6 private links
Search giant modifies terms of service to specifically state ‘automated systems analyse your content’. By Samuel Gibbs
Dutch House of Representatives passes dragnet surveillance bill
Researchers say hackers can use an insecure bluetooth device to listen and talk to a child.
Man streams son's birth on Facebook Live - sees footage on Good Morning America.
Mark Zuckerburg's manifesto offers a vision of social dystopia.
Inside Apple's absurd lobbying strategy.
En décembre dernier, Yahoo! faisait le point sur les mesures prises suite aux piratages massifs révélés ces derniers mois. La firme évoquait, à cette occasion, la fuite de code propriétaire et le blocage d'éventuels cookies contrefaits. Deux mois plus tard, l'exploitation de cette faille est confirmée : les utilisateurs touchés sont progressivement avertis.
Le mouvement n'est pas nouveau, mais les résultats sont brutaux. Selon le dernier rapport de l'institut Gartner, 99,6 % des smartphones vendus au quatrième trimestre 2016 tournaient soit sous Android, soit sous iOS. Autant dire que la concurrence à Google ou Apple sur le segment du mobile est aujourd'hui virtuellement inexistante.
After exhausting our legal options, Riseup recently chose to comply with two sealed warrants from the FBI, rather than facing contempt of court (which would have resulted in jail time for Riseup birds and/or termination of the Riseup organization). The first concerned the public contact address for an international DDoS extortion ring. The second concerned an account using ransomware to extort money from people.
Extortion activities clearly violate both the letter and the spirit of the social contract we have with our users: We have your back so long as you are not pursuing exploitative, misogynist, racist, or bigoted agendas.
There was a “gag order” that prevented us from disclosing even the existence of these warrants until now. This was also the reason why we could not update our “Canary”.
A court ruling could make it difficult to trust U.S. tech companies with private information.
Subgraph OS | Adversary Resistant Computing
Using Signal pseudonymously
A top life tip, there, from the Linux kernel chieftain
algo - 1-click IPSEC VPN in the Cloud
IKEv2-setup - Set up Ubuntu Server 16.10 as an IKEv2 VPN
WireGuard: fast, modern, secure VPN tunnel
strongSwan is an Open Source IPsec-based VPN solution for Linux and other UNIX based operating systems implementing both the IKEv1 and IKEv2 key exchange protocols.
Law enforcement agencies in cities nationwide have spent millions on sophisticated electronic surveillance devices. But there are few uniform rules on how they can be used.
A recent report says Samsung’s Internet-connected Smart TV might be listening in on your conversations and transmitting them to a third party via a voice control feature meant to change channels, adjust volume, browse apps and more.
Shane Harris of The Daily Beast noticed last week that the Smart TV’s privacy policy includes the following clause: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”
The company confirmed to The Huffington Post that the feature does send voice control requests to a third party, which then searches for results and returns them to the user’s device. Samsung doesn’t store or sell the voice data, she said.
VIZIO, Inc., one of the world’s largest manufacturers and sellers of internet-connected “smart” televisions, has agreed to pay $2.2 million to settle charges by the Federal Trade Commission and the Office of the New Jersey Attorney General that it installed software on its TVs to collect viewing data on 11 million consumer TVs without consumers’ knowledge or consent.