Weaverbird + tech   316

Facebook Well Aware That Tracking Contacts Is Creepy: Emails
Back in 2015, Facebook had a pickle of a problem. It was time to update the Android version of the Facebook app, and two different groups within Facebook were at odds over what the data grab should be.
2018-12  facebook  privacy  surveillance  tech  evil 
11 days ago by Weaverbird
Facebook chief's emails exposed by MPs - BBC News
The UK parliament's fake news inquiry has published a cache of seized Facebook documents.

The correspondence includes internal emails sent between Mark Zuckerberg and the social network's staff. The emails were obtained from the chief of a software firm that is suing the tech giant.

About 250 pages have been published, some of which are marked "highly confidential".
2018-12  facebook  corruption  evil  privacy  security  tech  surveillance 
11 days ago by Weaverbird
Google Home (in)Security – JerryGamblin.com
After I was able to get the Hub to reboot I was hooked and gave up a few hours of sleep to do some research and ended up finding a bunch of “good” information (see reading list at bottom). 

At the end of the night, I was extremely disappointed with the security of these devices especially coming from Google who I trust with so much of my data and is the driving force behind BeyondCorp. 
2018-11  google  security  privacy  tech  review 
5 weeks ago by Weaverbird
Feds Order Google To Hand Over A Load Of Innocent Americans' Locations
Forbes detailed one such order in August, not long after local media publication WRAL reported on a handful of others in Raleigh, North Carolina.

Now another order has been uncovered in Virginia. And it doesn’t contain some crucial limitations to protect innocents’ privacy.

“This fishing expedition infringes on the privacy rights of so many possible people who had the misfortune of being in an area where a crime is alleged to be committed,” said Jerome Greco, staff attorney at the Legal Aid Society. “We should not allow for such broad access to the data of so many on the mere speculation that a suspect may have used a cellphone near the location of the crime.”
privacy  security  tech  google  police_state 
5 weeks ago by Weaverbird
Tech's most egregious violations of user privacy - Axios
Technologies that have become ubiquitous in the daily lives of most Americans — from ride-sharing and dating apps to social media — are using sketchy practices and violating user privacy information, while most of us are unaware.

Why it matters: With tech becoming more and more sophisticated, users don't pay as close attention as they probably should to what they're signing on for and if their information is being inappropriately used.
2018-08  tech  privacy  data  security 
september 2018 by Weaverbird
A Guide to Using Android Without Selling Your Soul to Google
As soon as you start up a new Android phone, you get prompted to sign in with your Google account—but what if you don’t want to do that? Maybe you want to take advantage of Android but limit what Google knows about you, or maybe you just prefer the alternative apps; whatever the case, here’s how to live a Google-free Android life.
Right from the start we’ll be honest and say it’s not easy using Android without Google—but it is possible. If you want a more convenient life, then you need to sign right in when prompted. The big miss if you don’t is the Google Play Store, but here we’ll show you how to get around that and various other obstacles along the way.
tech  google  advice 
august 2018 by Weaverbird
How FREE VPNs Sell Your Data | TheBestVPN.com
At TheBestVPN, we generally advise against the use of free VPNs.

The reason is simple – many of them simply sell your data to 3rd party advertisers.

And this defeats the whole purpose of having a VPN in the first place.

But there’s more:
VPN  tech  privacy  security  advice  data 
august 2018 by Weaverbird
Google launches a DRM-free audiobook store: finally, a writer- and listener-friendly Audible alternative! / Boing Boing
Now it's Amazon's turn in the hot seat.

Google has just launched a DRM-free audiobook store that duplicates nearly the entire catalog at Audible. When you buy your audiobooks from Google Play you can download them to any device, play it on any device, convert them, archive them, back them up. If you decide you don't want to use Google products in the future, you won't lose your audiobooks. It's fucking amazing.
2018-07  books  e-books  google  Amazon  tech  copyright 
july 2018 by Weaverbird
What It’s Like When Elon Musk’s Twitter Mob Comes After You
When female journalists like me dare to question the SpaceX and Tesla founder, there’s a predictable result: We get called bitches, idiots, and worse.
bullying  socialmedia  money  power  male-privilege  batshitcrazy  media  tech  twitter 
june 2018 by Weaverbird
US takes aim at Russian hackers who infected over 500,000 routers - CNET
The VPNFilter malware targeted devices worldwide from Linksys, MikroTik, Netgear and TP-Link.
tech  security  russian 
june 2018 by Weaverbird
Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
Cloudflare's mission is to help build a better Internet. We're excited today to take another step toward that mission with the launch of 1.1.1.1 — the Internet's fastest, privacy-first consumer DNS service. This post will talk a little about what that is and a lot about why we decided to do it.
tech  privacy  security  internet 
april 2018 by Weaverbird
PrivacyHaus // App Directory
The apps and services listed below value your privacy, use reasonably strong encryption, and are dedicated to preserving your civil liberties.
privacy  security  tech  software 
february 2018 by Weaverbird
'Fiction is outperforming reality': how YouTube's algorithm distorts truth | Technology | The Guardian
An ex-YouTube insider reveals how its recommendation algorithm promotes divisive clips and conspiracy videos. Did they harm Hillary Clinton’s bid for the presidency?
youtube  tech  politics  2018-02 
february 2018 by Weaverbird
DuckDuckGo adds tracker blocking to help curb the wider surveillance web | TechCrunch
Some major product news from veteran anti-tracking search engine DuckDuckGo: Today it’s launched revamped mobile apps and browser extensions that bake in a tracker blocker for third party sites, and include a suite of other privacy features intended to help users keep surfing privately as they navigate around the web.

The apps and browser extensions are available globally for Android, iOS, Chrome, Firefox and Safari as of now. (DDG tells us Opera is also on its radar but there’s no launch date yet.)

“Our vision has been to set the standard of trust online,” says CEO and founder Gabe Weinberg, discussing the new products. “[To date] we’ve been really focused on the search engine because it’s really complicated to compete with Google in their core market. But now that we feel we can handle that we are making progress on this broader vision of protecting people across the Internet.
privacy  security  surveillance  tech  internet  duckduckgo 
january 2018 by Weaverbird
Three Types of Passphrases
A short guide on how to generate the best passphrases for your digital life.
security  privacy  data  tech  tutorial 
january 2018 by Weaverbird
Researchers Discover Two Major Flaws in the World’s Computers - The New York Times
Computer security experts have discovered two major security flaws in the microprocessors inside nearly all of the world’s computers.

The two problems, called Meltdown and Spectre, could allow hackers to steal the entire memory contents of computers, including mobile devices, personal computers and servers running in so-called cloud computer networks.

There is no easy fix for Spectre, which could require redesigning the processors, according to researchers. As for Meltdown, the software patch needed to fix the issue could slow down computers by as much as 30 percent — an ugly situation for people used to fast downloads from their favorite online services.
2018-01  tech  security 
january 2018 by Weaverbird
Silicon Valley Techies Still Think They're the Good Guys. They're Not. | WIRED
The issue is bigger than any single scandal, I told him. As headlines have exposed the troubling inner workings of company after company, startup culture no longer feels like fodder for gentle parodies about ping pong and hoodies. It feels ugly and rotten. Facebook, the greatest startup success story of this era, isn’t a merry band of hackers building cutesy tools that allow you to digitally Poke your friends. It’s a powerful and potentially sinister collector of personal data, a propaganda partner to government censors, and an enabler of discriminatory advertising.

The world is no longer interested in that kind of story, I told him. Anything that doesn’t address the thorny questions facing the tech industry feels beside the point.
2017-12  culture  tech  society 
january 2018 by Weaverbird
Brave and DuckDuckGo Partner to Improve Privacy on the Web | Join Brave and change the web together
Brave and DuckDuckGo are thrilled to announce a partnership today to radically improve Internet privacy. Standard browsing and search compromise user data.  To combat this, we’ve integrated DuckDuckGo search within the Brave browser’s private tabs, providing users with a simple way to ensure privacy.
The feature is available today via the new Brave browser desktop release 0.19.116, and will be integrated in Brave Android and iOS apps in the first quarter of 2018.
privacy  security  surveillance  data  tech 
december 2017 by Weaverbird
The Motherboard Guide to Not Getting Hacked - Motherboard
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
privacy  security  tech  resources  tutorial 
november 2017 by Weaverbird
No boundaries: Exfiltration of personal data by session-replay scripts
You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make.  But lately, more and more sites use “session replay” scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.
privacy  security  tech  surveillance  data 
november 2017 by Weaverbird
Who Decides What Websites You Visit?
Recently there’s been a lot of justified outrage over “fake news” and the fact that many people are living in an echo chamber online.

Companies like Google use your profile to filter the results they show you, based on what they think you are most likely to click on. This is commonly known as the “Filter Bubble.”

It’s a form of corporate censorship that can be used to influence public opinion (even unintentionally), such as election outcomes and other political issues.
tech  data  privacy  news  search 
october 2017 by Weaverbird
How to Choose a Good VPN
How to choose from the many VPN providers out there? Here are some important factors to think about:
VPN  tech  privacy  security 
october 2017 by Weaverbird
Serious flaw in WPA2 protocol lets attackers intercept passwords and much more | Ars Technica
Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a client is visiting.
2017-10  security  privacy  tech 
october 2017 by Weaverbird
Leaky-by-design location services show outsourced security won't ever work • The Register
It gets worse. As reported in El Reg, little bit of code published to Github a fortnight ago showed how any app granted access to the photos on your smartphone (hint: that’s quite a few of them) can simply walk through your database of images and generate an accurate map of your movements. In many cases this record of movements can go back years.

Every geek I’ve told about this had the same reaction: a facepalm. Of course our photos keep a record of our movements. Of course any app that has access to our photos can produce a map of our movements. Two unrelated features collide, generating a kind of retrospective self-surveillance of which the NSA would be proud.
2017-10  data  security  surveillance  tech 
october 2017 by Weaverbird
How Israel Caught Russian Hackers Scouring the World for U.S. Secrets - The New York Times
It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs.

What gave the Russian hacking, detected more than two years ago, such global reach was its improvised search tool — antivirus software made by a Russian company, Kaspersky Lab, that is used by 400 million people worldwide, including by officials at some two dozen American government agencies.

The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion, which has not been previously reported, leading to a decision just last month to order Kaspersky software removed from government computers.
2017-10  data  tech  privacy  security  surveillance  russian 
october 2017 by Weaverbird
British courts may unlock secrets of how Trump campaign profiled US voters | Technology | The Guardian
A US professor is trying to reclaim his personal data from the controversial analytics firm that helped Donald Trump to power. In what legal experts say may be a “watershed” case, a US citizen is using British laws to try to discover how he was profiled and potentially targeted by the Trump campaign.
2017-10  data  privacy  tech  law  money  power  politics  campaign2016 
october 2017 by Weaverbird
'Our minds can be hijacked': the tech insiders who fear a smartphone dystopia | Technology | The Guardian
Google, Twitter and Facebook workers who helped make technology so addictive are disconnecting themselves from the internet. Paul Lewis reports on the Silicon Valley refuseniks alarmed by a race for human attention
2017-10  tech  irony 
october 2017 by Weaverbird
Two Ex-Googlers Want To Make Bodegas And Mom-And-Pop Corner Stores Obsolete
The major downside to this concept–should it take off–is that it would put a lot of mom-and-pop stores out of business. In fact, replacing that beloved institution seems explicit in the very name of McDonald’s venture, a Spanish term synonymous with the tiny stores that dot urban landscapes and are commonly run by people originally from Latin America or Asia. Some might bristle at the idea of a Silicon Valley executive appropriating the term “bodega” for a project that could well put lots of immigrants out of work. (One of my coworkers even referred to it as “Bro-dega” to illustrate the disconnect.)

I asked McDonald point-blank about whether he’s worried that the name Bodega might come off as culturally insensitive. Not really. “I’m not particularly concerned about it,” he says. “We did surveys in the Latin American community to understand if they felt the name was a misappropriation of that term or had negative connotations, and 97% said ‘no’. It’s a simple name and I think it works.”

But some members of the Hispanic community don’t feel the same way.
tech  google  evil 
september 2017 by Weaverbird
Websites Must Use HSTS in Order to Be Secure | Electronic Frontier Foundation
You would think that by now the Internet would have grown up enough that things like online banking, email, or government websites would rely on thoroughly engineered security to make sure your data isn't intercepted by attackers. Unfortunately when it comes to the vast majority of websites on the Internet, that assumption would be dead wrong. That's because most websites don't yet support a standard called HSTS—HTTPS Strict Transport Security.1
internet  security  tech 
september 2017 by Weaverbird
We’re rewiring the Internet for freedom. – David Robinson – Medium
For the last two years, a team of engineers and researchers has quietly been working to develop new technology for Internet freedom. Today, we are pleased to share results from the first large-scale field trial of refraction networking, a fundamentally new way to help people around the world learn and communicate online in the face of censorship. We served more than 50,000 users, for more than a week, by deploying refraction networking at partner ISPs.
privacy  security  internet  tech  geekery 
august 2017 by Weaverbird
How to: Use Tor for Windows | Surveillance Self-Defense
Tor is a volunteer-run service that provides both privacy and anonymity online by masking who you are and where you are connecting. The service also protects you from the Tor network itself.

For people who might need occasional anonymity and privacy when accessing websites, Tor Browser provides a quick and easy way to use the Tor network.
privacy  security  internet  tech  tutorial 
august 2017 by Weaverbird
How to Send Files Securely (like Tax Info) | Firewalls Don't Stop DragonsFirewalls Don't Stop Dragons
Editor’s Note: Yeah, this is a long article. But if you ever need to transfer a file that contains financial, medical, or otherwise personal/private stuff, you need to know the techniques and concepts in this article. So read it carefully
security  privacy  tech  tutorial 
july 2017 by Weaverbird
Elon, Forget Killer Robots. Focus on the Real AI Problems | WIRED
Musk’s remarks made for an enlivening few minutes on a day otherwise concerned with more quotidian matters such as healthcare and education. But Musk’s call to action was something of a missed opportunity. People who spend more time working on artificial intelligence than the car, space, and solar entrepreneur say his eschatological scenarios risk distracting from more pressing concerns as artificial intelligence technology percolates into every industry.
2017-07  tech 
july 2017 by Weaverbird
It might be time to stop using antivirus | Ars Technica
Update your software and OS regularly instead, practice skeptical computing.
tech  security  antivirus 
may 2017 by Weaverbird
Google security expert says antivirus apps don’t work | Network World
It's time to switch to whitelisting instead of intrusion detection
tech  security 
may 2017 by Weaverbird
Intel's Management Engine is a security hazard, and users need a way to disable it | Electronic Frontier Foundation
Intel’s CPUs have another Intel inside.
Since 2008, most of Intel’s CPUs have contained a tiny homunculus computer called the “Management Engine” (ME). The ME is a largely undocumented master controller for your CPU: it works with system firmware during boot and has direct access to system memory, the screen, keyboard, and network. All of the code inside the ME is secret, signed, and tightly controlled by Intel. Last week, vulnerabilities in the Active Management (AMT) module in some Management Engines have caused lots of machines with Intel CPUs to be disastrously vulnerable to remote and local attackers. While AMT can be disabled, there is presently no way to disable or limit the Management Engine in general. Intel urgently needs to provide one.
tech  security 
may 2017 by Weaverbird
Tracing Spam: Diet Pills from Beltway Bandits — Krebs on Security
Your average spam email can contain a great deal of information about the systems used to blast junk email. If you’re lucky, it may even offer insight into the organization that owns the networked resources (computers, mobile devices) which have been hacked for use in sending or relaying junk messages.
2017-04  tech  security 
april 2017 by Weaverbird
Your Government's Hacking Tools Are Not Safe - Motherboard
Recent data breaches have made it startlingly clear hacking tools used by governments really are at risk of being exposed. The actual value of the information included in each of these dumps varies, and some may not be all that helpful in and of themselves, but they still highlight a key point: hackers or other third parties can obtain powerful tools of cyber espionage that are supposedly secure. And in most cases, the government does not appear to clean up the fallout, leaving the exploits open to be re-used by scammers, criminals, or anyone else—for any purpose.

It's as if someone posted a skeleton key online for breaking into an unimaginable number of locks.
2017-04  #0000  security  privacy  NSA  tech 
april 2017 by Weaverbird
Protecting customers and evaluating risk – MSRC
Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers. Understandingly, customers have expressed concerns around the risk this disclosure potentially creates. Our engineers have investigated the disclosed exploits, and most of the exploits are already patched. Below is our update on the investigation.
tech  security  microsoft  #0000 
april 2017 by Weaverbird
The Four Flavors of Automated License Plate Reader Technology | Electronic Frontier Foundation
Automated License Plate Readers (ALPRs) may be the most common mass surveillance technology in use by local law enforcement around the country—but they're not always used in the same way.
#0000  tech  privacy  surveillance  police_state 
april 2017 by Weaverbird
What the Repeal of Online Privacy Protections Means for You - The New York Times
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
What does this mean for your privacy and what can you do? Here’s what to know.
#0000  privacy  tech  security 
april 2017 by Weaverbird
How we made the typeface Comic Sans | Art and design | The Guardian
‘The level of hatred was amazing and quite funny. I couldn’t believe people could get so worked up about a font’
design  tech  history  humor  typeface 
march 2017 by Weaverbird
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online | WIRED
While most of us may tolerate having our emails scanned for malware, and perhaps some of us tolerate scanning for advertising purposes, the idea of third parties reading our correspondence and acting on specific contents found within specific emails is downright disturbing.

The least you can do is make it much harder for them to do so.
privacy  surveillance  tech  internet  instructions  reference  resources 
march 2017 by Weaverbird
Gabriel Weinberg DuckDuckGo CEO Interview - BestVPN.com
Gabriel Weinberg is the founder and CEO of DuckDuckGo, a popular and highly polished search engine that respects your privacy. Gabriel was recently kind enough to grant me an interview in which we discussed the state of online privacy.
interview  privacy  tech  internet  duckduckgo 
march 2017 by Weaverbird
sites-using-cloudflare/README.md at master · pirate/sites-using-cloudflare · GitHub
This is an (archived) list of sites on Cloudflare DNS at the time of the CloudBleed HTTPS traffic leak announcement. Original vuln thread by Google Project Zero.

Cloudflare has posted a very detailed response, explaining exactly what the implications of this leak are. It thoroughly explains their language in earlier statements, and I highly recommend reading it before looking through this list for domains: https://blog.cloudflare.com/quantifying-the-impact-of-cloudbleed/
security  privacy  tech 
march 2017 by Weaverbird
How Uber Used Secret Greyball Tool to Deceive Authorities Worldwide - The New York Times
Uber has for years engaged in a worldwide program to deceive the authorities in markets where its low-cost ride-hailing service was being resisted by law enforcement or, in some instances, had been outright banned.

The program, involving a tool called Greyball, uses data collected from the Uber app and other techniques to identify and circumvent officials. Uber used these methods to evade the authorities in cities such as Boston, Paris and Las Vegas, and in countries like Australia, China, Italy and South Korea.

Greyball was part of a broader program called VTOS, short for “violation of terms of service,” which Uber created to root out people it thought were using or targeting its service improperly. The VTOS program, including the Greyball tool, began as early as 2014 and remains in use, predominantly outside the United States. Greyball was approved by Uber’s legal team.
2017-03  uber  shenanigans  law  data  tech 
march 2017 by Weaverbird
How to Keep Messages Secure | Teen Vogue
Security experts give their best advice for keeping messages secure, whether you’re at a protest or just want to keep out snooping siblings.
tech  security  privacy 
march 2017 by Weaverbird
Choosing the VPN That's Right for You | Surveillance Self-Defense
VPN stands for “Virtual Private Network.” It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.
privacy  security  tech  surveillance  VPN  #0000 
march 2017 by Weaverbird
Keeping Your Data Safe | Surveillance Self-Defense
It's safest and easiest to encrypt all of your data, not just a few folders. Most computers and smartphones offer complete, full-disk encryption as an option. Android offers it under its "Security" settings, Apple devices such as the iPhone and iPad describe it as "Data Protection" and turn it on if you set a passcode. On computer running Windows Pro, it's known as "BitLocker."
privacy  security  tech  Encryption 
march 2017 by Weaverbird
Open Whisper Systems >> Home
Privacy that fits in your pocket. Signal
privacy  security  tech  Encryption 
march 2017 by Weaverbird
Privacy Badger | Electronic Frontier Foundation
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it's like you suddenly disappeared.
privacy  security  tech  data  internet  firefox 
march 2017 by Weaverbird
André Staltz - What happens when you block internet giants
I started with the basic premise that “I want to be in control of my data”. Sometimes that meant choosing when to interact with an internet giant and how much I feel like revealing to them. Most of times it meant not interacting with them at all. I don’t want to let them be in full control of how much they can know about me. I don’t want to be in autopilot mode.
privacy  security  tech  data  internet 
march 2017 by Weaverbird
Reducing Adobe Flash Usage in Firefox | Future Releases
In 2017, Firefox will require click-to-activate approval from users before a website activates the Flash plugin for any content. Websites that currently use Flash or Silverlight for video or games should plan on adopting HTML technologies as soon as possible. Firefox currently supports encrypted video playback using Adobe Primetime and Google Widevine as alternatives to plugin video.
firefox  security  tech 
march 2017 by Weaverbird
Is Private Browsing Really Private? – DuckDuckGo Blog
At DuckDuckGo, our vision is to raise the standard of trust online. To that end, we surveyed 5,710 random Americans about Private Browsing to understand what people know about and how they use this common privacy feature.

Key takeaways are below. Check out the full findings paper for details.
privacy  tech  research  security 
march 2017 by Weaverbird
Info Sec Recommendations
We are often asked "How can I be safer online?" Over the years we've accumulated 25 total recommendations, which we've divided into four categories:

Easy: An action that you only have to take one-time! Occasional effort and minimal inconvenience. See our 15 "easy" recommendations for you below.

Medium: Five somewhat more difficult, and non-free, recommendations below.

Hard: These three recommendations are the difficult changes in behavior but you gain the greatest safety.

Not worth it: Two pieces of advice from others you might consider skipping.
security  privacy  internet  tech  #0000 
february 2017 by Weaverbird
Tech and the Fake Market tactic – Humane Tech – Medium
[A]ll this equates to is an economic transfer from the working class over to urban metropolitan elites, which benefits one particular corporation over others. This is plainly crazy.

These new False Markets only resemble true markets just enough to pull the wool over the eyes of regulators and media, whose enthusiasm for high tech solutions is boundless, and whose understanding of markets on the Internet is still stuck in the early eBay era of 20 years ago.
tech  marketplace  economics  power 
february 2017 by Weaverbird
A rash of invisible, fileless malware is infecting banks around the globe | Ars Technica
Once the province of nation-sponsored hackers, in-memory malware goes mainstream.
tech  security  software  privacy 
february 2017 by Weaverbird
3 Ways To Remove EXIF MetaData From Photos (And Why You Might Want To)
EXIF data embeds a lot of this technical information into the image itself, making it easy for you to see how a particular photograph was taken (great for studying, learning, and recreating). For example, EXIF data can include:

Camera manufacturer and model.
Data and time.
Compression type.
Aperture, shutter speed, and ISO settings.
Metering mode.
Flash mode.
Pixel resolution.

Sounds fine, right? On the whole, EXIF data is actually well-intentioned, innocent, and practical. The problem is that certain devices may embed certain types of data that can betray your personal privacy and security.
security  privacy  tech  photography  tutorial 
january 2017 by Weaverbird
« earlier      
per page:    204080120160

related tags

#0000  #AaronSwartz  #CISPA  #fox  #gamergate  #OHPLEASE  #SOPA  #unasked  2017-03  2017-04  2017-07  2017-10  2017-12  2018-01  2018-02  2018-07  2018-08  2018-11  2018-12  advertising  advice  AI  ALEC  Amazon  analysis  animals  antivirus  aprilfools  architecture  art  articles  audio  baking  batshitcrazy  bbc  biography  bo  books  bullying  business  california  campaign2012  campaign2016  cars  cbm  censorship  cgm  clothing  color  computer  congress  conservation  copyright  corruption  costume  culture  data  design  diaspora  diy  drought  duckduckgo  dystopia  e-books  e-commerce  ebooks  economics  education  electronics  ello  email  encryption  energy  equipment  ethics  etsy  evil  fabric  facebook  factcheck  fandom  FBI  firefox  food  fox  funny  geekery  ginger  godaddy  google  government  graphics  hackers  hardware  history  homeless  humor  instructions  insurance  international  internet  interview  irony  law  library  links  male-privilege  marketing  marketplace  media  microsoft  money  mr  music  news  npr  NSA  obituary  opinion  phone  photography  police_state  politics  post-Jan-20  power  pricing  privacy  psychology  publishing  quickbooks  recipe  reference  regulation  research  resources  review  russian  satire  schadenfreude  science  sculpture  search  security  shenanigans  shipping  sleep  socialmedia  society  software  solar  starwars  storage  supplies  surveillance  tech  technology  tips  tools  transparency  TSA  tutorial  twitter  typeface  uber  uk  USB  utopia  video  VPN  water  website-stuff  wikipedia  work  writing  wtf  yahoo  youtube 

Copy this bookmark:



description:


tags: