Minnesota is now using contact tracing to track protestors, as demonstrations escalate

That Rona is an excuse for a lot of bullshit that will get pushed forward…..

As the Minnesota protests have spilled across the country, fueled by protestors angered over the police killing of an unarmed Minneapolis man named George Floyd, the protests have morphed into marches and demonstrations that have turned violent everywhere from New York City to Los Angeles. Curfews are being imposed in major cities around the US at the time of this writing, and at least eight states, as well as the District of Columbia, have requested the National Guard to assist local law enforcement. Continue reading

2 Ways Your SIM Card Can Be Hacked (And How to Protect It)

Good info here….

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

Folks should know by now China ain’t playing with nobody and certainly not playing fair…

Foreigners crossing certain Chinese borders into the Xinjiang region, where authorities are conducting a massive campaign of surveillance and oppression against the local Muslim population, are being forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian, the New York Times, and the German public broadcaster NDR has found. Continue reading

Please, for the Love of God, Make Sure You Delete Things Properly

Good info here….

Your personal data—be it financial spreadsheets or web searches—is not something you want to be leaving behind for other people to find, and totally wiping your activity off devices or the web takes a few more steps than you might have realized. Don’t worry though, as we’re going to walk you through the process. Continue reading

How Facebook Schemed Against Its Users

This story should surprise no one… FB ain’t shit…

Last year, I was trying to solve a mystery. Facebook’s “People You May Know” tool was outing sex workers’ real identities to their clients, and vice versa, and I was trying to figure out how. A sex worker using the pseudonym Leila told me she had gone to great lengths to hide her identity from clients by using an alternate name, alternate email address, and burner phone number—contact information she didn’t provide to Facebook—yet Facebook was still inextricably linking her with her clients, suggesting them to her real-name account as people she might want to friend. Continue reading

4 Examples of How Smartphone Location Tracking Can Violate Your Privacy

Like many people the world over, you’ve probably used GPS before. You may even have used it today, navigating your way to work with Google Maps. Our smartphones can precisely pinpoint our location, allowing us to get everything from local news, to restaurant reviews, in a matter of seconds. Continue reading

Safeguarding Your Smartphone’s Data While Using Public WiFi

Some good info here…. just remember public wifi is NEVER safe…..

So you’re sipping coffee at your favorite cafe. You’re connected to the free WiFi to check your Facebook account, maybe take a quick peek at your PayPal balance, and read the headlines. You’re so accustomed to having internet access that you don’t even consider whether the public network you’re connecting to is secure.

Just because open WiFi networks have firewalls to protect users doesn’t mean that you’re protected from others logging into the same network, and some may not even have an active firewall. So when you’re using public WiFi, the information stored on your handset will be transferred through mobile apps and the internet, which means it could be accessed by cyber criminals looking to steal data.
Continue reading