Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’

  • 56 Posts
  • 655 Comments
Joined 4Y ago
cake
Cake day: Apr 25, 2021

help-circle
rss

Well, one thing are TV sats and way other communication and military sats. That you can have hundreds of TV channels for free with an cheap sat reciever and parabolic is certainly nothing new


I wonder, if hackers with scarce means were able to access the communications, how much could the hackers and secret services do that did not warn of this breach?



Eavesdropping on Internal Networks via Unencrypted Satellites
# Major Security Flaws Found in Satellite Communications Researchers from UC San Diego and the University of Maryland revealed that nearly half of geostationary satellite signals transmit unencrypted data, exposing sensitive communications from telecom networks, military operations, and critical infrastructure[^1]. Using just $800 in off-the-shelf equipment - a satellite dish, roof mount, motor and tuner card - the team intercepted vast amounts of unprotected data over three years from their San Diego location[^7]. Their findings included: - T-Mobile cellular network traffic, including over 2,700 phone numbers and one-sided call/text content captured in just 9 hours[^7] - U.S. military vessel communications and Mexican military/law enforcement data, including helicopter locations and narcotics intelligence[^7] - Critical infrastructure communications from power grids and offshore oil platforms[^4] - In-flight WiFi data from 10 different airlines[^7] "It just completely shocked us. There are some really critical pieces of our infrastructure relying on this satellite ecosystem, and our suspicion was that it would all be encrypted," said Aaron Schulman, UCSD professor who co-led the research[^7]. After being notified, some companies like T-Mobile quickly added encryption, while others, including certain U.S. critical infrastructure operators, have yet to secure their systems[^4]. The researchers estimate they accessed only 15% of global satellite transponders from their single location, suggesting the vulnerability's true scope is far larger[^7]. Johns Hopkins professor Matt Green noted: "The fact that this much data is going over satellites that anyone can pick up with an antenna is just incredible"[^7]. [^1]: [SATCOM Security](https://satcom.sysnet.ucsd.edu/) [^4]: [Security Affairs - Unencrypted satellites expose global communications](https://securityaffairs.com/183404/hacking/unencrypted-satellites-expose-global-communications.html) [^7]: [Wired - Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data](https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/)
fedilink

Child abuse, terrorism, national security were always a good alibi for surveillance and control, while pedofiles, terrorists and criminals in the goverment, destroying the national security and basic rights, wishing us to eat cakes.


No problems here, URLvoid and Webbkoll don’t show any security issue, Limewire is a legit site. For sure a false positive of one of the uBO filters


(Fucking paywall article)

Summary

A catastrophic data breach at Discord’s third-party vendor Zendesk has exposed sensitive user information, including ID documents and selfies uploaded for age verification[1][2]. At least 70,000 people were impacted by the breach, with hackers leaking users’ driver’s licenses, approximate locations, real names, and emails[2:1].

The hackers are attempting to extort Discord and have already shared leaked selfies of users posing with their IDs in a Telegram group, along with a spreadsheet containing detailed information on a thousand users[2:2].

This breach validates critics’ concerns about tech companies collecting sensitive identity documents, particularly in light of recent age verification requirements in countries like the UK[2:3]. As one security expert notes in Gadgeteer, “a password is easy to change, but an ID document is often a nightmare to change, and the ID number anyway stays the same”[3].

Discord says it is working with affected users and authorities but won’t give in to the hackers’ demands[2:4].


  1. 404 Media - The Discord Hack is Every User’s Worst Nightmare ↩︎

  2. The Flagship Eclipse - Discord Suffers Major Hack Making Users’ Worst Nightmare Come True ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  3. Gadgeteer - The Discord Hack is Every User’s Worst Nightmare — Why Uploaded IDs are a Problem ↩︎


Yes, iy’s always to use with a grain of salt. As said, it ads a security layer, but can be an privacy hole, despte that mail directions are easier to track as phone numbers, at least in the EU, you can’t be mapped back to an user, this is only possible in crime investigations by the police with an court order. Mail adresses on the other hand are unique identifiers which are way easier th track, except you use an disposable mail or alias. Anyway, eg.in Vivaldi 2FA is safe and apart optional, as also the account itself, only needed when you want to use sync or the use of Vivaldimail, blog and other services it offers. In much other services it’s also only an option.


2FA is an important security layer, if the service, after sending you the activating SMS with the code, delete your number (normal in serious services), it’s also not an privacy problem. In big us corporations on the other hand, it is, eg.Google store tour number and also probably share it, there 2FA is not an option. Instead a number, some services also admit alternatively a second e-mail account to receive the activation code, there, if you have doubt, you can use an disposable mail, so there isn’t any privacy problem.


I prefer an old school security door with key for my home, any electronic doorlock is hackeable, more with online functions. Same as generally “smarthomes” are never private.


Upgrading is always needed in every OS, because with the time are appearing new exploids and other malware which need corresponding paches in the OS, if not these security holes becomes bigger and bigger. There are also new web system which need an update of the OS to not loose compatibilities. These updates anyway are done mostly automaticly- In Windows with an advice that an update is in the queue and it will be installed in the next reboot. Luckyly in last Windows a thing of 3-5 minutes, often less.

Updates are only irrelevant, if you use the OS exclusively local, eg. an old Windows XP in LAN for the intern use in a company with their own soft, an Vintage fan to play some old games in an old PC without internet access, or an automatism in a factory, which also don’t need more than a very basic OS, without any extra features than for what it is made for.


I know, it’s normal that after a good Windows release always follow an crappy one, independent from the bloatware which it always have. W7 good, W8 crap, W10 good, W11 crap…, but at least, for an advanced user possible always to gut all of these trash and even eliminate this crappy Fisher Price UI in W11, which try badly to imitate the UI of an Mac, eliminating, I don’t know why, a lot of setting to customize the UI, needing scripts to do it.


Also because it is the most easy and intuitive to use for everyone. Already with a good default setting, blocking the most problematic trackings, means, it’s install and forget it or at least customize only some specific traffic from an app to be protected.


Well, to anyones preferences. Every defense is valid and has it’s + and -. It’s irrelevant if you use Portmaster, PiHole, pFsense or anything else, important if it works to show the middlefinger to the big brother corporations, what all these do.


Yes, Windows currently is a stable, usefull and good OS, exept that it is by default full of bloatware, spyware, unnecesary telemetries, services “to improve the user experience” which nobody needs…all not easy to gut, but possible. They say that Windows is easy to handle, but only seens so at the first look, to convert it in a good OS it needs an advanced user. In Linux is way easier, there is nothing hidden, but also has his drawbacks. In my new Laptop with W11, the first impression was that it was the worst UI I’ve ever seen, impossible the startmenu and the taskbar, not even customizable in a bad copy of an Mac desktop, apart of all other from the mencioned crap, which I culd strip out, to get rid of the UI, turning it back of the good customizable one from W10, I used a nice FOSS app, Windhawk, something like an userscript manager which permits to do almost everything with the UI. Settings are instantanly, no restart needed. Now I use an snappy fast and reasonable private W11 which use less than 1GB RAM, to my like, with an small Taskbar on the top of the screen, an Startmenu as it should be and some more tweaks.


I don’t use Proton VPN, but Portmaster, which apart is FLOSS, only it’s SPN is paid OpenSource. Well, Portmaster is the best Firewall and traffic monitoring app out there, but depending of which filtering you use, it can be even very brutal, and enough to block some server conections which Proton use. I saw it blocking big corporations, with the result that I can’t even access none of their services, even without VPN. I think that you must see which site is blocked from Proton and except it from the filtering, or pay some bucks and use the SPN, which is anyway better, with it you can use multiple tunnels depending on the sites you want to visit. Or using an proxy extension, like VPNLY or CyberGhost, which are free, without limits, no logs and private. The Portmaster anyway avoid that web pages can sneak any tracking crap in your PC.


PEBCAK, too much Fakebook and the lack of common sense. For the rest of 10% maybe enough an VPN and updated devices.


Well, a backdoor isn’t a problem if it is an client side encryption, with it they may access the cloud data but they will see only this, encrypted data, because not even the ckoud provider can desencrypt these data. If you are investigated, they must visit you in person with an court order to give them the locally stored or memorized encryption password or spend a lot of time and effort to crack the code, almost impossible depending the used encryption systemwith normally 256 bits or more. The backdoor only make sense if the Cloud provider stores an recovery code to restore your data when you lose ore forget your encryption password, which isn’t the case when they want to offer an safe and no knowledge service. In these loosing your encryption password is loosing your data, the price of security.


I remember the need to reload my old Nokia brick sometimes and that it had a better reception strengh than my current smartphone, apart of the bulletproof finish.


I use FreeTube since time with the SMplayer, or using direct the SMplayer, entering the Video URL. SMplayer is a Gem. It works also in Windows in a similar way, described in your great post, not only in Linux, setting SMplayer as extern player in FreeTube and when FreeTube won’t play the Video in the list, clicking on the little square icon at the bottom left of the video thumbnail and it will open in the SMplayer. except few times in Videos with special protections, these can be watched only in YouTube itself, luckily only few.


Yes, not so difficult to spy phone calls and SMS, but it’s way less risky for privacy and security as in Smartphones, full of sensitive data on an OS and tons of apps which logs and spy on you, spreading the information not only to the ISP and govs, but also to private advertising companies and others, which is way worse. Phone lines are way less dangerous for privacy and security as the Internet, log data stored by the ISP are deleted after an max. of three month, data on the internet are forever and can’t be deleted, because they are spreeded everywhere.

At least in my case, I don’t use my Smartphone for other things as for calls, I don’t use any messenger apps nor storing sensitive data on it, desconected GPS and localisation apps. For me smartphones as such are spyware by definition, more if the include AI like they are doing currently.


If you use any adblocker, inbuild or as extension, eg.uBO, AdGuard or Adblock Plus extension and apart eg. Portmaster, or InviZible Pro on Mobile, it’s irrelevant if the page use tracking cookies, because they get blocked.


Yes, embed redirect was a good solution, also using an iFrame script, but this currently works only in few videos, in the most it got the error "watch video in YouTube· It’s almost a daily battle between YouTube, devs of adblockers and scripts and front-end instances, some solutions work for some days and on the next day YouTube begins to nag and block again. What we need is an real alternative of YouTube, but that need time to create something with this hugh amount of contents which nothing else has. Continue the battle against the crap, clickbaits and forced playlist pauses (well, there at least the extension still works for the moment), hoping the best.

Meanwhile Pluto TV, Bandcamp, channels from local public TV, Odysee, Rakuten TV, Internet Radio… etc…for info, music, movies, docus…


They are all valid, but most front ends are broken by Google.

I use often Andisearch where i search the video and where I can watch it in the search result, sandboxed and through random proxy, also using the SMplayer on desktop, entering the video URL- Avoiding also that YT put any crap in my PC with the Portmaster



Never, but the stock Android which include the Google Play isn’t anyway private, irrelevant if you use the Google Play services or not.



Well, there are also others, but I had mencioned only the FOSS alternatives. The others I found are proprietary, iOS only, paid or discontinued.

Mabe you can find those which you want to use in AlternativeTo

https://alternativeto.net/software/paralino/



Maybe somewhat later the Helium Browser (still not for mobile, in Alpha version), ungoogled Chromium, if not, Vivaldi, for all platforms, even as automotive app, (the only one)

https://github.com/imputnet/helium


Vivaldi for iOS, it has an inbuild ad- and trackerblocker


Any browser does it, it is needed for several reasons, every browser need to know the amount of users it has to calculate it’s market share. But statistical telemetries are not a privacy issue, it’s like an employee which count the amount of cars and trucks on a highway, to know if it is needed to enlarge the highway or not. A browser need to know it for its capacity of servers and sync, if they offer it. Normally the telemetries includes in which OS is used the browser and in which country, all this is legit and not a privacy problem.

Bad only when it also include logs and profiling of user data and activity, as Chrome and EDGE do, and worse if this is sold to third parties. Decent browser don’t do it.



Yes, a lot of people believe it, FF devs discuting in Google groups, Vivaldi in a own Mastodon instance. Mozilla since time is an Google pet which can’t survive without the support from Google.

It’s not the engine which use a browser, all engines are 100% FLOSS, it is important what you do with it.


AFAIK at least in the EU because have to admit also browsers with a different engine as WebKit. WebKit is same as Blink a fork from the KHTML engine by KDE, butway less advanced as Blink or Gecko, who outscore WebKit in modern webformats. This is why Apple don’t want other browsers which make Safari obsolete. Anyway, sooner or later Safari will be the next IE.


…also to Facebook, also one of the investors. Brave has good privacy protections, but they are selective.


Yes, it’s proprietary because some script parts are. It’s not so easy to go full OpenSource for an Chromium browser which is more an online suite than a simple browser, because Google and M$ will kill to be able to fork it for Chrome and EDGE, which will have catastrophic aftermaths for all other Chromium browsers, include Vivaldi. Way easier to be OpenSource for simpler Chromium or Gecko forks. Anyway I think in a market saturated with browsers (over 100 different), beeing OpenSource isn’t in the main interest for the user anymore, prevailing more the ethics and transparency of the manufactor, 100% given in Vivaldi. Apart, as say, it’s the only decent browser from the EU on level eye with the US big Brother browsers. Alternatively there is Mullvad, butit is , apart of the privacy features, a very basic browser, more an platform for the Mullvad VPN, no own sync, only with Mozilla, Konqueror with the KHTML engine by KDE is discontinued, same as sadly the French UR browser. Thats it.


I use Vivaldi, it’s IMHO the only decent Chromium browser, apart European, with a good privacy, no logs, no tracking no third party investors. great services and community.


The filter block all cookies which can be desactivated in the consent menu, same do the consent-o-matic extension. The rest is anyway blocked by the tracking blocker, site permission settings in Vivaldi and, in my case, also by the filters in the Portmaster which I use. If you also use the Site Bleacher Extension (somewhat outdated, but still extreme effective), Cookie-autodelete, CookieBro or similar (removes automatically cookies, local storages, IndexedDBs, service workers, cache storages, filesystems and webSQLs after leaving the page), “you never has visited this page”. Means, there are enough manners out there which you can use to show them the middle finger and which make this cookie consent pop up useless.


It’s this the problemm tecnically the EU is on the high, but as always policy, burocrathy and the users themself to use itThe last the most difficult to convince the people to use EU products, insteat of US ones. Everybody using Whatscrap, Fakebook, X, search with Googke, buy on Amazon, use Kindle, M$ Office,…not out of necessity, but out of ignorance and habit.


That is the right way, ads are a legit manner to create incommings if they are contextual, but not if they are abusive and surveillance based, tracking and logging the user activity. As in YT, it’s not the problem to have ads in the page or as banner at the border of an video, but it is, that the interrupt an conciert documental with several no scippable long ads, popups to use Premium, clickbaits and other crap, which serve nobody, less the author. In this case using an adblocker is mere selfdefense and legit to cut this crap and nags. A good manner is eg. how Bandcamp do it, there you can freely listen almost every song or album, without ads, and there you can buy and download it when you want, paying direct to the artist and Bandcamp an revenue. Or as Vivaldi does, using afiliate links and search engines added by default, which pay an revenue to Vivaldi, if the user use these, who is free to delete those which he don’t use. These and similar methodes are a legit and ethical way to create incommings, without putting in risk the right of privacy of the user, selling his data.


The European Commission aims to reform the EU's cookie consent rules that have cluttered websites with intrusive banners asking for permission to track user data[^4]. The initiative seeks to streamline data protection while maintaining privacy safeguards through centralized consent mechanisms[^4]. Cookie consent banners emerged from the ePrivacy Directive (Cookie Law) and GDPR requirements, which mandate websites obtain explicit user permission before collecting non-essential data through cookies[^17]. Current rules have led to widespread implementation of pop-up notices that interrupt user experience and often employ confusing interfaces. The proposed changes reflect growing recognition that the existing approach has "messed up the internet" while failing to provide meaningful privacy protection[^4]. Rather than requiring individual consent on every website, the Commission is exploring solutions like centralized consent management to reduce banner fatigue while preserving user privacy rights. [^4]: [Ground News - Europe's cookie law messed up the internet. Brussels wants to fix it.](https://ground.news/article/europes-cookie-law-messed-up-the-internet-brussels-wants-to-fix-it) [^17]: [Transcend - Cookie Consent Banner Best Practices: Optimizing Your Consent Management Experience](https://transcend.io/blog/cookie-consent-banner)
fedilink

TOR VPN
A VPN that grants network-level privacy on mobile by routing app traffic through Tor, assigns each app a separate circuit for improved separation, bypasses app-level censorship, features per-app routing, security via Rust-based implementation, and awaits early adopter feedback.
fedilink

A court ordered Google to pay $425 million after finding the company misled 98 million users about data collection through its "Web & App Activity" setting[^1]. The case revealed Google continued gathering user data via Firebase, a monitoring database embedded in 97% of top Android apps and 54% of leading iOS apps, even after users disabled data collection[^1]. Google's internal communications showed the company was "intentionally vague" about its data collection practices because being transparent "could sound alarming to users," according to district judge Richard Seeborg[^1]. This ruling adds to Google's recent privacy settlements, including: - $392 million paid to 40 states in 2023 for location tracking violations - $40 million to Washington state for similar location tracking issues - $1.38 billion to Texas in 2025 over location tracking and incognito mode claims[^1] Google plans to appeal the $425 million verdict, with spokesperson Jose Castaneda stating "This decision misunderstands how our products work" and asserting that Google honors user privacy choices[^1]. [^1]: [Malwarebytes - Google misled users about their privacy and now owes them $425m, says court](https://www.malwarebytes.com/blog/news/2025/09/google-misled-users-about-their-privacy-and-now-owes-them-425m-says-court)
fedilink

Clearview AI built a massive facial recognition database by scraping 30 billion photos from Facebook and other social media platforms without users' permission, which law enforcement has accessed nearly a million times since 2017[^1]. The company markets its technology to law enforcement as a tool "to bring justice to victims," with clients including the FBI and Department of Homeland Security. However, privacy advocates argue it creates a "perpetual police line-up" that includes innocent people who could face wrongful arrests from misidentification[^1]. Major social media companies like Facebook sent cease-and-desist letters to Clearview AI in 2020 for violating user privacy. Meta claims it has since invested in technology to combat unauthorized scraping[^1]. While Clearview AI recently won an appeal against a £7.5m fine from the UK's privacy watchdog, this was solely because the company only provides services to law enforcement outside the UK/EU. The ruling did not grant broad permission for data scraping activities[^5]. The risks extend beyond law enforcement use - once photos are scraped, individuals lose control over their biometric data permanently. Critics warn this could enable: - Retroactive prosecution if laws change - Creation of unauthorized AI training datasets - Identity theft and digital abuse - Commercial facial recognition systems without consent[^1] Sources: [^1]: [Business Insider - Clearview AI scraped 30 billion images from Facebook and other social media sites](https://www.businessinsider.com/clearview-scraped-30-billion-images-facebook-police-facial-recogntion-database-2023-4) [^5]: [BBC - Face search company Clearview AI overturns UK privacy fine](https://www.bbc.com/news/technology-67133157)
fedilink

# Meta Malvertising Campaign Spreads Android Crypto-Stealing Malware A sophisticated malvertising campaign targeting Meta's ad network has expanded from Windows to Android users worldwide, deploying an advanced version of the Brokewell malware disguised as TradingView's premium app[^1]. Since July 22, 2025, cybercriminals have launched over 75 malicious Facebook ads, reaching tens of thousands of users across the European Union[^1]. The campaign tricks victims into downloading a malicious APK from fake domains that mimic TradingView's official website. The malware, an enhanced strain of Brokewell, functions as both spyware and a remote access trojan (RAT) with capabilities including: - Cryptocurrency theft (BTC, ETH, USDT) - SMS interception for banking and 2FA codes - Google Authenticator data extraction - Screen recording and keylogging - Camera and microphone activation - Remote command execution via Tor and WebSockets[^1] The attackers have localized their ads in multiple languages including Vietnamese, Portuguese, Spanish, Turkish, Thai, Arabic and Chinese to maximize reach[^1]. While the Android campaign currently focuses on impersonating TradingView, the Windows version has mimicked numerous brands including Binance, Bitget, Metatrader, and OKX[^1]. [^1]: [Bitdefender - Malvertising Campaign on Meta Expands to Android, Pushing Advanced Crypto-Stealing Malware to Users Worldwide](https://www.bitdefender.com/en-us/blog/labs/malvertising-campaign-on-meta-expands-to-android-pushing-advanced-crypto-stealing-malware-to-users-worldwide)
fedilink

Mastodon, the decentralized social network, stated it cannot comply with age verification laws like Mississippi's recent legislation because it lacks the technical capability to do so[^1]. While Mastodon's software allows server administrators to specify a minimum age of 16 for sign-ups, the age-check data is not stored, and the nonprofit has no way to verify users' ages[^1]. The organization emphasizes that individual server owners must decide for themselves whether to implement age verification, noting that Mastodon was founded specifically "to allow different jurisdictions to have social media that is independent of the U.S."[^1] This stance follows Bluesky's decision to block service in Mississippi over similar age verification requirements[^1]. Mastodon's position highlights the unique challenges decentralized platforms face with regional compliance, as there is "nobody that can decide for the fediverse to block Mississippi," according to Mastodon founder Eugen Rochko[^1]. [^1]: [TechCrunch - Mastodon says it doesn't 'have the means' to comply with age verification laws](https://techcrunch.com/2025/08/29/mastodon-says-it-doesnt-have-the-means-to-comply-with-age-verification-laws/)
fedilink

YouTube will ban Premium accounts made through VPN
Based on recent reports, YouTube is actively restricting access to Premium accounts created through VPNs and cracking down on users accessing Premium content across different regions. According to user discussions, YouTube now detects and blocks VPN connections when attempting to stream Premium content[^6][^10]. Some key impacts: - Users report being unable to play YouTube Music through Sonos speakers when using a VPN, with the service becoming accessible only after bypassing VPN connections[^6] - Premium subscribers attempting to access content from different regions than their subscription face connection errors and service disruptions - The restrictions appear to be part of YouTube's broader strategy to enforce regional content licensing and subscription terms The crackdown coincides with YouTube's increased focus on Premium subscriptions, including showing longer unskippable ads to free users in 2025 to drive Premium adoption[^8]. [^6]: [Sonos Community - Unable to play YouTube Music](https://en.community.sonos.com/controllers-and-music-services-229131/unable-to-play-youtube-music-6882823) [^8]: [LateNode Community - Why are YouTube users experiencing extremely long, non-skippable advertisements?](https://community.latenode.com/t/why-are-youtube-users-experiencing-extremely-long-non-skippable-advertisements/16673) [^10]: [Reddit r/VPN - Getting around YouTube Premium](https://www.reddit.com/r/VPN/comments/11qmy08/getting_around_youtube_premium_it_looks_like/)
fedilink

YouTube secretly used artificial intelligence to modify creators' videos without notification or consent, making subtle changes to their appearance[^1]. According to Rick Beato, who runs a YouTube channel with over 5 million subscribers, he noticed strange alterations in his videos - his hair looked different and it appeared he was wearing makeup[^1]. The AI modifications included sharpening skin in some areas while smoothing it in others, defining wrinkles in clothing more clearly, and causing subtle warping of features like ears[^1]. YouTuber Rhett Shull, who investigated the changes, said "If I wanted this terrible over-sharpening I would have done it myself... I think that deeply misrepresents me and what I do and my voice on the internet"[^1]. The unauthorized AI enhancements represent a concerning trend where artificial intelligence increasingly mediates reality before it reaches viewers, potentially eroding authentic connections between creators and their audiences[^1]. [^1]: [BBC - YouTube secretly used AI to edit people's videos. The results could bend reality](https://www.bbc.com/future/article/20250822-youtube-is-using-ai-to-edit-videos-without-permission)
fedilink

Grok, Elon Musk's AI chatbot, has exposed hundreds of thousands of private user conversations through Google search indexing. When users click the "share" button to create a URL for sharing their chat, the conversation becomes publicly searchable - often without users realizing it[^1][^2]. Google has indexed over 370,000 Grok conversations, including sensitive content like medical questions, personal information, and at least one password[^2]. Unlike OpenAI's ChatGPT, which quickly removed a similar feature after backlash, Grok's share function does not include any warning that conversations will become public[^3]. According to Forbes, some marketers are already exploiting this feature by intentionally creating Grok conversations to manipulate search engine rankings for their businesses[^2]. [^1]: [TechCrunch - Thousands of Grok chats are now searchable on Google](https://techcrunch.com/2025/08/20/thousands-of-grok-chats-are-now-searchable-on-google/) [^2]: [Forbes - Elon Musk's xAI Published Hundreds Of Thousands Of Grok Chatbot Conversations](https://www.forbes.com/sites/iainmartin/2025/08/20/elon-musks-xai-published-hundreds-of-thousands-of-grok-chatbot-conversations/) [^3]: [Fortune - Thousands of private user conversations with Elon Musk's Grok AI chatbot have exposed on Google Search](https://fortune.com/2025/08/22/xai-grok-chats-public-on-google-search-elon-musk/)
fedilink

FreeVPN.One accused of secretly collecting users’ screenshots
Cybersecurity firm Koi Security revealed that FreeVPN.One, a Chrome VPN extension with over 100,000 users, has been secretly capturing and transmitting screenshots of users' browsing activity to remote servers[^1][^2]. The spyware functionality was introduced in July 2025 after earlier updates expanded the extension's permissions. According to researcher Lotan Sery from Koi Security, "FreeVPN.One shows how a privacy branding can be flipped into a trap"[^3]. When confronted, the developer claimed screenshots were only taken of suspicious sites and were encrypted, but researchers found evidence of capture on trusted sites like Google Photos[^5]. The extension's "AI Threat Detection" feature discloses taking screenshots, but Koi Security found most surveillance occurred silently in the background[^8]. The case highlights growing risks with free VPN services, particularly as demand increases due to new online safety regulations in the UK requiring age verification[^3]. [^1]: [GIGAZINE - Chrome VPN Extension Accused of Secretly Capturing User Screenshots](https://www.varindia.com/news/chrome-vpn-extension-accused-of-secretly-capturing-user-screenshots) [^2]: [It's FOSS - Google Verified FreeVPN Caught Red-handed Spying on its Users](https://news.itsfoss.com/freevpn-fiasco/) [^3]: [VARINDIA - Chrome VPN Extension Accused of Secretly Capturing User Screenshots](https://www.varindia.com/news/chrome-vpn-extension-accused-of-secretly-capturing-user-screenshots) [^5]: [It's FOSS - Google Verified FreeVPN Caught Red-handed Spying on its Users](https://news.itsfoss.com/freevpn-fiasco/) [^8]: [Instagram - Dhaka Chronicles post about FreeVPN.One spying](https://www.instagram.com/p/DNoteHNTwSQ/)
fedilink

Ecosia, the tree-planting search engine from Berlin, and Qwant, France's privacy-focused search provider, announced a joint venture in November 2024 to develop their own European search index[^5][^6]. The partnership aims to reduce their dependence on Microsoft's Bing APIs, which both companies currently rely on for search results[^6]. The new venture, called European Search Perspective (EUP), is structured as a 50-50 ownership split between Ecosia and Qwant[^6]. Qwant's engineering team and existing search index development will transfer to EUP, with Qwant CEO Olivier Abecassis leading the joint venture[^6]. "The door is open and we are ready to talk to anyone," said Abecassis, while noting they want to "move as fast as possible" with their existing shareholders' support[^6]. The index will begin serving France-based search traffic for both engines by Q1 2025, expanding to cover "a significant portion" of German traffic by end of 2025[^6]. Rising API costs are a key motivator, following Microsoft's massive price hike for Bing's search APIs in 2023[^6]. However, neither company plans to completely stop using Bing or Google, instead aiming to diversify their technical foundation as generative AI takes a more central role in search[^6]. [^5]: [News](https://discuss.techlore.tech/c/privacy-and-security/news/14?page=12) [^6]: [TechCrunch - Ecosia and Qwant, two European search engines, join forces on an index to shrink reliance on Big Tech](https://techcrunch.com/2024/11/11/ecosia-and-qwant-two-european-search-engines-join-forces-on-building-an-index-to-shrink-reliance-on-big-tech/)
fedilink

(Above link with skipped Paywall) Summary by Andi: A teenage hacker named Reynaldo Vasquez-Garcia discovered that the Halo 3C vape detector, which looks like a standard smoke detector in school bathrooms, contained hidden microphones and security flaws that allowed it to be turned into a secret listening device[^1]. Working with another hacker known as "Nyx," Vasquez-Garcia found the device could be hacked by exploiting weak password controls and firmware update vulnerabilities. Once compromised, attackers could use it to eavesdrop on conversations in real-time, disable its detection capabilities, create fake alerts, or play audio through its speaker[^1]. The researchers revealed these findings at the 2025 Defcon hacker conference, demonstrating how any hacker on the same network could hijack a Halo 3C by brute-forcing passwords at 3,000 attempts per minute. The device's firmware could also be modified since its encryption key was publicly available in updates on the manufacturer's website[^1]. Motorola, which owns the Halo 3C's manufacturer IPVideo Corporation, said it developed a firmware update to address the security flaws. However, the researchers argue this doesn't solve the fundamental privacy concern of having microphone-equipped devices installed in sensitive locations like school bathrooms and public housing[^1]. [^1]: [Wired - It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug](https://www.wired.com/story/school-bathroom-vape-detector-audio-bug/)
fedilink

Meta announced it will stop selling political, electoral and social issue advertising across its platforms (Facebook, Instagram, and Threads) in the European Union starting in early October 2025[^1][^2]. The decision comes in response to the EU's new Transparency and Targeting of Political Advertising (TTPA) regulation, which takes effect October 10, 2025. Meta called the rules "unworkable," citing "significant operational challenges and legal uncertainties"[^2]. The TTPA requires platforms to: - Label political ads with transparency information - Disclose who paid for ads and their costs - Show which elections or referendums ads target - Maintain ads in a public database - Follow strict conditions for user targeting[^3] Companies face fines of up to 6% of annual global revenue for violations[^2]. Google made a similar move in late 2024, also announcing it would stop serving political ads to EU users before the rules take effect[^4]. Meta emphasized that users can still discuss politics and politicians can share content "organically" on its platforms - they just cannot use paid advertising to amplify their messages[^2]. [^1]: [Bloomberg - Meta to Stop Selling Political Ads in the EU, Citing Regulation](https://www.bloomberg.com/news/articles/2025-07-25/meta-to-stop-selling-political-ads-in-the-eu-citing-regulation) [^2]: [AP News - Meta will cease political ads in European Union by fall](https://apnews.com/article/meta-instagram-facebook-eu-european-union-political-89efeac96723308d2a0469740d24d433) [^3]: [Euronews - Meta halts political advertising in the EU due to 'unworkable' rules](https://www.euronews.com/next/2025/07/25/meta-halts-political-advertising-in-the-eu-due-to-unworkable-rules) [^4]: [Economic Times - Meta to halt political advertising in EU from October](https://economictimes.indiatimes.com/tech/technology/meta-to-halt-political-advertising-in-eu-from-october-blames-eu-rules/articleshow/122904166.cms)
fedilink

privacy.sexy - Maximize Your Privacy and Security
Privacy.sexy is an open-source privacy tool that helps users implement security and privacy best practices on Windows, macOS, and Linux operating systems[^4]. Key features include: - Hundreds of customizable privacy and security scripts - Free and transparent codebase - Reversible changes if issues occur - Web version requiring no software installation - Desktop version with additional direct script execution capabilities - Independent, portable scripts without cross-dependencies - Extensive testing and community verification[^4] The tool comes in two versions: 1. An online web version that runs without installing software 2. An offline desktop version with expanded functionality for running scripts directly[^4] The project is built using TypeScript and Vue.js, with the desktop application created using Electron[^8]. All aspects of the application, including infrastructure and deployments, are open-source and automated through a system called "bump-everywhere"[^4]. [^4]: [PrivacyTools - Enforce Privacy & Security Best-Practices on Windows and macOS](https://www.privacytools.io/guides/enforce-privacy-security-on-windows-and-macos) [^8]: [Made with Vue.js - privacy.sexy - Tool to support privacy on Windows, macOS & Linux](https://madewithvuejs.com/privacysexy)
fedilink


Link to the list of extensions at the end of the article
fedilink



What is DNS4EU? DNS4EU is an initiative by the European Commission that aims to offer an alternative to the public DNS resolvers currently dominating the market. Supported by the European Union Agency for Cybersecurity (ENISA), the European Union's DNS4EU secure-infrastructure project provides a protective, privacy-compliant, and resilient DNS service to strengthen the EU’s digital sovereignty and enhance digital security for European Union citizens, governments, and institutions. The program provides robust DNS security for public institutions and their employees, ministries, local governments or municipalities, healthcare, education, and other critical services such as telecommunications providers. By working with the latter, for example, it ensures DNS resolution service for all of a telco’s customers, with minimum manual overhead for their teams. Additionally, the DNS4EU solutions aid organizations in complying with regulatory requirements (such as GDPR) to keep data within European borders. As these organizations often face challenges to independently developing and maintaining high-level cybersecurity measures (such as election cycles or funding), the DNS4EU project solves these challenges by providing a Europe-based, centralized, scalable solution to ensure the highest standards of security and privacy, compliant with EU regulations.
fedilink




The research group SECUSO (@SECUSO_Research) at Karlsruhe Institute of Technology 🇩🇪 (@KIT_Karlsruhe) has an account in the Play Store and F-Droid where you can download lots of privacy-friendly apps
fedilink


Firefox now has Terms of Use! This’ll go over like a lead balloon
https://www.mozilla.org/en-US/about/legal/terms/firefox/
fedilink



[Andisearch](https://andisearch.com/) Writeup >A security researcher known as Brutecat discovered a vulnerability that could expose the email addresses of YouTube's 2.7 billion users by exploiting two separate Google services[^1][^2]. The attack chain involved extracting Google Account identifiers (GaiaIDs) from YouTube's block feature, then using Google's Pixel Recorder app to convert these IDs into email addresses[^1]. > >To prevent notification emails from alerting victims, Brutecat created recordings with 2.5 million character titles that broke the email notification system[^1]. The exploit worked by intercepting server requests when clicking the three-dot menu in YouTube live chats, revealing users' GaiaIDs without actually blocking them[^2]. > >Brutecat reported the vulnerability to Google on September 15, 2024[^1]. Google initially awarded $3,133, then increased the bounty to $10,633 after their product team reviewed the severity[^1]. According to Google spokesperson Kimberly Samra, there was no evidence the vulnerability had been exploited by attackers[^2]. > >Google patched both parts of the exploit on February 9, 2025, approximately 147 days after the initial disclosure[^1]. > [^1]: [Brutecat - Leaking the email of any YouTube user for $10,000](https://brutecat.com/articles/leaking-youtube-emails) [^2]: [Forbes - YouTube Bug Could Have Exposed Emails Of 2.7 Billion Users](https://www.forbes.com/sites/dimitarmixmihov/2025/02/12/youtube-bug-couldve-exposed-emails-of-27-billion-users/)
fedilink




I have never liked Apple and lately even less. F.... US monopolies
fedilink

Good example why it is important to avoid private Photos on internet, a lot of crap like this app out there.
fedilink



Happy Net Box by Ben Brown
Happy Net Box is an experimental internet social experience based on the arcane and near-forgotten retro internet protocol known as [FINGER](https://en.wikipedia.org/wiki/Finger_(protocol)). Finger is a command line tool that comes pre-installed on Macs and Windows and most Unix systems. It allows you to retrieve information about a "user" on "the internet" -- but it doesn't use the web!
fedilink