Zum Inhalt der Seite gehen

Suche

Beiträge, die mit PRIVACY getaggt sind


Congreso de Comunicación del Caos: “La narrativa de los expedientes electrónicos seguros de los pacientes ya no se puede mantener” - https://netzpolitik.org/2024/chaos-communication-congress-das-narrativ-der-sicheren-elektronischen-patientenakte-ist-nicht-mehr-zu-halten/ #salud #sanidad #privacidad #privacy #health


"This article uses the case study of an insurance product linked to a health and wellbeing program—the Vitality scheme—as a lens to examine the limited regulation of collection and use of non-personal (de-identified/anonymised) information and the impacts it has on individuals, as well as society at large. Vitality is an incentive-based engagement program that mobilises online assessment tools, preventive health screening, and physical activity and wellness tracking through smart fitness technologies and apps. Vitality then uses the data generated through these activities, mainly in an aggregated, non-personal form, to make projections about changes in behaviour and future health outcomes, aiming at reducing risk in the context of health, life, and other insurance products. Non-personal data has been traditionally excluded from the scope of legal protections, and in particular privacy and data regimes, as it is thought not to contain information about specific, identifiable people, and thus its potential to affect individuals in any meaningful way has been understood to be minimal. However, digitalisation and ensuing ubiquitous data collection are proving these traditional assumptions wrong. We show how the response of the legal systems is limited in relation to non-personal information collection and use, and we argue that irrespective of the (possibly) beneficial nature of insurance innovation, the current lack of comprehensive regulation of non-personal data use potentially leads to individual, collective and societal data harms, as the example of the Vitality scheme illustrates."

https://www.sciencedirect.com/science/article/pii/S0267364924001614

#Australia #HealthInsurance #Anonymization #Privacy #DataProtection #GDPR #Insurance


It's the holiday slump, and you have some time on your hands. If you're a journalist, lawyer, filmmaker, educator, business owner, or anyone who needs to accept anonymous disclosures, take 5 minutes to set up a Hush Line account.

Our tip line platform is free, open-source, anonymous, and end-to-end encrypted. We work seamlessly with @protonprivacy Mail and any webmail when you use @mailvelope.

https://hushline.app

#journalism #business #product #security #privacy #anonymous
This image showcases a web platform and mobile interface for “Hush Line,” a service connecting whistleblowers with trusted professionals. The design is displayed on two smartphone screens and a desktop browser window, all featuring a purple-themed user interface.

The left smartphone screen shows a “Tips” submission page with an illustration of a cheerful, purple lockbox labeled “TIPS” and the text, “Nothing to see here… No messages yet.” The center screen shows a form to submit a message to “Science & Design, Inc.,” a non-profit organization. The form includes fields for anonymous contact and links for secure communication methods like Signal and Mastodon. The desktop view highlights a “User Directory,” where verified users are listed, including “Hush Line Admin.”

The platform encourages anonymity and secure communication, with a clean and approachable design.


❗2023 survey found children between 8-12 were much more likely to want to be a YouTuber (29%) than Astronaut (11%).

❓ What short and long-term impacts might there be when children aspire to be a YouTuber?

🌐 https://theconversation.com/work-or-play-the-rise-of-online-kidfluencers-is-raising-complex-legal-and-ethical-questions-241904

#socialmedia #technology #YouTube #advertising #influencers #privacy #culture #media #education #teaching #medialiteracy


"Capitalist and technology-enabled surveillance has moved beyond targeting users with ads to targeting their lives. This is why privacy online today means freedom tomorrow. Protecting our privacy secures our fundamental rights for the future.

I will be honest, it can be overwhelming; however, in times like this, I like to focus on what can be done instead of worrying about what hasn't happened yet. The most important thing is to act, no matter how difficult it can be during times of fear and stress. Pushing for incremental change and improvements requires small actions every day. We have to engage the folks that are willing to join our fight, pave the way for those actions, and build the communities we want collectively.

There is a lesson to be learned from merging with Tails in 2024 and our growth in the last several years: together we are stronger. And in 2025, I want to use this lesson as a guiding principle, that solidarity and collaboration are our greatest strengths."

https://blog.torproject.org/tor-in-2024/

#Tor #Anonymity #Privacy #Surveillance


"The findings, presented in November in Madrid at the Internet Measurement Conference (IMC 2024) and published in the Proceedings of the 2024 ACM on Internet Measurement Conference, highlight the frequency with which these screenshots are transmitted to the servers of the brands analyzed: Samsung and LG. Specifically, the research showed that Samsung TVs sent this information every minute, while LG devices did so every 15 seconds.

"This gives us an idea of the intensity of the monitoring and shows that smart TV platforms collect large volumes of data on users, regardless of how they consume content, whether through traditional TV viewing or devices connected via HDMI, like laptops or gaming consoles," Callejo emphasizes.

To test the ability of TVs to block ACR tracking, the research team experimented with various privacy settings on smart TVs. The results demonstrated that, while users can voluntarily block the transmission of this data to servers, the default setting is for TVs to perform ACR."

https://techxplore.com/news/2024-12-smart-tvs-viewing-external-screens.html

#TVs #SmartTVs #Surveillance #DataProtection #Privacy


Quite a good explanation of proximity advertising - no your phone is not listening to you all the time (although that can change can't it Siri)

http://archive.today/2024.12.21-181945/https://www.thetimes.com/uk/technology-uk/article/think-your-phone-is-listening-to-you-thats-proximity-advertising-q7nl9qbwt

Think your phone is listening to you? That’s proximity advertising.

But then they sould say that wouldn't they 😁

Review the privacy settings on your phone and beware many apps. Get your friends and family to do the same. Even without listening the privacy implications are enormous.

#Privacy #Google #Meta #
Collage. a phone is held in a hand and three sets of lips shown making noises.


No such thing as privacy:

https://www.surveillancewatch.io

#privacy


"While I once hoped 2017 would be the year of privacy, 2024 closes on a troubling note, a likely decrease in privacy standards across the web. I was surprised by the recent Information Commissioner’s Office post, which criticized Google’s decision to introduce device fingerprinting for advertising purposes from February 2025. According to ICO, this change risks undermining user control and transparency in how personal data is collected and used. Could this mark the end of nearly a decade of progress in internet and web privacy? It would be unfortunate if the newly developing AI economy started from a decrease of privacy and data protection standards. Some analysts or observers might then be inclined to wonder whether this approach to privacy online might signal similar attitudes in other future Google products, like AI.

I can confidently raise this question, having observed and analyzed this area for over 15 years from various perspectives. My background includes experience in web browser security and privacy, including in standardization. I served in the W3C Technical Architecture Group, and have authored scientific papers on privacy, tracking, and fingerprinting, as well as assessments of technologies like Web APIs. This includes the Privacy Sandbox’s Protected Audience API. I was looking forward to the architectural improvements of web privacy. In other words, I am deeply familiar with this context. The media so far have done a great job bringing attention to the issue, but they frame this development as a controversy between Google’s policy change and the UK ICO’s concerns. I believe that the general public and experts alike would benefit from a broader perspective."

https://blog.lukaszolejnik.com/biggest-privacy-erosion-in-10-years-on-googles-policy-change-towards-fingerprinting/

#Google #Surveillance #AdTracking #Privacy #DataProtection


"Microsoft’s Recall feature recently made its way back to Windows Insiders after having been pulled from test builds back in June, due to security and privacy concerns. The new version of Recall encrypts the screens it captures and, by default, it has a “Filter sensitive information,” setting enabled, which is supposed to prevent it from recording any app or website that is showing credit card numbers, social security numbers, or other important financial / personal info. In my tests, however, this filter only worked in some situations (on two e-commerce sites), leaving a gaping hole in the protection it promises.

When I entered a credit card number and a random username / password into a Windows Notepad window, Recall captured it, despite the fact that I had text such as “Capital One Visa” right next to the numbers. Similarly, when I filled out a loan application PDF in Microsoft Edge, entering a social security number, name and DOB, Recall captured that. Note that all info in these screenshots is made up, but I also tested with an actual credit card number of mine and the results were the same."

#Microsoft #MicrosoftRecall #DataProtection #Privacy

https://www.tomshardware.com/software/windows/microsoft-recall-screenshots-credit-cards-and-social-security-numbers-even-with-the-sensitive-information-filter-enabled


Customs & Border Protection Fails Baseline #Privacy Requirements for Surveillance Technology https://www.eff.org/deeplinks/2024/12/customs-border-protection-fails-baseline-privacy-requirements-surveillance #migration #privacidad #migraciones


Home Assistant’s new hardware voice assistant answers to ‘Hey Jarvis’ and can work offline


The image shows a small, square device, possibly a smart home gadget, resting on a surface. The background is a gradient of soft blue and orange hues, creating a calm and modern atmosphere. In the foreground, the device is the primary focus, with its sleek, white design and subtle glowing circle on the top drawing the viewer's attention. A thin cable is connected to the device, suggesting it is powered or connected to a network.
There’s a new voice assistant in town, and this one can work locally in your home without phoning home to its corporate overloads. This week, the popular hobbyist smart home platform Home Assistant officially launched its first voice assistant hardware — Home Assistant Voice Preview Edition.

Built for the open-source smart home platform, Voice PE costs $59 and brings a locally controlled, privacy-focused voice assistant to Home Assistant in a plug-and-play package. Once connected to Home Assistant, you can use voice to control any connected device, with commands such as “Turn on the living room lights,” “Lock all the doors,” “Create a timer for 5 minutes,” and many more.

There have been other solutions before, but they were not so reliable, and of course the Google or Amazon based ones require the cloud access of these companies, and many do not like to have that channel open.

This is a hardware device (that does look pretty good) and seems to be pretty versatile. I think it could be well worth it, as long as it will get ongoing updates and not be replaced with some new model in the short term. Despite that, seeing it works fully offline, you should at least find it won’t ever be bricked or turned into a paper weight.

See https://www.theverge.com/2024/12/19/24325101/home-assistant-voice-preview-edition-smart-home-voice-assistant-hardware
#Blog, #homeassistant, #privacy, #technology


"To access our latest innovations in AI driven #enshittification, please disable your regional regulations."

#Meta #GenAI #EuropeanUnion #legislation #privacy
Mark Zuckerberg posting on Threads about not being able to launch new AI features in EU. Quote posted with "I love being European".


Researchers find Security Flaws in Skoda Cars that may let Threat Actors remotely track them.

IT-Security researchers have discovered multiple vulnerabilities in the infotainment units used in some Skoda cars that could allow malicious actors to remotely trigger certain controls and track the car’s location in real time.

https://pcautomotive.com/vulnerabilities-in-skoda-and-volkswagen-vehicles

#skoda #mib3 #vulnerabilities #car #it #security #privacy #engineering #media #tech #news
PCAutomotive, a cybersecurity firm specializing in the automotive sector, unveiled 12 new security vulnerabilities impacting the latest model of the Skoda Superb III sedan. This comes a year after the organization disclosed 9 other vulnerabilities affecting the same model. Skoda is a car brand owned by German automobile giant Volkswagen.

The vulnerabilities, discovered in the vehicle’s MIB3 infotainment unit, could allow attackers to achieve unrestricted code execution and run malicious code every time the unit starts. This could let an attacker obtain live vehicle GPS coordinates and speed data, record conversations via the in-car microphone, take screenshots of the infotainment display and play arbitrary sounds in the car.

The researchers noted that the vulnerable MIB3 units are used in multiple Volkswagen and Skoda models, and based on public sales data, estimates there are potentially more than 1.4 million vulnerable vehicles out there.


"Every year, countless emails hit our inboxes telling us that our personal information was accessed, shared, or stolen in a data breach. In many cases, there is little we can do. Most of us can assume that at least our phone numbers, emails, addresses, credit card numbers, and social security numbers are all available somewhere on the internet.

But some of these data breaches are more noteworthy than others, because they include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive they’re impossible to ignore. For that reason, we are introducing the Breachies, a series of tongue-in-cheek “awards” for some of the most egregious data breaches of the year.

If these companies practiced a privacy first approach and focused on data minimization, only collecting and storing what they absolutely need to provide the services they promise, many data breaches would be far less harmful to the victims. But instead, companies gobble up as much as they can, store it for as long as possible, and inevitably at some point someone decides to poke in and steal that data."

https://www.eff.org/deeplinks/2024/12/breachies-2024-worst-weirdest-most-impactful-data-breaches-year

#CyberSecurity #Privacy #DataBreaches


"The UK’s data protection regulator has criticised Google over its decision to allow advertisers to use technology to track users which is harder to control or block.

The Information Commissioner’s Office (ICO) said Google’s decision was “irresponsible” and accused the company of a U-turn, having previously prohibited the use of so-called fingerprinting technology.

Fingerprinting involves collecting pieces of information about a device’s software and hardware which can be combined to uniquely identify a device and its user – and the ICO has warned that this technology is harder to wipe than clearing cookies or site data from a web browser, meaning users could continue to be identified by advertisers."

https://www.independent.co.uk/business/ico-criticises-google-over-irresponsible-advertising-tracking-change-b2667072.html

#UK #ICO #Google #AdTracking #FingerPrinting #DataProtection #Privacy


"Many in the UK were outraged by proposals to give the Department of Work and Pensions the power to examine people’s bank accounts. In the US, Hasbrouck points to a recent report from the House Judiciary Committee on the Weaponization of the Federal Government that documents the Treasury Department’s Financial Crimes Enforcement Network’s collaboration with the FBI to push banks to submit reports of suspicious activity while it trawled for possible suspects after the January 6 insurrection. Yes, the destructors should be caught and punished; but also any weapon turned against people we don’t like can also be turned against us. Did anyone vote to let the FBI conduct financial surveillance by the million?

Now imagine that companies outsource ID checks to the government and offload the risk of running their own. That is how the no-fly list works. That’s how airlines operate *now*. GIAAS.

Then add the passive identification that systems like facial recognition are spreading. You can no longer reliably know whether you have been identified and logged, who gets that information, or what hidden decision they may make based on it. Few of us are sure of our rights in any situation, and few of us even ask why."

https://netwars.pelicancrossing.net/2024/12/20/government-identification-as-a-service/

#Surveillance #StatePolice #Privacy


WikiLeaks is a non-profit organization that publishes classified and sensitive information from anonymous sources to promote transparency and accountability. Founded in 2006 by Julian Assange, it gained attention for releasing U.S. military documents, diplomatic cables, and corporate misconduct. WikiLeaks advocates for freedom of information, sparking debates on #privacy, #security, and the ethics of whistleblowing.

#WikiLeaks #Transparency #Whistleblowing #FreedomOfInformation #Journalism


Folks, just say NO. It is not easy to completely ignore Google but you can do a lot to reduce the harm you do, whatever telephone/computer platform you use.

https://www.theguardian.com/technology/2024/dec/19/google-advertisers-digital-fingerprints-ico-uk-data-regulator

A few tips here - https://spreadprivacy.com/how-to-remove-google/ and you can and should go further, but snall steps add up.

#Privacy #Google #NoToGoogle


Holanda impone una multa de 4,75 millones de euros a #Netflix por no informar adecuadamente a los clientes sobre lo que hace con sus datos https://noyb.eu/en/noyb-win-dutch-authority-fines-netflix-eu475-million #privacidad #privacy


#Australia Banning Kids from Social Media Does More Harm Than Good https://www.eff.org/deeplinks/2024/12/australia-banning-kids-social-media-does-more-harm-good #AgeVerification #privacy #privacidad #menores #surveillance #vigilancia


#DHS Says #China, #Russia, #Iran, and #Israel Are Spying on People in #US with #SS7

https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/

#cybersecurity #privacy


"While you were cooking your dinner, it seems some of these air fryers may have been capturing your family conversations via their smartphone apps and sending data to servers abroad."

#surveillance #privacy

https://www.theguardian.com/commentisfree/2024/dec/18/is-your-air-fryer-spying-on-you-its-time-to-stop-buying-unnecessary-smart-devices


404 Media: DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7
The Department of Homeland Security (DHS) believes that China, Russia, Iran, and Israel are the "primary" countries exploiting security holes in telecommunications networks to spy on people inside the United States, which can include tracking their physical movements and intercepting calls and texts, according to information released by Senator Ron Wyden.
Senator Wyden’s office says the DoD confirmed it believes that all U.S. carriers are vulnerable to Signaling System 7 (SS7) and Diameter surveillance, and that DoD has not reviewed third-party audits carried out by U.S. carriers of their own networks.
SS7 is used to route messages when a phone user roams outside of their area of normal coverage. But it is also leveraged by governments, surveillance contractors, and financially motivated criminals to target phones too. These malicious parties gain access to SS7 through legitimate telecommunications companies or even operating their own. They lease access to a Global Title, which is essentially an address to route messages with. With that access, attackers may be able to track a phone and person's location, or intercept their communications armed with just their phone number. SS7 attacks are also used to deliver malware that can then infect the target’s mobile device itself.
#nationalsecurity #threatintel #news #privacy #infosec #cybersecurity #russia #china #iran #israel #ss7


Gap Analysis Focuses on Strengthening Health Services in Uttarakhand.

https://aliyesha.com/sub/articles/news/display/uk_gap_analysis_strengthening_health_services

#uttarakhand #dehradun #india #news #press #bjp #government #governance #health #medical #HealthServices

Enjoy tracker free reading with us. #privacy #privacymatters