Privacy & Rights News - Page 1
The Australian government is tightening things Down Under to control coronavirus spread in the country, with lockdowns and borders heavily enforced the Australian government and authorities.
Just like the current app deployment in Singapore, the Australian government is now forging through with plans to release an app to track coronavirus victims, and just exactly where they go. Australia is wanting to lift COVID-19 restrictions that have seen millions of people stop their lives -- work, running businesses, school and everything in between -- and this app, could be the solution.
The Australian government first said that it would be making the coronavirus tracking app mandatory -- but Australian government quickly hopped back a step or two. Australians saw the move as draconian, but Australian Prime Minister Scott Morrison tweeted out that it wouldn't be mandatory.
With all of the current shelter-in-place, quarantines, and global lockdowns -- services like Zoom have seen a gigantic surge in popularity and use by companies and people around the world.
Well, did you know that over 500,000 Zoom accounts are being sold on the dark web and hacker forums for as low as 1c each, and in some cases, they're even free? Yeah, so new reports show that Zoom login details are happening through credential stuffing attacks, where hackers will login to Zoom accounts using leaked data from previous breaches.
If the login in successful, that Zoom account login goes into a list and is then sold to other hackers. Some of the Zoom accounts are offered up on a platter on the cheap, or for free -- where other hackers will use them for "zoom-bombing pranks" and "other malicious activities", reports BleepingComputer.
Zoom is in serious doo-doo right now, with the videop conferencing provider now admitting that users' calls from around the world were routed through China.
Zoom CEO Eric Yuan admitted that his company "mistakenly" routed calls through China, he explained: "In our urgency to come to the aid of people around the world during this unprecedented pandemic, we added server capacity and deployed it quickly - starting in China, where the outbreak began".
Yuan continued: "In that process, we failed to fully implement our usual geo-fencing best practices. As a result, it is possible certain meetings were allowed to connect to systems in China, where they should not have been able to connect".
Amazon has just done something very, very naughty that might get them scrubbed off Santa's nice list -- the everything giant has just leaked out every single home address of its Ring surveillance camera customers.
In a new investigation by Gizmodo, it revealed that thousands of Amazon Ring camera customers have had their home addresses leaked. The exact location of their house has been displayed, with Gizmodo (and myself, and I'm sure anyone that reads this story) completely blown away. Gizmodo says its discovery casts "new doubt on the effectiveness of the company's privacy safeguards".
Gizmodo continued, adding that its discovery "further offers one of the most "striking" and "disturbing" glimpses yet, privacy experts said, of Amazon's privately run, omni-surveillance shroud that's enveloping U.S. cities".
In another 'Only in Japan' post -- you can stay overnight in the Asahi Ryokan hotel for just $1 per night, but there's a big catch -- you'll need to livestream your stay 24/7.
Asahi Ryokan owner Tetsuya Inoue made the changes not long after taking on the business after his grandmother founded it, and tried to improve it for the new economy of 2019 and beyond. Asahi Ryokan is now offering guests rooms for just $1 per night if they agree to allowing their stay overnight (or longer) to be livestreamed.
There are rules and at least some privacy, with Asahi Ryokan not placing cameras in the bathroom, guests can turn the lights in the room on or off, and most importantly the livestream is video-only, so there's no audio to listen to that gives a thin layer of privacy. Inoue began running the hotel starting in 2018, explaining: "This is a very old ryokan and I was looking into a new business model. Our hotel is on the cheaper side, so we need some added value, something special that everyone will talk about".
If you watch porn Down Under, you might need to scan your face to get your rocks off in the future... with Australia's Department of Home Affairs seemingly aroused over the idea of scanning your face to verify your age before you can access porn or gambling websites.
The new system is called "The Capability" and feels like it's ripped right out of Fringe, The X-Files and 1984 combined -- and even though the Department of Home Affairs said the facial recognition system is not functional, it is still floating the idea to Parliament in Australia that would change things in a big way for Australians porn and gambling habits.
The department said that its Document Verification Service and Face Verification Service which is used to fight regular crime and identify theft, could be enabled and used by authorities for age verification. The parliamentary submission explains: "This could assist in age verification, for example by preventing a minor from using their parent's driver licence to circumvent age verification controls".
NordVPN has confirmed that it was hacked, after rumors began swirling that the virtual private network provider had an expired internal private key exposed. This means that the ones with that key could impersonate NordVPN, and you know how bad that could get.
While NordVPN says it has a "zero logs policy" by stating that the VPN provider doesn't "track, collect, or share your private data"... I'd dare say this is all in teh air right now. TechCrunch reached out to NordVPN, which spokesperson Laura Tyrell then explained: "One of the data centers in Finland we are renting our servers from was accessed with no authorization".
The hackers got into the NordVPN server by taking advantage of an insecure remote management system that was left open by the data center provider, NordVPN said that it was not aware of this system. NordVPN also didn't name the datacenter provider, for obvious reasons.
Google is in some hot water right now, with 50 state attorneys general (had to Google that, it is indeed attorneys general and not attorney generals) launching a new antitrust probe into Google.
The leader of the 50 strong AGs is Texas Attorney General Ken Paxton, who has said the investigation will kick off looking into Google's advertising business, before it looks deeper into how the company operates itself. On the steps of the Supreme Court, Paxton said: "The facts will lead where the fact lead".
What happens from here? Well, the antitrust probe isn't a lawsuit just yet -- but if the company has broken US antitrust rules then Google could be broken up into smaller pieces. For example, YouTube has long been accused of censoring conservative voices, personalities, channels, and normal everyday people -- yet they can't be held accountable, yet.
We know that Google has political bias (it's not a hidden thing, it's just hiding in plain sight) something that Project Veritas broke open less than a month ago now.
Facebook has been paying contractors to listen to users audio clips and transcribe them, according to anonymous sources who spoke with The Associated Press.
The sources state that the social networking giant has hired outside contractors to go over the audio clips, with every single word (good and bad, secret and explicit conversations) being transcribed. Worse yet, the contractors do not know why Facebook needs the voice clips transcribed.
But don't worry, because Facebook confirmed it had been transcribing users' audio calls but it wouldn't do it anymore. On Tuesday, Facebook said: "Much like Apple and Google, we paused human review of audio more than a week ago". Pegging them into the first week of August 2019 where they stopped transcribing voice chats.
Further reading: Mark Zuckerberg has tape covering his microphone and webcam on his laptop, all the way back in June 2016.
Facebook CEO Mark Zuckerberg responded to US Senator Gary Peters back in April 2018 during his Congressional testimony over privacy concerns, where he said: "You're talking about this conspiracy theory that gets passed around that we listen to what's going on on your microphone and use that for ads. We don't do that".
NCIX is in some big effing trouble with a story breaking over the weekend that someone had access to their old servers that went for auction and were purchased, after the Canadian retailer went bankrupt in 2017.
The servers that were previously owned by NCIX somehow ended up on Craigslist, with Travis Doering from Privacy Fly access the servers and pretending to be someone called "Jeff" for privacy (fly) reasons. Doering was after the data on the NCIX server, making is clear he was after the contents of the HDD alone and not the juicy server hardware. Doering met with the seller multiple times, confirming that they were ex-NCIX servers and that they indeed had NXIC user and business data on it.
The used servers were sold because NCIX reportedly didn't pay their warehouse storage bills in late-2017 with over $115,000 owed, where the servers were given to the warehouse owner to sell to recoup costs. Yeah well, the NCIX servers weren't wiped and millions of customers private detailed were exposed, as well as business customers who used to buy many millions worth of goods.
Doering said that Jeff, the guy selling the NCIX servers on Craigslist, had access to "300 desktop computers from NCIX's corporate offices and retails stores, 18 DELL Poweredge servers, as well as at least two Supermicro server's running StarWind iSCSI Software that NCIX had used to back up their hard disks". Jeff also gave Doering access to even more storage, with "109 hard drives which had been removed from servers before auction and one large pallet of 400-500 used hard drives from various manufacturers".