Tor Browser 8.0 is Released

Tor is probably the best-known privacy network and also one of the best at protecting your personal data. It is free software for enabling anonymous communication.

According to Wikipedia:

The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Continue reading

More Than 1 In 4 American Facebook Users are Changing Their Relationship with the Company

A recent survey by Pew Research has found nearly three-quarters of American Facebook users have changed how they use the social media app in the past year, following a barrage of scandals involving the abuse of personal data, foreign interference in U.S. elections and the spread of hateful or harassing content on the platform.

According to the survey, over half of Facebook users ages 18 and older (54%) say they have adjusted their privacy settings in the past 12 months. Around four-in-ten (42%) say they have taken a break from checking the platform for a period of several weeks or more, while around a quarter (26%) say they have deleted the Facebook app from their cellphone. All told, some 74% of Facebook users say they have taken at least one of these three actions in the past year.

You can read more at: https://pewrsr.ch/2Ck5Low.

Chrome Vulnerability leaves Wi-Fi Networks Open to Attack

Millions of home Wi-Fi networks could be easily hacked, even when the network is protected by a strong password, thanks to a flaw in Chrome-based browsers.

Researchers at cybersecurity and penetration testing consultancy SureCloud have uncovered a weakness in the way Google Chrome and Opera browsers, among others, handle saved passwords and how those saved passwords are used to interact with home Wi-Fi routers over unencrypted connections.

Details may be found in an article by Ian Barker in the BetaNews web site at: http://bit.ly/2ClLEGv.

COMMENTS:

Continue reading

Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Even the spies are being spied upon. mSpy, the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has reportedly leaked millions of sensitive records online, including passwords, call logs, text messages, contacts, notes and location data secretly collected from phones running the stealthy spyware.

You’d think they would learn to be more secure. However, this is the SECOND TIME in 3 Years that Mobile Spyware Maker mSpy has leaked millions of sensitive records. There is a good chance that your personal information has been compromised.

Details may be found in the Krebs on Security web site http://bit.ly/2MPFbZl. (Brian Krebs is internationally recognized as one of today’s greatest gurus concerning computer security.)

Apple Will Require All Apps to Have a Privacy Policy

Apple has always had strong privacy policies, updated frequently as new security issues appear. After data breaches at other tech companies and the European Union’s stricter GDPR rules, Apple is now tightening up its App Store. Apple will require all future updates and new apps to provide a link the developers’ privacy policies.

Details may be found in an article by Lisa Marie Segarra in the Fortune web site at: https://for.tn/2Cj63fB.

Facebook’s Onavo VPN is Banned from Apple’s App Store

A couple of weeks ago, I published a brief article entitled, You Should Delete Facebook’s VPN App. It provided a link to a number of articles describing Facebook’s violation of Apple’s data-gathering rules. The Facebook so-called VPN, called Onavo, did exactly the opposite of what VPNs are supposed to do: it monitored everything users were sending and receiving across the VPN and collected personal information about each VPN user, information that probably was to be re-sold to companies that want your private information. After all, that’s Facebook’s business model.

Now Apple has banned the Facebook VPN from its App Store. See https://tinyurl.com/yabm7wxp.

I suggest you also should exactly what Apple did: ban Facebook’s so-called VPN, called Onavo, from your mobile devices. Delete now.

Microsoft and Telekom Joint Venture that Provides Data Storage Services in Germany is Shutting Down Due to Privacy Issues

Last week, Microsoft announced their collaboration with Deutsche Telekom, which was providing customers Microsoft cloud services under strict German jurisdiction, is shutting down. Microsoft is replacing it with a service that no longer is directly operated by Microsoft. The new service(s) reportedly will comply with local and regional regulations, including the Cloud Computing Compliance Controls Catalogue (C5) certification in Germany.

Handelsblatt.com called the Telekom cloud solution “over-priced, under-performing and unpopular with customers”, and their sources tell them “Microsoft Cloud Deutschland” has lost Microsoft over 100 million euro. Handelsblatt.com stated that the security issues were the main problem.

In theory, the data stored in the German data centers were run under German law which strongly prohibits access to the stored data by anyone. Not even the German government is allowed to see the stored data, according to German laws. Of course, no other government is allowed access either.

The problem is with U.S. laws as applied to U.S. companies and the fact that data stored anywhere in the world is really international. While laws in various countries may claim rights over data stored within each country, the German laws are inadequate when applied to joint ventures by corporations in different countries.

Continue reading