Monthly Shaarli
October, 2018
TL;DR: An undocumented API in Google home devices is easily exploitable. This command will reboot any on your local network: nmap –open -p 8008 192.168.1.0/24 | awk ‘/is up/ {print up};…
Hi-tech drones that look and move like real birds have already flown over restive Xinjiang region
Hackers obtained the Social Security numbers of more than 145 million Americans. Paid political chaos monkeys allegedly harvested data from at least 87 million Facebook profiles in an effort to…
A patent filing from Amazon considers Alexa gaining awareness of your emotional and physical state.
Italian investigation found software updates ‘significantly reduced performance’, hastening new purchases
Apple’s CEO Tim Cook has joined the chorus of voices warning that data itself is being weaponized against people and societies — arguing that the trade in digital data has exploded into a “data industrial complex”. Cook did not namecheck the adtech elephants in the room: Goo…
Download Bypass Paywalls for Firefox. The most comprehensive paywall bypasser on the internet. Bypass paywall (bypass wsj paywall) of many news sites (remove paywalls).
Block paywalls. Blocks paywalls.
Most manufacturers don't want you to fix your stuff. Motorola's not like most manufacturers. And today, Motorola becomes the first major smartphone manufacturer ever to supply OEM parts to iFixit. Learn more about our partnership.
The authenticity of the following anonymous op-ed has been verified by Medium’s editorial staff. Our columnist, Trevor Timm, has also interviewed the op-ed’s writer. You can read that here. When a…
THREAD: I'm looking at a Huawei P20 from China, let see what can I found
The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and manipulation is already happening.
The company knew about a privacy glitch and kept quiet. That has to stop.
Peut-on travailler sans utiliser des outils et des plateformes des poids lourds américains ? L’État répond positivement à cette question en publiant une liste de solutions alternatives.
Google exposed the private data of hundreds of thousands of users of the Google+ social network, though it didn’t find evidence of misuse. The company opted not to disclose the issue this past spring, in part because of fears doing so would draw regulatory scrutiny.
Anthony Aiello of San Jose, Calif., was charged in his stepdaughter’s death after her Fitbit showed her heart stopped beating while he was in her house, the police said.
Slate’s Use of Your Data
Selon le réseau social, il n’est pas possible de désactiver ce type de ciblage publicitaire dans les paramètres.
In a new study of the most downloaded apps for children ages 5 and younger, researchers found advertising in almost all of them.
The Copyright Office has spoken: consumers now have permission to break DRM and software locks in the name of repair. A huge victory for the #RightToRepair movement.
Beijing’s underground system is planning to introduce 'bio-identification' technology including facial recognition in what it says is an effort to streamline passenger flow through its stations.
Samba TV, which has deals to put its software on sets made by about a dozen TV brands, uses viewing data to make personalized show recommendations. But that’s not the big draw for advertisers.
The 2010s will be remembered as the first decade in which we, the people, paid for the pleasure of welcoming Big Brother into our lives.
A review of the company’s patents indicates Facebook’s commitment to collecting and exploiting detailed personal information.
Afin de comprendre comment se créent les faux avis sur le site de commerce en ligne, nous sommes entrés en contact avec une dizaine de fabricants avides de reconnaissance et prêts à tout pour décrocher de bonnes notes.
Apple often overestimates the cost of repairs to its products and threatens third-party shops who are willing to fix them for a fraction of the price.
Refinement, Productivity, & an Improved Developer Platform
Analyst Gartner, best known for crunching device marketshare data; charting technology hype cycles; and churning out predictive listicles of emergent capabilities at software’s cutting edge has now put businesses on watch that as well as dabbling in the usual crop of nascent technologies orga…
On the same day the company announced it had purged domestic sources of disinformation, it said it had blocked two companies, one of them with Russian government clients.
Google CEO Sundar Pichai refused to answer a list of questions from a bipartisan group of six senators.
Although the total number of trackers has decreased since GDPR came into effect, a few large tracking operators such as Google receive even more user data.
Sur le Darknet, le gardien de la paix était notamment en contact avec des membres du crime organisé.
Police officer also advertised a system to track the location of buyers' gang rivals or spouses based on the telephone numbers.
Failure to run Apple's proprietary diagnostic software after a repair "will result in an inoperative system and an incomplete repair."
Overall, 24 percent of U.S. users have deleted the app while 42 percent have taken a break of several weeks or more.
Beijing is putting billions of dollars behind facial recognition and other technologies to track and control its citizens.
The Hong Kong airline said personal details including passport and credit card numbers were accessed.
Amazon and Google have filed patent applications, many still under consideration, that outline how digital assistants can monitor more of what users say and do.
Clorox is using data from so-called smart thermometers to target ads to areas where people are sick. It’s the latest example of internet-connected devices being used for advertising.
Do you know what personal details your phone is sharing about you when you're not looking? We decided to try to find out for sure.
Amazon in June pitched its facial recognition technology as a tool for U.S. Immigration and Customs Enforcement.
Madison Square Garden, and Kennedy International Airport both use facial-recognition software to identify their customers. Who else does?
Firms paying refunds to buyers who write five-star reviews on Amazon, consumer group says
Who you call and what apps you use could determine what ads you see.
Fortune 500 Daily & Breaking Business News
Lost faith in Facebook and Instagram after data leakages, breaches and too much noise? Here’s a guide to breaking up with the social network and its photo-sharing app for good.
Facebook Inc. said intimate information, including search results, recent locations and hometowns, were stolen from 14 million users by attackers in a major hack of the social network disclosed two weeks ago.
Facebook is boring, it used to be great now it’s boring. I used to have 200 friends now I have 1500. There is no way I know 1500 people. Draconian measures must be taken to save my relationship with the social network. The unfriend button is my path to
The companies named in our bombshell report weigh in.
Add “a phone number I never gave Facebook for targeted advertising” to the list of deceptive and invasive ways Facebook makes money off your personal information. Contrary to user expectations and Facebook representatives’ own previous statements, the company has been using contact information that...