privacy

2733 readers
14 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 2 years ago
MODERATORS
1
 
 

The use of selfies to verify identity online is an emerging trend in some parts of the world since the pandemic forced more business to go digital. Some banks – and even governments – have begun requiring live images over Zoom or similar in order to participate in the modern economy. The question must be asked, though: is it cyber smart?

Just last Monday the Southeast Asian nation of Vietnam began requiring face scans on phone banking apps as proof of identity for all digital transactions of around $400 and above.

The nation's residents are not able to opt out of the banking rules, despite Vietnam regularly finding itself ranked poorly when it comes to internet privacy or cyber security.

Local media has weighed in to suggest that selfies will not improve security. And just days into the new regime, some apps have already been called out for accepting still photos instead of a live image of the individual.

2
3
4
 
 

Brazil’s data protection authority (ANPD) has banned Meta from training its artificial intelligence models on Brazilian personal data, citing the “risks of serious damage and difficulty to users.” The decision follows an update to Meta’s privacy policy in May in which the social media giant granted itself permission to use public Facebook, Messenger, and Instagram data from Brazil — including posts, images, and captions — for AI training.

The decision follows a report published by Human Rights Watch last month which found that LAION-5B — one of the largest image-caption datasets used to train AI models — contains personal, identifiable photos of Brazilian children, placing them at risk of deepfakes and other exploitation.

5
6
7
 
 

cross-posted from: https://links.hackliberty.org/post/2005038

I know this is an outrageously bad idea, I don't need convincing. I am just looking for some more information and discussion on what exactly the exposure and surveillance risk is.

I'm asking both for my own education (I am still very green to networking), and to better explain to people in my life if and why they should care.

  1. Is it true that traffic can be tracked and logged by ISP through DNS lookups, as these routers are preconfigured to use their internal dns service?

  2. If this is changed (like base.dns.mullvad.net), how much does this actually mitigate the risk here?

  3. What about when a VPN (mullvad) is also being used at all times? Would it then be "overly paranoid" to fear this untrusted box all the traffic goes through?

I personally take a conservative approach to things like this and assume it's an unacceptable risk, but I don't really understand what the truth is.

Thank you in advance for your time and thoughts.

EDIT: I'm asking about US and US adjacent areas

8
 
 

Here is the website if you want to take a look yourself: https://zerotrace.org/

Social: https://www.instagram.com/zerotracepen/

You'll need to copy and paste the links, I didn't want to send them any direct traffic.

The ads seem to be targeted at younger and less tech-literate audiences. There are some comments on the posts joking/accusing them of being a honeypot, and the "company" is pretending to not understand.


Ignoring all the over the top outfits and video edits, here are some of their claims:

New Technological Advancement

Cybersecurity Experts Have Finally Found A Solution To Tor’s Vulnerabilities

Are You still using Tor Browser and a VPN? STOP! You already know you could expose yourself with one wrong click. Why leave it to chance?

Cybersecurity experts are redefining what achieving true anonymity really requires.

Who Is This For?

Gun Store Owners Private Investigators Construction Management Cybersecurity Audits

In partnership with Debian, Tor, Electrum

9
 
 

A lawsuit accusing Google of breaking America's child privacy laws will proceed to trial as a judge denied the web goliath's motion to throw out the case.

Filed in June last year, the suit alleges Google ignored state child privacy laws in California, Florida, and New York, which prohibit targeted advertising to children under the age of 13 and collecting their data.

Specifically, the suit is going after Google for setting up a program in 2015 called Designed for Families (DFF). That essentially allowed developers to declare their apps were all above board regarding advertising to children and that only appropriate content would be shown. Apps verified as such by the DFF program would be presented to parents in the Google Play store as safe for kids.

10
 
 

This was an interview on ABC (Australian public broadcaster) with Signal Foundation president Meredith Whittaker. It covered some points relevant to the discussions on Signal and encrypted messaging, with a small bit on AI at the end. The original title of the video is bad.

Key points in the video:

  • 1:30 - Should platforms be held responsible for [the content]
  • 3:15 - (paraphrased) Governments want law enforcement to have access to encrypted communications, why not?
  • 4:15 - (paraphrased) What if people are using it for criminal behaviour
  • 7:00 - (paraphrased) Random AI section
11
12
 
 

Today EU governments will not adopt their position on the EU regulation on “combating child sexual abuse”, the so-called chat control regulation, as planned, which would have heralded the end of private messages and secure encryption. The Belgian Council presidency postponed the vote at short notice. Once again the chat control proposal fails in Council.

13
 
 

A controversial European Union legislative proposal to scan the private messages of citizens in a bid to detect child sexual abuse material (CSAM) is a risk to the future of web security, Meredith Whittaker warned in a public blog post Monday. She’s the president of the not-for-profit foundation behind the end-to-end encrypted (E2EE) messaging app Signal.

“There is no way to implement such proposals in the context of end-to-end encrypted communications without fundamentally undermining encryption and creating a dangerous vulnerability in core infrastructure that would have global implications well beyond Europe,” she wrote.

The most recent European Council proposal, which was put forward in May under the Belgian presidency, includes a requirement that “providers of interpersonal communications services” (aka messaging apps) install and operate what the draft text describes as “technologies for upload moderation”, per a text published by Netzpolitik.

Last month, Euractiv reported that the revised proposal would require users of E2EE messaging apps to consent to scanning to detect CSAM. Users who did not consent would be prevented from using features that involve the sending of visual content or URLs it also reported — essentially downgrading their messaging experience to basic text and audio.

The EU’s own data protection supervisor has also voiced concern. Last year, it warned that the plan poses a direct threat to democratic values in a free and open society.

Pressure on governments to force E2EE apps to scan private messages, meanwhile, is likely coming from law enforcement.

Back in April European police chiefs put out a joint statement calling for platforms to design security systems in such a way that they can still identify illegal activity and send reports on message content to law enforcement. Their call for “technical solutions” to ensure “lawful access” to encrypted data did not specify how platforms should achieve this sleight of hand

14
 
 

cross-posted from: https://links.hackliberty.org/post/1846370

Hello all,

Just wondering if there are any projects involving lemmy and .onion

I searched and didn't see anything but I figured I'd ask

If not is there a reason this isn't possible? Or has nobody cared to do it yet?

When I have to visit r****t I use a libreddit hidden service, and there are quite a few to choose from. Am I correct to think a similar mirror should be about as easy to implement for Lemmy?

an onion only instance where it never touches the clearnet would be really cool too but it would probably be a ghost town (sadly).

Love to hear your thoughts

Thanks

15
16
17
18
 
 

cross-posted from: https://lemm.ee/post/34636917

19
 
 

Last month, Wells Fargo terminated over a dozen bank employees following an investigation into claims of faking work activity on their computers, according to a Bloomberg report.

A Financial Industry Regulatory Authority (FINRA) search conducted by Ars confirmed that the fired members of the firm's wealth and investment management division were "discharged after review of allegations involving simulation of keyboard activity creating impression of active work."

A rise in remote work during the COVID-19 pandemic accelerated the adoption of remote worker surveillance techniques, especially those using software installed on machines that keeps track of activity and reports back to corporate management. It's worth noting that the Bloomberg report says the FINRA filing does not specify whether the fired Wells Fargo employees were simulating activity at home or in an office.

We do not know exactly what technique(s) the fired employees used to simulate keyboard activity, but several options exist for would-be work-shirkers. Those options include software that simulates keyboard presses (like AutoHotkey) and physical devices sold on Amazon for around $30–$60 that use a motor or solenoid and a small arm to push a real keyboard at random intervals.

20
21
 
 

A few days after EU citizens were called to vote on their next parliamentary representatives, we just have a rough idea of what the upcoming political squad will look like. What is certain, however, is that anti-encryption sentiments are still thriving across the Union.

We already reported the revised proposal to halt the spread of online child sexual abuse material (CSAM) that wants your permission to scan your WhatsApp messages. Now, a leaked 42-point plan puts forward new recommendations on how companies must handle people's online activities, including data retention, access, and interception of all digital services.

The goal is simple: make the digital devices we use every day, from smartphones and smart homes to IoT devices and even cars, legally and technically monitorable at all times by law enforcement bodies.

According to Jan Jonsson, CEO at Mullvad—one of the best VPNs around with a privacy-first mandate—all encrypted traffic will no longer be private and secure if the legislation passes. "A VPN won’t help either," he told me. "It would mean total surveillance and that Europe's inhabitants carry state spyware in their pockets."

22
23
24
 
 

I wanted to know if my local Food Basics store is tracking me.

I looked at the privacy policy on foodbasics.ca and not finding any mention of this, but wanting to be sure, I emailed their Privacy Officer.

This is the email I sent:

Hello,

I shop at the food basics store at [Address] in [City],

I would like to know if you use facial recognition or identification technology in the store? And if so, for what purpose, and if the information is stored for how long?

Thank you,
[Me]

Here is the response I got:

Hello,

I confirm that Metro does not use facial recognition technology or any other technology that allows the identification of individual at the Food Basics stores.

Best regards
Eliane
Legal Counsel

Just want to share to encourage everyone to learn about and exercise your consumer privacy rights.

25
view more: next ›