If you have an interest in maintaining your online privacy, you will want to read an article by Rae Hodge in the C|Net web site at https://www.cnet.com/how-to/what-is-tor-your-guide-to-using-the-private-browser/. Tor is the U.S. government’s gift to people everywhere who do not wish to be spied upon. Yes, Tor was invented by a mathematician and two computer scientists working for the U.S. government at the Naval Research Lab looking for ways to securely […]
Online Privacy & Security
The Zoom videoconferencing program at https://zoom.us/ has proven very popular during the CoronaVirus pandemic with all the various isolation policies in place. while popular, the Zoom app has also been criticized for not being fully encrypted, not totally private, and for lacking several other features. Now Zoom has released an enhanced and encrypted version of the application in order to ensure protection and privacy of personal information, and is asking […]
Brave Browser has announced video calls can soon be made on the testing version of its browser. The service, Brave Together, offers end-to-end encryption with its calls—unlike a number of other video conferencing platforms, such as Zoom. Unlimited participants can join the calls, though features are still in development. Please notice this new feature is still in beta test, available only on the nightly (test) builds. It will become a […]
The U.S. National Security Agency says the same Russian military hacking group that interfered in the 2016 presidential election and unleashed a devastating malware attack the following year has been exploiting a major email server program since last August or earlier. The NSA did not say who the Russian military hackers have targeted. But senior U.S. intelligence officials have warned in recent months that Kremlin agents are engaged in activities […]
What is probably the most secure text messaging/phone calling/video calling app available today becomes even more secure: Signal to Move Away From Using Phone Numbers as User IDs at https://www.zdnet.com/article/signal-to-move-away-from-phone-numbers-as-user-ids/.
If you care about online privacy, you need to be familiar with the Tor Browser. It was originally invented by the U.S. government for the purpose of keeping online communications hidden from foreign spies. The government no longer maintains it but the software is public domain and various civilian programmers have taken over the task of maintaining the Tor Browser and adding new functionality to it as needed. You can […]
Cyber criminals are still attempting to exploit the coronavirus pandemic for their own gain and they’re being helped by website templates that allow them to mimic government agencies and companies. Researchers at cybersecurity company Proofpoint have identified over 300 phishing campaigns designed to steal personal information and bank details from victims – and many are using sites that are indistinguishable from the real thing, complete with authentic imagery and user […]
On March 17, 2020, the federal government relaxed a number of telehealth-related regulatory requirements due to COVID-19. On April 3, 2020, California Governor Gavin Newsom issued Executive Order N-43-20 (the Order), which relaxes various telehealth reporting requirements, penalties, and enforcements otherwise imposed under state laws, including those associated with unauthorized access and disclosure of personal information through telehealth mediums.
As privacy concerns grow about the data collected through contact tracing apps to monitor the spread of the coronavirus, a group of Democratic lawmakers is introducing a bill Thursday that aims to ensure that the data collected is protected from over-surveillance and abuse, according to a copy of the legislation seen by Morning Consult. The Public Health Emergency Privacy Act — which is being introduced by Sens. Richard Blumenthal (Conn.) and […]
A new set of flaws discovered in the Intel Thunderbolt port has put millions of machines at risk of local hacking. This new research by Eindhoven University‘s Björn Ruytenberg suggests that if a hacker gains access to a machine for just five minutes, they could bypass login methods to gain full data access. Thunderbolt ports are present in machines with Windows, Linux, and macOS. So, that covers a lot of […]