Google Created Faster Adiantum Encryption for All Low-End Android Phones and IoT Devices
With the spread of advanced spying technology, such as social media monitoring and cell-phone tracking, itâ€™s easy to forget about the most ubiquitous form of surveillanceâ€”regular old security cameras. But the San Francisco County District Attorneyâ€™s Office sure hasnâ€™t forgotten. Prosecutors maintain a map and dataset of thousands of privately and publicly owned security cameras. When law enforcement is investigating a crime, officers can refer to this information to identify which cameras may have caught relevant footage. And through a public records request under the San Francisco Sunshine Ordinance, EFF recently obtained most of this dataâ€”the locations of 2,753 camerasâ€”and we are now making it available to the public.
Intelligence officials in many countries are concerned the company could be helping the Chinese government spy on companies, military units and government agencies.
No Chinese company is fully independent of its government, which reserves the right to require companies to assist with intelligence gathering. Huawei is even more closely tied to the government than many Chinese firms: Its founder, Ren Zhengfei, is a former technologist in the Peopleâ€™s Liberation Army. As his company grew, so did international concerns about whether Huawei equipment could be used to spy on companies and governments around the world.
A number of organizations, including ProPublica, have developed tools to let the public see exactly how Facebook users are being targeted by advertisers.Now, Facebook has quietly made changes to its site that stop those efforts.#ProPublica, #Mozilla and #WhoTargetsMe have all noticed their tools stopped working this month after Facebook inserted code in its website that blocks them.
Facebook has restricted the ability of external political transparency campaigners to monitor adverts placed on the social network, in a move described as an â€œappalling lookâ€ by one of the organisations affected.WhoTargetsMe, a British group dedicated to scrutinising adverts on the social network, has said its activities have been severely restricted by recent changes made by the social network. The change has also hit a similar programme by the US investigative journalism site ProPublica, affecting both groupsâ€™ ability to collect data on why users are being targeted by political campaigners.
Zumigo, which sold the location data of American cell phone users, wanted the FCC to remove requirements around user consent.
The womanÂ fled to ShanghaiÂ to elude arrest after murdering her boyfriend in south-western Yunnan province, more than 2,600 kilometres (1,615 miles) away.
In Zhengzhou city, central China, transport police have been wearing high-tech sunglasses that can help them spot suspects within seconds in a crowded train station since February.At the same time, police in Shenzhen city, south-eastern China, has started to 'name and shame' unruly drivers and jaywalkers in April by projecting their faces on LED screens after identifying them from a database.The rapid development of the technology has triggered a demand for commercial applications as well, with gyms, restaurants and even public toilets getting in on the facial recognition game.
Two unpatched vulnerabilities disclosed in ES File Explorer Android app with 100,000,000 installationsOpen Port #vulnerability (CVE-2019-6447) â†’
ES File Explorer Open Port Vulnerability by Elliot Alderson on YouTubeMan-in-the-middle vulnerability â†’
Vulnerable Android app ES File Explorer | Man in the middle attack ( MITM) | ESET Mobile Security by Lukas Stefanko on YouTube
Ordinary Facebook text messages, Alphabet Incâ€™s (GOOGL.O) Gmail, and other services are decrypted by the service providers during transit for targeted advertising or other reasons, making them available for court-ordered interception.End-to-end encrypted communications, by contrast, go directly from one user to another user without revealing anything intelligible to providers.
Facebook says it can only comply with the governmentâ€™s request if it rewrites the code relied upon by all its users to remove encryption or else hacks the governmentâ€™s current target, according to the sources.