Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

The Protesters’ Guide to Smartphone Security

Privacy Guides: “For most protesters, activists, and journalists, your smartphone is an essential tool you depend on for organizing with your peers, accessing and distributing information, and helping others. It also represents a great risk, as a tool that is easily appropriated by authorities for targeted and mass surveillance. The perennial question when it comes to protests is whether you should bring your phone at all. If you leave your phone at home, that is probably the safest your data will get, and you will be at very low risk of being tracked by mass surveillance tools. On the other hand, your phone is a critical resource when it comes to coordinating with others, getting updates on the protest from social media, or simply documenting what is going on with your phone’s camera. If possible, bringing a separate device like a “burner phone,” an old phone you can reset, or even a regular old-fashioned camera is a much better option than bringing your primary phone. Any data you don’t bring with you can’t be taken from you at the scene. However, getting access to or affording devices like these aren’t a realistic option for many people. Whether you decide to take your smartphone or a secondary smartphone with you to the event, this guide will cover how to maximize that device’s security and minimize risks to your privacy.”

PowerSchool hacker claims they stole data of 62 million students

Bleeping Computer: “The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of 62.4 million students and 9.5 million teachers. PowerSchool is a cloud-based software solutions provider for K-12 schools and districts that provides tools for enrollment, communication, attendance, staff management, learning systems, analytics, and finance.… Continue Reading

Federal Court Rules Backdoor Searches of 702 Data Unconstitutional

EFF: “Better late than never: last night a federal district court held that backdoor searches of databases full of Americans’ private communications collected under Section 702 ordinarily require a warrant. The landmark ruling comes in a criminal case, United States v. Hasbajrami, after more than a decade of litigation, and over four years since the… Continue Reading

LinkedIn accused of using private messages to train AI

BBC: “A US lawsuit filed on behalf of LinkedIn Premium users accuses the social media platform of sharing their private messages with other companies to train artificial intelligence (AI) models. It alleges that in August last year, the world’s largest professional social networking website “quietly” introduced a privacy setting, automatically opting users in to a… Continue Reading

4 Cybersecurity Misconceptions to Leave Behind in 2025

The New Stack: “Most people know that cyberthreats lurk around every corner. Be it an opportunistic lone criminal or a hacker with the power of a nation-state behind them, it can feel like the world and its dog want to access your private data. Beyond this, though, how well do people grasp the threat? According… Continue Reading

The Powerful AI Tool That Cops (or Stalkers) Can Use to Geolocate Photos in Seconds

404 Media: “A powerful AI tool can predict with high accuracy the location of photos based on features inside the image itself—such as vegetation, architecture, and the distance between buildings—in seconds, with the company now marketing the tool to law enforcement officers and government agencies. Called GeoSpy, made by a firm called Graylark Technologies out… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, January 18, 2025

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, January 18, 2025 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

FTC Surveillance Pricing Study – Wide Range of Personal Data Used to Set Individualized Consumer Prices

“The agency details interim insights from staff perspective examining how companies track consumer behaviors to inform surveillance pricing. The Federal Trade Commission’s initial findings from its surveillance pricing market study revealed that details like a person’s precise location or browser history can be frequently used to target individual consumers with different prices for the same… Continue Reading

The Ethics of Advanced AI Assistants

Google DeepMind – “First, because LLMs display immense modeling power, there is a risk that the model weights encode private information present in the training corpus. In particular, it is possible for LLMs to ‘memorise’ personally identifiable information (PII) such as names, addresses and telephone numbers, and subsequently leak such information through generated text outputs… Continue Reading

FTC Finalizes Order Prohibiting Gravy Analytics, Venntel from Selling Sensitive Location Data

“The Federal Trade Commission finalized an order prohibiting Gravy Analytics and its subsidiary Venntel from unlawfully tracking and selling sensitive location data from users, including data about consumers’ visits to health-related locations and places of worship. In a complaint first announced last month, the FTC alleged that Gravy and Venntel violated the FTC Act by unfairly… Continue Reading

NSA Warns iPhone And Android Users – Disable Location Tracking

Forbes: “…NSA warns that “mobile devices store and share device geolocation data by design…Location data can be extremely valuable and must be protected. It can reveal details about the number of users in a location, user and supply movements, daily routines (user and organizational), and can expose otherwise unknown associations between users and locations.” EFF:… Continue Reading

How to Avoid the Top Internet Scams

Wrong Numbers, Fake Invoices, and Catfishing: If you’re online, you’re at risk. “We spoke to three security experts about what you can do to protect yourself…In a video call, Bogdan Botezatu, Bitdefender’s director of threat research, warned that despite the numerous ways scammers go after their targets, spam email remains the most prevalent. Using telemetry… Continue Reading