Privacy & Rights News - Page 1
The elite have always had the attitude of "rules for thee, but not for me" but Facebook is in trouble, yet again, this time with its now-not-so-secret XCheck program.
Facebook's internal XCheck program lets whitelisted users break the same rules that would otherwise see a regular user, or someone on the opposite side of the political spectrum, get banned. XCheck, otherwise known as just Cross Check, has improved quality control when it comes to moderation from high-profile users like celebrities, and politicians.
XCheck is meant to see posts made by whitelisted users get flagged, and have them routed through better-trained moderators to make sure that Facebook's rules are upheld and enforced. Instead, XCheck users -- some 5.8 million of them -- were being protected in 2020. Just 10% of the posts that were flagged for XCheck got reviewed, according to a document witnessed by The Wall Street Journal.
ProtonMail has been busted holding onto the IP addresses of a French climate activity, as well as their browser fingerprint -- after Swiss authorities requested the data.
After the company sent over the metadata of the French activity, ProtonMail then removed the portion of its policy that said the company didn't log IP addresses. In its place, is "ProtonMail is email that respects privacy and puts people (not advertisers) first".
The world has been gripped by the pandemic, changing the very fabric of our society bit-by-bit, and now the Biden administration will lurk around in your smartphone spying on your text messages but it's okay... it's for your own safety, they're the government.
In a new post by Politico, the Biden administration is going into the second season of Utopia by ramping up its attack on anti-vaxxers in an article Polico titled "'Potentially a death sentence': White House goes off on vaccine fearmongers" for maximum fear and SEO.
Anyway, inside of that article are some details on what the Biden administration and DNC have planned for the near future for all Americans: they'll be spying on your text messages. Why? Well, for your safety of course -- as the Biden administration will be working with Big Tech and SMS carriers to "dispel misinformation about vaccines".
TikTok was already pretty liberal with the amount of data it scrapes from users on the daily, but now it is in overdrive with the new section explaining that it will be collecting information about the images and audio that is in users' actual content.
Another day, another huge Facebook data leak with the personal data of 533 million users has leaked online and is available for free.
Business Insider reports that it has verified the leaks, explaining: "The exposed data includes personal information of over 533 million Facebook users from 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, BIOS, and - in some cases - email addresses".
Facebook explains that it had fixed a vulnerability in 2019 and that the data scraped was from back then, and not current data. But the information on the users is the same with the biggest point here being the phone numbers, as many more services now just require a phone number for registration and as the creator of Have I Been Pwned database, Troy Hunt, explains:
The Trump administration is bringing down the ban hammer on both TikTok and WeChat in the United States, starting this Sunday.
WeChat will be blocked from US app stores starting on Sunday, with the same bans hitting TikTok on November 12. Commerce Secretary Wilbur Russ explained in a statement: "Today's actions prove once again that President Trump will do everything in his power to guarantee our national security and protect Americans from the threats of the Chinese Communist Party".
President Trump signed an executive order on August 6, giving TikTok 45 days to GTFO of the United States -- well, Sunday is 45 days from August 6.
Apple is warning customers to not cover their camera over concerns of their privacy, as it may damage the MacBook notebook they're using.
The company is telling people not to cover their cameras up as it will also create issues with the automatic brightness and True Tone technologies, with the company explaining: "If you close your Mac notebook with a camera cover installed, you might damage your display because the clearance between the display and keyboard is designed to very tight tolerances".
Apple continues: "Covering the built-in camera might also interfere with the ambient light sensor and prevent features like automatic brightness and True Tone from working. As an alternative to a camera cover, use the camera indicator light to determine if your camera is active, and decide which apps can use your camera in System Preferences".
The Australian government is tightening things Down Under to control coronavirus spread in the country, with lockdowns and borders heavily enforced the Australian government and authorities.
Just like the current app deployment in Singapore, the Australian government is now forging through with plans to release an app to track coronavirus victims, and just exactly where they go. Australia is wanting to lift COVID-19 restrictions that have seen millions of people stop their lives -- work, running businesses, school and everything in between -- and this app, could be the solution.
The Australian government first said that it would be making the coronavirus tracking app mandatory -- but Australian government quickly hopped back a step or two. Australians saw the move as draconian, but Australian Prime Minister Scott Morrison tweeted out that it wouldn't be mandatory.
With all of the current shelter-in-place, quarantines, and global lockdowns -- services like Zoom have seen a gigantic surge in popularity and use by companies and people around the world.
Well, did you know that over 500,000 Zoom accounts are being sold on the dark web and hacker forums for as low as 1c each, and in some cases, they're even free? Yeah, so new reports show that Zoom login details are happening through credential stuffing attacks, where hackers will login to Zoom accounts using leaked data from previous breaches.
If the login in successful, that Zoom account login goes into a list and is then sold to other hackers. Some of the Zoom accounts are offered up on a platter on the cheap, or for free -- where other hackers will use them for "zoom-bombing pranks" and "other malicious activities", reports BleepingComputer.
Zoom is in serious doo-doo right now, with the videop conferencing provider now admitting that users' calls from around the world were routed through China.
Zoom CEO Eric Yuan admitted that his company "mistakenly" routed calls through China, he explained: "In our urgency to come to the aid of people around the world during this unprecedented pandemic, we added server capacity and deployed it quickly - starting in China, where the outbreak began".
Yuan continued: "In that process, we failed to fully implement our usual geo-fencing best practices. As a result, it is possible certain meetings were allowed to connect to systems in China, where they should not have been able to connect".