Monthly Shaarli
January, 2019
India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions. The server, hosted in a regional Mumbai-based data center, stored two months of data from SBI Quick, a text mess…
Les câbles d'affichage cassés sur les modèles MacBook Pro fabriqués en 2016 ou plus tard nécessitent de remplacer totalement l’écran. Et cela ne satisfait pas du tout les clients Apple concernés.
Male impotence, substance abuse, right-wing politics, left-wing politics, sexually transmitted diseases, cancer, mental health. Those are just a few of the advertising labels that Google’s adtech infrastructure routinely sticks to Internet users as it watches and tracks what they do online in…
During me being at my parents over the holidays (Christmas 2017) I had the usual IT-support stuff to do, that always happens to tech sa...
When the tech giant helps Wikipedia, it’s also helping itself.
Shoshana Zuboff’s “The Age of Surveillance Capitalism” looks at the new power of behemoths like Facebook and Google.
Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1". Most of them won't have a tech background or be familiar with the concept of credential stuffing so I'm going to write this post for the masses
Download View Image for Firefox. Re-implements the google image, "View Image" and "Search by Image" buttons.
Most Raspberry Pi cases are not really newsworthy, but there's an unnamed case for Raspberry Pi 2 & 3 boards sold for $15.99 on Banggood that looks
How much of your digital life would you lose if you lost a single password? Without it, you are locked out and the cold reality of using free cloud services like Google is that you don’t have a human arbiter to help you. If you think back to earlier times where, say you lost your bank [&helli…
In 2016, doctors’ identities were decrypted in Australian medical records. Now, a University of Melbourne team finds patients’ records can also be re-identified
The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.
There’s a security best practice where sign ins aren’t supposed to say “password is incorrect”. Instead they’re supposed to say the…
The WordPress repository recently removed the plugin Captcha over what initially appeared to be a trademark issue with the current author using “WordPress” [Editors note: the original page has been removed, we’re now linking to a screen shot.] in their brand name. Whenever the WordPress repository removes a plugin with a large user base, we check ...Read More
Sources disclosed troubling privacy practices at a Ring office in Ukraine.
:shipit: A look at how LinkedIn spies on its users. - dandrews/nefarious-linkedin
In a lawsuit on Thursday, the city attorney said tracking was used not just for local forecasts but also for commercial purposes like targeted marketing.
Une ONG a découvert que des données étaient envoyées à Facebook, même lorsque leur utilisateur ne disposait pas de compte sur le réseau social.
Desperate for data on its competitors, Facebook has been secretly paying people to install a “Facebook Research” VPN that lets the company suck in all of a user’s phone and web activity, similar to Facebook’s Onavo Protect app that Apple banned in June and that was removed i…
Being treated as lab rats for algorithms is not an option, says the German justice minister in a response to Mark Zuckerberg and explains how Facebook must be regulated.
En 2018, le budget de lobbying aux Etats-Unis de Google, Amazon et Facebook a augmenté de 13%. Depuis 2013, les montants ont évolué de 69% pour l'ensemble des géants de la tech, Microsoft et Apple compris.
Google's public version of events of how it came to secretly intercept Americans' data sent on unencrypted Wi-Fi routers over a two-year period doesn't quite mesh with what the search giant told federal regulators. And if Google had its way, the public would have never learned the software on Google's Street View mapping cars was "intended" to collect payload data from open Wi-Fi networks.
Employers flood the ranking site with 5-star postings requested from enthusiastic staffers, leading to unusual spikes, a WSJ investigation found. This is a conundrum facing many influential raters, including Amazon.com, Yelp and TripAdvisor, who have had to fend off attempts to game reviews.
Smart TVs have never been more affordable. Turns out there's a reason for that.
tl;dr:
ads are everywhere and aren’t so fun everyone is trying to track you (for better or worse) Pi Hole is awesome; it’s a network-level adblocker and runs on a Raspberry Pi streisand gives you a quick way to set up a censorship-resistant and secure server running a number of VPNs/proxies (OpenVPN, Shadowsocks, Wireguard, and more!) you can combine them to get a secure & resilient connection with network-level ad-blocking everywhere you go (iOS/android, linux, mac OS, windows, etc.
A new start-up company called eelo wants to provide you with an alternative version of Android. What makes this different than the version of the mobile OS that you are familiar with is that this version is de-Google-ized. The goal is to allow users to have more privacy than they currently do with the Google Play Services version of the open source OS...
Among storage components, hard disk drives (HDDs) have become the most
commonly-used type of non-volatile storage due to their recent technological
advances, including, enhanced energy efficacy and significantly-improved areal
density. Such advances in HDDs have made them an inevitable part of numerous
computing systems, including, personal computers, closed-circuit television
(CCTV) systems, medical bedside monitors, and automated teller machines (ATMs).
Despite the widespread use of HDDs and their critical role in real-world
systems, there exist only a few research studies on the security of HDDs. In
particular, prior research studies have discussed how HDDs can potentially leak
critical private information through acoustic or electromagnetic emanations.
Borrowing theoretical principles from acoustics and mechanics, we propose a
novel denial-of-service (DoS) attack against HDDs that exploits a physical
phenomenon, known as acoustic resonance. We perform a comprehensive examination
of physical characteristics of several HDDs and create acoustic signals that
cause significant vibrations in HDD's internal components. We demonstrate that
such vibrations can negatively influence the performance of HDDs embedded in
real-world systems. We show the feasibility of the proposed attack in two
real-world case studies, namely, personal computers and CCTVs.
Nick Winke, a photographer in the Pacific northwest, was perusing internet forums when he came across a complaint that alarmed him: On certain Samsung Electronics Co. smartphones, users aren’t allowed to delete the Facebook app.
Welcome to 2019 where we learn Facebook is the new crapware. Sorry #DeleteFacebook, you never stood a chance. Yesterday Bloomberg reported that the scandal-beset social media behemoth has inked an unknown number of agreements with Android smartphone makers, mobile carriers and OSes around the world…
The overall number of guests affected by the hacking, in which Chinese intelligence is the leading suspect, declined to 383 million. But the passport data is critical to intelligence agencies.
Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools. App developers share data with Facebook through the Facebook Software Development Kit (SDK), a set of software development tools that help developers build apps for a specific operating system. Using the free and open source software tool called "mitmproxy", an interactive HTTPS proxy, Privacy International has analyzed the data that 34 apps on Android, each with an install base from 10 to 500 million, transmit to Facebook through the Facebook SDK.
Expect the consequences to be fairly immediate: More in-person time with friends and family. Less political knowledge, but also less partisan fever. A small bump in one’s daily moods and life satisfaction. And, for the average Facebook user, an extra hour a day of downtime.
Facebook are going to monetize encrypted messaging by consolidating metadata analysis of 3 key platforms (Messenger, Whatsapp & Instagram). They will make money by tracking your relationships and social groups. They will make that information easily accessible to law enforcement.
Mark Zuckerberg vient de se lancer dans une grosse campagne de communication en publiant une tribune simultanément dans plusieurs très grands journaux dont Le Monde ou le Wall Street Journal. Elle est intitulée : "Je souhaite clarifier la manière dont...
Google's sibling company Sidewalk Labs offers planning agencies the ability to model an entire city's patterns of movement.
Unsealed internal documents show the company orchestrated a multi-year effort that duped children and their parents out of money.
Facebook’s own employees worried they were bamboozling children who racked up hundreds, and sometimes even thousands, of dollars in game charges, documents show.
Download Violentmonkey for Firefox. Violentmonkey provides userscripts support for browsers.
It's open source! <a rel="nofollow" href="https://outgoing.prod.mozaws.net/v1/c8bcebd9a0e76f20c888274e94578ab5957439e46d59a046ff9e1a9ef55c282c/https%3A//github.com/violentmonkey/violentmonkey">https://github.com/violentmonkey/violentmonkey</a>
It’s always difficult admitting you’re wrong. But sometimes, it’s exactly what you have to do in the face of overwhelming evidence to the contrary. So, today, I admit that I was wrong about Google, Facebook, and surveillance capitalism in general being toxic for our human rights and democracy.
You see, it simply cannot be true given how they are endorsed by some of the most well-respected groups and organisations in the world.
With the aim of informing sound policy about data sharing and privacy, we
describe successful re-identification of patients in an Australian
de-identified open health dataset. As in prior studies of similar datasets, a
few mundane facts often suffice to isolate an individual. Some people can be
identified by name based on publicly available information. Decreasing the
precision of the unit-record level data, or perturbing it statistically, makes
re-identification gradually harder at a substantial cost to utility. We also
examine the value of related datasets in improving the accuracy and confidence
of re-identification. Our re-identifications were performed on a 10% sample
dataset, but a related open Australian dataset allows us to infer with high
confidence that some individuals in the sample have been correctly
re-identified. Finally, we examine the combination of the open datasets with
some commercial datasets that are known to exist but are not in our possession.
We show that they would further increase the ease of re-identification.
A political website pulled an article after Google’s AdSense team threatened to withdraw advertising.
Boutique propulsée par PrestaShop
Le règlement européen sur la protection des données personnelles place le consentement de l’individu au cœur de son approche. Le responsable de traitement doit répondre à de nouvelles exigences notamment en matière d’informations. Check-list des mesures à prendre.
University researchers push the limits of Google’s experimental radar hardware
We present an innovative technique to detect ads in radio streams and podcasts, featuring machine learning and Shazam-like detection. It works pretty well!
Don’t Let the Tail Wag the Dog
Une professeure d'informatique a publié sur la plateforme Medium un long article mettant à jour les nombreux moyens mis en place par Facebook pour suivre à la trace ses utilisateurs.Facebook...