55 private links
»Learn how identifiable you are on the Internet.«
This guide covers many different aspects of online anonymity.
Reclaim Your Face is a European Citizens' Initiative (ECI) petition for a ban on biometric mass surveillance practices.
The article reveals a technique serving user-specific favicons to circumvent existing counter-tracking-measures.
What if we would base web analytics on the concept of informed consent?
Der Einsatz von Microsoft Office 365 an Schulen ist datenschutzrechtlich unzulässig, soweit Schulen personenbezogene Daten in der europäischen Cloud speichern.
- Google Gmail keeps a log of everything you buy.
- Google says this is so you can ask Google Assistant about the status of an order or reorder something.
- It also says you can delete this log by deleting the email, but three weeks after we deleted all email, the list is still there.
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.
To understand the future of Silicon Valley, cross the Atlantic.
Wireless devices are everywhere, at home, at the office, and on the street. Devices are bombarding us with transmissions across a wide range of RF frequencies. Many of these invisible transmissions reflect off our bodies, carrying off information about ou location, movement, and other physiological properties. While a boon to professionals with carefully calibrated instruments, they may also be revealing private data about us to potential attackers nearby.
In this paper, we examine the problem of adversarial WiFi sensing, and consider whether ambient WiFi signals around us pose real risks to our personal privacy. We identify a passive adversarial sensing attack, where bad actors using a single smartphone can silently localize and track individuals in their home or office from outside walls, by just listening to ambient WiFi signals. We experimentally validate this attack in 11 real-world locations, and show user tracking with high accuracy. Finally, we propose and evaluate defenses including geo-fencing, rate limiting, and signal obfuscation by WiFi access points.
This report provides information on government requests received.