Is Microsoft Stealing People’s Bookmarks, passwords, ID / passport numbers without consent?

received email from two people who told me that Microsoft Edge enabled synching without warning or consent, which means that Microsoft sucked up all of their bookmarks. Of course they can turn synching off, but it’s too late.

Has this happened to anyone else, or was this user error of some sort? If this is real, can some reporter write about it?

(Not that “user error” is a good justification. Any system where making a simple mistake means that you’ve forever lost your privacy isn’t a good one. We see this same situation with sharing contact lists with apps on smartphones. Apps will repeatedly ask, and only need you to accidentally click “okay” once.)

EDITED TO ADD: It’s actually worse than I thought. Edge urges users to store passwords, ID numbers, and even passport numbers, all of which get uploaded to Microsoft by default when synch is enabled.

Source: Is Microsoft Stealing People’s Bookmarks? – Schneier on Security

Suicide Hotline Collected, Monetized The Data Of Desperate People, Because Of Course It Did

Crisis Text Line, one of the nation’s largest nonprofit support options for the suicidal, is in some hot water. A Politico report last week highlighted how the company has been caught collecting and monetizing the data of callers… to create and market customer service software. More specifically, Crisis Text Line says it “anonymizes” some user and interaction data (ranging from the frequency certain words are used, to the type of distress users are experiencing) and sells it to a for-profit partner named Loris.ai. Crisis Text Line has a minority stake in Loris.ai, and gets a cut of their revenues in exchange.

As we’ve seen in countless privacy scandals before this one, the idea that this data is “anonymized” is once again held up as some kind of get out of jail free card:

“Crisis Text Line says any data it shares with that company, Loris.ai, has been wholly “anonymized,” stripped of any details that could be used to identify people who contacted the helpline in distress. Both entities say their goal is to improve the world — in Loris’ case, by making “customer support more human, empathetic, and scalable.”

But as we’ve noted more times than I can count, “anonymized” is effectively a meaningless term in the privacy realm. Study after study after study has shown that it’s relatively trivial to identify a user’s “anonymized” footprint when that data is combined with a variety of other datasets. For a long time the press couldn’t be bothered to point this out, something that’s thankfully starting to change.

[…]

Source: Suicide Hotline Collected, Monetized The Data Of Desperate People, Because Of Course It Did | Techdirt

Google adds new opt out tracking for Workspace Customers

[…]

according to a new FAQ posted on Google’s Workplace administrator forum. At the end of that month, the company will be adding a new feature—“Workspace search history”—that can continue to track these customers, even if they, or their admins, turn activity tracking off.

The worst part? Unlike Google’s activity trackers that are politely defaulted to “off” for all users, this new Workplace-specific feature will be defaulted to “on,” across Workspace apps like Gmail, Google Drive, Google Meet, and more.

[…]

Luckily, they can turn this option off if they want to, the same way they could turn off activity settings until now. According to Google, the option to do so will be right on the “My Activity” page once the feature goes live, right alongside the current options to flip off Google’s ability to keep tabs on their web activity, location history, and YouTube history. On this page, Google says the option to turn off Workspace history will be located on the far lefthand side, under the “Other Google Activity” tab.

[…]

Source: Google Makes Opting Out Harder for Workspace Customers

LG Announces New Ad Targeting Features for TVs – wait, wtf, I bought my TV, not a service!

[… ]

there are plenty of cases where you throw down hundreds of dollars for a piece of hardware and then you end up being the product anyway. Case in point: TVs.

On Wednesday, the television giant LG announced a new offering to advertisers that promises to be able to reach the company’s millions of connected devices in households across the country, pummeling TV viewers with—you guessed it—targeted ads. While ads playing on your connected TV might not be anything new, some of the metrics the company plans to hand over to advertisers include targeting viewers by specific demographics, for example, or being able to tie a TV ad view to someone’s in-store purchase down the line.

If you swap out a TV screen for a computer screen, the kind of microtargeting that LG’s offering doesn’t sound any different than what a company like Facebook or Google would offer. That’s kind of the point.

[…]

Aside from being an eyesore that literally no TV user wants, these ads come bundled with their own privacy issues, too. While the kinds of invasive tracking and targeting that regularly happens with the ads on your Facebook feed or Google search results are built off of more than a decade’s worth of infrastructure, those in the connected television (or so-called “CTV”) space are clearly catching up, and catching up fast. Aside from what LG’s offering, there are other players in adtech right now that offer ways to connect your in-app activity to what you watch on TV, or the billboards you walk by with what you watch on TV. For whatever reason, this sort of tech largely sidesteps the kinds of privacy snafus that regulators are trying to wrap their heads around right now—regulations like CPRA and GDPR are largely designed to handle your data is handled on the web, not on TV.

[…]

The good news is that you have some sort of refuge from this ad-ridden hell, though it does take a few extra steps. If you own a smart TV, you can simply not connect it to the internet and use another device—an ad-free set-top box like an Apple TV, for instance—to access apps. Sure, a smart TV is dead simple to use, but the privacy trade-offs might wind up being too great.

Source: LG Announces New Ad Targeting Features for TVs

How normal am I? – Let an AI judge you

This is an art project by Tijmen Schep that shows how face detection algoritms are increasingly used to judge you. It was made as part of the European Union’s Sherpa research program.

No personal data is sent to our server in any way. Nothing. Zilch. Nada. All the face detection algorithms will run on your own computer, in the browser.

In this ‘test’ your face is compared with that of all the other people who came before you. At the end of the show you can, if you want to, share some anonimized data. That will then be used to re-calculate the new average. That anonymous data is not shared any further.

Source: How normal am I?

How to Download Everything Amazon Knows About You (It’s a Lot)

[…]To be clear, data collection is far from an Amazon-specific problem; it’s pretty much par for the course when it comes to tech companies. Even Apple, a company vocal about user privacy, has faced criticism in the past for recording Siri interactions and sharing them with third-party contractors.

The issue with Amazon, however, is the extent to which they collect and archive your data. Just about everything you do on, with, and around an Amazon product or service is logged and recorded. Sure, you might not be surprised to learn that when you visit Amazon’s website, the company logs your browsing history and shopping data. But it goes far beyond that. Since Amazon owns Whole Foods, it also saves your shopping history there. When you watch video content through its platforms, it records all of that information, too.

Things get even creepier with other Amazon products. If you read books on a Kindle, Amazon records your reading activity, including the speed of your page turns (I wonder if Bezos prefers a slow or fast page flip); if you peered into your Amazon data, you might find something similar to what a Reuter’s reporter found: On Aug. 8 2020, someone on that account read The Mitchell Sisters: A Complete Romance Series from 4:52 p.m. through 7:36 p.m., completing 428 pages. (Nice sprint.)

If you have one of Amazon’s smart speakers, you’re on the record with everything you’ve ever uttered to the device: When you ask Alexa a question or give it a command, Amazon saves the audio files for the entire interaction. If you know how to access you data, you can listen to every one of those audio files, and relive moments you may or may not have realized were recorded.

Another Reuters reporter found Amazon saved over 90,000 recordings over a three-and-a-half-year period, which included the reporter’s children asking Alexa questions, recordings of those same children apologizing to their parents, and, in some cases, extended conversations that were outside the scope of a reasonable Alexa query.

Unfortunately, while you can access this data, Amazon doesn’t make it possible to delete much of it. You can tweak your privacy settings you stop your devices from recording quite as much information. However, once logged, the main strategy to delete it is to delete the entire account it is associated with. But even if you can’t delete the data while sticking with your account, you do have a right to see what data Amazon has on you, and it’s simple to request.

How to download all of your Amazon data

To start, , or go to Amazon’s Help page. You’ll find the link under Security and Privacy > More in Security & Privacy > Privacy > How Do I Request My Data? Once there, click the “Request My Data” link.

From the dropdown menu, choose the data you want from Amazon. If you want everything, choose “Request All Your Data.” Hit “Submit Request,” then click the validation link in your email. That’s it. Amazon makes it easy to see what the have on you, probably because they know you can’t do anything about it.

[Reuters]

Source: How to Download Everything Amazon Knows About You (It’s a Lot)

The IEA wants to make their data available to the public – now it is on governments of the world’s rich countries to make this happen

To tackle climate change we need good data. This data exists; it is published by the International Energy Agency (IEA). But despite being an institution that is largely publicly funded, most IEA data is locked behind paywalls.

[…]

In 2020 we launched a campaign to unlock this data; we started on Twitter (one example), last year we wrote a detailed article about the problem here on OWID, and our letter in Nature.

[…]

The IEA has just announced that it aims to make all of its data and analysis freely available and open-access. This was put forward by the IEA’s executive director, Fatih Birol, and has been approved by its governing board already.

There is one step left. Next month – on February 2nd and 3rd – the IEA will ask for approval from its member countries. That means it is on the governments of the world’s rich countries to make this happen. If they do not approve it, it would be a missed opportunity to accelerate our action on addressing climate change.

This would be a massive achievement. The benefits of closing the small funding gap that remains greatly outweigh the costs.

There is now large support for the IEA data to be freely available – from researchers to journalists; policymakers to innovators. Many have called for the IEA data to be public.  Many thanks to everyone who has joined in pushing this forwards – below we share the links to several articles, petitions, and open letters that have made this possible.

Open letter to the International Energy Agency and its member countries: please remove paywalls from global energy data and add appropriate open licenses – by Robbie Morrison, Malte Schaefer and the OpenMod community

Energy watchdog urged to give free access to government data – Jillian Ambrose, in The Guardian

Opening up energy data is critical to battling climate change – Christa Hasenkopf, in Devex

Researchers are excited by ‘tantalising’ prospect of open IEA energy data – Joe Lo, in Climate Home

Open petition letter: Free IEA Data – A site by Skander Garroum and Christoph Proeschel on which you can write a letter to your country’s government.

[…]

Source: The IEA wants to make their data available to the public – now it is on governments of the world’s rich countries to make this happen – Our World in Data

Totally Bogus DMCA Takedowns From Giant Publishers Completely Nuke Book Review Blog Off The Internet

Just as we’re in the midst of a Greenhouse series all about SOPA, copyright industry lobbyists, and former copyright industry lawyers now running the Copyright Office are conspiring to make copyright law worse and to favor Hollywood and give the big giant legacy copyright companies more control and power over the internet.

And, yet, we pay almost no attention to how they massively abuse the power they already have under copyright law to silence people. The latest example is the book review blog, Fantasy Book Critic. I’d link to it, but as I’m writing this all you now see is a message that says “Sorry, the blog at fantasybookcritic.blogspot.com has been removed.”

Why? Because two of the largest publishing companies in the world, Penguin Random House and HarperCollins, hired a ridiculously incompetent service provider called “Link-Busters” which specializes in bullshit automated DMCA takedowns for the publishing industry. Link-Busters’ website looks like basically all of these sketchy, unreliable services, promising to “protect IP” and (even more ridiculously) “turn piracy into profits.”

[…]

On Monday, Link-Busters, on behalf of Penguin Random House and HarperCollins sent over 50 bullshit takedown notices to Google, claiming that various reviews on Fantasy Book Critic were actually infringing copies of the books they were reviewing. Each notice listed many, many blog posts on the site. This is just a small sample of four such notices.

The actual notices do contain some links to websites that appear to have pirated copies of some books available, but also lots of links to Fantasy Book Critic’s reviews. The whole thing just seems incredibly sloppy by Link-Busters. Some of the “allegedly infringing” books in some of these notices didn’t even include links to allegedly infringing pages.

And then some show the only allegedly “infringing” links being… Fantasy Book Critic’s reviews:

That link, which again, does not exist any more, can be seen on the Internet Archive where you see that not only is it clearly a review, and not piracy, but it directly links visitors to places where they can buy the book.

[…]

the real problem here is that there are no consequences whatsoever for Link-Busters or Penguin Random House or HarperCollins. While the DMCA has Section 512(f), which is supposed to punish false notifiers, in practice it is a dead letter. This means, Link-Busters can spam Google with wild abandon with blatantly false DMCA notices and face zero consequences. But, more importantly, publishing giants like Penguin Random House and HarperCollins (which are currently suing libraries for offering lendable ebooks), can get away with this abuse of the law over and over again.

Fantasy Book Critic was reduced to begging on Twitter for Google to look more closely at Link-Busters bogus notifications and to restore their blog. They even contacted Link-Busters which admitted that they fucked up (though, perhaps they should have checked before sending these bogus notices?)

[…]

Source: Totally Bogus DMCA Takedowns From Giant Publishers Completely Nuke Book Review Blog Off The Internet | Techdirt

WhatsApp Ordered To Help US Agents Spy On Chinese Phones using 1986 pen register act

U.S. federal agencies have been using a 35-year-old American surveillance law to secretly track WhatsApp users with no explanation as to why and without knowing whom they are targeting. In Ohio, a just-unsealed government surveillance application reveals that in November 2021, DEA investigators demanded the Facebook-owned messaging company track seven users based in China and Macau. The application reveals the DEA didn’t know the identities of any of the targets, but told WhatsApp to monitor the IP addresses and numbers with which the targeted users were communicating, as well as when and how they were using the app. Such surveillance is done using a technology known as a pen register and under the 1986 Pen Register Act, and doesn’t seek any message content, which WhatsApp couldn’t provide anyway, as it is end-to-end encrypted.

As Forbes previously reported, over at least the last two years, law enforcement in the U.S. has repeatedly ordered WhatsApp and other tech companies to install these pen registers without showing any probable cause. As in those previous cases, the government order to trace Chinese users came with the statement that the Justice Department only needed to provide three “elements” to justify tracking of WhatsApp users. They include: the identity of the attorney or the law enforcement officer making the application; the identity of the agency making the application; and a certification from the applicant that “the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency.” “Other than the three elements described above, federal law does not require that an application for an order authorizing the installation and use of a pen register and a trap and trace device specify any facts,” the government wrote in the latest application.

Source: WhatsApp Ordered To Help US Agents Spy On Chinese Phones – Slashdot

Canon can’t get enough toner chips, so it’s telling customers how to defeat its DRM

[.,..]To enforce the use of first-party cartridges, manufacturers typically embed chips inside the consumables for the printers to “authenticate.” But when chips are in short supply, like today, manufacturers can find themselves in a bind. So Canon is now telling German customers how to defeat its printers’ warnings about third-party cartridges.

“Due to the worldwide continuing shortage of semiconductor components, Canon is currently facing challenges in procuring certain electronic components that are used in our consumables for our multifunction printers (MFP),” a Canon support website says in German. “In order to ensure a continuous and reliable supply of consumables, we have decided to supply consumables without a semiconductor component until the normal supply takes place again.”

[…]

The software on these printers comes with a relatively simple way to defeat the chip checks. Depending on the model, when an error message occurs after inserting toner, users can press either “I Agree,” “Close,” or “OK.” When users press that button, the world does not end. Rather, Canon says users may find that their toner cartridge doesn’t give them a low-toner warning before running empty.

“Although there are no negative effects on print quality when consumables are used without electronic components, certain additional functions, such as the detection of the toner level, may be impaired,” Canon’s support site says.

Source: Canon can’t get enough toner chips, so it’s telling customers how to defeat its DRM | Ars Technica

Facebook Pixel Hunt – Mozilla Rally want to track the trackers

In a collaboration between journalists at The Markup and Mozilla researchers, this study seeks to map Facebook’s pixel tracking network and understand the kinds of information it collects on sites across the web. The Markup will use the data collected in this study to create investigative journalism around the kinds of information Facebook collects about you, and where.

The study will run until July 13, 2022.

Goals of the Study

According to its own privacy policy, Facebook may collect information about you across the web even if you don’t have a Facebook account. One way Facebook performs this tracking is through a network of “pixels” that may be installed on many of the sites you visit. By joining this study, you will help Rally and The Markup investigate and report on where Facebook is tracking you and what kind of information they are collecting.

This Study Will Collect:

This Study will Collect:

  • The data sent to Facebook pixels as you browse
  • The URLs of the web pages you browse
  • The time you spend browsing pages
  • The presence of Facebook login cookies in your browser
  • A study survey that the user completes
  • Metadata on the URLs your visit:
    • The full URL of each webpage that you are on
    • Time spent browsing and playing media on each webpage
    • How far down the webpage you scrolled

In addition, your Rally demographics survey responses will be combined with study data for the analysis.

Note: Only deidentified metrics and models will be exported from our secure environment. For additional information about our data collection, view our metrics definition file in our open source codebase.

Source: Facebook Pixel Hunt

John Deere Hit With Class Action Lawsuit for Alleged Tractor Repair Monopoly

A class action lawsuit filed in Chicago has accused John Deere of running an illegal repair monopoly. The lawsuit alleged that John Deere has used software locks and restricted access to repair documentation and tools, making it very difficult for farmers to fix their own agricultural equipment, a problem that Motherboard has documented for years and that lawmakers, the FTC, and even the Biden administration have acknowledged.

[…]

The situation is so bad that it’s created a boom in the secondary market. Used tractors are selling for hundreds of thousands of dollars, in part, because they’re easier to repair than modern machines.

Forest River Farms, a farming corporation in North Dakota, filed the recent antitrust lawsuit against John Deere, alleging that “Deere’s network of highly-consolidated independent dealerships is not permitted through their agreements with Deere to provide farmers or repair shops with access to the same software and repair tools the Dealerships have.”

[…]

Last year, President Biden signed an executive order aimed at making it easier for everyone to fix their own stuff. He also directed the FTC to formally adopt a pro right-to-repair platform. Legislation has been introduced in congress that would enshrine the right-to-repair and similar laws are working their way through various statehouses across the country. Microsoft’s shareholders have pressed the company to do more for repair and even Apple is backing away from its monopolistic repair practices.

[…]

Source: John Deere Hit With Class Action Lawsuit for Alleged Tractor Repair Monopoly

German IT security watchdog: No evidence of censorship function in Xiaomi phones

Germany’s federal cybersecurity watchdog, the BSI, did not find any evidence of censorship functions in mobile phones manufactured by China’s Xiaomi Corp (1810.HK), a spokesperson said on Thursday.

Lithuania’s state cybersecurity body had said in September that Xiaomi phones had a built-in ability to detect and censor terms such as “Free Tibet”, “Long live Taiwan independence” or “democracy movement”. The BSI started an examination following these accusations, which lasted several months. read more

“As a result, the BSI was unable to identify any anomalies that would require further investigation or other measures,” the BSI spokesperson said.

Source: German IT security watchdog: No evidence of censorship function in Xiaomi phones | Reuters

Google’s and Facebook’s top execs accused of fixing ads

The alleged 2017 deal between Google and Facebook to kill header bidding, a way for multiple ad exchanges to compete fairly in automated ad auctions, was negotiated by Facebook COO Sheryl Sandberg, and endorsed by both Facebook CEO Mark Zuckerberg (now with Meta) and Google CEO Sundar Pichai, according to an updated complaint filed in the Texas-led antitrust lawsuit against Google.

Texas, 14 other US states, and the Commonwealths of Kentucky and Puerto Rico accused Google of unlawfully monopolizing the online ad market and rigging ad auctions in a December, 2020, lawsuit. The plaintiffs subsequently filed an amendment complaint in October, 2021, that includes details previously redacted.

On Friday, Texas et al. filed a third amended complaint [PDF] that fills in more blanks and expands the allegations by 69 more pages.

The fortified filing adds additional information about previous revelations and extends the scope of concern to cover in-app advertising in greater detail.

Presently, there are three other US government-backed unfair competition claims against Google ongoing: a federal antitrust lawsuit from the US Justice Department, a challenge from Colorado and 38 other State Attorneys General (filed around the same time as the Texas-led complaint), as well as a competition claim focused on Android and the Google Play Store filed last July.

The third amendment complaint delves into more detail about how Google allegedly worked “to kill header bidding,”

[]…]

The deal, referred to as “Jedi Blue” internally and eventually as “Open Bidding” when discussed publicly, allegedly allowed Facebook to win ad auctions even when outbid by competitors.

The third amended complaint explains, “Facebook’s Chief Operating Officer [REDACTED] was explicit that ‘[t]his is a big deal strategically’ in an email thread that included Facebook CEO [REDACTED].

[…]

The expanded filing includes new allegations about how Google used Accelerated Mobile Pages to hinder header bidding.

Google first created Accelerated Mobile Pages (“AMP”), a framework for developing mobile webpages, and made AMP compatible with Google’s ad server but substantially hindered compatibility with header bidding. Specifically, Google made AMP unable to execute JavaScript in the header, which frustrated publishers’ use of header bidding.

[…]

What’s more, the revised filing adds support for the claim that a Google ad program called Dynamic Revenue Share or DRS cheated to help Google win more valuable ad impressions.

“DRS manipulated Google’s exchange fee after soliciting bids in the auction and after peeking at rival exchanges’ bids to win impressions it would have otherwise lost,” the revised complaint says.

And the complaint now contends that Google personnel admitted the unfairness of the DRS system: “Google internally acknowledged that DRS made its auction untruthful: ‘One known issue with the current DRS is that it makes the auction untruthful as we determine the AdX revshare after seeing buyers’ bids and use winner’s bid to price itself (first-pricing)….'”

[…]

Source: Google’s and Facebook’s top execs accused of fixing ads • The Register

Google and Facebook Fined Big in Russia for Failing to Remove Banned Content – imprisonment threats follow forcing local data storage

A Russian court fined Alphabet Inc.’s Google 7.2 billion rubles ($98 million) and Meta Platforms Inc. 2 billion rubles Friday for failing to remove banned content, the largest such penalties yet, as the authorities escalate a crackdown on foreign technology companies.

The fines were due to the companies’ repeated failure to comply with orders to take down content and based on a percentage of their annual earnings in Russia, the federal communications watchdog said in a statement. Google and Meta could face more fines if they don’t remove the material, it said.

[…]

The government is also pushing tech companies to comply with its increasingly strict laws on localizing data storage. This year, Google and Apple Inc. removed a protest-voting app from their Russian stores during parliamentary elections after the authorities threatened to imprison their local staff.

Until the latest rulings, however, fines for failure to remove content were generally insignificant. In September, Russia’s federal communications watchdog said companies that did not delete content could face fines of 5% to 20% of their annual local revenue.

Google earned revenues in Russia of about 85 billion rubles in 2020, according to the Spark-Interfax database.

“For some reason, the company fulfills decisions of American and European courts unquestioningly,” Anton Gorelkin, a ruling party deputy in the lower house of parliament who sits on the Information Policy committee, wrote on Telegram after the Google ruling was announced Friday. “If the turnover fine doesn’t bring Google to its senses, I’m afraid that some very unpleasant measures will be taken.”

[…]

Source: Google in Russia Fined $98 Million for Failing to Remove Banned Content – Bloomberg

Snap suing to trademark the word “spectacles” for its smart glasses that no one has ever used or knows much about

Snap is suing the US Patent and Trademark Office (USPTO) for rejecting its application to trademark the word “spectacles” for its digital eyewear camera device. But the USPTO has maintained that “spectacles” is a generic term for smart glasses and that Snap’s version “has not acquired distinctiveness,” as required for a trademark.

In its complaint filed Wednesday in US District Court in California, Snap claims that the Spectacles name “evokes an incongruity between an 18th century term for corrective eyewear and Snap’s high-tech 21st century smart glasses. SPECTACLES also is suggestive of the camera’s purpose, to capture and share unusual, notable, or entertaining scenes (i.e., “spectacles”) and while also encouraging users to make ‘spectacles’ of themselves.”

Snap first introduced its camera-equipped Spectacles in 2016 (“a wearable digital video camera housed in a pair of fashionable sunglasses,” according to its complaint), which can take photos and videos while the user wears them and connects with the Snap smartphone app. Despite selling them both online and in pop-up vending machines around the world, the first iteration of Spectacles mostly flopped with consumers. In its 2017 third-quarter earnings report, Snap said it had lost nearly $40 million on some 300,000 unsold Spectacles.

In May 2021, Snap CEO Evan Spiegel showed off an augmented reality version of the Spectacles, which so far are available only to a small group of creators and reviewers chosen by the company. The AR Spectacles aren’t yet available for purchase by the general public.

Snap’s new complaint posits that there’s been enough media coverage of Spectacles, bolstered by some industry awards and its own marketing including social media, to support its claim that consumers associate the word “spectacles” with the Snap brand. Snap first filed a trademark application for Spectacles in September 2016, “for use in connection with wearable computer hardware” and other related uses “among consumer electronics devices and displays.”

During several rounds of back-and-forth with the company since then, the USPTO has maintained that the word “spectacles” appeared to be “generic in connection with the identified goods,” i.e. the camera glasses. Snap continued to appeal the agency’s decision.

In a November 2021 opinion, the USPTO’s Trademark Trial and Appeal Board (pdf) upheld the decision, reiterating that the word “spectacles” was a generic term that applied to all smart glasses, not just Snap’s version. Despite the publicity Snap claimed its Spectacles had received from its marketing and social media, the board noted in its opinion that Spectacles’ “social media accounts have an underwhelming number of followers, and the number of followers is surprisingly small,” which didn’t support the company’s argument that there had been a high enough level of consumer exposure to Snap’s Spectacles to claim that consumers associated the word with Snap’s brand.

[…]

Source: Snap suing to trademark the word “spectacles” for its smart glasses

This App Will Tell Android Users If an AirTag Is Tracking Them

Apple’s AirTags and Find My service can be helpful for finding things you lose—but they also introduce a big privacy problem. While those of us on iOS have had some tools for fighting those issues, Apple left those of us on Android without much to work with. A new Android AirTag finder app finally addresses some of those concerns.

How AirTags work

[…]

The Find My network employs the passive use of hundreds of millions of Apple devices to help expand your search. That way, you can locate your lost items even if they’re too far away for traditional wireless tracking. Your lost AirTag may be out of your own phone’s Bluetooth range, but it may not be far from another Apple device.

[…]

The Tracker Detect app comes out of a need for better security in the Find My network. Having such a wide network to track a tiny, easy-to-miss device could make it easy for someone to use AirTags to track someone.

People pointed out this vulnerability pretty soon after Apple announced the AirTags. With more than 113 million iPhones in the U.S., not to mention other Apple devices, the Find My network could be one of the widest tracking systems available. A device as small and easy-to-use as an AirTag on that network could make stalking easier than ever.

That said, Apple has a built-in feature designed to prevent tracking. If your iPhone senses that a strange AirTag, separated from its owner, is following you, it will send you an alert. If that AirTag is not found, it will start to make a sound anywhere from 8 to 24 hours after being separated from its owner.

However, Android users haven’t had these protections. That’s where Tracker Detect comes in; with this new Android AirTag app, you can scan the area to see if anyone may be tracking your location with an AirTag or other Find My-enabled accessory.

How to use Tracker Detect

If you’re concerned about people tracking you, download the Tracker Detect app from the Google Play Store. You don’t need an Apple account or any Apple devices to use it.

The app won’t scan automatically, so you’ll have to look for devices manually. To do that, open the app and tap Scan. Apple says it may take up to 15 minutes to find an AirTag that’s separated from its owner. You can tap Stop Scanning to end the search if you feel safe, and if the app detects something, it will mark it as Unknown AirTag.

Once the app has detected an AirTag, you can have it play a sound through the tag for up to ten minutes to help you find it. When you find the AirTag, you can scan it with an NFC reader to learn more about it.

[…]

 

Source: This App Will Tell Android Users If an AirTag Is Tracking Them

Malaysia in pocket of big business: Passes Bill to Imprison Illegal Streaming (even devices!) for 20 years

Laws that forbid the illegal uploading and downloading of copyrighted content are common around the world but the rise of streaming has sometimes exposed gaps in legislation.

Piracy-equipped Kodi devices, illegal streaming apps, and similar tools have led legal specialists to attempt to apply laws that didn’t envision the technology. In Malaysia, for example, it took a decision by the High Court last May to determine that the sale and distribution of streaming devices configured for piracy purposes does indeed constitute infringement under the Copyright Act.

But Malaysia was far from done. After previously informing the United States Patent and Trademark Office (USPTO) that the economic harm being caused to broadcasters and rightsholders in the country was a “serious problem”, Malaysia said it had amendments on the table to more directly tackle the illegal uploading, provision, and sharing of access to copyright works.

House of Representatives Passes Copyright Amendment Bill

This week Malaysia’s Dewan Rakyat (House of Representatives) passed the Copyright (Amendment) Bill 2021 which, among other things, will more directly address the challenges of illegal streaming.

“Act 332 is amended to ensure copyright laws implemented will provide more efficient and effective protection in line with current demands and to fulfill the needs of the business community and stakeholders,” said Domestic Trade and Consumer Affairs Minister Datuk Seri Alexander Nanta Linggi.

The amendments are focused on those involved in the provision or facilitation of illegal streams. The term “streaming technology” is repeatedly referenced and for the purposes of the act this includes computer programs (apps and other software tools), devices (streaming hardware of all kinds) that, in whole or in part, are used to infringe copyright in a protected work.

How the amendments will be used in practice remains to be seen but the scope appears to be intentionally broad and could result in significant punishments for those found to be in breach of the law.

Punishments for Illegal Streaming Facilitators

The first section of the amendment deals with those who “commit or facilitate infringement” of copyright by manufacturing a streaming technology for sale or hire, importing a streaming technology, selling or letting for hire (including offering, exposing or advertising for sale or hire), and/or possessing or distributing a streaming technology in the course of a business.

It expands to include distributing or offering to the public an infringing streaming technology or service other than in the course of a business, to such an extent “as to affect prejudicially the owner of the copyright.”

Anyone who contravenes these amendments will be guilty of an offense and upon conviction shall be liable to a fine of not less than 10 thousand ringgit (US$2,377) but not more than two hundred thousand ringgit (US$47,545). In addition to the possibility of fines, there are also custodial sentences that could reach a staggering 20 years imprisonment in the most serious of cases.

Those hoping to use a corporate structure as a shield are also put on notice. When any offenses are committed by a corporate body or by a person who is a partner in a firm, everyone from directors to managers will be deemed guilty of the offense and may be charged severally or jointly, unless they can show they had no knowledge and conducted due diligence to prevent the offense.

The details of the amendments can be found here (pdf)

Source: Malaysia Passes Bill to Imprison Illegal Streaming Pirates For Up To 20 Years * TorrentFreak

Considering the broadness of this law, it looks like selling a mobile phone, PC or laptop – which are all capable of streaming illegal content – could become punishable.

How China Uses Western Influencers As Pawns In Its Propaganda War

According to the New York Times, China is recruiting YouTubers to report on the country in a positive light and counter the West’s increasingly negative perceptions. “The videos have a casual, homespun feel. But on the other side of the camera often stands a large apparatus of government organizers, state-controlled news media and other official amplifiers — all part of the Chinese government’s widening attempts to spread pro-Beijing messages around the planet,” the report says. “State-run news outlets and local governments have organized and funded pro-Beijing influencers’ travel, according to government documents and the creators themselves. They have paid or offered to pay the creators. They have generated lucrative traffic for the influencers by sharing videos with millions of followers on YouTube, Twitter and Facebook.” An anonymous reader shares an excerpt from Techdirt, which summarizes the Times’ findings: Typically, the Chinese government support comes in the form of free organized trips around China, particularly in Xinjiang. By showing the influencers a carefully sanitized image of life in the country, the authorities don’t need to worry about negative stories. They simply make it easy for the YouTubers to present images of jolly peasants and happy city-dwellers, because that’s all they are allowed to see. One of the authors of the New York Times piece, Paul Mozur, noted on Twitter another important way that the authorities are able to help their influencer guests. Once produced, the China-friendly videos are boosted massively by state media and diplomatic Facebook and Twitter accounts: “One video by Israeli influencer Raz Gal-Or portraying Xinjiang as ‘totally normal’ was shared by 35 government connected accounts with a total of 400 million followers. Many were Chinese embassy Facebook accounts, which posted about the video in numerous languages.”

A new report from the Australian Strategic Policy Institute, “Borrowing mouths to speak on Xinjiang,” has some more statistics on this practice: “Our data collection has found that, between January 2020 and August 2021, 156 Chinese state-controlled accounts on US-based social media platforms have published at least 546 Facebook posts, Twitter posts and shared articles from [China Global Television Network], Global Times, Xinhua or China Daily websites that have amplified Xinjiang-related social media content from 13 influencer accounts. More than 50% of that activity occurred on Facebook.” Mozur says that the use of Western influencers in this way also allows employees of Beijing-controlled media, like the journalist Li Jingjing, to present themselves as independent YouTubers. On Twitter, however, she is labeled as “China state-affiliated media.” The Australian Strategic Policy Institute sees this as part of a larger problem (pdf): “labelling schemes adopted by some video-sharing and social media platforms to identify state-affiliated accounts are inconsistently applied to media outlets and journalists working for those outlets. In addition, few platforms appear to have clear policies on content from online influencers or vloggers whose content may be facilitated by state-affiliated media, through sponsored trips, for example.”

According to Mozur, China’s state broadcaster is actively looking for more influencers, offering bonuses and publicity for those who sign up. In the US, China’s consulate general is paying $300,000 to a firm to recruit influencers for the Winter Olympics, ranging from Celebrity Influencers with millions of Instagram or TikTok followers, to Nano Influencers, with merely a few thousand. The ultimate goal of deploying these alternative voices is not to disprove negative stories appearing in Western media, but something arguably worse, as the New York Times report explains: “China is the new super-abuser that has arrived in global social media,” said Eric Liu, a former content moderator for Chinese social media. “The goal is not to win, but to cause chaos and suspicion until there is no real truth.”

Source: How China Uses Western Influencers As Pawns In Its Propaganda War – Slashdot

Banks, ISPs Increasingly Embrace ‘Voice Print’ Authentication Despite Growing Security Risk

While it’s certainly possible to sometimes do biometrics well, a long line of companies frequently… don’t. Voice print authentication is particularly shaky, especially given the rise of inexpensive voice deepfake technology. But, much like the continued use of text-message two-factor authentication (which is increasingly shown to not be secure), it apparently doesn’t matter to a long list of companies.

Banks and telecom giants alike have started embracing voice authentication tech at significant scale despite the added threat to user privacy and security. And they’re increasingly collecting user “voice print” data without any way to opt out:

“despite multiple high-profile cases of scammers successfully stealing money by impersonating people via deepfake audio, big banks and ISPs are rolling out voice-based authentication at scale. The worst offender that I could find is Chase. There is no “opt in”. There doesn’t even appear to be a formal way to “opt out”! There is literally no way for me to call my bank without my voice being “fingerprinted” without my consent.”

[…]

Source: Banks, ISPs Increasingly Embrace ‘Voice Print’ Authentication Despite Growing Security Risk | Techdirt

Why our electronics break: what we can learn from nearly 10 years of repairs over 50k broken items

We now have data on over 21,000 broken items and what was done to fix them. This information comes from volunteers at our own events and others who use our community repair platform, restarters.net.

Thanks to our partners in the Open Repair Alliance who also collect this kind of data, we were able to include extra data from other networks around the world.

Together, this brought the total to nearly 50,000 broken items.

Want to see this data for yourself? Download the full dataset here
(Note: Links to the datasets that contain fault types are further down this page)

That’s a lot of data. So to analyse it, we focused on three types of products that the European Commission would be investigating:

  • Printers
  • Tablets
  • The batteries that power many of our gadgets.

[…]

Thanks to this collective effort, we were able to identify the most common reasons printers, tablets and batteries become unusable.

A diagram showing the most common tablet problems
These findings are based on the analysis of problems in 647 tablets brought to community repair events, but don’t include 131 tablets with poor data quality, making it impossible to confirm the main fault.

In addition, many of the items we looked at were fairly old, demonstrating that people really want to keep using their devices for longer.

But we also found that there are lots of barriers to repair that make this tricky. Some of the biggest are the lack of spare parts and repair documentation as well as designs that make opening the product difficult without causing extra damage.

You can see our full results and download the data for yourself here:

[…]

We want rules that make products easier to fix. And we’re already using data to push for a real Right to Repair. Just recently, we used previous findings to undermine an industry lobbyist’s anti-repair arguments in an EU policy meeting about upcoming regulations for smartphone and tablet repairability.

As a follow up, we also contributed our findings on common fault types in tablets, making the case for the need for better access to spare parts and repair information for this product category as well.

Next, we hope to increase the pressure on European policymakers for regulating printer repairability and battery-related issues in consumer products. For printers, the European Commission is considering rejecting a “voluntary agreement” proposed by industry, which ignores repairability for consumer printers.

And as for batteries, European institutions are working towards a Batteries Regulation, which must prioritise user-replaceability as well as the availability of spare parts.

[…]

Source: Why our electronics break: what we can learn from nearly 10 years of repairs – The Restart Project

Apple Removes All References to Controversial CSAM Scanning Feature – where they would scan all the pictures you took

Apple has quietly nixed all mentions of CSAM from its Child Safety webpage, suggesting its controversial plan to detect child sexual abuse images on iPhones and iPads may hang in the balance following significant criticism of its methods.

Apple in August announced a planned suite of new child safety features, including scanning users’ iCloud Photos libraries for Child Sexual Abuse Material (CSAM), Communication Safety to warn children and their parents when receiving or sending sexually explicit photos, and expanded CSAM guidance in Siri and Search.

Following their announcement, the features were criticized by a wide range of individuals and organizations, including security researchers, the privacy whistleblower Edward Snowden, the Electronic Frontier Foundation (EFF), Facebook’s former security chief, politicians, policy groups, university researchers, and even some Apple employees.

The majority of criticism was leveled at Apple’s planned on-device CSAM detection, which was lambasted by researchers for relying on dangerous technology that bordered on surveillance, and derided for being ineffective at identifying images of child sexual abuse.

[…]

Source: Apple Removes All References to Controversial CSAM Scanning Feature From Its Child Safety Webpage [Updated] – MacRumors

Scott Morrison urged to end ‘lunacy’ and push UK and US for Julian Assange’s release by Australian PMs

Australian parliamentarians have demanded the prime minister, Scott Morrison, intervene in the case of Julian Assange, an Australian citizen, after the United States won a crucial appeal in its fight to extradite the WikiLeaks founder on espionage charges.

“The prime minister must get Assange home,” the Australian Greens leader, Adam Bandt, told Guardian Australia on Saturday.

“An Australian citizen is being prosecuted for publishing details of war crimes, yet our government sits on its hands and does nothing.”

WikiLeaks founder Julian Assange.
WikiLeaks founder Julian Assange. Photograph: Daniel Leal-Olivas/AFP/Getty Images

The independent MP Andrew Wilkie called on Morrison to “end this lunacy” and demand the US and UK release Assange.

[…]

Source: Scott Morrison urged to end ‘lunacy’ and push UK and US for Julian Assange’s release | Australian politics | The Guardian

The European Commission is making its software open source to benefit society – considering it was paid for by the tax payers it’s the least they could do and should have done this years ago

The European Commission has announced that it’s adopting new rules around open source software which will see it release software under open source licenses. The decision follows a Commission study that found investment in open source software leads on average to four times higher returns. There has also been a push for this type of action from the Public Money, Public Code campaign.

If you’re wondering what sort of code the EC could offer to the world, it gave two examples. First, there’s its eSignature, a set of free standards, tools, and services that can speed up the creation and verification of electronic signatures that are legally valid inside the EU. Another example is LEOS (Legislation Editing Open Software) which is used to draft legal texts.

[…]

Source: The European Commission is making its software open source to benefit society – Neowin

Julian Assange can be extradited to the US, court rules, changes mind because US tells judge to.

Wikileaks founder Julian Assange can be extradited from the UK to the US, the High Court has ruled.

The US won its appeal against a January UK court ruling that he could not be extradited due to concerns over his mental health.

Judges were reassured by US promises to reduce the risk of suicide. His fiancee said they intended to appeal.

Mr Assange is wanted in the US over the publication of thousands of classified documents in 2010 and 2011.

Senior judges found the lower judge had based her decision in January on the risk of Mr Assange being held in highly restrictive prison conditions if extradited.

However, the US authorities later gave assurances that he would not face those strictest measures unless he committed an act in the future that merited them.

Giving the judgement, Lord Chief Justice Lord Burnett said: “That risk is in our judgement excluded by the assurances which are offered.

“It follows that we are satisfied that, if the assurances had been before the judge, she would have answered the relevant question differently.”

Mr Assange’s fiancee Stella Moris called the ruling “dangerous and misguided”, adding that the US assurances were “inherently unreliable”.

[…]

Wikileaks editor-in-chief Kristinn Hrafnsson said in a statement: “Julian’s life is once more under grave threat, and so is the right of journalists to publish material that governments and corporations find inconvenient.

“This is about the right of a free press to publish without being threatened by a bullying superpower.”

Amnesty International described the ruling as a “travesty of justice” and the US assurances as “deeply flawed”.

Nils Muiznieks, the human rights organisation’s Europe director, said it “poses a grave threat to press freedom both in the Unites States and abroad”.

Judges ordered the case must return to Westminster Magistrates’ Court for a district judge to send it formally to Home Secretary Priti Patel.

Mr Assange’s legal team – Birnberg Peirce Solicitors – said any appeal to the Supreme Court would relate to the question of assurances, rather than on issues such as free speech or “the political motivation of the US extradition request”.

Source: Julian Assange can be extradited to the US, court rules – BBC News