Data protection and laws are easily dodged or circumvented by technical assurances of : we need something more ambitious to escape the giants’ walled gardens.

We need new digital rights.

Apple adds support for encrypted DNS ( and )
said this week that and macOS 11 will support the -over-HTTPS and DNS-over-TLS protocols.

According to this report from 18% of consumers say they have experienced issues getting a loan or mortgage due to information collected about them from a social media account.

Social credits and security: embracing the world of ratings.

Don't get fooled by statements like this. A 3 months moving timeframe is more than enough for to build a profile on you and selling it to ad-companies or States. They are just throwing away already analyzed data.

The browser is secure, but the networks you join might not be. Get up to 12 hours free a month of in-browser protection with the lightweight Firefox extension.

US Government is trying to scare people into supporting legislation to make secure illegal.

The message from the director of F.B.I. to is implicitly this: «If you won’t add backdoors to your devices we’re going to keep saying you’re aiding terrorists and deviant criminals».

The can no longer perform bulk data collection themselves. Now, companies like collect troves of personal information and law enforcement can make a data request to access it all. Protect yourself by adjusting which online tools you use.

Did you know? In 2015 a photo app called "Trump hair" was released for free to people. You were able to put his hair on top of your photos. Funny.

No, not that much.

The developer was Hoan Ton-That, the same guy selling now to police and governments around the world through his company

Please, please, stop using stupid photo apps to share funny faces with friends. 99/100 these apps are there to collect nice face photos to fill up new databases.

John Oliver shares a powerful example of what is wrong with the attitude towards and security in Silicon Valley. Don't give your data. It isn't safe.

Did you know? You can check which trackers and permissions are used by your Android apps by scanning them with Exodus.

It's as easy as to paste the link from Google Play Store.

Lamphone attack lets threat actors recover conversations from your light bulb.

The technique relies on recording light bulb emission variations caused by sound waves (speech) and then converting the light variations back into sound

Lamphone was tested from a distance of 25 meters, but could work from farther, with the proper equipment (laptop, telescope, and electro-optical sensor).

Works in real-time, too. More here:

Do you use a captcha to keep out bots? hCaptcha protects user , rewards websites, and helps companies get their data labeled. It is a drop-in replacement for : you can switch within minutes.

Show more

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!