Monthly Shaarli
July, 2018
The Independent on the scene as police trial controversial new technology
Activists, dissidents and writers are gravitating to other social media platforms as Facebook appears to acquiesce to government censorship demands
C’est une fuite d’une ampleur rare. Vinny Troia, un chercheur en sécurité informatique, a découvert en juin une base de données contenant les informations personnelles d’environ 230 millions d’Américains et 110 millions d’entreprises, a rapporté le site spécialisé Wired mercredi 27 juin. Elle appartenait à l’entreprise Exactis, spécialisée dans le marketing et l’agrégation de données.
Au total, Vinny Troia a trouvé près de deux téraoctets de données, accessibles depuis Internet, concernant « presque tous les citoyens américains » : des nom, adresse, numéro de téléphone, adresse e-mails, âge, et des informations sur de potentiels centres d’intérêt comme le statut de fumeur, la religion, le genre des enfants ou encore la possession ou non d’animaux de compagnie. Plus de quatre cents variables par personne figurent dans la base, grâce à des méthodes que ne détaille pas la firme sur son site tout en assurant être en conformité avec la loi dans sa collecte de données.
KeePass is probably one of the most popular password managers. Simple, free and open source, it quickly became largely adopted at home and at work. Beware, a non-official website using an URL similar to the real one lets you download a tampered version of the password manager with some adware in it.
The Chrome team is delighted to announce the promotion of Chrome 68 to the stable channel for Windows, Mac and Linux. This will roll out ove...
Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant
Stay away from any websites or apps (there's numerous) powered by Metabrite's SDK. They data mine and resell [1] the receipts scanned.
Souvent, la réponse aux inquiétudes concernant la confidentialité de nos données consiste à dire que ceux qui ne transgressent pas la loi ...
What's the problem with ubiquitous surveillance? Don't think Orwell; think Kafka.
Quand on est, comme moi, un vieil activiste désabusé, il y a des lieux et des moments où on s’attend à déposer les armes.Se reposer l’esprit en assistant à un débat réunissant des gens qui partagent nos idées. Écouter tranquillement sans avoir à repérer les pièges et les non-dits. Lâcher prise.Et puis, paf le chien.
Apportez-moi deux lignes du plus honnête homme et jy découvrirai de quoi le faire pendre. -- Louis-Benoît Picard, inspiré de cette citation ...
Il est une question à laquelle j’avoue avoir du mal à répondre : « pourquoi la surveillance de masse est-elle néfaste à la société dans son ensemble ? ». Comme beaucoup, j’ai une
Games developers are removing data collecting software created by Red Shell after sleuthing players discovered it was recording their information
Google decided to make Maps its next billion dollar business by raising prices 14 times and decreasing free usage limit almost 30 times, all with minimal notice period. Fortunately, the move energised map competitors. Apple Maps, Mapbox, TomTom - which alternative is best for mid- and larger sites?
A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on the keyboard, according to a recently published research paper by three scientists from the University of California, Irvine (UCI).
European Commission - Press Release details page - European Commission - Press release Brussels, 18 July 2018 The European Commission has fined Google €4.34 billion for breaching EU antitrust rules. Since 2011, Google has imposed illegal restrictions on Android device manufacturers and mobile network operators to cement its dominant position in general internet search. Google must now bring
Une trouvaille qui fait froid dans le dos
Ces derniers mois beaucoup de personnes hésitent à quitter les réseaux sociaux, pour fuir les trolls, pour gagner du temps ou pour arrêter d'en perdre. Faux mouvement ou vraie réflexion, nos rapports aux réseaux sociaux évoluent.
It's getting harder to escape Google and other powerful tech companies. Here is a list of open-source or paid alternatives to every component of the Googleverse.
Labour officials ran a secret operation to deceive Jeremy Corbyn at last year’s general election, micro-targeting Facebook adverts at the leader and his closest aides to convince them the party was...
Popular secure messaging service Telegram loses battle with Russian courts and now must hand over encryption keys or face being blocked from the country.
Kudelski Security and X-41 D-Sec have published application-level security audits of Wire’s iOS, Android, web application, and calling…
WhatsApp also has the glaring vulnerability that Facebook could at any time reset your key to a compromised one without your knowledge, and WhatsApp will resend any hanging messages automatically upon the change, making any undelivered messages available to the one who has the decryption capability associated with that new key. It's possible they've put in a method to do this without notifying the user. Also, this "automatic resend" behavior means that a physical attack can be made simply by switching SIMs on the phone before the message is sent. It requires some careful timing to be a real vulnerability and anyone using a phone to communicate will certainly opt for a more secure platform for critical applications.
La collecte de données jusque dans les salons
Modération à plein régime
A group of simple, stupid, open source Android apps with customizable widgets, without annoying ads and unnecessary permissions.
In order to protect civil liberties without hampering innovation, lawmakers should require public input before surveillance tools are deployed and ensure that facial recognition databases are purged of data related to law-abiding people.
PwC vient de publier son Top 100 mondial
Des applis un peu trop curieuses
L'agence de surveillance US victime de son zèle
Les géants ne jouent pas le jeu
The issue appears to be affecting Galaxy S9 and Galaxy Note 8 users.
Privacy risks with Facebook’s PII-based targeting: auditing a data broker’s advertising interface Venkatadri et al., IEEE Security and Privacy 2018 This is one of those jaw-hits-the-floor, can’t qu…
Bing has made very significant investments in the area of deep learning, computer vision and artificial intelligence to support a number of different search scenarios. The Bing Maps team has been applying these techniques as well with the goal to increase the coverage of building footprints available for OpenStreetMap.
Hackers working for Russia claimed “hundreds of victims” last year in a long-running campaign that put them inside the control rooms of U.S. electric utilities where they could have caused blackouts, federal officials said.
In which I attempt to leave honest, critical reviews of products and am eventually not allowed, yet bots and fake reviews are everywhere.
After more than 2 decades relying on Windows, I was finally pushed over the edge and into the embrace of Ubuntu Linux. I haven't looked back.
The people who called into the help hotlines and domestic violence shelters said they felt as if they were going crazy.
One woman had turned on her air-conditioner, but said it then switched off without her touching it. Another said the code numbers of the digital lock at her front door changed every day and she could not figure out why. Still another told an abuse help line that she kept hearing the doorbell ring, but no one was there.
Their stories are part of a new pattern of behavior in domestic abuse cases tied to the rise of smart home technology. Internet-connected locks, speakers, thermostats, lights and cameras that have been marketed as the newest conveniences are now also being used as a means for harassment, monitoring, revenge and control.
Pop!_OS is beautiful, thanks in no small part to a consistent minimalist visual style and Kate Hazen’s beautiful space-themed illustrations. Pop!_OS 18.04 is a GNU/Linux distribution curated by US-based computer maker System76. It is the state of the art in usability and experience when it comes to desktop Linux today1.
The genius of the System76 team was in realising that all the components for a usable, convenient, and delightful GNU/Linux desktop experience are already here, they’re just not tastefully curated.
Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted email interoperability. Starting with the latest release of ProtonMail on web (v3.14), iOS and Android (v1.9), and the latest versions of the ProtonMail IMAP/SMTP Bridge, ProtonMail now supports Address Verification, along with full PGP interoperability …
In early July, Intel issued security advisories SA-00112 and SA-00118 regarding fixes for vulnerabilities in Intel Management Engine. ...
Supporters of wholesale government surveillance are fond of saying that only the guilty should be worried about spying. Let's put that spurious argument out to pasture once and for all. Commentary by Bruce Schneier.
On entend régulièrement la formule « Celui qui n'a rien à se reprocher n'a rien à cacher ». Cet aphorisme devrait vous rassurer lorsque vous vous inquiétez de l'invasion des technologies dans votre vie. Je voudrais illustrer la tromperie de cette phrase au travers d'une anecdote réelle, vécue à une
Une étude américaine montre que la surveillance gouvernementale incite les internautes à taire leurs opinions quand ils les considèrent minoritaires.
<p>En vous observant, Facebook peut deviner quand vous tombez amoureux, Google sait quelles langues vous parlez ou si vous avez l’habitude de fréquenter un lieu de culte.</p>
La position controversée de Zuckerberg
Cisco has released 25 security updates yesterday, including a critical patch for Cisco Policy Suite that removes an undocumented password for the "root" account.
TED Talk Subtitles and Transcript: Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you're "not doing anything you need to hide."
Working with publicly available metadata from Twitter, a machine learning algorithm was able to identify users with 96.7 per cent accuracy
Just found out the car I drive from @Ford has an app that enables the car’s location to be tracked. There are good reasons I might not want someone else who drives the car to know my location. Dealership laughed at my privacy concerns. This just seems wrong to me.
tridactyl - Implementing Vimperator/Pentadactyl as a WebExtension.
• Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook• Companies deny any knowledge of program in operation since 2007
Firm removes category, which affected 65,000 people, from ad tools, following safety fears
Membership in closed groups was easily accessible before the change
Documenting here Wire's restrictions on CORS(Cross-Origin Resource Sharing). Without this change, building on top of Wire's open source project is not an option. This is a continuation of g...
On Friday, the Tagansky District Court in Moscow is expected to rule on a request by Roskomnadzor, the Russian media watchdog, to block Telegram for its refusal to provide the Federal Security Service (FSB) with backdoor access to encrypted messages.
Tech companies have changed the world by building answers to obvious questions — but now the obvious, pressing questions are about them.
Samba TV, which has deals to put its software on sets made by about a dozen TV brands, uses viewing data to make personalized show recommendations. But that’s not the big draw for advertisers.
Apple has removed Telegram’s official app from its iOS App Store. The app disappeared yesterday, shortly after Telegram launched a rewritten Telegram X app for Android. Telegram X is currently in...
Today the American Civil Liberties Union Foundations of California released emails between Amazon employees and local law enforcement revealing how the company has been pushing its facial re
Contre l'obsolescence programmée
Le passe-droit abusif accordé par Google
La faille de sécurité de l'application Nametests
Because of their side effects, browser fingerprinting countermeasures may have a negative impact on users privacy. In this post we look more in details at Canvas Defender, a canvas fingerprinting countermeasure.
Protect the nudes
Facebook told US lawmakers that while it imposed new data-sharing restrictions on most app developers in May 2015, 61 companies received a special 'one-time' extension.
It was Jan last year that I suggested HTTPS adoption had passed the "tipping point", that is, it had passed the moment of critical mass and as I said at the time, "will very shortly become the norm". Since that time, the percentage of web pages
Utiliser une montre connectée pour suivre ses performances physiques n'est parfois pas sans conséquence sur sa vie privée. Sur Polar Explorer, il était encore récemment possible de remonter jusqu'à l'adresse personnelle de personnes s'entrainant dans des lieux réputés sensibles. Une faille est aussi évoquée, mais Polar réfute.
Researchers found 20 flaws in Samsung’s SmartThings Hub controller - opening up supported third-party smart home devices to attack.
Amazon’s face surveillance technology is the target of growing opposition nationwide, and today, there are 28 more causes for concern. In a test the ACLU recently conducted of the facial recognition tool, called “Rekognition,” the software incorrectly matched 28 members of Congress, identifying them as other people who have been arrested for a crime. The members of Congress who were falsely matched with the mugshot database we used in the test include Republicans and Democrats, men and women, and legislators of all ages, from all across the country.
Un rapport prouve l’inefficacité de la vidéosurveillance
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. -- David Cole
Social media company to provide details of spending on ads targeting Irish voters
For the past year, Android malware authors have been increasingly relying on a solid trick for bypassing Google's security scans and sneaking malicious apps into the official Play Store.
Would you publish your passwords?
La Commission européenne frappe fort
Ouf, rien ne change pour les particuliers
Mark Zuckerberg is making bank on your information.
Forget cookies. America's Girl Scouts are learning to pick locks and hack computers as an inside track toward careers in science and tec
ATM skimming is on the rise and getting more sophisticated.
Open and edit PSD, XCF, Sketch (Photoshop, Gimp and Sketch) or any other image files. Inspect PSD and Sketch files. Convert Sketch to PSD. Apply photo effects and filters. A perfect alternative to Photoshop or Gimp.
Quitting Facebook, and the hope of a new, socially conscious, open-source social network for good.
Social network categorises users based on potentially sensitive interests such as Islam or homosexuality
OpenStreetMap is a map of the world, created by people like you and free to use under an open license.
2018, l'année de la fuite
Earlier this year, we started open sourcing Wire server code under the AGPL license. Today, the code necessary to run Wire servers is…
Many don't seem to understand why I object to @Telegram having unsafe, censorable public channels in an app that is promoted as a secure messenger. Some presumed I just don't understand how channels work. So let's talk about it
Twitter will begin removing tens of millions of suspicious accounts from follower numbers, signaling a major new effort to fight fraud and restore trust on the platform.
Plus de 50 000 € pour le YouTube décentralisé
I often recommend F-Droid to my Android-using friends. F-Droid is an alternative app store which contains only Free and Open Source Software (FOSS). It's great because the apps are almost all not evil. Did you know that a flashlight app doesn't need access to your contacts, location, and pictures? Did you know that every app doesn't need to serve you ads?
Samba TV, which has deals to put its software on sets made by about a dozen TV brands, uses viewing data to make personalized show recommendations. But that’s not the big draw for advertisers.
Pas de chantage en cas de piratage
Le navigateur signalera les comptes compromis
Before it became a covert surveillance tool disguised as an outstanding browser extension, Stylish really was an outstanding browser extension. It bestowed upon its users nothing less than the power to change the appearance of the internet. Its extensive bank of user-made skins gave bright websites a dark background, undid disliked UI changes, and added manga pictures to everything that wasn’t a manga picture already. I spent many wonderful hours in its simple CSS editor, hiding the distracting parts of the web whilst unknowingly being spied on. Facebook news feed...
And how it might change what cops can do with our smartphones.