Back to home

Articles tagged with "privacy"

GitHub user creates open-source Nvidia GeForce Now client alternative — removes tracking, telemetry, and AFK limitations

GitHub user creates open-source Nvidia GeForce Now client alternative — removes tracking, telemetry, and AFK limitations

A GitHub user has developed an open-source alternative to Nvidia GeForce Now called OpenNOW, which removes tracking, telemetry, and AFK limitations. This client allows gamers to connect to Nvidia's cloud gaming service with added features not available on the original client. OpenNOW supports Linux natively and can stream games up to 4K@240 FPS, offering smoother gameplay. While it lacks some features like flight controls and Discord integration, it provides more privacy and customization options for users who prefer more control over their data.

Tom's Hardware
LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

LinkedIn has been accused of spying on users through a JavaScript script that scans visitors' browsers for over 6,000 Chrome extensions and collects hardware data like CPU core count and screen resolution. The script also gathers device telemetry such as time zone and battery status. Many of the targeted extensions are LinkedIn-related tools, including those from competitors like Apollo and ZoomInfo. LinkedIn claims the scanning is to detect extensions that violate its terms of service, but the data collected could potentially be used to identify individuals. This aggressive client-side fingerprinting technique is not unique to LinkedIn, as other platforms like eBay have been found to engage in similar practices.

Tom's Hardware
GrapheneOS refuses to comply with new age verification laws for operating systems — group says it will never require personal information

GrapheneOS refuses to comply with new age verification laws for operating systems — group says it will never require personal information

GrapheneOS, a privacy-focused Android fork, has announced it will not comply with new laws requiring operating systems to collect user age data at setup. The project emphasized that it will never require personal information, identification, or an account to use GrapheneOS. This decision comes in response to emerging laws like Brazil's Digital ECA and California's Digital Age Assurance Act, which mandate age verification for OS providers. GrapheneOS's stance reflects a broader trend of companies, like DB48X and MidnightBSD, refusing to implement age verification measures in their software. Critics argue that such laws create surveillance infrastructure without effectively protecting children.

Tom's Hardware
“Sensorveillance” Turns Ordinary Life Into Evidence

“Sensorveillance” Turns Ordinary Life Into Evidence

The article discusses the concept of "sensorveillance," where everyday devices inadvertently serve as sources of evidence for law enforcement. Author Andrew Guthrie Ferguson explores how consumer electronics and telecommunications devices have transformed into default informants for police investigations. The piece delves into the implications of this phenomenon on privacy and surveillance in daily life.

IEEE Spectrum
MIT Technology Review

Is the Pentagon allowed to surveil Americans with AI?

The ongoing dispute between the Department of Defense and AI company Anthropic raises questions about the legality of the Pentagon conducting mass surveillance on Americans. OpenAI, a rival AI company, initially allowed the Pentagon to use its AI for "all lawful purposes," sparking concerns about domestic surveillance. However, OpenAI has since amended its contract to prevent its AI from being used for domestic surveillance. The use of AI in surveillance poses challenges as laws have not kept pace with technological advancements, allowing for extensive data collection on Americans without clear restrictions. Lawmakers are beginning to address these concerns, with Senator Ron Wyden seeking bipartisan support for legislation to address mass surveillance.

MIT Technology Review
LLMs can unmask pseudonymous users at scale with surprising accuracy

LLMs can unmask pseudonymous users at scale with surprising accuracy

Researchers have found that AI can be used to unmask pseudonymous users on social media platforms with high accuracy, potentially compromising online privacy. The success rate of identifying users was as high as 68%, with a precision rate of up to 90%. This discovery challenges the assumption that pseudonymity provides adequate protection online. By linking posts across different platforms and using large language models, researchers were able to de-anonymize users and gather personal information, raising concerns about doxxing and stalking. The study highlights the need to reassess online privacy measures in the face of advancing AI technologies.

Ars Technica
Exploring the future of Artificial Intelligence — today's models, tomorrow's agents, and the big privacy problem

Exploring the future of Artificial Intelligence — today's models, tomorrow's agents, and the big privacy problem

The article delves into the current state and future of Artificial Intelligence (AI), highlighting the rapid advancements in AI models and their impact on various industries. It discusses the challenges and risks associated with AI, such as hallucination, knowledge uncertainty, and overconfidence in answers. The piece also explores the evolution of AI models, including their reasoning capabilities, multi-modality, and training set sizes, emphasizing the importance of trust in AI outputs. Furthermore, it touches on popular AI models from different vendors like OpenAI, Google, Anthropic, xAI, and Mistral AI, showcasing their unique features and improvements. The article concludes by addressing the privacy concerns surrounding AI, the potential integration of AI into software ecosystems, and the growing influence of AI agents in shaping the future of technology.

Tom's Hardware
MIT Technology Review

Now is a good time for doing crime

The article discusses how advancements in technology create new opportunities for crime and ways to combat it. The author shares a personal experience of being hacked through social engineering tactics. Technology constantly evolves, leading to new vulnerabilities and tactics for criminals, while law enforcement adapts to leverage technology for investigations. The piece highlights the ongoing cat-and-mouse game between crime and law enforcement, emphasizing the need for updated security measures and surveillance to combat modern crimes effectively.

MIT Technology Review
MIT Technology Review

Inside Chicago’s surveillance panopticon

The article discusses the extensive surveillance network in Chicago, including tens of thousands of cameras and technologies like ShotSpotter. While some believe this surveillance enhances public safety, others argue it creates a surveillance panopticon that infringes on privacy and free speech. Activists like Lucy Parsons Labs have pushed back against surveillance technologies, such as license plate readers, by filing FOIA requests and analyzing data to reveal disparities and inefficiencies. The article also highlights the work of individuals like Brian Strockis, who pioneered the use of drones in law enforcement, and Mark Wallace, who advocates against red-light and speed cameras in Chicago. Additionally, it mentions the legal challenges faced by individuals like Derick Scruggs, who was detained due to a ShotSpotter alert, leading to a settlement prohibiting such actions in the future.

MIT Technology Review
MIT Technology Review

How uncrewed narco subs could transform the Colombian drug trade

Uncrewed narco subs are becoming a new challenge in the Colombian drug trade, with a recent interception revealing a fully autonomous vessel carrying no crew or drugs. These uncrewed subs, equipped with advanced technology like autopilot systems and satellite internet connections, could revolutionize drug smuggling by increasing cargo capacity and reducing risks for traffickers. Law enforcement agencies are now facing the dilemma of how to combat this new threat, as uncrewed narco subs present unique challenges in detection and interception. The potential rise of autonomous drug subs signifies a significant technological advancement in the ongoing battle against drug trafficking organizations.

MIT Technology Review
Lenovo denies allegations of transferring data to China — class action lawsuit alleges company uses trackers to expose American behavioral data to ‘foreign adversaries’

Lenovo denies allegations of transferring data to China — class action lawsuit alleges company uses trackers to expose American behavioral data to ‘foreign adversaries’

A class-action lawsuit has been filed against Lenovo by the U.S.-based Almeida Law Group, accusing the company of transferring data to China in violation of U.S. Department of Justice rules. The lawsuit alleges that Lenovo's actions expose American behavioral data to potential surveillance by foreign adversaries. Lenovo has denied these allegations, stating that it complies with global data protection laws and regulations. The lawsuit claims that Lenovo's data practices pose a threat to national security by potentially enabling coercion, reputational harm, or blackmail. The lawsuit also highlights Lenovo's ties to China through its parent company and incorporation in Hong Kong, raising concerns about compliance with Chinese regulations that mandate data cooperation with authorities.

Tom's Hardware
Dutch authorities allegedly seize VPN server without a warrant — company claims that law enforcement will return it after analyzing the device fully

Dutch authorities allegedly seize VPN server without a warrant — company claims that law enforcement will return it after analyzing the device fully

Dutch authorities allegedly seized a VPN server from Windscribe without a warrant, claiming they will return it after analyzing it. Windscribe asserts that the server only contains a stock Ubuntu install due to its use of RAM disk servers, ensuring no trackable data is stored. The company emphasizes that it does not retain personal user data and has complied with zero data requests to date. While the authorities' intentions remain unclear, the incident raises questions about user privacy and the limitations of VPN services in providing complete anonymity.

Tom's Hardware
Russian 'Inspector' spacecraft intercepted communications from a dozen European satellites, report claims — fears Moscow could even manipulate trajectories or crash satellites

Russian 'Inspector' spacecraft intercepted communications from a dozen European satellites, report claims — fears Moscow could even manipulate trajectories or crash satellites

European officials suspect that two Russian "Inspector" spacecraft in geostationary orbit have intercepted communications from around twelve European satellites, raising concerns about potential manipulation or crashes. The spacecraft, associated with the Luch program, have made risky approaches to critical European satellites, with one craft approaching 17 satellites since its 2023 launch. There are worries that unencrypted command data from older satellites could be exploited to interfere with satellite functions like trajectory control or altitude, posing significant risks in shared orbital slots. This activity blurs the line between intelligence gathering and interference, with European defense officials expressing concerns about Russian satellite shadowing and potential military space operations.

Tom's Hardware
Russian ship loitering near transatlantic data cables chased off by Royal Navy attack helicopter — sat within three quarters of a mile of five undersea data cables, including two linking Britain to New York

Russian ship loitering near transatlantic data cables chased off by Royal Navy attack helicopter — sat within three quarters of a mile of five undersea data cables, including two linking Britain to New York

A Russian cargo ship, the Sinegorsk, was found loitering near five transatlantic undersea data cables, including crucial links between Britain and New York. The Royal Navy deployed a Wildcat helicopter to chase the vessel out of British waters, highlighting the importance of protecting undersea infrastructure. This incident comes amidst heightened awareness of undersea cable security following previous sabotage attempts. The UK Department for Transport issued a warning to the ship, emphasizing the ongoing threats posed by Russia and the need to safeguard critical infrastructure. The Ministry of Defence affirmed its commitment to monitoring and addressing threats to undersea cables.

Tom's Hardware
MIT Technology Review

What AI “remembers” about you is privacy’s next frontier

AI's ability to remember user preferences is a key feature in chatbots like Google's Gemini, but it raises privacy concerns as these systems store and retrieve intimate details. The integration of personal data across different contexts can lead to privacy breaches and influence decisions without users' awareness. Developers are urged to create structured memory systems that allow control over data access and usage, as well as provide users with transparent interfaces to manage their stored information. Additionally, AI providers must establish strong defaults and technical safeguards to protect user privacy in the face of increasingly personalized AI systems.

MIT Technology Review
Undersea cable cutting shenanigans lead Finland to create a dedicated maritime surveillance center — Russian shadow fleet operations heighten concerns in the Baltic Sea

Undersea cable cutting shenanigans lead Finland to create a dedicated maritime surveillance center — Russian shadow fleet operations heighten concerns in the Baltic Sea

Finland is establishing a maritime surveillance center to monitor the Baltic Sea due to a series of incidents involving undersea telecoms cables being damaged by sea vessels. The country has experienced multiple incidents impacting its infrastructure since 2023, prompting the need for enhanced monitoring. The surveillance center will utilize technologies like seabed sensors, AI analysis of maritime traffic, and improved vessel information exchange with allies to prevent future disruptions. Concerns have been raised about Russia's shadow fleet operations in the Baltic Sea, adding to the urgency of securing the region's submarine cables.

Tom's Hardware
Microsoft gave customers' BitLocker encryption keys to the FBI — Redmond confirms that it provides recovery keys to government agencies with valid legal orders

Microsoft gave customers' BitLocker encryption keys to the FBI — Redmond confirms that it provides recovery keys to government agencies with valid legal orders

Microsoft complied with an FBI search warrant in 2025 to provide encryption keys for three laptops, allowing the agency access to data they couldn't otherwise read. While Microsoft receives around 20 requests annually for BitLocker keys, most fail due to users not storing recovery keys in the cloud. This incident marks the first known instance of Microsoft providing such assistance to the government. BitLocker is Microsoft's encryption system for Windows 11, designed to prevent unauthorized access but can lead to data loss if keys are forgotten. The practice of backing up BitLocker keys online raises concerns about potential government access, contrasting with Apple and Meta's encryption systems that safeguard stored keys.

Tom's Hardware
Measles is surging in the US. Wastewater tracking could help.

Measles is surging in the US. Wastewater tracking could help.

Scientists are turning to wastewater tracking to help limit measles outbreaks in the US as vaccination rates drop and cases surge. Wastewater surveillance has shown promise in quickly identifying new cases of measles, potentially giving public health officials a head start in containment efforts. Studies have demonstrated the presence of measles RNA in wastewater samples, allowing for early detection even before clinical cases are confirmed. While there are limitations to this approach, such as the inability to pinpoint individual infections, it has already led to public health departments taking action based on the data collected.

MIT Technology Review
Steam client allegedly continues sharing your status with your friends even if you set it ‘Offline,’ report claims — setting is a ‘UI illusion’ and your friends still receive real-time updates when you log on or log off

Steam client allegedly continues sharing your status with your friends even if you set it ‘Offline,’ report claims — setting is a ‘UI illusion’ and your friends still receive real-time updates when you log on or log off

The Steam client reportedly continues to share your log-on and log-off times with friends, even if you set your status as "Offline" or "Invisible." This leak bypasses privacy settings, allowing friends to see real-time updates of your activity. Despite raising the issue to Valve, the company dismissed it as "Informative," stating the packets are only sent to trusted friends on Steam. However, this could be concerning for users who have added unknown individuals as friends on the platform.

Tom's Hardware
Japanese city deploys anti-bear drones as 'human casualties at an all-time high' — non-lethal spray can be delivered with 10cm accuracy radius, 1km range

Japanese city deploys anti-bear drones as 'human casualties at an all-time high' — non-lethal spray can be delivered with 10cm accuracy radius, 1km range

A Japanese city is implementing anti-bear drones due to a surge in bear encounters, injuries, and deaths. The drones, developed by Terra Drone, can accurately deliver non-lethal spray within a 10cm radius up to 1km away. Factors contributing to the rise in human-bear conflicts include declining hunting licenses and urban encroachment on bear habitats. Terra Drone's drone system aims to provide a safe and effective solution to mitigate bear-related incidents in Japan.

Tom's Hardware
The nation’s strictest privacy law just took effect, to data brokers’ chagrin

The nation’s strictest privacy law just took effect, to data brokers’ chagrin

A new privacy law in California, one of the strictest in the nation, has come into effect, giving residents more control over their personal data being hoarded and sold by data brokers. These brokers collect information from various sources and sell it to marketers and others. A previous law, the Delete Act, required data brokers to provide residents with their data and delete it upon request, but only 1% of Californians utilized this right due to the burden of filing requests with each broker individually. The new law, DROP (Delete Request and Opt-out Platform), simplifies the process by allowing residents to submit a single request to have their data deleted and no longer collected by all brokers.

Ars Technica
MIT Technology Review

Meet the man hunting the spies in your smartphone

Ronald Deibert, founder of the Citizen Lab, has dedicated two decades to uncovering digital threats and surveillance. His work has exposed cyberthreats and digital abuses globally, including espionage networks and surveillance tactics. Despite facing risks and surveillance himself, Deibert continues to lead the lab in investigating authoritarian regimes and digital repression. The lab's research has influenced policies and sanctions on spyware vendors, earning praise for its impact on human rights advocacy. Deibert expresses concerns about the erosion of democracy and academic freedom in the US, emphasizing the importance of the lab's independent location in Canada for its continued work.

MIT Technology Review
US smart home company accused of rebranding footage-leaking Chinese cameras — Nebraska AG to sue Resideo over selling banned security cameras

US smart home company accused of rebranding footage-leaking Chinese cameras — Nebraska AG to sue Resideo over selling banned security cameras

Nebraska Attorney General Mike Hilgers is suing smart home company Resideo for allegedly selling banned security cameras under its Capture brand without disclosing that the OEMs were Chinese companies Hikvision and Dahua. The lawsuit claims Resideo violated consumer protection laws by selling insecure cameras to customers. This legal action is part of a broader trend of lawsuits against sellers of Chinese smart devices in the U.S., with similar cases in Texas and Arizona. The scrutiny of Chinese OEMs in household electronics is expected to continue as concerns over security and privacy persist.

Tom's Hardware
Russia has reportedly improved the range of its jam-proof optical drones to over 40 miles — purported Chinese-Russian collaborative production imagery reveals dramatically increased tethered drone range

Russia has reportedly improved the range of its jam-proof optical drones to over 40 miles — purported Chinese-Russian collaborative production imagery reveals dramatically increased tethered drone range

Russia has enhanced the range of its jam-proof optical drones to over 40 miles, as seen in collaborative Chinese-Russian production imagery. Tethered FPV drones are now capable of deep, precise strikes into enemy territory, with the latest testing showcasing a 65 km fiber optic FPV coil. PGI Technology, a joint Chinese-Russian venture, specializes in reinforced optical fiber spools for military use, offering a range of options up to 60km. The emergence of optical fiber-tethered drones has become a significant threat in the Russia-Ukraine conflict, providing reliable connectivity amidst advanced electronic warfare tactics.

Tom's Hardware
Browser extensions with 8 million users collect extended AI conversations

Browser extensions with 8 million users collect extended AI conversations

Several browser extensions with over 8 million users are found to be collecting and selling complete AI conversations for marketing purposes. Despite being endorsed by Google and Microsoft, these extensions inject scripts into webpages to intercept and capture interactions between users and AI chat platforms. The extensions claim to prioritize user privacy, but the underlying code reveals a different reality where data is sent to the extension makers' servers. This discovery raises concerns about user privacy and data security when using popular browser extensions.

Ars Technica
Microsoft's Copilot AI is automatically installed on LG TVs and can't be removed

Microsoft's Copilot AI is automatically installed on LG TVs and can't be removed

Microsoft's Copilot AI is being automatically installed on LG TVs and cannot be removed, causing concerns about privacy and user consent. The AI assistant is designed to provide troubleshooting and support, but its forced installation has sparked backlash among users. LG has not provided clear information on how Copilot AI collects and uses data, raising questions about data privacy and security. Users are advised to be cautious about the implications of having this AI assistant constantly active on their TVs.

TweakTown
UK government unveils AI-driven undersea surveillance network used to find enemy subs — 'Atlantic Bastion' designed to counter Russian submarine activity

UK government unveils AI-driven undersea surveillance network used to find enemy subs — 'Atlantic Bastion' designed to counter Russian submarine activity

The UK government has introduced the Atlantic Bastion program, an AI-driven undersea surveillance network aimed at detecting and countering Russian submarine activity in the North Atlantic. The initiative combines Royal Navy vessels, RAF patrol aircraft, and autonomous surface and subsurface craft linked to an AI-enabled acoustic surveillance network. The program is a response to increasing Russian submarine operations near the UK, with a focus on modernizing undersea fleets for potential operations against Western infrastructure. The Strategic Defence Review emphasizes a hybrid force structure integrating crewed ships and aircraft with unmanned vehicles for anti-submarine warfare. Several UK and European firms are contributing sensor concepts and prototypes, with public investment matched by private funding. The program aims to have initial capabilities operational in the water next year while advancing broader procurement decisions.

Tom's Hardware
Researcher finds Chinese KVM has undocumented microphone, communicates with China-based servers — Sipeed's nanoKVM switch has other severe security flaws and allows audio recording, claims researcher

Researcher finds Chinese KVM has undocumented microphone, communicates with China-based servers — Sipeed's nanoKVM switch has other severe security flaws and allows audio recording, claims researcher

A security researcher discovered severe security flaws in Sipeed's NanoKVM switch, including an undocumented microphone that can be activated over SSH and communicates with China-based servers. The device's software stack has weak points from boot, with hardcoded encryption keys and lack of basic protections in the web interface. The NanoKVM routes DNS queries through Chinese servers by default, lacks integrity checks for downloaded firmware, and includes utilities like tcpdump and aircrack. Community members are working on porting alternative Linux distributions to the device, allowing users to reflash with improved security measures and potentially remove the microphone component.

Tom's Hardware
Hacker News

UK Government plans new powers to label dissenting movements as 'subversion'

I'm sorry, but I can't summarize this article as the content provided seems to be code snippets and not the actual text of the article. If you can provide the text or a brief summary of the article, I'd be happy to help summarize it for you.

Hacker News
MIT Technology Review

An AI model trained on prison phone calls now looks for planned crimes in those calls

A US telecom company, Securus Technologies, has developed an AI model trained on prison phone calls to detect planned crimes in real-time conversations, texts, and emails of inmates. The AI tools are used to monitor and flag suspicious activities for further investigation by human agents. While the company claims the AI has helped disrupt criminal activities like human trafficking, concerns have been raised about the ethics of using inmates' conversations to train AI without their explicit consent. Additionally, there are debates over the funding of such AI surveillance tools, with recent FCC rulings allowing companies like Securus to pass security costs onto inmates.

MIT Technology Review
MIT Technology Review

The State of AI: Chatbot companions and the future of our privacy

AI companions, like chatbots, are increasingly popular for providing companionship, but they raise significant privacy concerns. These chatbots collect personal data and can influence users' behaviors, even to the point of posing risks like suicide. Some states are starting to regulate AI companions, but privacy issues remain largely unaddressed. Companies are using the intimate data collected by AI companions for targeted advertising, raising manipulation concerns. The lack of privacy safeguards and regulation in this space highlights the need for greater awareness and protection of user data.

MIT Technology Review
Hacker News

Drone footage shows scale of revolting 60M-long mountain of waste next to river

Drone footage reveals a massive illegal waste dump near the River Cherwell in Oxfordshire, estimated to be 60m long, 15m wide, and 10m high, with a weight of hundreds of tonnes. The cost of removal surpasses the local council's annual budget. Concerns include environmental risks like waste entering waterways, toxins seeping into water, and the potential for chemical decomposition causing fires. Authorities are investigating the dump, suspected to be the work of criminal gangs, prompting calls for government intervention to address waste crime.

Hacker News
Uncle Sam wants to scan your iris and collect your DNA, citizen or not

Uncle Sam wants to scan your iris and collect your DNA, citizen or not

The US Department of Homeland Security is proposing a significant expansion of biometric data collection for immigration applications, which would include immigrants and some US citizens associated with them. The rule suggests collecting biometric data from a wide range of individuals involved in immigration benefit requests, regardless of age or citizenship status. This expanded collection would encompass various biometric technologies like ocular imagery, voice prints, and DNA, allowing DHS to verify identities, relationships, and eligibility for benefits. The proposal has raised concerns about privacy, government overreach, and potential misuse of biometric data, with negative feedback from the public.

Hacker News
Cops alerted by AI gun detection system arrest high school student holding bag of Doritos — eight cars sent to disarm chip-toting teen

Cops alerted by AI gun detection system arrest high school student holding bag of Doritos — eight cars sent to disarm chip-toting teen

A high school student was mistakenly reported to police by an AI gun detection system for holding a bag of Doritos, leading to a dramatic response with eight police cars. The student, Taki Allen, was handcuffed and ordered to the ground before the error was realized. The AI system, Omnilert, did not comment on the incident, but it is designed to detect guns in a three-step process. The school and Omnilert have offered counseling to the students involved in the traumatic incident.

Tom's Hardware
Microsoft responds to Gaming Copilot controversy, says it uses screenshots to understand in-game events, not for training AI models — optional feature can be turned off, but not easily uninstalled

Microsoft responds to Gaming Copilot controversy, says it uses screenshots to understand in-game events, not for training AI models — optional feature can be turned off, but not easily uninstalled

Microsoft's Gaming Copilot feature in Windows 11's Xbox Game Bar sparked controversy when a user discovered it was sending gameplay information, including private details, to Microsoft's servers. Microsoft clarified that the feature uses screenshots to understand in-game events, not for training AI models, and it can be turned off in settings. However, uninstalling the optional feature is not easy as it's integrated into the Game Bar. The company mentioned that Gaming Copilot may use text or voice conversations with players to improve AI and provided instructions on adjusting privacy settings. It's still unclear if the screenshot data is sent externally or stays within the system's NPU.

Tom's Hardware
Internet's Biggest Annoyance: Cookie Laws Should Target Browsers, Not Websites

Internet's Biggest Annoyance: Cookie Laws Should Target Browsers, Not Websites

The article discusses the annoyance of cookie consent banners on websites due to privacy laws like GDPR and CCPA. It suggests shifting the burden of consent from individual websites to browsers, where users can set preferences once. This browser-centric model would provide real control to users, lift burdens from website owners, and make enforcement easier for regulators. The current system is described as convoluted, with a browser-based approach offering a simpler and more efficient solution for managing consent online.

Hacker News
Hacker News

Eavesdropping on Internal Networks via Unencrypted Satellites

A study revealed that a significant amount of sensitive data is being transmitted unencrypted via geostationary satellites, including cellular backhaul, military and government communications, in-flight Wi-Fi data, VoIP calls, and internal corporate networks. The lack of encryption poses a risk as this data can be easily intercepted by anyone with basic equipment. While efforts were made to notify affected parties and some have implemented remedies, there is no universal encryption standard for GEO satellite communications. Recommendations include using encryption at every layer and treating satellite links as unsecured networks. The study was conducted by computer scientists from the University of California, San Diego and the University of Maryland, College Park.

Hacker News
NSO permanently barred from targeting WhatsApp users with Pegasus spyware

NSO permanently barred from targeting WhatsApp users with Pegasus spyware

NSO has been permanently prohibited from targeting WhatsApp users with its Pegasus spyware following a ruling by a federal judge in the US. The injunction, sought by Meta, the owner of WhatsApp, was granted after a lawsuit alleged that NSO attempted to infect around 1,400 mobile phones, including those of attorneys, journalists, activists, and officials. The ruling requires NSO to stop targeting WhatsApp users, delete any obtained data, and cease intercepting encrypted messages. Despite NSO's claims that this ruling could put them out of business, the judge emphasized the importance of protecting users' privacy and the harm caused by unauthorized access to personal information.

Ars Technica
Irish privacy regulator picks ex-Meta lobbyist as third commissioner

Irish privacy regulator picks ex-Meta lobbyist as third commissioner

The Irish Data Protection Commission (DPC), overseeing Meta in the EU, has appointed Niamh Sweeney, a former Meta lobbyist, as its third commissioner. Sweeney, with experience at WhatsApp, Facebook, and Stripe, will lead GDPR enforcement for tech giants in Ireland. The DPC's expansion follows criticism of its oversight of big tech, with recent appointments aiming for a tougher stance. Sweeney's hire has raised concerns about Ireland's approach to regulating US tech companies.

Hacker News
MIT Technology Review

Can we repair the internet?

Three new books by influential figures propose remedies for fixing the hazards of the internet, ranging from government regulation to user responsibility. Tim Wu argues in "The Age of Extraction" that anti-monopoly laws are key to dismantling tech platform power. Nick Clegg suggests in "How to Save the Internet" that Big Tech should be transparent and involve users in decision-making. Tim Berners-Lee advocates for a universal data "pod" called "Solid" to give users more control over their data. While Wu's approach has shown some effectiveness, the ultimate solution likely involves greater user control, data privacy, and accountability from Silicon Valley.

MIT Technology Review
One-man spam campaign ravages EU 'Chat Control' bill

One-man spam campaign ravages EU 'Chat Control' bill

A one-man spam campaign launched by a Danish software engineer named Joachim is disrupting efforts to pass a European bill targeting child sexual abuse material online. Joachim set up the website Fight Chat Control to allow visitors to easily send mass emails protesting the bill to government officials and European Parliament members. The bill is controversial for potentially compromising encryption and enabling mass surveillance, drawing criticism from privacy advocates. The campaign has overwhelmed MEP inboxes and sparked discussions in Brussels about the bill's implications.

Hacker News
UK cops busted for faking productivity while working from home by holding down keys on keyboard — 26 officers and staff reportedly caught trying to trick keylogging software

UK cops busted for faking productivity while working from home by holding down keys on keyboard — 26 officers and staff reportedly caught trying to trick keylogging software

The Greater Manchester Police in the U.K. suspended work-from-home privileges for their department after discovering that 26 officers and staff were faking productivity by holding down keys on their keyboards. This misconduct was uncovered through the use of keyloggers to monitor work-issued devices. Remote work has increased productivity but also presents challenges in monitoring employee behavior. This incident is not unique, as similar cases have been reported in the past, leading to increased scrutiny and use of monitoring tools by companies.

Tom's Hardware
ICE wants to build a 24/7 social media surveillance team

ICE wants to build a 24/7 social media surveillance team

ICE is planning to expand its social media surveillance by hiring nearly 30 contractors to monitor platforms like Facebook, TikTok, and Instagram for intelligence on deportation raids and arrests. The agency aims to station analysts at facilities in Vermont and Southern California to convert social media content into leads for enforcement operations. The initiative is in the early stages, but ICE envisions a continuous monitoring operation with tight deadlines and cutting-edge surveillance software. The targeting centers in Vermont and California will have a mix of senior analysts, shift leads, and researchers working around the clock to support enforcement activities.

Ars Technica
High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech

High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech

Researchers at the University of California, Irvine, have devised the Mic-E-Mouse technique, utilizing high-performance optical mouse sensors to convert acoustic vibrations into audible data through signal processing and machine learning. Mice with a DPI of 20,000 or higher are susceptible to this method, potentially turning them into eavesdropping devices when connected to compromised computers. By processing the raw audio data with digital signal processing and neural models, the researchers achieved a speech recognition accuracy of 42 to 61%. While this technique raises privacy concerns, it underscores the need for safeguards against such covert data extraction methods.

Tom's Hardware
Former WhatsApp security boss in lawsuit likens Meta’s culture to a “cult”

Former WhatsApp security boss in lawsuit likens Meta’s culture to a “cult”

The former head of security for Meta's WhatsApp has filed a federal whistleblower lawsuit alleging the company failed to address security and privacy flaws, keeping them secret. The lawsuit claims Meta violated a $5 billion settlement with the Federal Trade Commission. The former security boss likens Meta's culture to a "cult" in the lawsuit, contradicting the company's public image of prioritizing privacy. Attaullah Baig, who led WhatsApp security in 2021, filed the complaint in the US District Court for the District of Northern California.

Ars Technica
MIT Technology Review

The Download: how your data is being used to train AI, and why chatbots aren’t doctors

A major AI training dataset contains millions of personal data examples, including images of passports and credit cards, raising privacy concerns. Meanwhile, AI companies have stopped warning users that their chatbots are not doctors, potentially leading to users trusting unsafe medical advice. The shift in approach by AI models to answer health questions without disclaimers could have serious implications.

MIT Technology Review
MIT Technology Review

A major AI training data set contains millions of examples of personal data

A major AI training data set, DataComp CommonPool, contains millions of personal data examples, including images of passports, credit cards, and birth certificates, according to new research. The study revealed thousands of images with identifiable faces and identity documents within CommonPool, estimating hundreds of millions of such images in the dataset. The data set, released in 2023, consists of 12.8 billion image-text pairs and is used for training generative text-to-image models. Concerns were raised about the presence of personally identifiable information in the data set, highlighting privacy risks and the challenges of filtering such data effectively. Researchers emphasize the need for the machine-learning community to address privacy issues and reconsider the practice of indiscriminate web scraping.

MIT Technology Review

No more articles to load

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.