Read: 6/2/2022 www.extremetech.com
Apple released AirTags last year, giving iOS users a better way to track and find their belongings. However, the tracking capabilities of AirTags were so good that many expressed concerns about privacy and safety.
apple apple airtags computer hardware hardware hardware hacking hardware teardown privacy privacy circumvention stalkerware stalking surveillance unlocked hardware
Read: 27/1/2022 www.vice.com
NFTs are usually passive affairs. A consumer buys the token, and then sells or stores the NFT. The NFT doesn’t really do anything.
crypto exchanges crypto tokens crypto trading cryptocurrency cryptocurrency hacks cyber hacks cybersecurity cybersecurity industry denial of service exploits ip addresses metamask nft critiques nfts opensea personal data privacy privacy circumvention surveillance vice.com vulnerabilities xss exploits
Read: 19/1/2022 www.vice.com
Lawmakers have proposed new legislation that they say would ban surveillance-based advertising. The legislation would target the underlying practice of targeted or personalized ads that facilitates surveillance-based advertising itself.
adl organisation advertising advertising blowback big data business models capitalism cybersecurity data collection data cross referencing data industry data markets data modeling data processing data science data security duckduckgo epic organisation facebook ads gdpr google ads internet internet advertising internet infrastructure personal data personal internet history privacy privacy circumvention proton company search engines surveillance targeted advertising tech companies ubiquitous internet us democrats us ftc us law usa vice.com web services
Read: 30/11/2021 www.vice.com
On Tuesday a Finnish court ruled that chat messages secretly gathered by the FBI from encrypted phone company Anom can’t be used as evidence against two particular suspects, according to a report from Finnish outlet Iltalehti.
anom phones crime crime infiltration crime networks criminal groups criminal investigation cyber crime cybercrime cybersecurity encryption end to end encryption europe european crime european union fbi finland finland police honeypot message services organised crime privacy privacy circumvention surveillance vice.com
Read: 23/11/2021 www.vice.com
The tech giant’s lawsuit is just the latest in a string of bad news for NSO in the last few weeks.
apple contract lawsuits cyber hacks hacker groups hacker tools hacking methods iphones malicious software mobile phones nso group privacy privacy circumvention spyware surveillance tech industry us courts us law usa vice.com
Read: 14/11/2021 www.theverge.com
Controversial facial recognition firm Clearview AI has been ordered to destroy all images and facial templates belonging to individuals living in Australia by the country’s national privacy regulator.
australia australian law clearview data modeling facebook facebook pr facial recognition meta company modeling privacy privacy circumvention social media social media abuse social networks surveillance web scraping
Read: 3/11/2021 www.vice.com
The U.S. government added NSO Group to a federal denylist that prohibits any American company or individual from selling or providing services to the controversial Israeli spyware seller. The sanctions effectively prohibit any U.S. company, as well as American citizens working in the U.S.
corporations cybersecurity cybersecurity industry israel israeli businesses lmao corporations malicious software privacy privacy circumvention sanctions software spyware surveillance usa vice.com
Read: 21/10/2021 www.news.com.au
The woman, who goes by my.data.not.yours on TikTok, posted a now-viral video explaining that she requested to see what data Amazon had collected about her, but wasn’t expecting to receive so much. She revealed that she has three Amazon smart speakers.
amazon data collection data storage internet of things leaks negligence personal data privacy privacy circumvention social media social media companies surveillance tiktok tiktok influencers
Read: 19/10/2021 www.vice.com
Want the best of VICE News straight to your inbox? Sign up here. Those documents include specifics about Arbery’s mental health and prior criminal history that a judge ordered suppressed and never brought up in court.
ahmaud arbery criminal history death evidence georgia state incompetence juries jury selection leaked documents leaks mental health mental health history mental health treatment mishandled information misinformation murder personal data privacy privacy circumvention race racial discrimination racial profiling racism random violence us courts us crime us race politics usa vice.com
Read: 19/10/2021 www.vice.com
Japanese police on Monday arrested a 43-year-old man for using artificial intelligence to effectively unblur pixelated porn videos, in the first criminal case in the country involving the exploitative use of the powerful technology.
ai asia blackmail california california law copyright copyright law deepfakes india indian crime japan japan and pornography japan crime japanese court japanese law lmao japan nonconsensual pornography pornography privacy privacy circumvention taiwan taiwan law vice.com
Read: 14/10/2021 www.vice.com
Want the best of VICE News straight to your inbox? Sign up here.
eu law europe european union facebook gdpr ireland privacy privacy circumvention social media companies surveillance tax haven tech companies us companies vice.com web services
Read: 25/8/2021 the-pen.co
There is considerable interest in efforts by the Chinese government to impose greater control over major private enterprises operating in the country. Critics see this as an attack of freedom to do business. Supporters see it as a justified crackdown on corporate greed.
australia australian business australian government china china law chinese crackdown cybersecurity data collection data modeling personal data privacy privacy circumvention social media social media companies tech companies
Read: 12/8/2021 www.vice.com
Grayshift, the company that develops that iPhone unlocking device GrayKey that is widely used by law enforcement, tries to keep details of its technology out of the broader public's hands.
cybersecurity iphones phone hacks privacy privacy circumvention vice.com