$0.61 total tips
Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.
On iOS 11, pressing the wifi toggle immediately disconnects the iPhone or iPad from any wifi networks, but leaves the wireless radio available for use by location services, scanning for the names of nearby wifi access points. The Bluetooth toggle operates in a similar fashion. ...A similar thing happens in Android smartphones, which use wifi as part of their location services. Switching wifi off prevents it from connecting to wifi access points, but allows it to continue periodically scanning for access point names to help pinpoint its location.
« First « Previous Comments 96 - 119 of 119
AmericanKulak says2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.Woah, good point. I had not considered it, but it makes sense.
2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.
Hircus says Exploiting 2FA alone buys you nothing. Session hijacking? XSS? I don't need your password, I just need to access your account once and I can change it. Worse, if I steal your mobile device(more likely since you probably take it everywhere), I now have access to all your 2FA codes. I simply go to your sites, click the forgot password link, and easily gain access.
Exploiting 2FA alone buys you nothing.
And you haven't addressed the HUGE loss of privacy 2FA entails. I don't see enough advantages over the method I've proposed that would ever justify giving up my privacy/freedom.
Hackers can break into your iPhone even when it's switched off. Cybersecurity researchers have discovered a way to run malware on Apple's iPhones, even when the device is switched off.
For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network.
June 28, 2022Russia fines Threema app for not collecting user dataFined under "anti-terror" laws.By Ken MaconA court in Moscow fined Switzerland based messenger service Threema for refusing to comply with the Russian “anti-terror” law.Threema competes with Telegram and Signal.Threema was found guilty of non-compliance with rules under the anti-terror law. The law requires tech companies to store data, such as calls, messages, emails, photos, and videos, on their servers for at least six months, and allow the government access to that data if requested.Speaking to German news outlet Welt am Sonntag, a spokesperson for Threema said that Russian authorities “apparently launched an investigation in March 2022 probably to make an example.”“Of course, under no circumstances will we hand over any data to Russian authorities,” Threema added, arguing it is governed by Swiss law, which does not allow the transfer of user data to other countries, much less authoritarian countries like Russia.The company will also not pay the fine.
July 4, 2022From this week, all new vehicles in the EU with have to have a surveillance-based speed limiterGPS is the most common method.Tracking and surveillance tech is finding its use in yet another segment of public life in the West – road traffic. ...For the moment, they are “opt-in,” since drivers can still turn them off. But, the plan is to remove this option completely.
July 8, 2022Royal Canadian Mounted Police used smartphone malware to spy on targetsA breach of rules.Members of the Royal Canadian Mounted Police (RCMP) have been using malware in their investigations since 2018 that can secretly turn phones and laptops into full-fledged spying devices, with the news, and some, but not all details about the program only just emerging now.Traditionally unwilling to “share” what types of surveillance technology it uses unless it has to, mostly pressed during inquiries, this time once again the public is becoming aware of the facts a full four years after the software was first deployed.
July 30, 2022Tim Hortons offers customers a free coffee and baked item in settlement for spying on peopleThe company's invasive tracking was revealed this year.As settlement in class action lawsuits, Canadian coffee giant Tim Hortons will offer a free hot beverage and a baked good as an apology for tracking the location of users of its app. The app tracked users when they left or entered a Tim Hortons competitor such as Starbucks, their home or workplace, and more.In June, regulators said that the data collection was in violation of the law.“Tim Hortons clearly crossed the line by amassing a huge amount of highly sensitive information about its customers. Following people’s movements every few minutes of every day was clearly an inappropriate form of surveillance.
Amazon just bought Roomba, which means if you have one Amazon will soon have an extremely valuable map of the inside of your home
No one should ever install any app. Anything an app does can also be done by a web page these days. The only reason the want you to install an app is to do exactly this kind of spying on your every movement.
Yeah, no webpage ever tracks your every move. Websites never install Google scripts to track and market to you across different sites.
You can control which apps have access to photos, addressbook, gps, camera, microphone, etc.