We just launched a new Web-privacy-related webapp, and want to show it off to you.
There are over 20 tests to extract various kinds of information from the browser's history; the most obvious application is to check for visits to the most popular websites and blogs, which we grouped into categories (banks, pr0n sites, dating sites, social networks, etc.) We're also monitoring for more sensitive content, such as all visited Wikileaks articles and administrative pages, visited .gov and .mil websites, as well as Google search queries and zipcodes typed into forms. In addition to that, we're indexing over fifty most popular RSS newsfeeds (including Boing Boing, of course) to determine which recent news stories the user has read; also, for social news sites, we're trying to determine the user's username by detecting visited profile pages.
We also meticulously documented the problem and listed possible solutions in hope of educating casual Web users as well as browser vendors about this issue. Most people still have no idea that such history detection is possible, and in fact trivially easy to implement; what's worse, there are no simple ways to protect against this (other than disabling history altogether). I hope that by publicizing the issue we can get browser vendors to figure out sane ways of solving the problem to make our browsing histories private again, and would appreciate your help.
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
For $170, Motherboard’s Joseph Cox bought SpyPhone Android Rec Pro, an Android app that you have to sideload on your target’s phone (the software’s manufacturer sells passcode-defeating apps that help you do this); once it’s loaded, you activate it with an SMS and then you can covertly operate the phone’s mic, steal its photos, and […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]