Remove Internet Remove Presentation Remove Surveillance
article thumbnail

Transacting in Person with Strangers from the Internet

Krebs on Security

But when dealing with strangers from the Internet, there is always a risk that the person you’ve agreed to meet has other intentions. These safe trading places exist because sometimes in-person transactions from the Internet don’t end well for one or more parties involved. Nearly all U.S. Nearly all U.S.

Internet 339
article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

The app also includes a censorship keyword list, which, while presently inactive, targets a variety of political topics including domestic issues such as Xinjiang and Tibet as well as references to Chinese government agencies. MY2022 includes features that allow users to report “politically sensitive” content.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

The example in the presentation is a kidnapper. But if you assume that he has some sort of smart phone in his pocket that identifies itself over the Internet, you might be able to find him in that dataset. There’s a whole lot of surveillance you can do if you can follow everyone, everywhere, all the time.

article thumbnail

Expert found Russia’s SORM surveillance equipment leaking user data

Security Affairs

A Russian security researcher has found that hardware wiretapping equipment composing Russia’s SORM surveillance system had been leaking user data. SORM is a mass surveillance system that allows the Government of Moscow to track online activities of single individuals thanks to the support of the Russian ISPs. Pierluigi Paganini.

article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

The ubiquity of smart surveillance systems has contributed greatly to public safety. We discussed how ABE is ready to help resolve some rather sticky privacy issues stemming from widespread digital surveillance – and also do much more. Here are my takeaways. I’ll keep watch and keep reporting.

article thumbnail

Modern TVs have “unprecedented capabilities for surveillance and manipulation,” group reveals

Malwarebytes

In a report titled “ How TV Watches Us: Commercial Surveillance in the Streaming Era ,” the Center for Digital Democracy (CDD) spotlighted a massive data-driven surveillance apparatus that ensnares the public through modern television sets. Your television is debuting the latest, most captivating program: You.

article thumbnail

Tor’s (security) role in the future of the Internet, with Alec Muffett

Malwarebytes

The open-source project lets people browse the Internet more anonymously by routing their traffic across different nodes before making a final connection between their device and a desired website. The post Tor’s (security) role in the future of the Internet, with Alec Muffett appeared first on Malwarebytes Labs.

Internet 123