I wrote about Verizon’s “Supercookies” or “Perma-Cookies” earlier at http://goo.gl/M3gNaU. When a Verizon customer visits from a mobile device, these supercookies allow third-party advertisers and websites to assemble a deep, permanent profile of visitors’ web browsing habits without their consent. I don’t like the idea of supercookies and apparently a lot of other people also do not. Those who question the practice of online tracking include several U.S. senators. The […]
If you unwittingly download malicious software, your computer and even your smartphone could be locked, unable to do anything. It’s called ransomware, a type of malicious code that leaves its victims feeling personally violated. Some versions destroy your data if you don’t pay, while others merely threaten. Some will encrypt your device, scrambling everything it contains until you pay a ransom. Some versions of ransomware display a fake FBI alert […]
When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iOS, Android or Windows PC device and is transmitted via Silent Circle’s crystal-clear, secure network. Silent Circle provides an encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations. The […]
German researchers have uncovered a network privacy flaw in the mobile phone network used by almost every carrier on the planet that will let hackers intercept calls and text messages even on an encrypted line. The flaw was found on “SS7″ the global network the world’s networks use to route calls to one another. SS7 was designed in the 80’s and is being proven to have holes and flaws that […]
Wiper is not the only cell phone app that sends secure texts, photos, and and then deletes them from the recipient’s phone later. However, it is unusual that it also creates encrypted voice calls over wi-fi connections. Wiper is available free of charge for both Android and iOS (iPhone, iPad, and iPod Touch) devices. Most apps delete the messages a set time after they’re read, but Wiper lets you remove […]
An interesting article: Advertisers on the Internet know who you are; they know where you are with your mobile phone; and they can track your interests and send you advertising despite efforts on your part to avoid their attention. The good news is you can easily find out if this tracking is taking place.
You probably have a tracking device in your pocket. You are helping government spies, hackers, burglars, and cell phone companies track your every move. Every time you place your cell phone in your pocket or purse, you are on the radar and your movements, position, orientation, and conversations are all open to someone. In fact, that happens whether you place a call or not. The “smart phones,” such as an […]
Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users’ web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device. It allows third-party advertisers and websites to assemble a deep, permanent profile […]
Do you have an iPhone that can be unlocked with your fingerprint? Don’t put anything on that phone should remain private! A Virginia Circuit Court judge ruled on Thursday that a person does not need to provide a passcode to unlock their phone for the police. The court also ruled that demanding a suspect to provide a fingerprint to unlock a phone would be constitutional.