Personal Defense against Abusive Technology - Printable Version +- Deveray forums - No censorship of real news by liberal billionaires here. (https://deveray.com) +-- Forum: Upper Division (https://deveray.com/forumdisplay.php?fid=39) +--- Forum: Member-controlled forums (https://deveray.com/forumdisplay.php?fid=28) +---- Forum: Betty Boop's lounge (https://deveray.com/forumdisplay.php?fid=29) +---- Thread: Personal Defense against Abusive Technology (/showthread.php?tid=278) |
Personal Defense against Abusive Technology - crazyon - 05-17-2022 | | More Phone App Tracking Revelations Sam Biddle, Jack Poulson | April 22 2022, More Phone App Tracking Revelations New firm says it tracks 3 Billion smart phones at any given time on a global scale. In the months leading up to Russia’s invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six — or “A6” — the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6’s powers inward, spying on the National Security Agency and CIA, using their own cellphones against them. All of this is powered by general ignorance of the ubiquity and invasiveness of smartphone software development kits, known as SDKs. GPS dragnet yields between 30 to 60 location pings per device per day and 2.5 trillion locational data points annually worldwide “Everything is agreed to and sent by the user even though they probably don’t read the 60 pages in the [end user license agreement].” Critics say the loose trade in advertising data constitutes a loophole in the Fourth Amendment. crazyedit: A lot of tracking data comes from apps and the rest comes from 'FANG' owned networks...more on that in the next report :endedit Whole report At https://theintercept.com/2022/04/22/anomaly-six-phone-tracking-zignal-surveillance-cia-nsa/ | | | | The Online Tracking Company That Knows Your Name May 14, 2022 Most online ad tracking companies know which websites you’ve been to—based on “cookies” they place on your computer—but don’t know your actual name. Not Facebook, though. When Facebook began placing “Like” buttons and other widgets on sites beyond Facebook, it was the first massive online advertising company that knew the name of nearly every user who stumbled across one of its widgets. At first, Facebook said it was not collecting data from users across the web, but it eventually admitted it was. And it was even tracking users if they merely visited webpages—the user didn’t have to click on the Like button to send data to Facebook or even have a Facebook account. Now, however, Facebook has replaced the Like button with tracking technology that’s even less visible. Meta, Facebook’s parent company, now uses technology it calls a “pixel”—a snippet of computer code that websites embed on their pages—that sends data back to Facebook. Unlike the Like button, it is invisible to users, and so most people are unaware that their data is being collected. What’s even less clear is what data Facebook is collecting on any given site. To get a better idea, The Markup partnered with Mozilla to conduct the first large-scale crowdsourced study of the presence of the pixel and the data it collects in real-world scenarios. Complete report @ https://themarkup.org/newsletter/hello-world/the-online-tracking-company-that-knows-your-name Next we will look at solutions > stay tuned and post your own in this Tech thread. | | | | Protection against third-parties that leak form data Web browsers do not reveal to users if third-party scripts collect data that users input on sites, even before submitting. While most, with the notable exception of Google Chrome, include anti-tracking functionality, it appears that they are not suitable for protecting user data against this form of tracking. The researchers ran a small test using Firefox and Safari to find out of the default anti-tracking functionality blocked data exfiltration on the sample. Both browsers failed to protect user data in the test. Browsers with built-in ad-blocking functionality, such as Brave or Vivaldi, and ad-blocking extensions such as uBlock Origin, offer better protection against data leaking. Users on mobile devices may use browsers that support extensions or include ad-blocking functionality by default. More can be seen @ https://www.ghacks.net/2022/05/17/trackers-may-collect-data-that-you-type-even-before-hitting-submit/ Crazyedit: I am an avid user of NetLimiter >>> version 4.0.59.0 Version's mean a lot for different uses. It can choke a 72KB per-second live broadcast full of tracking down to 6KB per-sec. Choking out most all the nonsense when using Ublock-origin in your browser Also check Blackbird for windows @ https://www.getblackbird.net/documentation/ >>> Disclaimer >>> Do not use on a business/work computer...other than that I Really Like Blackbird on my playground machine. https://noscript.net/ is Wonderful For extensive learning read >>> https://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/ study and read it all the before you change anything. I studied and practiced with the ghacks guide for at least 40 Hours before making it permanent. Disclaimer: I am not responsible for errors :endedit | | RE: Personal Defense against Abusive Technology - crazyon - 05-20-2022 | | The best advice I can give you for one's smart phone is to practice Rooting an old phone and wipe it of ALL Apps >>> GO Back to the Future It's worth it if one has the money to buy a couple of old used Moto-G7's and get busy...I'm still using a pair of 10 year old International LG7's that are stripped out, run fast and quiet using very little data. I don't need maps, messaging, or Email >>> That is all for now. | | RE: Personal Defense against Abusive Technology - crazyon - 05-27-2022 The previous list is for firefox 51 and older. I use version's 26 + 51 This is for the latest firefox >>> ‘Firefox Privacy – The Complete How-To Guide for 2022’ [NOTE : 2022, not 2017] "" https://restoreprivacy.com/firefox-privacy/ "" — RE: Personal Defense against Abusive Technology - takeyouposiot - 01-14-2023 The article you provided is discussing how two American startups, Anomaly Six (A6) and Zignal Labs, reportedly met to discuss a potential partnership that would merge the ability to track the movements of billions of people via their smartphones with a constant stream of data purchased directly from Twitter. According to the article, A6 claims to have the ability to track up to 3 billion smartphones at any given time on a global scale, and that the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces or track Chinese nuclear submarines. The article also claims that the technology is powered by general ignorance of the ubiquity and invasiveness of smartphone software development kits (SDKs). SDKs are tools that allow app developers to add features and functionalities to their apps, such as push notifications, in-app purchases, and analytics. However, these SDKs can also be used to track users' location, behavior, and personal information. The article also claims that the loose trade in advertising data constitutes a loophole in the Fourth Amendment, which protects citizens from unreasonable searches and seizures by the government. Critics argue that this kind of tracking data collection and sharing could be seen as a violation of citizens' privacy rights. __________________________ https://www.rst.software/blog/engineering-a-scalable-backend-for-a-messaging-app-like-whatsapp-4-key-principles RE: Personal Defense against Abusive Technology - dianapps - 11-17-2023 Here's a condensed list of measures for personal defense against abusive technology: 1. Privacy Settings Check: Regularly review and adjust privacy settings on devices and apps. 2. Strong Passwords: Use unique and strong passwords for accounts, and enable two-factor authentication. 3. Stay Informed: Stay updated on tech risks, data breaches, and security measures. 4. Data Encryption: Use encrypted tools for sensitive data and communications. 5. Regular Updates: Keep devices and software updated for security patches. 6. Limit Data Sharing: Be cautious about sharing personal information online. 7. Secure Networks: Use secure Wi-Fi and avoid public networks without a VPN. 8. Ad Blocking & Tracking Prevention: Use ad blockers and anti-tracking tools. 9. Regular Device Checkup: Use reputable antivirus software and scan devices regularly. 10. Digital Boundaries: Take breaks from devices and set usage boundaries. 11. Be Wary of Scams: Verify sources and avoid sharing personal info with unknown entities. 12. Legal Protections: Know your rights regarding privacy and data protection laws. 13. Seek Support: Seek help if facing online harassment or abuse from authorities or support organizations. Implementing these measures helps fortify personal defense against potential technology abuse and privacy threats. |