillance system’[…]

How Google quietly funds Europe’s leading tech policy institutes

A recent scientific paper proposed that, like Big Tobacco in the Seventies, Big Tech thrives on creating uncertainty around the impacts of its products and business model. One of the ways it does this is by cultivating pockets of friendly academics who can be relied on to echo Big Tech talking points, giving them added Read more about How Google quietly funds Europe’s leading tech policy institutes[…]

Major U.K. science funder to require grantees to make papers immediately free to all

[…] UK Research and Innovation (UKRI), will expand on existing rules covering all research papers produced from its £8 billion in annual funding. About three-quarters of papers recently published from U.K. universities are open access, and UKRI’s current policy gives scholars two routes to comply: Pay journals for “gold” open access, which makes a paper Read more about Major U.K. science funder to require grantees to make papers immediately free to all[…]