A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.
Facebook users and privacy advocates erupted in anger recently after New Scientist drew attention to a 2012 study in which Facebook researchers had attempted to manipulate users’ moods. “The company purposefully messed with people’s minds,” one privacy group complained to the Federal Trade Commission.
But the mood study is far from the only example of Facebook scrutinizing its users—the company has been doing that for years, examining users’ ethnicities, political views, romantic partners, and even how they talk to their children. (Unlike the mood study, the Facebook studies listed below are observational; they don’t attempt to change users’ behavior.) Although it’s unlikely Facebook users have heard about most of these studies, they’ve consented to them; the social network’s Data Use Policy states: “We may use the information we receive about you…for internal operations, including troubleshooting, data analysis, testing, research and service improvement.”
In May, the EU Court of Justice ruled that because people have the “right to be forgotten,” Google must remove links from European versions of search, just because people ask them to. But you can’t hide from the past on the internet.
The requirement that Google take down links for the right to be forgotten is just lame censorship. Overtly! It’s the removal of inconvenient facts from published public view because somebody wants the facts to disappear. It’s a bit like the producers of Friday Night Lights calling on the Ministry of Truth to have Season 2 erased from the record because it’s inferior to the rest of the series.
Earlier this week, Facebook announced that it was going to start using all of that ever-so-illuminating app and website data it collects to serve us with more targeted ads. In other words, Facebook is getting ready to use your browsing history to benefit advertisers. Here’s how to stop them.
Cyber criminals have reportedly hacked into the servers of Domino’s Pizza France and Belgium, and downloaded over 600,000 customer records.
The data includes customers’ names, addresses, phone numbers, email addresses, passwords and delivery instructions – as well as their favourite pizza toppings – according to the hacker organisation known as Rex Mundi.
The hackers are now demanding a ransom of €30,000 (£24,000) to release the data. If Domino’s does not pay the ransom by 20:00 CET tonight, they say they will post the entirety of the data in their possession on the Internet
Twitter has been a happening place this spring. Reuters suggests the micr0blogging site will have nearly 400 million users by 2018. In addition, the hashtag #YesAllWomen exploded, and according to CNN, it was mentioned in 1 million tweets in just one week. That’s a lot of talking.
At the same time, there’s a ghost conversation going on about the public nature of Twitter. Specifically, some people who thought they were speaking at least semi-privately have discovered that their names, their identities, and in some cases, their locations were being spread all across the internet after they shared a few thoughts that seemed somehow newsworthy.
Seems like it’s time to look a little closer at how Twitter really works, and how much privacy a reasonable person can expect while using this particular social media site.
Most Facebook Inc (NASDAQ:FB) users think that when they set their friends list privacy to “Only Me,” it means that they are the only ones who can see it. However, anyone can take advantage of a loophole in the privacy. As Mashable reports, that loophole is the social network’s mutual friends feature.
All users can see mutual friends between any other two users if one of them has made their friends list publicly available. So, for example, if one user keeps her friends list private but her closest friend does not, then a third party could compare the two users’ lists to see all the friends they have in common.
Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.
Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?
“They can absolutely turn them on with the power turned off to the device,” Snowden replied.
Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.