Telegram apparently censor queer groups ( mastodon.social )
cross-posted from: https://leminal.space/post/6433881
Proton Mail Discloses User Data Leading to Arrest in Spain ( restoreprivacy.com )
Materialious - Desktop & Android client ( materialio.us )
Materialious now can be used as a Desktop or Android application. Allowing it to be used for any Invidious instance!...
Mozilla to protect Firefox users from bounce trackers - Stack Diary ( stackdiary.com )
GrapheneOS latest release includes a preliminary defense to prevent app-based VPN implementations from leaking DNS requests on Android when the VPN is down/connecting ( grapheneos.org )
Mullvad VPN's blog post: DNS traffic can leak outside the VPN tunnel on Android...
How Do I Prepare My Phone for a Protest? ( themarkup.org )
Simple steps to take before hitting the streets
Encrypted services Apple, Proton and Wire helped Spanish police identify activist | TechCrunch ( techcrunch.com )
By the way, the earlier posted article https://restoreprivacy.com/protonmail-discloses-user-data-leading-to-arrest-in-spain had an update starting at the paragraph with title Update: Statement from Proton and additional commentary
Smart meter data: the Government’s at it again ( www.openrightsgroup.org )
The Bitcoiners were wrong: a blog post about privacy and bitcoin, and how they failed to design a cash alternative ( unfathom.ing )
Man Booked For Using VPN In J&K's Rajouri, 3rd Such Case In 2 Days ( www.ndtv.com )
cross-posted from: https://lemmy.world/post/15187027...
Novel attack against virtually all VPN apps neuters their entire purpose ( arstechnica.com )
Pulling this off requires high privileges in the network, so if this is done by intruder you're probably having a Really Bad Day anyway, but might be good to know if you're connecting to untrusted networks (public wifi etc). For now, if you need to be sure, either tether to Android - since the Android stack doesn't implement...
Why Your VPN May Not Be As Secure As It Claims ( krebsonsecurity.com )
Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection...
Mullvad VPN: Introducing Defense against AI-guided Traffic Analysis (DAITA) ( mullvad.net )
Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic analysis is a growing threat against your privacy. Therefore, we now introduce DAITA....
The Best Secure Email Providers in 2024 ( blog.thenewoil.org )
Like it or not, email is a critical part of our digital lives. It’s how we sign up for accounts, get notifications, and communicate with a wide range of entities online. Critics of email rightfully point out that email suffers from a significant number of flaws that make it less than ideal, but that doesn’t change the...
End-to-end encryption may be the bane of cops, but they can't close that Pandora's Box ( www.theregister.com )
"just got doxxed to within 15 miles by a vision model, from only a single photo of some random trees. the implications for privacy are terrifying. i had no idea we would get here so soon. holy shit" ( twitter.com )
DNS traffic can leak outside the VPN tunnel on Android ( mullvad.net )
US Police Banned by Microsoft from Using Azure's AI Facial Recognition Technology ( www.techtimes.com )
Microsoft plans to lock down Windows DNS like never before. Here’s how. ( arstechnica.com )
Israel using Meta's WhatsApp to kill Palestinians in Gaza through AI system ( www.middleeastmonitor.com )
According to software engineer and blogger, Paul Biggar, however, one key detail on the methods employed by the Lavender system that is often overlooked is the involvement of the messaging platform, WhatsApp. A major determining factor of the system’s identification is simply if an individual is in a WhatsApp group containing...
Ninth Circuit: 5th Amendment Doesn’t Cover Compelled Production Of Fingerprints To Unlock A Phone ( www.techdirt.com )
from the passcodes-ftw dept
CJEU Gives File-Sharer Surveillance & Data Retention a Green Light * TorrentFreak ( torrentfreak.com )
Image...
Two Years Post-Roe: A Better Understanding Of Digital Threats ( www.techdirt.com )
from the our-digital-reality dept