What every website knows about you

This website shows you all the data any website you visit can find out about you: your location, operating system, browser plugins, previously visited web page, local and public IP, service provider, social media networks you are logged into, devices on your local network, and more. The site also shows you how to hide any of this information that you don't want to reveal. Read the rest

Bruce Schneier's four-year plan for the Trump years

1. Fight the fights (against more government and commercial surveillance; backdoors, government hacking); 2. Prepare for those fights (push companies to delete those logs; remind everyone that security and privacy can peacefully co-exist); 3. Lay the groundword for a better future (figure out non-surveillance internet business models, privacy-respecting law enforcement, and limits on corporate surveillance); 4. Continue to solve the actual problems (cybercrime, cyber-espionage, cyberwar, the Internet of Things, algorithmic decision making, foreign interference in our elections). Read the rest

Snowden on fake news, Twitter features, and the rule of law

Edward Snowden's Periscope interview with Jack Dorsey -- hosted by the Pardon Snowden campaign ranged over a lot of territory, including the special problems of metadata surveillance (metadata can be "more intrusive" than content "because it can be understood at scale"); asymmetry in privacy (where "an increasing imbalance of power" arises between citizens, with no privacy, and officials with all the privacy: "We can't even see their tax-returns"); the problems of relying on the rule of law in a "global context" where surveillance crosses borders and jurisdictions; and fake news, which Snowden thinks can't be solved by asking Google to be a "referee" but rather when "We talk and we share and we point out what is true." Read the rest

William Gibson on individual privacy, governmental secrecy and the future of history

In a thoughtful New York Times editorial, science fiction giant William Gibson mediates on the difference between the privacy that individuals have and deserve, the privacy that governments assert ("What does it mean, in an ostensible democracy, for the state to keep secrets from its citizens?"), and what this will mean for the historians of the future. Read the rest

The latest generation of chatbot toys listen to your kids 24/7 and send their speech to a military contractor

Last year's Hello Barbie chatbot toy sent all your kid's speech to cloud servers operated by Mattel and its tech partner, but only when your kid held down Barbie's listen button -- new chatbot toys like My Friend Cayla and the i-Que Intelligent Robot are in constant listening mode -- as is your "OK Google" enabled phone, your Alexa-enabled home mic, and your Siri-enabled Ios device -- and everything that is uttered in mic range is transmitted to Nuance, a company that makes text-to-speech tech (you probably know them through their Dragon-branded tools), and contracts to the US military. Read the rest

The Snoopers Charter gives these 48 organisations unlimited, secret access to all UK browsing history

With the passage of the Snoopers Charter earlier this month, the UK has become the most-surveilled "democratic" state in the world, where service providers are required to retain at least a year's worth of their customers' browsing history and make it searchable, without a warrant, to a variety of agencies -- and no records are kept of these searches, making it virtually impossible to detect petty vendetta-settling, stalking, or systemic abuses (including selling access to criminals, foreign governments, and institutionalised racism). Read the rest

The Snoopers Charter is now law in the UK: "extreme surveillance" rules the land

Britain's love-affair with mass surveillance began under the Labour government, but it was two successive Conservative governments (one in coalition with the Liberal Democrats, who are nominally pro-civil liberties) who took Tony Blair's mass surveillance system and turned it into a vicious, all-powerful weapon. Now, their work is done. Read the rest

How to defend your digital rights: street protest edition

The Electronic Frontier Foundation's Digital Security Tips for Protesters builds on its indispensable Surveillance Self Defense guide for protesters with legal and technical suggestions to protect your rights, your data, and your identity when protesting. Read the rest

Your user data is secretly sent to China through a backdoor on some U.S. Android phones

Included for free with some Android phones: “a backdoor that sends all your text messages to China every 72 hours.”

Read the rest

Brazilian domestic spies use Tinder to infiltrate protest movements

Brazilian Army Captain Willian Pina Botelho posed as Baltazar "Balta" Nunes in a fake Tinder profile and set out to seduce members of left wing anti-government protest movements in order to infiltrate them. Read the rest

The surveillance economy has 67 days to disarm before Trump is sworn in

The Obama administration asserted the power to raid the massive databases of peoples' private, sensitive information that ad-based tech companies have assembled; the Trump administration has promised to use Obama's powers to effect the surveillance and deportation of 11 millions undocumented migrants, and the ongoing, continuous surveillance of people of Muslim heritage. Read the rest

A madman has been given the keys to the surveillance state

When the USA PATRIOT Act was signed into law on October 26, 2001, it erased many of the vital checks and balances that stood between the American people and their government. As Bush supporters cheered the unprecedented power that their people in Washington now held, the civil liberties world warned them: "Your president has just fashioned a weapon that will be wielded by all who come after him."

A fake HP printer that's actual an office-camouflaged cellular eavesdropping device

Julian Oliver is a playful and media-savvy security researcher; previously, he documented hidden cell-phone towers in bad disguises and produced a hand-grenade shaped "transparency device" that spied on everything going on in the room. Read the rest

Sneaky ultrasonic adware makes homes vulnerable to ultrasonic hacking

Earlier this year, companies like Silverpush were outed for sneaking ultrasonic communications channels into peoples' devices, so that advertisers could covertly link different devices to a single user in order to build deeper, more complete surveillance profiles of them. Read the rest

One week left! Apply for a Shuttleworth Fellowship

The Shuttleworth Fellowships hand millions directly to people starting out on a journey to radically transform the world to make it more open; this year, I'm Honourary Steward, meaning I'll help pick the grantees. Read the rest

Digital Defenders: a free open-licensed booklet for kids about privacy and crypto

European Digital Rights has created a free, CC-licensed kids' booklet about privacy called Digital Defenders. Read the rest

Half of all U.S. adults are in face-recognition databases, and Black people more likely to be targeted

One in two American adults is in a law enforcement face recognition network.

“The Perpetual Lineup” report out today from a Georgetown University thinktank makes a compelling case for greater oversight of police facial-recognition software that “makes the images of more than 117 million Americans — a disproportionate number of whom are black — searchable by law enforcement agencies across the nation,” as the New York Times account reads.

Read the rest

More posts