I’d be surprised if there were any manufacturers that didn’t do this to some degree. Most people are wilfully trustful enough of companies, that being caught out like this is rare enough to make the news. This applies to all ‘Internet of Things’ devices. If something has internet access in some way, it can be either compromised or used against the user’s best interests. “According … Continue reading Bose Headphones Spy on Users, Lawsuit Says
Won’t somebody think of the likes? “Let’s step back for a second and take Zuckerberg out of the equation. As we’ve seen, Facebook is the biggest personal data collector in history. It is openly working on simulating human beings for research. It has all the tools needed to manipulate people’s realities, emotions, thoughts, and political preferences. And it continues to build these capabilities, especially with … Continue reading Is Facebook A Structural Threat To Free Society?
The solution appears to be either handing over control to a walled garden like Google AMP or Facebook Pages, relinquishing the core values of the Internet, or people contribute to a shared opt-in revenue system, as Brave Browser is doing. The latter seems far more logical, but will fail due to human nature. “While, as a whole, web usability has improved over these past several … Continue reading The Most Hated Online Advertising Techniques
If anybody asks why backdoors are a bad idea, mention Intel’s AMT. Well-intentioned, but as with all such systems, eventually succumbs to being hijacked for nefarious purposes. AMT is incredibly powerful, offering much more control over the target machine, not requiring any software, rootkits, authentication nor even an IP address. Being that AMT is implemented at a BIOS level, and the vast majority of motherboard … Continue reading Intel’s Remote AMT Privilege Escalation
The unique phone ID (IMEI), and less importantly, Android ID and carrier information can be obtained by apps without any permission requests. Like internet access, it’s provided by default. As the article mentions, some of it can be mitigated in 6.0+, but ideally, you should be spoofing your IDs using XPrivacy or similar. “The downside of using a device-level ID is, well, whoever has that … Continue reading Android apps, IMEIs and privacy
Two things come to mind: Firstly, people who run full Facebook or Google services on their phones, which collect far more information and in more detail, even outside the car. Secondly, hang onto your ‘dumb’ car for as long as possible. “Beyond the actuators, there’s data collection going on in the OnStar and Car-Net-like systems as well. These devices have microphones and video cameras. The … Continue reading How connected car tech is eroding personal privacy
The difference between full-device encryption (Marshmallow and prior) and file-based encryption (Nougat and above). It addresses many of the shortcomings of FDE, allowing for far more convenient decryption. “When you power on an FBE-configured device, it starts up in a secured Direct Boot mode with access to only the DE storage (the utility closet). Direct Boot allows many of Android’s core processes to start up, … Continue reading Explained: Android Nougat File-Based Encryption