After revisiting SailfishOS earlier this autumn, I spent a week living with its open-source cousin, Ubuntu Touch. With Google tightening the Android ecosystem, it felt like the right moment to explore what a true Linux mobile OS offers today. My first attempt was with a OnePlus Nord N100 on MetroPCS. It fought me at every step. Flashing, fastboot flags, and ADB coaxing were all unsuccessful. In the end I ordered a Pixel 3a, one of Ubuntu Touch's officially supported devices.| geekyschmidt.com
Comments| Lobsters
Ad blockers, Google AMP, and Facebook IA should be a wake-up call for publishers about the demands of their readers.| Parse.ly
Welcome to the Q3 2025 edition of the Firefox Security and Privacy newsletter!| Attack & Defense
You’ve probably seen it in analytics dashboards, server logs, or privacy documentation: IP addresses with their last octet zeroed out. 192.168.1.42 beco...| Frank DENIS random thoughts.
Big Tech needs to step up. We’re pushing companies in the 2025 RDR Index to do better on human rights. The post Taking stock of Big Tech: the 2025 RDR Index appeared first on Access Now.| Access Now
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.| Purism
Privacy-Enhancing Technologies (PETs) are essential for safeguarding digital identities amidst increasing data breaches. They encompass tools like zero-knowledge proofs and advanced biometrics to secure both human and non-human identities in the digital space. As digital identity expands to include non-human entities, PETs are vital for ensuring privacy and security. Zero-knowledge proofs (ZKPs) emerge as a game-changer, allowing for verification without revealing sensitive data. While challe...| Spherical Cow Consulting
In a digital age where the management of identity wallets and credentials is becoming increasingly complex, the W3C's Web Incubator Community Group (WICG) has initiated a pivotal work item called Digital Credentials. As co-chair of the newly formed Federated Identity Working Group alongside Wendy Seltzer, I delve into why this project may (or may not!) soon find a permanent home within our group. This post explores the dance between digital identity, browser behavior, and the broader ecosyste...| Spherical Cow Consulting
This is the transcript to my YouTube explainer video on why privacy and personalization are so hard to balance. Likes and subscriptions are always welcome! The post Privacy and Personalization on the Web: Striking the Balance appeared first on Spherical Cow Consulting.| Spherical Cow Consulting
Privacy is a particularly thorny topic. The concept is always contextually defined, and it does not get easier when different concepts—anonymity, confidentiality, secrecy, and security—are regularly conflated with privacy. Read on... The post Pedantic About Privacy appeared first on Spherical Cow Consulting.| Spherical Cow Consulting
Sometimes even the changes you’ve been planning for can take you by surprise. Time to reflect on how on earth THAT happened! The post When Gravity Takes Over appeared first on Spherical Cow Consulting.| Spherical Cow Consulting
AI is the worst thing that mankind has ever created and there’s a good chance that Skynet will be real, R.I.P. humanity. Or not. It’s complicated.| Bruceb Consulting
Tired of Microsoft Family Safety popups? Learn how to turn off Family Safety mode on Windows 11 or 10 by disabling the Parental Controls service.| WebTrickz
L’uso dei dati sintetici in medicina promette di accelerare la ricerca e tutelare la privacy, ma solleva questioni etiche e giuridiche legate a trasparenza, bias e responsabilità degli algoritmi L'articolo Dati sintetici in sanità: potenziale enorme, sfide complesse proviene da Agenda Digitale.| Agenda Digitale
Le telecamere installate per proteggere case e uffici possono trasformarsi in strumenti di spionaggio. In Italia oltre 74mila webcam sono accessibili senza particolari competenze. Il fattore umano resta l'anello debole nella gestione della sicurezza digitale L'articolo Telecamere violate: ecco gli errori che aprono le porte agli hacker proviene da Agenda Digitale.| Agenda Digitale
The appeal of traditional journalism to engaged, coveted audiences is still “news” to many major advertisers. But when established publishers try to make that case, marketers cite that brand safety concerns are top of mind. “I tell [those advertisers] it’s a miss, to be honest,” Mike Irenski, SVP, Programmatic Strategy, Newspapers & TV at Hearst, [...]| Beet.TV
Andrej Sokolow, Deutsche Presse Agentur: Apple could switch off a function that prevents users’ apps from tracking their behaviour across various services and websites for advertising purposes in Germany and other European countries. The iPhone manufacturer on Wednesday complained that it has experienced constant headwinds from the tracking industry. “Intense lobbying efforts in Germany, Italy […]⌥ Permalink| Pixel Envy
Maxwell Zeff, TechCrunch: OpenAI announced Tuesday the launch of its AI-powered browser, ChatGPT Atlas, a major step in the company’s quest to unseat Google as the main way people find information online. The company says Atlas will first roll out on macOS, with support for Windows, iOS, and Android coming soon. OpenAI says the product […]⌥ Permalink| Pixel Envy
US regulators on Wednesday slapped a record $5 billion fine on Facebook for privacy violations in a wide-ranging settlement that calls for revamping privacy controls and oversight at the social network.| France 24
Facebook chief Mark Zuckerberg vowed Wednesday to "step up" to fix problems at the social media giant, as it fights a snowballing scandal over the hijacking of personal data from millions of its users.| France 24
Guess what? NewPipe just turned 10 this month last month! Time just flew by. In one moment you hit “new project”, and in the next there is a whole association, a group of maintainers, an uncountable amount of contributors, and millions of users!1 This is amazing. Last time we wrote about an important birthday, NewPipe had just turned five years old. Now it’s yet another five years later, and we still stand on the ground with both feet, running forward like there is no other direction! N...| NewPipe
2025 updates to two key technical specifications: the Global Privacy Protocol (GPP) and the Data Deletion Request Framework (DDRF)| IAB Tech Lab
Google’s new Recovery Contact feature lets a trusted friend help you regain access to your account if you get locked out. Here’s why you should set it up.| www.techlicious.com
CISOs prioritize visibility into employee AI use, policy enforcement, and safeguarding data, intellectual property, and confidential info.| Help Net Security
Google is sunsetting a large portion of its Privacy Sandbox initiative, just two years after it began rolling out the platform across Chrome and Android. In a surprise pivot, the tech giant is narrowing its focus to fewer APIs with broader adoption, while discontinuing many controversial technologies, including Topics, Attribution Reporting, and Protected Audience. This … The post Google Quietly Dismantles Core of Privacy Sandbox for Chrome appeared first on CyberInsider.| CyberInsider
Recently, California Governor Gavin Newsom signed into law several privacy and related proposals, including new laws governing browser opt-out preference signals, social media account deletion, data brokers, reproductive and health services, age signals for app stores, social media “black box warning” labels for minors, and companion chatbots. This blog summarizes the statutes’ key takeaways. Continue Reading…| Global Policy Watch
On September 30, 2025, the California Privacy Protection Agency (“Agency”) announced a decision and $1.35 million fine to resolve allegations that Tractor Supply Co. (“Tractor Supply”) violated the California Consumer Privacy Act (“CCPA”). The settlement comes after the Agency filed a petition to enforce an investigative subpoena against Tractor Supply. In addition to imposing the... Continue Reading…| Global Policy Watch
On September 17, 2025, the Federal Trade Commission (“FTC”) and seven states – Colorado, Florida, Illinois, Nebraska, Tennessee, Utah, and Virginia – sued| Global Policy Watch
The post Privacy Plantings for Luxury Landscapes in Delaware & the Main Line appeared first on Borsello Landscaping.| Borsello Landscaping
In today's world, lack in privacy makes it very difficult to keep personal information private. This article explains how Nostr can help with that.| Bitcoin News
Blockchain forensics enables unprecedented surveillance into people's financial lives, with profound implications for privacy rights.| Bitcoin News
Explore how AI is reshaping the legal profession through smarter strategies, collaboration, and data-driven decision-making. The post How AI Is Transforming the General Counsel Role appeared first on Red Clover Advisors.| Red Clover Advisors
October has rolled around again. It’s a month that marks two big events: Cybersecurity Awareness Month and Halloween. But if... The post Building Cybersecurity Programs That Meet Privacy Regulations appeared first on Red Clover Advisors.| Red Clover Advisors
Learn how small businesses can fight phishing, deepfakes, and cyberattacks with practical, affordable cybersecurity strategies.| Red Clover Advisors
Audio measurement is facing its most dramatic shift in years. The familiar benchmarks that once defined success are no longer enough. Advertisers want more than impressions and CPMs. They want proof that campaigns move the needle on awareness, engagement, and sales. For publishers, that makes this a pivotal moment. Those who can demonstrate audio’s full […] The post The Great Measurement Reset: Audio’s Brandformance Moment appeared first on AdsWizz.| AdsWizz
TUNE has successfully completed another SOC 2 Type 2 audit and SOC 1 Type 2 audit, proving its commitment to the Trust Services Principles.| TUNE
The European non-profit DNS service DNS0.EU has ceased its activities. The organization, which focused on secure and privacy-friendly DNS resolution within the European Union, says it is discontinuing the service due to a lack of time and resources. The official DNS0.EU website now only displays a short announcement: The dns0.eu service has been discontinued. We […]| Techzine Global
Data protection laws often do not apply to the lesser-known category of “anonymous data”. There are misleading claims and new risks.| Least Authority
In a significant step toward strengthening consumer privacy protections, the California Privacy Protection Agency (CPPA) board has officially adopted a| Password Protected
Pop-ups are small browser windows that appear automatically when you visit certain websites. They’re often used for logging in, completing payments, or displaying important notifications. Some examples include online banking sites, government forms, and secure payment gateways. While pop-ups can sometimes be annoying, there are times when you actually need to allow them to proceed […] The post How to Disable Pop-Up Blocker in Microsoft Edge (2025) appeared first on WebTrickz.| WebTrickz
Safari is Apple’s default web browser on iPhone and iPad. While it offers a fast and secure browsing experience, your browsing history, search terms, and visited websites can quickly pile up over time. If you want to keep your browsing activity private or simply declutter your Safari data, you can easily delete your history. This […] The post iOS 26: How to Clear or Delete Safari History on iPhone appeared first on WebTrickz.| WebTrickz
If you want to know how to protect your privacy or reputation online, different sources will provide varying opinions and angles.| Pagefreezer Blog
Would you allow a stranger to drive a camera-equipped computer around your living room? You might have already done so without even realizing it. The Beginning: A Curious Experiment It all started innocently enough. I had recently bought an iLife A11 smart vacuum—a sleek, affordable, and technologically advanced robot| Small World
Gregg Wallace, the former MasterChef presenter, has issued proceedings against the BBC and BBC Studios for failing to respond to his subject access requests (SAR) in accordance with the UK GDPR. Wallace was sacked by the BBC in July following an inquiry into alleged misconduct. As the saying goes, “Revenge is a dish best served cold!” Background … Continue reading "A Pinch of GDPR: Gregg Wallace Serves Up a Data Rights Claim "| Your Front Page For Information Governance News
Back in 2006, Tony Blair was extremely keen on the idea of introducing mandatory ID cards. Fortunately, they were scrapped by the coalition government following Labour's 2010 general election drubbing (for the historians, though, it is worth noting the cards were originally a Tory idea, and that Blair originally campaigned against them). 19 years later, Tony Blair (via the Tony Blair Institute) continues to hawk the idea of a "super identity card". Unfortunately, the current government have a...| www.bentasker.co.uk
The refuge and intimate space that was once the bedroom has become the stage for digital exposure and patriarchal surveillance.| CCCB LAB
The Data Localization Suite helps businesses get the performance and security benefits of Cloudflare’s global network while making it easy to set rules and controls at the edge about where their data is stored and protected.| The Cloudflare Blog
Budget gaps and thin staffing met their match in a machine that never blinks. The post Dover, NJ Implements AI Surveillance, Expanding Facial Recognition and Public Monitoring Systems appeared first on Reclaim The Net.| Reclaim The Net
What begins as child protection ends as an unprecedented mandate to tag, track, and watch every digital move. The post Newsom Approves New Tech Rules: Social Media Warnings, Chatbot Surveillance, Age Verification appeared first on Reclaim The Net.| Reclaim The Net
Apple and Google brace for a privacy tradeoff as Texas turns app downloads into identity checkpoints. The post Google and Apple to Enforce Age Verification in Texas Starting in 2026 appeared first on Reclaim The Net.| Reclaim The Net
The move from watching crowds to identifying individuals is no longer hypothetical in Hong Kong. The post Hong Kong to Install 60,000 AI-Enabled Surveillance Cameras by 2028 appeared first on Reclaim The Net.| Reclaim The Net
The Canadian government wants the power to disappear your internet access with no judge, no warrant, no warning. The post Canada’s Privacy Watchdog Not Consulted on Bill C-8, Enabling Secret Internet & Phone Shutdowns appeared first on Reclaim The Net.| Reclaim The Net
Your power company might be the most valuable data broker you never noticed. The post The Secret Life of Your Utility Bill appeared first on Reclaim The Net.| Reclaim The Net
The proposed rules would force open-source coders into the role of financial gatekeepers. The post Coinbase CEO Brian Armstrong Opposes Senate Democrats’ Plan to Extend ID Verification to Decentralized Finance appeared first on Reclaim The Net.| Reclaim The Net
New York’s lawsuit drills into tech giants’ negligence, but the real endgame could be a future where online anonymity is collateral damage. The post New York City Sues Platforms Over Failure to Protect Minors, Raising Broader Privacy Concerns Around Age Verification Laws appeared first on Reclaim The Net.| Reclaim The Net
CoSN TLE Spotlight: Chapel Hill-Carrboro City Schools The North Carolina Department of Instruction joined CoSN’s TLE State Partnership Program to provide TLE applications and student data privacy supports to all…| CoSN
Alex Ambrose speaks about navigating the risks and rewards of AI in marketing at Kids Industry Connect: A Children's Advertising and Privacy Summit, hosted by BBB National Programs.| Information Technology and Innovation Foundation Feed
Strict data privacy laws like the GDPR have significantly reduced biopharmaceutical R&D investment—especially among smaller firms—highlighting the need for U.S. policymakers to reform HIPAA, pass innovation-friendly federal privacy legislation, and invest in privacy-enhancing technologies to protect both privacy and progress in medical research.| Information Technology and Innovation Foundation Feed
The UK Online Safety Act aims to protect children online but its vague rules and strict enforcement have led to over-censorship, threatening legitimate communities, and Parliament should clarify content definitions, allow remediation periods, and require judicial review to fix these issues.| Information Technology and Innovation Foundation Feed
Rather than blanket social media bans, policymakers should adopt privacy-preserving tools that empower parents and teens to manage online safety directly.| Information Technology and Innovation Foundation Feed
Signal recently announced the introduction of another layer of post-quantum cryptography to their protocol, this time in their ratcheting mechanism. Let's take a look!| Quarkslab's blog
The California Privacy Protection Agency (CPPA)’s recent action serves as an important reminder for employers to follow the requirements of the California Consumer Privacy Act... The post $1.35 Million Dollars Fine for California Employer’s Privacy Act Violations Involving Job Applicant Data first appeared on HRWatchdog.| HRWatchdog
Singleton v. Mazhari, 2025 WL 2736530 (D. Md. Sep. 25, 2025), answered that question in the negative. Maryland’s “Public Information Act” (“MPIA”) is a State analog to the federal Freedom of Information Act (“FOIA”). Like FOIA, the MPIA provides a broad right to inspect public records, subject to enumerated exceptions. Singleton addressed […]| E-Discovery LLC
Congrats to Epiq for the announcement that Epiq acquires First Watch Data Breach Solutions, LLC! Here's part of the press release! The post Epiq Acquires First Watch Data Breach Solutions, LLC appeared first on eDiscovery Today by Doug Austin.| eDiscovery Today by Doug Austin
Canadian privacy authorities say TikTok’s efforts to keep children off the platform and prevent the collection and use of their sensitive personal information are “inadequate” but the company is taking steps to address concerns.| AP News
China is accusing the U.S. of spreading disinformation amid reports the Biden administration is calling for TikTok's Chinese owners to sell their stakes in the company.| AP News
Authorities say that social media platforms should not require age verification for all users when a ban on children under 16 having accounts goes into effect in December in Australia.| AP News
To make a long story short, I work from home using my personal computer. I was supposed to be supplied with one from the company but it keeps getting delayed (apparently it's coming from HQ which is in another country). My boss is really into screen sharing and recording our meetings. He's started asking me to share my screen when there's other people in the call. I feel this is a problem waiting to happen. Today he asked me to install a browser plugin and when it didn't appear right away got...| Recent Questions - The Workplace Stack Exchange
by Martin Eiermann* In international comparison, the United States stand out for the wide range of political hopes that are attached to the right to privacy—which covers anything from abortion and contraceptive access to employee claims against workplace surveillance and consumer rights—and for having a uniquely fragmented landscape of privacy laws. The privacy of health-related […]| Economic Sociology & Political Economy
The post Introducing Aggregated Insights appeared first on Kochava.| Kochava
Here’s a story for you. I was taking care of my dying mother and needed to get some more chemical for the pool. So I drive to the local pool store. But the owner wasn’t in. Just his kid or a yound cousin. When I was accidentally given the wrong pool chemical by a dumb … Continue reading The best way to solve a problem is to laugh at it| Metallicman
You have to be obsessive compulsive to avoid the privacy landmines that companies like OpenAI and Anthropic spread throughout their products. Yesterday I wrote a blog post about how the “How is Claude doing this session?” prompt seemed like a feature just designed to sneak more data from paying Claude users who had opted out… Continue reading Don’t even “Dismiss” the “How is Claude doing this session?” prompt, as it may compromise your chat session’s privacy| Key Discussions
I am a power user of AI models, who pays a premium for plans claiming to better-respect the privacy of users. (Btw, I am not a lawyer.)| Key Discussions
I recently built a new computer, something I’d been itching to do for a long time. Like most enthusiasts, I started with a modest gaming rig… but over time, ...| A Caffeinated Blog
The Austrian data protection authority, the DSB, has ruled that Microsoft 365 Education illegally tracks students. The software uses student data for its| Techzine Global
On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms. The post Dialing Back to Move...| Purism
In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo. The post Safety Without Surveillance: Designing Digital Sovereignty for All Ages appeared first on Purism.| Purism
The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire. The post Purism Approach vs. Google Model appeared first on Purism.| Purism
When not distracted by AI (which, you have to admit, is very distracting) I’ve been thinking a lot about delegation in digital identity. We have the tools that allow administrators or individuals grant specific permissions to applications and service. In theory, it’s a clean model. The post Delegation and Consent: Who Actually Benefits? appeared first on Spherical Cow Consulting.| Spherical Cow Consulting
Access 4 Learning's data privacy terms for schools and vendors| /dev/lawyer
On September 1, 2025, Texas amended its telephone solicitation law to include text messages and to add several new requirements, including a registration| Data Protection Report
A cheap Craigslist laptop gets its BIOS hacked and Intel Management Engine neutered.| Colin Cogle's Blog
GPGMail has been an invaluable tool for users of both GPG and Apple’s Mail application. Unfortunately, the marriage of GPG to Mail has been a bittersweet relationship.| Colin Cogle
By Gia Grimm and Karan Manohar In an era where technology is woven into nearly every part of daily life, consumers often share personal information without… The post Maryland’s New Privacy Law Explained: Your Rights, Their Responsibility appeared first on JGL Law.| JGL Law
Brave browser has crossed 100 million monthly active users, capping off a year of accelerated growth for both the browser and the search engine.| CyberInsider
In this increasingly growing digital landscape, companies are entrusted with vast amounts of sensitive personal information. From names and email| Global Policy Watch
Discover how to overcome consent fatigue and create user-friendly privacy controls with insights on GPC. The post GPC and UOOMS: Do Consumers Want an On/Off Switch or a Dimmer? appeared first on Red Clover Advisors.| Red Clover Advisors
Privacy and security are often treated as parallel disciplines, each with its own priorities, language, and metrics. Yet the most... The post 6 Ways Privacy Pros Strengthen Cybersecurity (Without Saying ‘Compliance’) appeared first on Red Clover Advisors.| Red Clover Advisors
Discover how healthcare marketers can target audiences while aligning with evolving privacy regulations and guarding sensitive data. The post Navigating the New Rules of Healthcare Advertising appeared first on Red Clover Advisors.| Red Clover Advisors
Learn how privacy technology, combined with people and processes, accelerates program capability and ensures scalable compliance.| Red Clover Advisors
Today's links| Pluralistic: Daily links from Cory Doctorow
What if Privacy Were the Default? Most digital services still require accounts, personal data, and behavioral tracking permissions, even for simple actions. It’s often assumed that convenience depends on identity. But that assumption is outdated. Tools like anonymous credentials make it possible to build services where an identifying profile is not directly linked to access, ... Read more The post How Anonymous Credentials Redefine Digital Access appeared first on Least Authority.| Least Authority
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a ...| Schneier on Security
Regulators of data privacy laws have expressed a desire in recent months to intensify enforcement around opt-out preference signals, also known as universal opt-out mechanisms (the “Opt-Out Signals”). Opt-Out Signals allow consumers to automatically opt-out of the sale and sharing of personal information for targeted advertising across all websites they may visit through an internet... Continue Reading| Password Protected
Last week, I described a gloomy situation: all public TLS certificate providers log your requests. By browsing through the subdomains, one can get their respective IP addresses. If one of them points to your home route, they know your general location. I analyzed several solutions and decided to use wildcard certificates, which don’t leak subdomain information, while continuing to use Let’s Encrypt. My solution caters to my Synology NAS, as it’s the one I’m using. Gett| A Java geek
I recently learned about a new way to leak your privacy, and it’s a scary one. Before going further, know that I’m not a network engineer: perhaps if you work in the field, you’ve known it for your whole career, but it’s quite new to me. Let me share my findings and you can judge. Because the original post was quite lengthy, I broke it down into two instalments, the problem and the solution. The problemThe solution| A Java geek
I recently learned about a new way to leak your privacy, and it’s a scary one. Before going further, know that I’m not a network engineer: perhaps if you work in this field, you’ve known it for your whole career, but it’s quite new to me. Let me share my findings, and you can judge for yourself. Since the original post was quite lengthy, I have broken it down into two installments: the problem and the solution. The situation I own my own domain. I’ve created mu| A Java geek
The way we consume content on the internet is increasingly driven by walled-garden platforms and black-box feed algorithms. This shift is making our media diets miserable. Ironically, a solution to the problem predates algorithmic feeds, social media and other forms of informational junk food. It is called RSS (Really Simple Syndication) and it is beautiful. What the hell is RSS? RSS is just a format that defines how websites can publish updates (articles, posts, episodes, and so on) in a sta...| Tom Burkert
Anna Gross and Tim Bradshaw, Financial Times: The UK government has issued a new order to Apple to create a backdoor into its cloud storage service, this time targeting only British users’ data, despite US claims that Britain had abandoned all attempts to break the tech giant’s encryption. […] Apple made a complaint to the […]| pxlnv.com