Rabobank puts NFC payment on all KPN simcards

The simcards have an NFC element that belongs to the Rabobank. I guess that means that Rabobank must then get quite a lot of information from the telco provider that you wouldn’t necessarily want them to have. Worrying. KPN geeft sinds begin dit jaar een nieuw type simkaart uit dat contactloos betalen per telefoon mogelijk Read more about Rabobank puts NFC payment on all KPN simcards[…]

CBP wordt Autoriteit Persoonsgegevens

Per 1 januari is de naam van het College bescherming persoonsgegevens (CBP) veranderd in Autoriteit Persoonsgegevens. Voortaan kan de Autoriteit Persoonsgegevens boetes opleggen en zijn organisaties verplicht ernstige datalekken direct te melden aan de toezichthouder. Onvoldoende zorgvuldige omgang met persoonsgegevens levert voortaan dus zowel een boete als reputatieschade op. De maximale boete is 820.000 euro. Read more about CBP wordt Autoriteit Persoonsgegevens[…]

Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on “the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups” about how to sabotage the Iran Deal. All sorts of people who spent many years cheering Read more about Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated[…]

Why is Microsoft monitoring how long you use Windows 10?

This might seem like a slightly strange statistic for Microsoft to keep track of, but the company knows how long, collectively, Windows 10 has been running on computers around the world. To have reached this figure (11 billion hours in December, apparently) Microsoft must have been logging individuals’ usage times Source: Why is Microsoft monitoring Read more about Why is Microsoft monitoring how long you use Windows 10?[…]

AVG: “Web TuneUP” extension multiple critical vulnerabilities: exposes browsing history and other personal data

When a user installs AVG AntiVirus, a Chrome extension called “AVG Web TuneUp” with extension id chfdnecihphmhljaaejmgoiahnihplgn is force-installed. I can see from the webstore statistics it has nearly 9 million active Chrome users. the attached exploit steals cookies from avg.com. It also exposes browsing history and other personal data to the internet, I wouldn’t Read more about AVG: “Web TuneUP” extension multiple critical vulnerabilities: exposes browsing history and other personal data[…]

Windows 10 uploads your Encryption Key to Microsoft with no opt-out.

One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen. But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer Read more about Windows 10 uploads your Encryption Key to Microsoft with no opt-out.[…]

Microsoft: Upgrade to Windows 10 NOW or TONIGHT!

The large pop-up screen, which first appeared over the weekend, gives users the option of upgrading straight away or … that evening. Users can still opt out by clicking on the red ‘X’ in the top right corner of the window, but less savvy computer users (part of Redmond’s core market segments) might not figure Read more about Microsoft: Upgrade to Windows 10 NOW or TONIGHT![…]

Congress strips out privacy protections from CISA ‘security’ bill

Under the original CISA legislation, companies would share their users’ information with federal government departments once it had been anonymized. The government could then analyze it for online threats, while the companies received legal immunity from prosecution for breaking existing privacy agreements. But as the bill was amended, the privacy parts of the proposed law Read more about Congress strips out privacy protections from CISA ‘security’ bill[…]

Cox Is Liable for Pirating Subscribers, Ordered to pay $25 million

Internet provider Cox Communications is responsible for the copyright infringements of its subscribers, a Virginia federal jury has ruled. The ISP is guilty of willful contributory copyright infringement and must pay music publisher BMG $25 million in damages. cox-logoToday marks the end of a crucial case that will define how U.S. Internet providers deal with Read more about Cox Is Liable for Pirating Subscribers, Ordered to pay $25 million[…]

Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users

Ted Cruz’s presidential campaign is using psychological data based on research spanning tens of millions of Facebook users, harvested largely without their permission, to boost his surging White House run and gain an edge over Donald Trump and other Republican rivals, the Guardian can reveal. A little-known data company (Cambridge Analytica), now embedded within Cruz’s Read more about Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users[…]

UK citizens may soon need licenses to photograph some stuff they already own

Copyright strikes again, with photographers and publishers hit particularly hard. Changes to UK copyright law will soon mean that you may need to take out a licence to photograph classic designer objects even if you own them. That’s the result of the Enterprise and Regulatory Reform Act 2013, which extends the copyright of artistic objects Read more about UK citizens may soon need licenses to photograph some stuff they already own[…]

Kazakhstan may enact law to install false national security certificate on PCs – brouhaha

There is a lot of this on the internet but I’m not sure it’s true as it’s all based on something that was posted on a telcos site and removed, so all the sources link to a google cache site. It’s not clear how this would be implemented and whether users would somehow be forced Read more about Kazakhstan may enact law to install false national security certificate on PCs – brouhaha[…]

GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks

Privacy International battle exposes ‘bulk’ warrants Documents released by GCHQ to the Investigatory Powers Tribunal suggest the agency may be allowed to hack multiple computers in the UK under single “thematic” or “class” warrants. Responding to complaints brought by Privacy International and seven global internet and communication service providers, the British spy agency told the Read more about GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks[…]

Microsoft sets stage for massive Windows 10 upgrade strategy

Microsoft has been prepping Windows 7 and Windows 8.1 PCs for a more aggressive Windows 10 upgrade strategy that the company will kick off shortly. Source: Microsoft sets stage for massive Windows 10 upgrade strategy As Windows 10 is a massive privacy invading advertising machine, quite a lot of people are not waiting for this Read more about Microsoft sets stage for massive Windows 10 upgrade strategy[…]

Russia’s blanket phone spying busted Europe’s human rights laws

Russia’s legal framework around the mass surveillance was found to be unfit because it did not limit the circumstances in which public authorities were allowed to conduct their surveillance activities, nor were there any limits on the duration of those activities. Additionally, there was insufficient supervision of the interception and a lack of “procedures for Read more about Russia’s blanket phone spying busted Europe’s human rights laws[…]

Anti-NSA Easter egg in HTTP/2: every connection starts with PRISM

British programmer and writer John Graham-Cumming has spotted something interesting in the opening protocol of any HTTP/2 connection: an array of explicitly formatted code which spells the word PRISM, in an apparent reference to the NSA’s primary program for mass-surveillance of the internet, as disclosed by Edward Snowden in 2013. The HTTP/2 client connection begins Read more about Anti-NSA Easter egg in HTTP/2: every connection starts with PRISM[…]

Revealed: What info the FBI can collect with a National Security Letter. Hint – a lot.

Merrill is now able to reveal that the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases. The FBI also claims authority Read more about Revealed: What info the FBI can collect with a National Security Letter. Hint – a lot.[…]

Patent troll reckons it owns https via TLS

It appears in May this year CryptoPeak Solutions, based in Longview, Texas, got its hands on US Patent 6,202,150, which describes “auto-escrowable and auto-certifiable cryptosystems.” CryptoPeak reckons TLS-secured websites that use elliptic curve cryptography are infringing the patent – so it’s suing owners of HTTPS websites that use ECC. Top tip: loads of websites use Read more about Patent troll reckons it owns https via TLS[…]

ADNAUSEAM – Clicking Ads So You Don’t Have To

AdNauseam is a browser extension designed to obfuscate browsing data and protect users from surveillance and tracking by advertising networks. Simultaneously, AdNauseam serves as a means of amplifying users’ discontent with advertising networks that disregard privacy and facilitate bulk surveillance agendas. Source: ADNAUSEAM – Clicking Ads So You Don’t Have To

New IBM tech lets apps authenticate you without personal data

Identity Mixer is designed to protect users’ privacy by focusing just on the essentials of the proof. Thanks to a set of algorithms based on cryptography work done at IBM Research, the tool allows developers to build apps that can authenticate users’ identities using what’s known as a “zero-knowledge proof” that collects no personal data. Read more about New IBM tech lets apps authenticate you without personal data[…]