KarnaSubarna

joined 1 year ago
[–] [email protected] 7 points 9 months ago (2 children)

Same as that happened to Bibliogram earlier – a cat-n-mouse game between Dev and API owner.

[–] [email protected] 3 points 9 months ago

The post is about Nextcloud self-hosted file storage as an open source replacement for One Drive which is deeply integrated with MS Teams. For those, who can't replace MS Teams with FOSS equivalent for whatever reason, can at least stop relying on One Drive for file storage solution.

And, for your information, Nextcloud does offer 1:1 and group chat solution[1], which is an open source replacement for MS Teams.

[1] https://nextcloud.com/talk/

[–] [email protected] 1 points 9 months ago (3 children)

You are essentially sharing a file link via MS Teams.

Instead of keeping the actual file on OneDrive, it is hosted on your own (Nextcloud) server. Sorry but how it leads to privacy issue?

[–] [email protected] 4 points 9 months ago* (last edited 9 months ago) (6 children)

Nextcloud[1] is an open source and self-hostable SaaS product.

Instead of using OneDrive and Google Drive (and similar proprietary solutions), Nextcloud is a better solution from Privacy POV, IMO.

[1] https://en.wikipedia.org/wiki/Nextcloud

[–] [email protected] 8 points 9 months ago* (last edited 9 months ago)

And, here come typical response -

telecom operators have informally shared with the department that the leaked information claimed in the ClouSEK report seems to be a compilation of old data sets of telecom subscribers and it is not due to any vulnerability in their system."

Source: https://telecom.economictimes.indiatimes.com/news/industry/cybersecurity-firm-claims-data-leak-of-750-million-telecom-users-dot-asks-telcos-for-security-audit/107244949

 

The idea behind predictive policing is that by feeding historical crime data into a computer algorithm, it’s possible to determine where crime is most likely to occur, or who is most likely to offend. Law enforcement officials can then make proactive interventions, like conducting patrols in predicted crime locations, ideally stopping crime before it occurs.

Predictive policing systems rely on historical data distorted by falsified crime reports and disproportionate arrests of people of color,” the letter continues. “As a result, they are prone to over-predicting crime rates in Black and Latino neighborhoods while under-predicting crime in white neighborhoods. The continued use of such systems creates a dangerous feedback loop: biased predictions are used to justify disproportionate stops and arrests in minority neighborhoods, which further biases statistics on where crimes are happening.

Cameron was part of a joint effort between The Markup and Gizmodo that published an investigation in 2021 showing how a predictive policing algorithm developed by a company called Geolitica disproportionately directed officers to patrol marginalized communities almost everywhere it was used.

 

For facial recognition experts and privacy advocates, the East Bay detective’s request, while dystopian, was also entirely predictable. It emphasizes the ways that, without oversight, law enforcement is able to mix and match technologies in unintended ways, using untested algorithms to single out suspects based on unknowable criteria.

[–] [email protected] 2 points 9 months ago

Request: Your IP > Apple (1st) relay node > 3rd party (2nd) relay node > Website

Response: Your IP < Apple (1st) relay node < 3rd party (2nd) relay node < Website

Whoever has access to both relay nodes, can easily track you end-to-end.

As for Apple, they claim the 1st relay node is owned by them, and 2nd relay node is owned by 3rd party. (Source: https://www.apple.com/icloud/docs/iCloud_Private_Relay_Overview_Dec2021.pdf)

In theory, it should not be a privacy concern because -

  • Website will see the request coming from 2nd relay node's IP.
  • 2nd relay node will see the request is coming from Apple (1st) relay node's IP.
  • So, only Apple knows your IP.
[–] [email protected] 3 points 9 months ago

The really powerful thing about Facebook ads is in your ability to layer targeting options on top of one another, gradually making your audience more and more specific. An extreme (and hilarious) example of the power of hypertargeting was featured in AdWeek last year, when a marketing pro targeted his roommate with ads so specific the poor guy thought he was being cyberstalked.

🤮

 

Mozilla is unhappy because the use of browser engines other than WebKit will be restricted to the EU, forcing them to develop two different apps.

For an independent browser like Firefox, managing two browsers is not easy, so it can be forgiven that this could be seen as almost harassment.

Also, the fact that the use of browser engines other than WebKit is limited to iOS means that the use of WebKit is still forced on iPadOS, which also increases the effort for Mozilla.

Source: https://iphonewired.com/news/746093/

[–] [email protected] 11 points 10 months ago* (last edited 10 months ago) (1 children)

sold ad analytics

Do you still the have the link to news article where it was reported?

Earlier I was using Pi-Hole on my network then switched to AdGuard Home (not same as AdGuard DNS) as it is an open source product with in-built DOH support (yes, I can setup Pi-Hole to do the same, but that's an extra manual configuration) and Privacy Guide seems to recommend it over Pi-hole. After reading your post, I tried to lookup more about it. Nothing on Wiki. Closest thing is this. If the allegations are true then I need to switch back to Pi-Hole.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago)
 

AdGuard Temp Mail’s addresses are temporary and aren’t stored long by design:

Emails are automatically deleted 24 hours after you receive them.
A temporary mailbox is deleted after 7 days of inactivity. But if you keep the page open or come back in a couple of days, it won’t disappear.

AdGuard Temp Mail is currently in beta stage. Here’s what we’re planning to add in the future:

Zero-access encryption
TLS support on the SMTP server side
Image proxying
Security checks for links
 

"The InMarket Apps have been downloaded onto over 30 million unique devices since 2017," reads the FTC complaint against InMarket Media.

"Respondent also makes the InMarket SDK available to third party app developers, and it has been incorporated into more than 300 such apps which have been downloaded onto over 390 million unique devices since 2017."

The FTC complaint says InMarket maintains 2,000 categories of distinct "audiences" which tracked people fall into, including "Christian churchgoers," "wealthy and not healthy," and "parents of preschoolers."

Ultimately, the FTC deems InMarket's five-year data retention policy overly excessive for targeted advertising, significantly elevating the risk of misuse and exposure.

 

Google collects and shares data between its own services by default. Search, advertising, YouTube and several others exchange user data. Users in the EU have to give consent to this form of sharing. By default, data will no longer be exchanged between services. EU users may already manage the Google Services that may or may not exchange data.

EU users who searching with buying intentions, e.g., for a hotel or laptop, will get a new dedicated unit in the search results that shows group of links from comparison sites "from across the web" and "query shortcuts at the top of the search page to help people refine their searches".

Users from the EU will get browser and search engine choice screens on Android and in Google Chrome.

 

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

 

Location firm Near describes itself as “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Mobilewalla boasts “40+ Countries, 1.9B+ Devices, 50B Mobile Signals Daily, 5+ Years of Data.” X-Mode’s website claims its data covers “25%+ of the Adult U.S. population monthly.”

Fast food restaurants and other businesses have been known to buy location data for advertising purposes down to a person’s steps. For example, in 2018, Burger King ran a promotion in which, if a customer’s phone was within 600 feet of a McDonalds, the Burger King app would let the user buy a Whopper for one cent.

Outlogic (formerly known as X-Mode) offers a license for a location dataset titled “Cyber Security Location data” on Datarade for $240,000 per year. The listing says “Outlogic’s accurate and granular location data is collected directly from a mobile device’s GPS.”

view more: ‹ prev next ›