Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Delete Your Phone Number From Twitter Before They Sell It

Lifehacker: “According to a new report on Platformer, after alienating advertisers and losing revenue, Twitter plans to sell location data and phone numbers to advertisers, whether you like it or not. Now is a great time to remove that information from your account. Even if Musk’s platform never implements these changes, you’re probably better off… Continue Reading

Riana Pfefferkorn on End-to-End Encryption for iPhone Backups to iCloud

LawFare Podcast: “Last week, Apple made an announcement about some new security features it would be offering to users. One of those features involves users’ ability to opt in to encryption for iPhone backups to iCloud. While this new feature will enhance data privacy and security for those users who choose to opt in, it… Continue Reading

3 Takeaways About Abortion Litigation Since Dobbs

Brennan Center: “In Dobbs v. Jackson Women’s Health Organization, the Supreme Court overruled Roe v. Wade and held that there is no federal constitutional right to an abortion. This shifted the battle for reproductive rights primarily to the states. Dozens of lawsuits have since been filed under state constitutions and statutes challenging abortion bans, many… Continue Reading

Dozens of Telehealth Startups Sent Sensitive Health Information to Big Tech Companies

MarkUp: “Open the website of WorkIt Health, and the path to treatment starts with a simple intake form: Are you in danger of harming yourself or others? If not, what’s your current opioid and alcohol use? How much methadone do you use? Within minutes, patients looking for online treatment for opioid use and other addictions… Continue Reading

Foreign Information Manipulation Interference and Cybersecurity – Threat Landscape

“The EU Agency for Cybersecurity (ENISA) and the European External Action Service (EEAS) have joined forces to study and analyse the threat landscape concerning Foreign Information Manipulation and Interference (FIMI) and disinformation. A dedicated analytical framework is put forward, consistent with the ENISA Threat Landscape (ETL) methodology, with the aim of analysing both FIMI and… Continue Reading

Here’s When You Should Use Tor Instead of a VPN

How-To-Geek: “If you’ve been looking into the different ways to browse anonymously, two terms will come up regularly: VPNs and Tor. However, when you compare these two, you’ll quickly see that they have very different use cases. To figure out when you should use Tor rather than a VPN, let’s first go over how they… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

New Vivaldi version integrates Mastodon into the browser sidebar

Bleeping Computer: “Vivaldi 5.6 was released today with a Mastodon client integrated directly into the browser’s sidebar, seamlessly incorporating the rising social media platform in the browser’s interface. Vivaldi is a cross-platform web browser created by the former co-founder and CEO of Opera Software, Jon Stephenson von Tetzchner. It is geared towards power users who… Continue Reading

Apple advances user security with powerful new data protections

Apple: “Apple today introduced three advanced security features focused on protecting against threats to user data in the cloud, representing the next step in its ongoing effort to provide users with even stronger ways to protect their data. With iMessage Contact Key Verification, users can verify they are communicating only with whom they intend. With… Continue Reading

Computer Matching and Privacy Protection Act: Data Integration and Individual Rights

CRS Report – Computer Matching and Privacy Protection Act: Data Integration and Individual Rights, December 6, 2022: “Computers and information technologies have increased the amount of data that can be collected, stored, and processed. Computers make it easier to exchange, share, and match data on individuals across programmatic and agency boundaries, enabling the use of… Continue Reading

Amazon is offering customers $2 per month for letting the company monitor the traffic on their phones

Insider: “Amazon’s Ad Verification program offers select users $2 per month for sharing their traffic data. It is part of Amazon’s Shopper Panel, an invite-only program that offers users financial rewards. The voluntary program could raise privacy concerns over how Amazon handles customer data… Under the company’s new invite-only Ad Verification program, Amazon is tracking… Continue Reading