daguti + privacy   302

How can I tell if my information was shared with Cambridge Analytica? | Facebook Help Center
This is the page you are taken to when Facebook gives you the announcement at the top of your feed that your account was part of the Cambridge Analytica data leak.
facebook  privacy 
april 2018 by daguti
The Man Who Spent $100K To Remove A Lie From Google : NPR
A turkish kid tries to pull a scam on a financial advisor in the US. The financial advisor catches on and reports him to the police. Turkish kid and his family are arrested and deported back to Turkey. Turkish kid sets up a website defaming the financial advisor. Google refuses to do anything about it even after a court order. Eventually, the guy has to spend $100,000 in overseas courts to have European privacy laws apply and the page is eventually taken down. Turkish kid is still an asshole.
google  Search  privacy  security-personal  legal-or-law 
april 2018 by daguti
Steve Jobs warned about privacy issues in 2010. Mark Zuckerberg was in the audience - Mar. 27, 2018
""Silicon Valley is not monolithic," Jobs said. "We've always had a very different view of privacy than some of our colleagues in the Valley.""
people-steve-jobs  privacy  predictions-true  facebook 
march 2018 by daguti
Mozilla launches 'Facebook Container' extension for its Firefox browser that isolates the Facebook identity of users from rest of their web activity : worldnews
Funny - They had something like this to run individual apps years ago, but discontinued it. I used to run Facebook in it. Everything old is new again!
browsers  browsers-firefox  facebook  privacy 
march 2018 by daguti
Informed Delivery
privacy, projects-stalking = https://krebsonsecurity.com/2017/10/usps-informed-delivery-is-stalkers-dream/

"The Postal Service said it is not possible for an address occupant to receive emailed, scanned images of incoming mail at more than one email address. In other words, if you wish to prevent others from signing up in your name or in the name of any other adults at the address, the surest way to do that may be to register your own account and then urge all other adult residents at the address to create their own accounts."

also see:
mail-post-office  privacy  security-personal  warnings  crime-identity-theft 
october 2017 by daguti
Is it possible to retrieve locations of tweets even though...
Seems it is possible to trace the location of Tweets even if the Tweet Location is turned off.
twitter  projects-stalking  privacy  security-personal  security-computer 
october 2017 by daguti
House panel looking into Reddit post linked to Clinton’s deleted email – Naked Security
Ok, this is obviously amateur shit. Keep sensitive shit sensitive by never having ANY link back to your personal/public identities. This includes profile pictures (even non-identifying pictures, for example of a torso or a table or a sky or a cartoon character, can be circumstantial evidence if both the "sensitive" account and your personal/public account have the same profile pic. Same goes for usernames, as is the case in the following example.) = "The identity of the “stonetear” user is unconfirmed. Reddit users are pointing to the fact that an account on the online marketplace Etsy for a Paul Combetta has the same username “stonetear”, and the inactive website combetta.com is registered to the email address stonetear@gmail.com."
projects-stalking  privacy  security-computer 
september 2016 by daguti
DeRay Mckesson’s Twitter account hacked with just his name and four digits – Naked Security
Goddamit - 2FA is useless now because idiot phone monkeys reset things at any caller's request. "There was social engineering involved: the hacker(s) called Verizon’s billing department and impersonated him. Then, they redirected his phone service to their own phone, so that calls and texts that should have gone to Mckesson’s number went instead to theirs." ............

cellphone = "All four major US carriers have been involved in these cases. But all four of them also offer an important step to protect against identity theft. Namely, you can set up a password or PIN that’s required before any changes are made to your mobile account."
security-computer  privacy  cellphone 
june 2016 by daguti
Even Microsoft's Windows Phone chief is using an iPhone
not your typical internet will expose your lies link, but it certainly will expose your hypocrisy. Not that I blame this guy, it's just important to note that anything you do online is open to anyone who wants to hassle you. I also bookmarked this under privacy and stalking project because it is relevant to those tags.
privacy  projects-stalking  marketing-the-internet-will-expose-your-lies 
january 2016 by daguti
Instagram, Facebook location data led panty-snatching burglar to homes |
Be sure to get to the last two or three paragraphs where it links to a guide explaining EXIF data and how to get rid of it.
security-personal  security-computer  privacy  photos-related-to  projects-stalking 
december 2015 by daguti
Another 5 tips to help keep you safe on Facebook | Naked Security
#3 - One time password sent to you by text if you want to log in from a public computer and don't want to use your real password.
facebook  security-computer  privacy  passwords 
september 2015 by daguti
5 ways to keep your data safe right now | ideas.ted.com
1) user a password manager 2) 2-factor authentication 3) whole disk encryption 4) cover your webcam 5) phone/text encryption
security-computer  privacy  projects-stalking 
september 2015 by daguti
Ixquick Search Engine
Similar to DogPile, but mixed with DuckDuckGo's privacy
search-engine  privacy 
september 2015 by daguti
Maskbot will keep your dirty online subscriptions private
Another reason why I am glad I use email forwarders for every single company I create an account with.
privacy  email  projects-stalking  hacks  news  2015 
september 2015 by daguti
Kaspersky Labs has uncovered a malware publisher that is pervasive, persistent, and seems to be the US Government. They infect hard drive firmware, USB thumb drive firmware, and can intercept encryption keys used. : news
"A cancer killing itself." ... This post was removed by the mods of /r/news. Look for the same exact title posted the same day in other subreddits in order to find other relevant comments/discussion, as people were pissed and started posting it on lots of other subreddits. ............ MORE: http://tnw.me/TokcHO7 ...... MORE: http://www.reddit.com/r/technology/comments/2w6tjf/one_of_nsas_most_precious_spying_tools_was_just/
nsa  big-brother  privacy  security-computer  fight-the-g 
february 2015 by daguti
Mark Cuban: The Big Mistake You Don't Know You're Making on Social Media | Inc.com
This is somewhat true, but keep in mind that he's also got 2 apps that deal with this kind of thing, so he's got something to sell.
future  people-mark-cuban  social-media  privacy  scary  video 
december 2014 by daguti
Congress OKs ‘unprecedented’ codification of warrantless surveillance | Naked Security
What the fucking fuck? "A lot of members were not even aware that this new provision had been inserted last-minute. Had we been given an additional day, we may have stopped it." --- You mean shit gets passed just because time runs out on a clock? WTF is wrong with the system?
privacy  big-brother  news  2014 
december 2014 by daguti
Browser fingerprints – the cookies you can’t delete | Naked Security
"Panopticlick asks your browser a few questions, such what fonts you have installed, what HTTP headers your browser sends, your screen size and your timezone."
privacy  security-computer 
december 2014 by daguti
Google ordered to forget ‘endangered’ man’s search results by Tokyo court | Naked Security
The site that indexes everything that Google's been forced to forget: HiddenFromGoogle.com
privacy  projects-stalking 
october 2014 by daguti
Eric Schmidt to dictators: 'You don’t turn off the internet: you infiltrate it' | Technology | theguardian.com
Governments have learned not to turn off the message, but to infiltrate it. Motherfuckers. ========================= I'm convinced the white knight in the book of revelations, the "savior" who turns out to be the AntiChrist is just a metaphor for how all bad things start -- with 'good intentions' as a starting point. Evil people know they are evil, so they can't just say 'We want to block all videos that criticise the government.' That looks bad - so they start by talking about child safety. ........................ "“It looks like people are going to use child safety as the starting point. Russia just passed a law nominally about child safety which pretty much allows arbitrary takedown of videos,” said Schmidt, noting sardonically that based on takedowns so far, Russian children must be particularly interested in videos expressing opposition to the regime there."
big-brother  people-eric-schmidt  marketing-tactics--manipulative  fight-the-g  revolution  privacy  big-brother-prism-scandal 
march 2014 by daguti
Secrecy at the Border - On The Media
1) Ship laptops and other devices separately from your person. 1.1) Full, encrypted laptop backup in the cloud 1.2) Full laptop encryption 1.optional) Do the TrueCrypt thing: encrypt only part of the hard drive on a hidden partition. This will make the hard drive appear smaller than what the physical label on the outside of the hard drive says, so get a label made to match the new size (or the "public", unencrypted portion of the hard drive.) ================= 2) Full cell backup & encryption 2.1) Remove anything "private" - Gmail, Goog Docs, private pics 2.2) Have a plan to get a temporary/disposable phone at your new destination 2.3) Forward Google Voice to the new ph# 2.optional) Use a decoy cell phone. Hide or ship your main phone. ================= 3) Tell multiple (non-traveling) family and friends when and where you are traveling, things to do if you disappear, in waves (for example: day 1: notify employer, family, feed petse, etc) after 1 week: these bills are due, day 10:
privacy  freedom  terrorism-dont-erode-freedoms  fight-the-g  travel  warnings  police-abuses  howto 
march 2014 by daguti
A Stranger Can Find Out Where You Are By Getting You To Open An Email - On The Media
A tool that makes it easy for someone to send you an email with an embedded image that will show (roughly) your location. ........................ Huffington Post covers it from the angle that "Horrifying! Now, anyone can see when you've opened their email!" which, to me, is less horrifying than being able to geolocate you. ------- http://www.huffingtonpost.com/2014/02/12/streak-gmail_n_4774889.html .................. Sophos' take: http://nakedsecurity.sophos.com/2014/02/27/how-emails-can-be-used-to-track-your-location-and-how-to-stop-it/
projects-stalking  privacy  security-computer  email 
february 2014 by daguti
Facebook reveals friends list even when it’s set to private | Naked Security
The recurring topic that keeps coming up is "If you don't want it on the front page of the newspaper, don't do it on Facebook (or online)" ........... But that phrase requires some clarification, because people only thing about "don't do it on Facebook" as "don't POST it on Facebook", but this leaves open all the other actions you can DO, such as building a list of friends, LIKEing pages, comments or photos, etc.
privacy  facebook  projects-stalking 
november 2013 by daguti
« earlier      
per page:    204080120160

related tags

!!to-read  !to-read-agora  airlines  airplanes  airplanes-drones  airport  amazon.com  analysis  analytics-metrics  anonymity  anti-something  apple  apple-iphone  audio  batteries  big-brother  big-brother-prism-scandal  blogging  books-ebooks  books-to-buy  branding-personal  browsers  browsers-firefox  bugs-software  bureaucracy  business-ideas  business-models  capitalism-greed  cars  cars-driving  cellphone  censorship  childrearing  children  children-teens  cloud-computing  college  communities  companies-instagram  computers  conspiracy  corruption  corruption-exposed-by-whistleblowers  countries-china  countries-russia  countries-united-states-america  credit  credit-cards  credit-report  crime  crime-child-abuse  crime-child-porn  crime-identity-theft  culture  data  data-big  data-mining  data-wipe  death-dying  disaster  disease  disease-cancer  disposable  dns  domain-names  electronics  email  email-why-i-use-forwarders  employment  encryption  encryption-software  facebook  faces  fight-the-g  filetype:pdf  firewalls  flickr  florida  foursquare  free  freedom  future  future-dystopian  google  google-adsense  google-adwords  google-android  google-buzz  google-calendar  google-docs  google-drive  google-gmail  google-plus  government  government-cia  government-fbi  guns  hacking  hacks  hardware  health  health-mental-depression  hiddeninfo  history-computer  howto  hypocricy  identity-as-a-concept  interesting  internet  jobs  jobs-interviewing  journalism  large-systems  legal-or-law  lifehacks  lifelock  linkedin  location-related  mail-post-office  mail-post-office-junkmail  marketing  marketing-social-media-campaigns  marketing-tactics--manipulative  marketing-tactics--shocking-or-weird  marketing-the-internet-will-expose-your-lies  mathematics  me-stuff  media:document  microsoft  military  mobile  money  myspace  networking-computers  new-features  news  nj  nsa  nyc  ocr  operating-systems  operating-systems-linux  paradigm-shifts  passwords  people  people-barack-obama  people-bruce-schneier  people-edward-snowden  people-eric-schmidt  people-julian-assange  people-mark-cuban  people-mark-zuckerberg  people-richard-branson  people-richard-stallman  people-seth-godin  people-steve-jobs  photos  photos-related-to  photos-related-to-profile-pictures  photoshop  plugins  police  police-abuses  politics  politics-philosophies-republicans  pornography  predictions  predictions-related-to  predictions-true  privacy  privacy-opt-out  projects-stalking  proxy  publishing  reading  relationships  revolution  scary  search  search-engine  secrets  security  security-computer  security-national  security-personal  shopping  siliconvalley  social-engineering  social-media  social-networking  social-networks  society  software  spam  spying-or-surveillance  survival  technology  techsupport  tedtalks  telephone  television  terrorism  terrorism-as-excuse-for-big-brother  terrorism-dont-erode-freedoms  time-timeline  tips-n-tricks  tools  torrents  tracking-reputation  transportation-traffic  travel  twitter  url-shorteners  utilities  verizon  video  videos-to-watch  viral  virus-or-malware  visualization  warnings  weapons  website-analysis  website-improvement  wifi  wikileaks  win  windows-10  wireless  wordpress  work-tools  youtube 

Copy this bookmark: