tracking

Hacked Robot Vacuums, Secret Printer Tracking Dots
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

EFF Angry as Google Keeps 3rd-Party Cookies in Chrome
Regulatory capture by stealth? Google changes its mind about third-party tracking cookies—we’re stuck with them for the foreseeable ...

The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Facebook’s Extensive Surveillance Network
Consumer Reports is reporting that Facebook has built a massive surveillance network: Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of ...

Data Privacy Week: Are you ready to become a data privacy snob?
Welcome to Data Privacy Week 2024, brought to us once again courtesy of the National Cybersecurity Alliance (NCA). ...
USENIX Security ’23 – Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles – ‘Exploring Privacy And Incentives Considerations In Adoption Of COVID-19 Contact Tracing Apps’
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...

Don’t Be Evil: Google’s Scary ‘IP Protection’ Privacy Plan
Firefox here we come! “Free” privacy proxy for all Chrome users? What could POSSIBLY go wrong? ...
Identifying the Idaho Killer
The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay attention to the techniques: The ...
Fines as a Security System
Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app ...
Identifying People Using Cell Phone Location Data
The two people who shut down four Washington power stations in December were arrested. This is the interesting part: Investigators identified Greenwood and Crahan almost immediately after the attacks took place by ...