Monthly Shaarli

All links of one month in a single page.

February, 2018

Apple is under fire for moving iCloud data to China

Apple is moving iCloud accounts registered in China to state-run Chinese servers on Wednesday along with the digital keys needed to unlock them.

How Apple is paving the way to a ‘cloud dictatorship’ in China | Hong Kong Free Press HKFP

By Lo Shih-hung The US-based global tech giant Apple Inc. is set to hand over the operation of its iCloud data center in mainland China to a local corporation called Guizhou-Cloud Big Data (GCBD) by February 28, 2018. When this transition happens, the local company will become responsible for handling …

The Car of the Future Will Sell Your Data - Bloomberg

As smarter vehicles become troves of personal information, get ready for coupon offers at the next stoplight.

Données personnelles : Facebook "déçu" du verdict de la justice belge

Des astreintes jusqu'à 100 millions d'euros

In our eyes, Google’s software sees heart attack risk - The Washington Post

The new approach could one day allow people to screen themselves for the risks that could lead to heart disease.

Comment Android P empêchera les applications de vous espionner

Google sécurise enfin l'appareil photo et le micro

Le cofondateur de Whatsapp injecte 50 millions de dollars dans Signal

Et c'est un peu grâce à Facebook

Neutralité des terminaux : après les tuyaux, l'Arcep veut se pencher sur les robinets - ZDNet
21 degrés de liberté – 06 – Framablog

« Tout ce que vous dites ou faites peut être et sera utilisé contre vous, n’importe quand dans un avenir lointain, lorsque le contexte et l’acceptabilité de ce que vous dites ou faites auront radicalement changé. » Avec la surveillance analogique de nos parents, tout était capté dans le contexte de son temps. La surveillance numérique de nos enfants conserve tout pour un usage futur contre eux.

L'Arcep veut réguler les appareils d'Apple, de Google et consorts

Vers une neutralité des terminaux ?

Watching the watchers: Epstein and Robertson’s „Search Engine Manipulation Effect“ – AlgorithmWatch
How UK Spies Hacked a European Ally and Got Away With It

A British spy agency secretly hacked a company in Belgium then evaded an extraordinary police investigation.

Opinion | The Tyranny of Convenience - The New York Times

The paradoxical truth I’m driving at is that today’s technologies of individualization are technologies of mass individualization. Customization can be surprisingly homogenizing. Everyone, or nearly everyone, is on Facebook: It is the most convenient way to keep track of your friends and family, who in theory should represent what is unique about you and your life. Yet Facebook seems to make us all the same. Its format and conventions strip us of all but the most superficial expressions of individuality, such as which particular photo of a beach or mountain range we select as our background image.

I recently listened to a podcast with the founders of a startup by the name of A... | Hacker News

I recently listened to a podcast with the founders of a startup by the name of Aerial (https://aerial.ai) that that is doing real-time location mapping and activity detection using wifi and deep learning.

NOTE: I'm in no way related to this company or the podcast (aside from being an occasional listener).

Episode page: https://twimlai.com/talk/107

Direct episode link: https://feeds.soundcloud.com/stream/393602724-twiml-twiml-ta...

Episode description:

In this episode I’m joined by Michel Allegue and Negar Ghourchian of Aerial.ai. Aerial is doing some really interesting things in the home automation space, by using wifi signal statistics to identify and understand what’s happening in our homes and office environments.

Michel, the CTO, describes some of the capabilities of their platform, including its ability to detect not only people and pets within the home, but surprising characteristics like breathing rates and patterns. He also gives us a look into the data collection process, including the types of data needed, how they obtain it, and how it is parsed. Negar, a senior data scientist with Aerial, describes the types of models used, including semi-supervised, unsupervised and signal processing based models, and how they’ve scaled their platform, and provides us with some real-world use cases.

Sortie de MATE 1.20 - LinuxFr.org
Privacy/Privacy Task Force/firefox about config privacy tweeks - MozillaWiki
Protection des données : Facebook épinglé par la justice allemande
Do Not, I Repeat, Do Not Download Onavo, Facebook’s Vampiric VPN Service

The company is actually collecting and analyzing the data of Onavo users. Doing so allows Facebook to monitor the online habits of people outside their use of the Facebook app itself. For instance, this gave the company insight into Snapchat’s dwindling user base, even before the company announced a period of diminished growth last year.

AMP for email is a terrible idea | TechCrunch

AMP is, to begin with, Google exerting its market power to extend its control over others’ content. Facebook is doing it, so Google has to. Using its privileged position as the means through which people find a great deal of content, Google is attempting to make it so that the content itself must also be part of a system it has defined.

OpenBoard, the best interactive whiteboard for schools and universities

OpenBoard is an open source cross-platform interactive whiteboard application. OpenBoard is intended for use primarily in schools and universities, and can be used both with interactive whiteboards or in a dual-screen setup with a touchscreen and secondary display.

Il faut « interdire la collecte de données personnelles en ligne »

Le plus grand danger, à long terme, estime le journaliste du « Monde » Damien Leloup, est celui de créer des sociétés habituées à la surveillance de masse permanente, dans laquelle tout libre arbitre disparaît dans les bases de données de quelques entreprises géantes.

La serrure connectée Amazon Key déjà piratée

Mauvais coup de pub pour Amazon

AdsBypasser
Nano Adblocker – Add-ons for Firefox
Anti Anti Anti Pub - Anti Anti Adblocker - l'Almanet doLys de nam1962 et ses amis

Comment éviter la plupart des blocages d'adblocker en quelques clics.

Des scripts trompent les navigateurs pour récupérer des données, le Français AdThink nous répond
LibreOffice 6.0 sera officiellement disponible le 31 janvier, avec de nouvelles bibliothèques pour améliorer la compatibilité avec des formats tiers
Données personnelles et droit de vendre des organes humains - Standblog

Aral Balkan, en anglais et à l’occasion de la journée des données personnelles, s’expliquait ainsi (traduction approximative par mes soins) :

Séparer une personne de ses données, c’est retirer à celles-ci ses droits humains, c’est en faire un objet qu’on peut commercialiser. Tous les droits ainsi conférés à l’objet (les données) seront donc moindres que ceux protégeant le sujet (la personne). En traitant les gens et leurs données comme étant des notions différentes — l’une en sujet, l’autre en objet — ce qu’on finit par faire c’est de rendre commercialisable les gens en les découpant en tranches prêtes à être vendues au plus offrant. Voici, en substance, le business model de la Silicon Valley : numériser les gens et être propriétaire des versions numériques.
Pour un collège d'experts, Messenger Kids devrait être fermé d'urgence

Lettre ouverte à Mark Zuckerberg

How China spied on the African Union’s computers | News | Africa | M&G

China built and paid for the AU’s computer network – but inserted a backdoor allowing it access to confidential information

AdHell 2 - Rootless Ad Blocking | Samsung Galaxy S8

AdHell 2 *** Disclamer I first want to note that the original developer did not help me in any way with this, he did not provide me with the code (it was…

doc/Applications.md · master · Christopher Roy Bratusek / NanoDroid · GitLab

microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android

[MODULE/SYSTEM] NanoDroid 16.0.20180130 (microG, pseudo-debloat, F-Droid + apps)

Versions until 15.1 were called NanoMod, starting with 16.0 they’re called NanoDroid.

Oups... Une faille dans le lecteur d'empreinte des PC Lenovo - ZDNet

La faille se situe dans l'utilitaire Lenovo Fingerprint Manager Pro qui permet aux utilisateurs de déverrouiller leur ordinateur ou de s'authentifier pour des paiements en ligne. "Les données sensibles stockées par Lenovo Fingerprint Manager Pro, y compris les informations d'identification de Windows et les données d'empreintes digitales des utilisateurs, sont chiffrées à l'aide d'un algorithme faible, avec un mot de passe codé en dur, et sont accessibles à tous les utilisateurs disposant d'un accès local non administrateur", reconnaît la firme.

Princeton WebTAP – Web Transparency & Accountability Project @ Princeton

Web Transparency & Accountability Project @ Princeton

Google, Facebook data privacy concerns out of control-commentary

Google, Facebook hidden trackers follow users around the web at alarming rates, says DuckDuckGo's CEO Gabriel Weinberg.

SNIIRAM : la CNAMTS mise en demeure pour des manquements à la sécurité des données | CNIL

Le traitement « SNIIRAM » (Système national d’information inter-régimes de l’assurance maladie), créé par la loi du 23 décembre 1998 et mis en œuvre par la CNAMTS (Caisse nationale de l’assurance maladie des travailleurs salariés) a pour objectif de contribuer à une meilleure gestion des politiques de santé.

CSS-Keylogging/README.md at master · maxchehab/CSS-Keylogging · GitHub

CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.

Internet of Babies – When baby monitors fail to be smart | SEC Consult

Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a

A Hacker Has Wiped a Spyware Company’s Servers—Again - Motherboard

"I don't want to live in a world where younger generations grow up without privacy."

China's Xinjiang surveillance is the dystopian future nobody wants

Monitoring tech pioneered in the region is spreading across China and the world.

Et si l'intelligence artificielle tombait dans de mauvaises mains...

Des experts tirent la sonnette d'alarme

Signal >> Blog >> Signal Foundation

Long before we knew that it would be called Signal, we knew what we wanted it to be. Instead of teaching the rest of the world cryptography, we wanted to see if we could develop cryptography that worked for the rest of the world. At the time, the industry consensus was largely that encryption and cryptography would remain unusable, but we started Signal with the idea that private communication could be simple. Since then, we’ve made some progress. We’ve built a service used by millions, and software used by billions. The stories that make it back to us and keep us going are the stories of people discovering each other in moments where they found they could speak freely over Signal, of people falling in love over Signal, of people organizing ambitious plans over Signal. When we ask friends who at their workplace is on Signal and they respond “every C-level executive, and the kitchen staff.” When we receive a subpoena for user data and have nothing to send back but a blank sheet of paper. When we catch that glimpse of “Signal blue” on a metro commuter’s phone and smile.

MIT's WiFi System Detects People's Breathing, Heart Rate, Even Through Walls | Medgadget

researchers of the NETMIT group at MIT’s Computer Science and Artificial Intelligence Lab, are using WiFi signals to detect the breathing and heart rate of individuals in a room. They’ve just released a couple videos showing off the technology in action

AlgorithmWatch
Get involved: We crack the Schufa! > Open Knowledge Foundation Deutschland

When applying for a loan, mobile phone contract, or even trying to rent an apartment in Germany, the Schufa score - Germany’s credit rating - is decisive. If you have a few „points“ too little, yo...

Solutions – Aerial WiFi Motion Analytics

Our Solutions

Technology Overview

Our contextual technology is based on one key principle: simplicity. We rely on existing wireless signals to recognize people (and animals too), gather data about what they are doing and where they are located. Based on this data, we can automate workflows and provide contextual information that can be

Your ISP is Probably Spying On You

A while back I decided to no longer use the router given to me by my ISP. You may want to consider doing the same.

The Best Private Search Engines — Alternatives to Google

Private search engines have seen huge growth over the past few years. Until recently, it was unthinkable that anyone could compete with…

La Cour des comptes reconnaît l'intérêt du logiciel libre - Politique - Numerama

Dans son rapport public annuel 2018, la Cour des comptes a reconnu l'intérêt du logiciel libre, décrit comme un « puissant facteur d’efficience et d’influence » mais aussi une façon de répondre à un « enjeu de sécurité et de souveraineté ».

Electronics-recycling innovator faces prison for trying to extend computers' lives

Eric Lundgren is obsessed with recycling electronics. His Chatsworth company, IT Asset Partners, processes more than 41 million pounds of e-waste each year and counts IBM, Motorola and Sprint among its clients. But an idea he had to prolong the life of personal computers could land him in prison.

« Facebook nous prend en otage »
En vrac du vendredi - Standblog
Les conditions d'utilisation de Facebook condamnées en Allemagne - ZDNet
Facebook : jeune, allez viens, tu vas pas rester sur Snapchat - ZDNet

Ces utilisateurs se détournent de Facebook ? Pas grave puisque le géant avait justement modifié ses règles de confidentialité pour permettre les croisements de données entre ses différents services, dont Instagram, sa propriété.

La firme de Zuckerberg peut donc toujours offrir à ses clients la possibilité de cibler ces internautes. "Bien que l'utilisation de la principale application Facebook diminue chez les adolescents, les spécialistes du marketing pourront toujours les atteindre sur Instagram" notait d'ailleurs eMarketer l'année dernière.

Et la collecte de données de Facebook ne se cantonne nullement à ses seuls services et applications. Avec ses plugins sociaux intégrés dans pratiquement toutes les pages du Web, dont des forums et sites Web populaires parmi les ados, Facebook peut continuer de capter données et donc valeur.

Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by Hackers

The Sacramento Bee said in a statement that a firewall protecting its database was not restored during routine maintenance last month, leaving the 19,501,258 voter files publicly accessible. Additionally, the names, home addresses, email addresses, and phone numbers of 52,873 Sacramento Bee subscribers were compromised.

Car Hacker's Handbook
Firefox 59 : Mozilla veut renforcer la navigation privée - ZDNet

Firefox détaille une nouvelle fonctionnalité visant à améliorer la protection des utilisateurs de la navigation privée : l’URL de provenance, ou referrer, n’affichera plus que le nom de domaine et non l’URL de la page complète, afin d’éviter la fuite de données personnelles.

NanoCore/README.MD at master · NanoAdblocker/NanoCore · GitHub

An adblocker. Contribute to NanoAdblocker/NanoCore development by creating an account on GitHub.

PII-Oakland.pdf

Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface

Cookies (tiers), traceurs, fingerprint et compagnie : comment ça marche ?
Hébergement Xibo sous CentOS | Le blog technique de Microlinux
[btrfs] snapshot et rollback sur votre système Linux - LinuxFr.org

Ayant cherché pendant un certain temps à mettre en place une solution fonctionnelle permettant un retour arrière (rollback) suite à une mise à jour système défaillante, j'ai le plaisir de vous faire découvrir la recette magique. Nous verrons que la procédure est plus ou moins complexe suivant la distribution.

Encore une faille hautement critique dans Flash - ZDNet
Test de l'ordinateur portable Slimbook Katana 13 i5 - www.cypouz.com
Ubuntu 18.04 LTS Minimal Image Gets Even Smaller (30MB Compressed) | CNXSoft - Embedded Systems News
Un vendeur new-yorkais de faux abonnés Twitter visé par une enquête

Combien le "j'aime" ? Et combien le retweet ?

A Addis-Abeba, le siège de l’Union africaine espionné par Pékin

Il y a un an, les informaticiens du bâtiment, construit en 2012 par les Chinois, ont découvert que l’intégralité du contenu de ses serveurs était transférée à Shanghaï.

Preventing data leaks by stripping path information in HTTP Referrers | Mozilla Security Blog

To help prevent third party data leakage while browsing privately, Firefox Private Browsing Mode will remove path information from referrers sent to third parties starting ...

doc/PseudoDebloat.md · master · Christopher Roy Bratusek / NanoDroid · GitLab

microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android

Shotcut: Free, open source, cross-platform video editor | Hacker News
Election américaine : 1,4 million d’utilisateurs de Twitter confrontés à la propagande russe

Le réseau social a revu à la hausse le nombre de ses utilisateurs ayant interagi avec des comptes liés aux intérêts russes pendant la campagne présidentielle américaine de 2016.

https://senglehardt.com/papers/pets18_email_tracking.pdf
WebTAP Princeton University - Press
The Web never forgets: Persistent tracking mechanisms in the wild

The Web never forgets: Persistent tracking mechanisms in the wild is the first large-scale study of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in conjunction with evercookies.

The Document Foundation announces LibreOffice 6.0: power, simplicity, security and interoperability from desktop to cloud - The Document Foundation Blog

Berlin, January 31, 2018 – The Document Foundation announces LibreOffice 6.0, a major release and a dramatically improved free office suite, which celebrates the 7th anniversary of the availability of the very first version of LibreOffice. Today LibreOffice is more powerful, simple and secure, and offers superior interoperability with Microsoft Office documents.

LibreOffice 6.0 is immediately ...

Base de données SNIIRAM : la Cnil met en demeure l'Assurance maladie

Trois mois pour se mettre en conformité

Apple confirms it uses Google cloud for iCloud

A document contains Apple's first public acknowledgment that it is storing data for its iCloud services in Google's data centers.

Les Gafa règnent sur nos smartphones, reprenons le contrôle !

TRIBUNE. Nous avons passé malgré nous un pacte entre d’un côté le confort procuré et de l’autre la liberté abandonnée. L’enjeu deviendra démocratique s’il ne l’est pas déjà.

CGU : Bruxelles remet la pression sur Facebook et Twitter

La Commission satisfaite des efforts de Google

Citymapper permettait de tracer ses utilisateurs

35.000 personnes touchées par la faille

Google’s focus on AI means it will get even deeper into our lives - The Washington Post

Google's going to weave AI into every part of the company.

The #1 reason Facebook won’t ever change – Om Malik

Facebook’s (much deserved) media nightmare continued this week when it came under criticism for spamming members who signed up for two-factor authentication. This was followed by charges that its P…

Troy Hunt: I've Just Launched "Pwned Passwords" V2 With Half a Billion Passwords for Download

Last August, I launched a little feature within Have I Been Pwned (HIBP) I called Pwned Passwords. This was a list of 320 million passwords from a range of different data breaches which organisations could use to better protect their own systems. How? NIST explains: When processing requests to establish

Enquête télé « Le dilemme Microsoft, l'Europe colonisée par des logiciels » (ARD) | April
Chromium utilise les DNS publics Google à votre insu !
Instagram submits to Russia censor's demands - BBC News

Service blocks access to corruption claim-related posts despite YouTube failing to meet similar demand.

RF-Capture: Capturing the Human Figure Through a Wall

RF-Capture has many applications, like:

It can know who the person behind a wall is.

It can trace a person's handwriting in air from behind a wall.

It can determine how a person behind a wall is moving .

Facebook ordered to stop collecting user data by Belgian court | Technology | The Guardian

Social network instructed to delete illegally collected data or face €100m in fines after it loses case over consent and tracking

catt/README.rst at master · skorokithakis/catt · GitHub

catt - Cast All The Things allows you to send videos from many, many online sources to your Chromecast.

The URLs [1] [2] describe the content. I thought [1] was interesting but not ans... | Hacker News

The URLs [1] [2] describe the content. I thought [1] was interesting but not answering your question. [2] Answers your question, and shows black and white and thermal pictures.

[1] https://www.medgadget.com/2014/06/mits-wifi-system-detects-p... (June 2014)

[2] https://hackaday.io/project/5452-wifi-thermal-camera (2015)

[EDIT] I stand corrected, [2] is unrelated. My bad! Here's some good sources as alternative.

"MIT turns Wi-Fi Into Indoor GPS New tech from CSAIL lab lets one Wi-Fi device locate another to within centimeters" [3]

"RF-Capture: Capturing the Human Figure Through a Wall

It can know who the person behind a wall is. It can trace a person's handwriting in air from behind a wall. It can determine how a person behind a wall is moving." [4]

They also contain further resources.

[3] https://spectrum.ieee.org/tech-talk/telecom/wireless/mit-tur...

[4] http://rfcapture.csail.mit.edu/

Hey Microsoft, Stop Installing Apps On My PC Without Asking

I’m getting sick of Windows 10’s auto-installing apps. Apps like Facebook are now showing up out of nowhere, and even displaying notifications begging for me to use them. I didn’t install the Facebook app, I didn’t give it permission to show notifications, and I’ve never even used it. So why is it bugging me?

CIA, FBI et NSA conseillent d'éviter les produits Huawei et ZTE

Une loi est même en préparation

Why Ad Companies Love Google’s Ad Blocker, But Hate Apple’s Privacy Features

Google might sell hardware, but they’re an advertising company first and foremost. That’s how Google makes the vast majority their money, so it’s unlikely Google would ever do anything that would actually hurt advertising revenue.

Apple, meanwhile, makes basically all of their money from selling hardware and services, and next to nothing from advertising revenue. This means they see advertising less as a source of revenue and more as a potential annoyance for their users. 

Facebook promoting Onavo Protect without disclosing ownership

Facebook is now pointing some users to a secure wireless networking app without disclosing it's a Facebook-owned company.

The app, Onavo Protect, also tracks users' apps, how often they're used and what websites users visit.

Is social media causing childhood depression? - BBC News

Seven in 10 said Instagram made them feel worse about body image and half of 14-24-year-olds reported Instagram and Facebook exacerbated feelings of anxiety. Two-thirds said Facebook made cyber-bullying worse.

Meet the pirate queen making academic papers free online - The Verge

Alexandra Elbakyan runs Sci-Hub, a website with over 64 million academic papers available for free to anybody in the world.

Sortie de LibreOffice 6.0 - LinuxFr.org
Numérique Libre à l'ère du Cloud : se résigner à vivre dans écosystème Google ? - Tristan Nitot | April

Intervenant : Tristan Nitot

Google Won't Take Down 'Pirate' VLC With Five Million Downloads - TorrentFreak

VideoLAN, the team behind the VLC media player, recently revealed that they turned down several tens of millions of euros to bundle their software with advertising. The same cannot be said of third-party developers cloning VLC for profit, however. An ad-supported clone discovered on Google Play has a staggering five to ten million downloads and breaches VLC's GPL license, yet Google refuses to take it down.

The need for speed: Google dedicates engineering team to accelerate development of WordPress ecosystem

Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance & mobile experience. And they're hiring WordPress experts.

Présentation et usages de apt-cacher-ng – Blog Libre
Aral Balkan sur Twitter : "Today is apparently #DataPrivacyDay, so here goes: There is no such thing as “data privacy”, there is privacy. Data doesn’t have rights, people have a human right to privacy. Your data belongs to you & is a part of you. Data about people is people. See https://t.co/hLZZQT2dIY"

Today is apparently #DataPrivacyDay, so here goes: There is no such thing as “data privacy”, there is privacy. Data doesn’t have rights, people have a human right to privacy. Your data belongs to you & is a part of you. Data about people is people.
Same goes for “digital rights”. There are no digital rights, only human rights in the digital age. Speaking of “digital rights” and “data privacy” implies that those are separate to our human rights and to our privacy, paving the way for a different set of (lesser) protections.
To separate a person from their data is to strip the latter of its human rights, making it into an object to be commodified. Any rights thereupon conferred on the object will thus be lesser than those protecting the subject.
By treating people and their data as separate constructs – one a subject, the other an object – what you end up doing is commodifying people by slicing them into their constituent bits and bytes; ready to be sold off to the highest bidder.
And that, in a nutshell, is the business model of Silicon Valley: to digitise people and to own those digital copies.

Footej Camera - Android Apps on Google Play

L'application de la caméra simple mais fort pour capturer vos moments!

README.md · master · Christopher Roy Bratusek / NanoDroid · GitLab

microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android

Shotcut - Home

Shotcut is a free, open source, cross-platform video editor for Windows, Mac and Linux

LibreOffice 6.0 : nouveautés et interopérabilité - ZDNet
You are less anonymous on the web than you think — much less. | School of Engineering

Stanford Engineering Digital Magazine Article

http://randomwalker.info/publications/browsing-history-deanonymization.pdf
Online tracking: A 1-million-site measurement and analysis
The Follower Factory - The New York Times

Everyone wants to be popular online. Some even pay for it. Inside social media’s black market.

Privacy is Mainstream

24% of the population currently cares deeply enough about their online privacy to take significant actions to try to protect it.

Twitter Followers Vanish Amid Inquiries Into Fake Accounts - The New York Times

Federal and state authorities are investigating the sellers of artificial followers and other fraudulent social media engagement.