You Can Absolutely Be Identified Just By How You Drive

Researchers from the University of Washington and the University of California, San Diego did an experiment to see what could be learned from just the information many cars are already recording. The result was that the way people drove was as identifiable as a fingerprint. […] When it was given data from all 16 sensors Read more about You Can Absolutely Be Identified Just By How You Drive[…]

Study shows phone metadata is much more sensitive than top spies admit

In a study published online Monday in the journal Proceedings of the National Academy of Sciences, Stanford University researchers demonstrated how they used publicly available sources—like Google searches and the paid background-check service Intelius—to identify “the overwhelming majority” of their 823 volunteers based only on their anonymized call and SMS metadata. Using data collected through Read more about Study shows phone metadata is much more sensitive than top spies admit[…]

Runkeeper is secretly tracking you around the clock and sending your data to advertisers

The NCC, a consumer rights watchdog, is conducting an investigation into 20 apps’ terms and conditions to see if the apps do what their permissions say they do and to monitor data flows. Tinder has already been reported to the Norwegian data protection authority for similar breaches of privacy laws. The NCC’s investigation into Runkeeper Read more about Runkeeper is secretly tracking you around the clock and sending your data to advertisers[…]

FindFace Facial Recognition Service Becomes a Weapon Against Russian Porn Actresses

Users of the Russian imageboard “Dvach” (2chan) have launched a campaign to deanonymize Russian actresses who appear in pornography, utilizing a controversial new service called “FindFace.” Source: Facial Recognition Service Becomes a Weapon Against Russian Porn Actresses – Global Voices Advocacy What a bunch of pissants – using a creepy stalker app to then send Read more about FindFace Facial Recognition Service Becomes a Weapon Against Russian Porn Actresses[…]

93.4m Mexican Voters Data found on open US server

In my hands is something dangerous. It is proof that someone moved confidential government data out of Mexico and into the United States. It is a hard drive with 93.4 million downloaded voter registration records— The Mexican voter database. See the interview with Chris Vickery commenting on this breach: Before going any further, let’s make Read more about 93.4m Mexican Voters Data found on open US server[…]

Data protection reform – Parliament approves new rules fit for the digital era

The new rules include provisions on: a right to be forgotten, “clear and affirmative consent” to the processing of private data by the person concerned, a right to transfer your data to another service provider, the right to know when your data has been hacked, ensuring that privacy policies are explained in clear and understandable Read more about Data protection reform – Parliament approves new rules fit for the digital era[…]

Hotjar – Records mouse behaviour to see where visitors are scrolling, mousing and clicking to make heatmaps

Hotjar is a new and easy way to truly understand your web and mobile site visitors. Source: Hotjar – Heatmaps, Visitor Recordings, Conversion Funnels, Form Analytics, Feedback Polls and Surveys in One Platform I’ve been seeing this on more and more sites recently. They state that the service is cheap (but no pricing to be Read more about Hotjar – Records mouse behaviour to see where visitors are scrolling, mousing and clicking to make heatmaps[…]

CIA’s Fundings Clearista Skin Care Products That Collect DNA among other markers for health

Clearista products were designed with medical applications in mind before they became beauty products. The idea was that removing the product got you access to traces or biological markers that give an insight into the health of a person. They also cover blemishes and dark spots on the skin. So the CIA is interested, as Read more about CIA’s Fundings Clearista Skin Care Products That Collect DNA among other markers for health[…]

IFTTT changes their ToS, claims ownership of all that goes through new API

3. Ownership. IFTTT shall own all right, title, and interest (and all related moral rights and intellectual property rights) in and to the Developer Tool, Service, and Content 12. Patent License. Licensee hereby grants IFTTT a nonexclusive, sublicensable, perpetual, fully-paid, worldwide license to fully exercise and exploit all patent rights with respect to improvements or Read more about IFTTT changes their ToS, claims ownership of all that goes through new API[…]

Companies Are Using Big Data to Discourage Employees From Having Costly Surgery

Do you work for a big company? Have you been having back pain? Your company probably knows about it already thanks to high-tech healthcare companies that it hired. Welcome to our brave new world of big data. Source: Companies Are Using Big Data to Discourage Employees From Having Costly Surgery They are using this to Read more about Companies Are Using Big Data to Discourage Employees From Having Costly Surgery[…]

Anaheim cops in Disneyland’s backyard have had plane based mass mobile phone hacking stuff going for years

Pentagon: DRTBox can usually nab phone’s crypto session keys in under a second. Source: City cops in Disneyland’s backyard have had “stingray on steroids” for years Military grade Dirtboxes have been flying for the police without requiring a warrant for years. The 4th Reich irrepresive surveillance machine strikes again – Anaheim won’t be the only Read more about Anaheim cops in Disneyland’s backyard have had plane based mass mobile phone hacking stuff going for years[…]

Microsoft explains why Irish Warrant Fight is important

Without trust, Microsoft thinks, nobody is going to use any cloud services, and the Snowden revelations put the trustworthiness of all technology suppliers in the spotlight. So when a warrant arrived at Microsoft’s Dublin data centre one day in 2013, a not uncommon occurrence for a cloud host, Microsoft was ready to kick back. What Read more about Microsoft explains why Irish Warrant Fight is important[…]

CBP wordt Autoriteit Persoonsgegevens

Per 1 januari is de naam van het College bescherming persoonsgegevens (CBP) veranderd in Autoriteit Persoonsgegevens. Voortaan kan de Autoriteit Persoonsgegevens boetes opleggen en zijn organisaties verplicht ernstige datalekken direct te melden aan de toezichthouder. Onvoldoende zorgvuldige omgang met persoonsgegevens levert voortaan dus zowel een boete als reputatieschade op. De maximale boete is 820.000 euro. Read more about CBP wordt Autoriteit Persoonsgegevens[…]

Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on “the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups” about how to sabotage the Iran Deal. All sorts of people who spent many years cheering Read more about Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated[…]

Why is Microsoft monitoring how long you use Windows 10?

This might seem like a slightly strange statistic for Microsoft to keep track of, but the company knows how long, collectively, Windows 10 has been running on computers around the world. To have reached this figure (11 billion hours in December, apparently) Microsoft must have been logging individuals’ usage times Source: Why is Microsoft monitoring Read more about Why is Microsoft monitoring how long you use Windows 10?[…]

AVG: “Web TuneUP” extension multiple critical vulnerabilities: exposes browsing history and other personal data

When a user installs AVG AntiVirus, a Chrome extension called “AVG Web TuneUp” with extension id chfdnecihphmhljaaejmgoiahnihplgn is force-installed. I can see from the webstore statistics it has nearly 9 million active Chrome users. the attached exploit steals cookies from avg.com. It also exposes browsing history and other personal data to the internet, I wouldn’t Read more about AVG: “Web TuneUP” extension multiple critical vulnerabilities: exposes browsing history and other personal data[…]

Windows 10 uploads your Encryption Key to Microsoft with no opt-out.

One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen. But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer Read more about Windows 10 uploads your Encryption Key to Microsoft with no opt-out.[…]

Congress strips out privacy protections from CISA ‘security’ bill

Under the original CISA legislation, companies would share their users’ information with federal government departments once it had been anonymized. The government could then analyze it for online threats, while the companies received legal immunity from prosecution for breaking existing privacy agreements. But as the bill was amended, the privacy parts of the proposed law Read more about Congress strips out privacy protections from CISA ‘security’ bill[…]

Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users

Ted Cruz’s presidential campaign is using psychological data based on research spanning tens of millions of Facebook users, harvested largely without their permission, to boost his surging White House run and gain an edge over Donald Trump and other Republican rivals, the Guardian can reveal. A little-known data company (Cambridge Analytica), now embedded within Cruz’s Read more about Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users[…]

GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks

Privacy International battle exposes ‘bulk’ warrants Documents released by GCHQ to the Investigatory Powers Tribunal suggest the agency may be allowed to hack multiple computers in the UK under single “thematic” or “class” warrants. Responding to complaints brought by Privacy International and seven global internet and communication service providers, the British spy agency told the Read more about GCHQ can hack your systems at will – thanks to ‘soft touch’ oversight, judges not needed thanks[…]

Russia’s blanket phone spying busted Europe’s human rights laws

Russia’s legal framework around the mass surveillance was found to be unfit because it did not limit the circumstances in which public authorities were allowed to conduct their surveillance activities, nor were there any limits on the duration of those activities. Additionally, there was insufficient supervision of the interception and a lack of “procedures for Read more about Russia’s blanket phone spying busted Europe’s human rights laws[…]

Anti-NSA Easter egg in HTTP/2: every connection starts with PRISM

British programmer and writer John Graham-Cumming has spotted something interesting in the opening protocol of any HTTP/2 connection: an array of explicitly formatted code which spells the word PRISM, in an apparent reference to the NSA’s primary program for mass-surveillance of the internet, as disclosed by Edward Snowden in 2013. The HTTP/2 client connection begins Read more about Anti-NSA Easter egg in HTTP/2: every connection starts with PRISM[…]

Revealed: What info the FBI can collect with a National Security Letter. Hint – a lot.

Merrill is now able to reveal that the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases. The FBI also claims authority Read more about Revealed: What info the FBI can collect with a National Security Letter. Hint – a lot.[…]