Researchers at the University of Vienna uncovered a weakness in WhatsApp’s contact discovery process that let them confirm more than 3.5 billion active accounts across 245 countries. The team relied on the same basic mechanism that helps users find contacts through phone numbers. WhatsApp checks each number against its registry. The researchers found that the system allowed an unusually high volume of lookups from a single source, which opened the door to automated enumeration at a massive ...| Digital Information World
A bipartisan letter reveals the IRS searched a database of hundreds of millions of travel records without first conducting a legal review. Airlines like Delta, United, American, and Southwest are selling these records to the government through a co-owned data broker.| 404 Media
Replicate’s backers include Andreessen Horowitz, Nvidia, Sequoia and Y Combinator. Read more: Cloudflare acquires Replicate to simplify AI deployment| Silicon Republic
We’re excited to announce the open sourcing of tokio-quiche, our async QUIC library built on quiche and tokio. Relied upon in our services such as iCloud Private Relay and our next-generation Oxy-based proxies, tokio-quiche handles millions of HTTP/3 requests per second with low latency and high throughput.| The Cloudflare Blog
Are you a red wine drinker? A high spender? Or perhaps you're a slow eater, the sort who takes up a restaurant's table for longer than they'd like. You might not even know - but OpenTable does. Those are just a few of the notes that the reservation platform has started serving up to some […]| The Verge
Material viewed by 404 Media shows data giant Thomson Reuters enriches license plate data with marriage, voter, and ownership records. The tool can predict where a car may be in the future.| 404 Media
How a privacy researcher proved a politician wrong, and how she created the first ever definition of anonymity in the process.| desfontain.es
Greetings CIPAWorld! Happy Halloween! On this spookiest of days, the Southern District of California delivered a decision that should haunt plaintiffs’ counsel who file CIPA cases without sol…| CIPAWorld
Americans trade personal data for small discounts despite widespread concerns about breaches and long-term privacy risks.| Digital Information World
At Stanford University, OpenAI’s chief executive Sam Altman outlined a growing concern about how artificial intelligence systems handle personal data. | Digital Information World
Chapitre 1er. Le web pourrissant et l'IA florissante. Nos espaces discursifs en ligne, nos médias sociaux, sont déjà largement contaminés de contenus entièrement générés par IA. Les proportions peuvent varier d'un média à l'autre mais il s'agit de bien plus qu'une simple tendance, il s'agit de l'a| affordance.info
Introduction Searching the internet has been both increasingly cumbersome and frightening due to privacy concerns with many of the major search engine providers (such as Google or Bing). Thankfully there are some other good options like Startpage, Qwant, and Mojeek. Some of them use results provided by the major providers like Google, and some of ...| The Z-Issue
Big companies know far more about you than you think. You have very little privacy from their all-seeing algorithms. They may even have worked out some very, very personal things about you, that even your parents don't know…| cs4fn
Il caso Report - Garante privacy italiano porta a riflettere su come, in Europa e nel resto del mondo, vengano scelti i membri delle analoghe autorità ma anche a sondare scandali e inchieste che hanno riguardato queste istituzioni L'articolo Ma il garante privacy è indipendente? Come funziona in Italia e in altri Paesi proviene da Agenda Digitale.| Agenda Digitale
Il Digital Omnibus punta a semplificare il quadro digitale UE intervenendo su GDPR, ePrivacy, eIDAS2 e coordinamento con AI Act e NIS2. Le bozze prevedono cambi su definizioni, diritti, automatizzazioni e data breach, con impatti su imprese, PMI e utenti L'articolo Vogliono distruggere il Gdpr, fermiamoli: la minaccia Digital Omnibus proviene da Agenda Digitale.| Agenda Digitale
Another news which has almost gone unnoticed is the fact that the Nigerian government has fined Meta, the American tech giant, for breaching privacy laws; and Meta has decided to settle out of court to the fine!!! This is a major development for an African country, and then in general in an era where these … Continue reading Meta Bows to Nigeria and Pays for Privacy Infraction| African Heritage
With Firefox 145, we’re rolling out major privacy upgrades that take on browser fingerprinting — a pervasive and hidden tracking technique that lets we| blog.mozilla.org
A digital privacy group says agencies are collecting too much data on Americans and using AI tools to make connections that may not be valid. The post Report: Government data mining has gone too far – and AI will make it worse appeared first on CyberScoop.| CyberScoop
Palo Alto Networks researchers haven’t been able to identify who’s behind the commercial-grade tech yet. The post New Landfall spyware apparently targeting Samsung phones in Middle East appeared first on CyberScoop.| CyberScoop
Introducing 1.1.1.1 for Families — the easiest way to add a layer of protection to your home network and protect it from malware and adult content.| The Cloudflare Blog
Vivaldi, Orion, Waterfox and Zen are my current favorites. I like Firefox, but I'm not so sure about Mozilla these days. Safari's OK. LibreWolf and IronFox are good for everyday privacy, Tor for advanced scenarios. Falkon and Dillo are good for slow hardware.| Hyperborea: New Posts
Reece Rogers, Wired: As I browse the web in 2025, I rarely encounter captchas anymore. There’s no slanted text to discern. No image grid of stoplights to identify. And on the rare occasion that I am asked to complete some bot-deterring task, the experience almost always feels surreal. A colleague shared recent tests where they […]⌥ Permalink| Pixel Envy
Corporate Europe Observatory: Over the past year, tech industry lobby groups have used their lavish budgets to aggressively push for the deregulation of the EU’s digital rulebook. The intensity of this policy battle is also reflected in the fact that Big Tech companies have on average more than one lobby meeting per day with EU […]⌥ Permalink| Pixel Envy
Andrew Kenney, Denverite: It was Sgt. Jamie Milliman [at the door], a police officer with the Columbine Valley Police Department who covers the town of Bow Mar, which begins just south of [Chrisanna] Elser’s home. […] “You know we have cameras in that jurisdiction and you can’t get a breath of fresh air, in or […]| pxlnv.com
Password manager app Dashlane reports a big uptake of the more secure passkey login option, with Google and Amazon dominating and Roblox rising fast.| Techlicious Latest Articles
WhatsApp has begun rolling out support for messaging users on third-party platforms, starting with its latest Android beta release (v2.25.33.8). The feature, currently limited to testers in the European region, marks a significant step toward cross-platform interoperability as mandated by the EU's Digital Markets Act (DMA). The update was first identified by WABetaInfo, which reports … The post WhatsApp Beta Adds Support for Third-Party Messaging Apps appeared first on CyberInsider.| CyberInsider
A fresh round of testing by the Electronic Frontier Foundation (EFF) and AV-Comparatives reveals significant disparities in how well Android antivirus apps detect stalkerware, with some popular products failing to identify nearly half of the tested spyware. Conducted in August and September 2025, the evaluation shows that while some vendors have made progress, others still … The post Android’s default security tool fails to detect most stalkerware apps appeared first on CyberInsider.| CyberInsider
Swedish privacy-focused VPN provider Mullvad has announced the discontinuation of its search proxy service, Leta, citing the fast-changing dynamics of the search industry and diminishing returns on maintaining the tool. The decision marks a strategic refocus on Mullvad’s core areas of VPN development and browser privacy research. Leta, introduced as a privacy layer for search … The post Mullvad shuts down Leta Search proxy citing shifting industry landscape appeared first on CyberInsider.| CyberInsider
A newly published research paper by Microsoft researchers has revealed “Whisper Leak,” a potent side-channel attack capable of inferring sensitive user prompt topics from encrypted traffic between users and large language models (LLMs). Despite the widespread use of TLS encryption, researchers demonstrated that patterns in packet sizes and timings can leak enough information to classify … The post Microsoft warns of ‘Whisper Leak’ side-channel on encrypted LLM traffic appeared first...| CyberInsider
Phone location data, collected under the guise of ad tracking, can be used to precisely track the movements of millions in the EU.| CyberInsider
On September 23, 2025, the California Privacy Protection Agency announced that the state’s Office of Administrative Law approved regulations that update existing California Consumer Privacy Act (“CCPA”) regulations and introduce new regulations covering cybersecurity audits, risk assessments, and automated decision-making technology. The updates to the existing regulations—which take effect on January 1, 2026—expand business obligations... Continue Reading…| Global Policy Watch
Businesses are increasingly being pulled into lawsuits over how they collect and share user data online. What was once the domain of large tech firms is now a widespread legal risk for companies of all sizes. The latest analysis from cyber insurer Coalition shows that outdated privacy laws are driving a surge in web privacy claims, with small and midsize businesses now common targets. Third parties named in web privacy claims (Source: Coalition) A growing … More → The post Old privacy law...| Help Net Security
Windows 11 Camera is Blocked because of Privacy Shutter. This helps the operating system to understand whether the laptop has a physical privacy shutter or| Anoop C Nair
Mark Weinstein joins to discuss rethinking privacy, data ownership, and protecting children in the evolving digital and AI age. The post The Path to Restoring Trust in a Connected World appeared first on Red Clover Advisors.| Red Clover Advisors
Discover how communities can drive responsible AI adoption through education, ethics, and local innovation. The post AI, Privacy, and the General Counsel’s Role in Responsible Innovation appeared first on Red Clover Advisors.| Red Clover Advisors
“We need someone to figure out our AI governance plan, and everyone thinks it should be you.” If you work... The post Why AI Risk Is Now Every Company’s Problem (and How to Manage It) appeared first on Red Clover Advisors.| Red Clover Advisors
Discover how communities can drive responsible AI adoption through education, ethics, and local innovation.| Red Clover Advisors
Last year almost a dozen major U.S. ISPs were the victim of a massive, historic intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The “Salt Typhoon” hack was so severe, the intruders spent much of the last year rooting around the ISP networks even after discovery. AT&T and Verizon, […]| Techdirt
AI’s appetite for data is relentless. But the rules around that data are hardening fast. From the EU’s GDPR to India’s new DPDP Act, regulators across the globe are drawing bright red lines around how personal data is collected, shared, and used. For enterprises hoping to scale AI in sensitive or regulated sectors, these changes...| Duality Technologies
With Halloween lurking around the corner and as National Cybersecurity Awareness Month comes to a close, the McGuireWoods Data Privacy & Cybersecurity Practice Group reminds you to not wait to be spooked by a cybersecurity incident or haunted by the task of maintaining your cybersecurity program. Today’s threat landscape is rapidly changing and accelerated evermore... Continue Reading| Password Protected
California’s Invasion of Privacy Act (CIPA) is a 1967 criminal wiretapping statute being stretched to govern 2025-era internet technologies. The| Password Protected
On 5th of July I have made a number of changes to the privacy settings on this website. Without going too much into detail about reasons: This website no longer uses Google Analytics. Theme fonts are no longer loaded from Google Fonts service. They’re now served from the gruchalski.com domain. If you’d like to do the same, here’s a good place to start: https://github.com/radekg/google-font-download. The newsletter has been cancelled. Mailchimp decided to nuke my account some time ago an...| gruchalski.com
Josh Taylor had a great article yesterday about cybercrime and data leaks. Australian companies routinely file for injunctions against “persons unknown” when data leaks occur. If you think this would only impact honest people, and not those already breaking the law, you’d be right! From his report: This highlights the major flaw in the injunction scheme. Qantas argues the injunction protects customers, but cybersecurity experts warn that in practice it has the opposite effect: scammers ...| Rubenerd
The Airlines Reporting Corporation (ARC), owned by major U.S. airlines, collects billions of ticketing records and sells them to the government to be searched without a warrant. I managed to opt-out of that data selling.| 404 Media
Learn about five important but optional features that are available on iPhone that you can turn on to ensure extra privacy and security.| iDownloadBlog.com
The sleep tech played back the bathroom videos on his work computer until he was discovered by a coworker.| Sleep Review
Neurotecnologie e brain-computer interface superano il GDPR: i dati cerebrali sono vulnerabili ma manca una legislazione chiara| Panorama
Need backyard privacy ideas? Make these garden privacy screens with small trees, plants and other easy to find supplies!| The Garden Glove
Fort Knox for your secrets| fnox.jdx.dev
A pink-tinted lens option meant to protect against sunlight largely blocks the infrared light also used in many face-recognition systems.| Techlicious Latest Articles
Videos on social media show officers from ICE and CBP using facial recognition technology on people in the field. One expert described the practice as “pure dystopian creep.”| 404 Media
After revisiting SailfishOS earlier this autumn, I spent a week living with its open-source cousin, Ubuntu Touch. With Google tightening the Android ecosystem, it felt like the right moment to explore what a true Linux mobile OS offers today. My first attempt was with a OnePlus Nord N100 on MetroPCS. It fought me at every step. Flashing, fastboot flags, and ADB coaxing were all unsuccessful. In the end I ordered a Pixel 3a, one of Ubuntu Touch's officially supported devices.| geekyschmidt.com
Ad blockers, Google AMP, and Facebook IA should be a wake-up call for publishers about the demands of their readers.| Parse.ly
Welcome to the Q3 2025 edition of the Firefox Security and Privacy newsletter!| Attack & Defense
You’ve probably seen it in analytics dashboards, server logs, or privacy documentation: IP addresses with their last octet zeroed out. 192.168.1.42 beco...| Frank DENIS random thoughts.
Big Tech needs to step up. We’re pushing companies in the 2025 RDR Index to do better on human rights. The post Taking stock of Big Tech: the 2025 RDR Index appeared first on Access Now.| Access Now
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.| Purism
AI is the worst thing that mankind has ever created and there’s a good chance that Skynet will be real, R.I.P. humanity. Or not. It’s complicated.| Bruceb Consulting
Tired of Microsoft Family Safety popups? Learn how to turn off Family Safety mode on Windows 11 or 10 by disabling the Parental Controls service.| WebTrickz
US regulators on Wednesday slapped a record $5 billion fine on Facebook for privacy violations in a wide-ranging settlement that calls for revamping privacy controls and oversight at the social network.| France 24
Facebook chief Mark Zuckerberg vowed Wednesday to "step up" to fix problems at the social media giant, as it fights a snowballing scandal over the hijacking of personal data from millions of its users.| France 24
Guess what? NewPipe just turned 10 this month last month! Time just flew by. In one moment you hit “new project”, and in the next there is a whole association, a group of maintainers, an uncountable amount of contributors, and millions of users!1 This is amazing. Last time we wrote about an important birthday, NewPipe had just turned five years old. Now it’s yet another five years later, and we still stand on the ground with both feet, running forward like there is no other direction! N...| NewPipe
2025 updates to two key technical specifications: the Global Privacy Protocol (GPP) and the Data Deletion Request Framework (DDRF)| IAB Tech Lab
Google’s new Recovery Contact feature lets a trusted friend help you regain access to your account if you get locked out. Here’s why you should set it up.| www.techlicious.com
CISOs prioritize visibility into employee AI use, policy enforcement, and safeguarding data, intellectual property, and confidential info.| Help Net Security
On September 17, 2025, the Federal Trade Commission (“FTC”) and seven states – Colorado, Florida, Illinois, Nebraska, Tennessee, Utah, and Virginia – sued| Global Policy Watch
The post Privacy Plantings for Luxury Landscapes in Delaware & the Main Line appeared first on Borsello Landscaping.| Borsello Landscaping
In today's world, lack in privacy makes it very difficult to keep personal information private. This article explains how Nostr can help with that.| Bitcoin News
Blockchain forensics enables unprecedented surveillance into people's financial lives, with profound implications for privacy rights.| Bitcoin News
Explore how AI is reshaping the legal profession through smarter strategies, collaboration, and data-driven decision-making. The post How AI Is Transforming the General Counsel Role appeared first on Red Clover Advisors.| Red Clover Advisors
October has rolled around again. It’s a month that marks two big events: Cybersecurity Awareness Month and Halloween. But if... The post Building Cybersecurity Programs That Meet Privacy Regulations appeared first on Red Clover Advisors.| Red Clover Advisors
Learn how small businesses can fight phishing, deepfakes, and cyberattacks with practical, affordable cybersecurity strategies.| Red Clover Advisors
Audio measurement is facing its most dramatic shift in years. The familiar benchmarks that once defined success are no longer enough. Advertisers want more than impressions and CPMs. They want proof that campaigns move the needle on awareness, engagement, and sales. For publishers, that makes this a pivotal moment. Those who can demonstrate audio’s full […] The post The Great Measurement Reset: Audio’s Brandformance Moment appeared first on AdsWizz.| AdsWizz
TUNE has successfully completed another SOC 2 Type 2 audit and SOC 1 Type 2 audit, proving its commitment to the Trust Services Principles.| TUNE
Data protection laws often do not apply to the lesser-known category of “anonymous data”. There are misleading claims and new risks.| Least Authority
In a significant step toward strengthening consumer privacy protections, the California Privacy Protection Agency (CPPA) board has officially adopted a| Password Protected
Pop-ups are small browser windows that appear automatically when you visit certain websites. They’re often used for logging in, completing payments, or displaying important notifications. Some examples include online banking sites, government forms, and secure payment gateways. While pop-ups can sometimes be annoying, there are times when you actually need to allow them to proceed […] The post How to Disable Pop-Up Blocker in Microsoft Edge (2025) appeared first on WebTrickz.| WebTrickz
Safari is Apple’s default web browser on iPhone and iPad. While it offers a fast and secure browsing experience, your browsing history, search terms, and visited websites can quickly pile up over time. If you want to keep your browsing activity private or simply declutter your Safari data, you can easily delete your history. This […] The post iOS 26: How to Clear or Delete Safari History on iPhone appeared first on WebTrickz.| WebTrickz
Would you allow a stranger to drive a camera-equipped computer around your living room? You might have already done so without even realizing it. The Beginning: A Curious Experiment It all started innocently enough. I had recently bought an iLife A11 smart vacuum—a sleek, affordable, and technologically advanced robot| Small World
Gregg Wallace, the former MasterChef presenter, has issued proceedings against the BBC and BBC Studios for failing to respond to his subject access requests (SAR) in accordance with the UK GDPR. Wallace was sacked by the BBC in July following an inquiry into alleged misconduct. As the saying goes, “Revenge is a dish best served cold!” Background … Continue reading "A Pinch of GDPR: Gregg Wallace Serves Up a Data Rights Claim "| Your Front Page For Information Governance News
Back in 2006, Tony Blair was extremely keen on the idea of introducing mandatory ID cards. Fortunately, they were scrapped by the coalition government following Labour's 2010 general election drubbing (for the historians, though, it is worth noting the cards were originally a Tory idea, and that Blair originally campaigned against them). 19 years later, Tony Blair (via the Tony Blair Institute) continues to hawk the idea of a "super identity card". Unfortunately, the current government have a...| www.bentasker.co.uk
The refuge and intimate space that was once the bedroom has become the stage for digital exposure and patriarchal surveillance.| CCCB LAB
The Data Localization Suite helps businesses get the performance and security benefits of Cloudflare’s global network while making it easy to set rules and controls at the edge about where their data is stored and protected.| The Cloudflare Blog
Alex Ambrose speaks about navigating the risks and rewards of AI in marketing at Kids Industry Connect: A Children's Advertising and Privacy Summit, hosted by BBB National Programs.| Information Technology and Innovation Foundation Feed
Rather than blanket social media bans, policymakers should adopt privacy-preserving tools that empower parents and teens to manage online safety directly.| itif.org
Signal recently announced the introduction of another layer of post-quantum cryptography to their protocol, this time in their ratcheting mechanism. Let's take a look!| Quarkslab's blog
Canadian privacy authorities say TikTok’s efforts to keep children off the platform and prevent the collection and use of their sensitive personal information are “inadequate” but the company is taking steps to address concerns.| AP News
China is accusing the U.S. of spreading disinformation amid reports the Biden administration is calling for TikTok's Chinese owners to sell their stakes in the company.| AP News
Authorities say that social media platforms should not require age verification for all users when a ban on children under 16 having accounts goes into effect in December in Australia.| AP News
by Martin Eiermann* In international comparison, the United States stand out for the wide range of political hopes that are attached to the right to privacy—which covers anything from abortion and contraceptive access to employee claims against workplace surveillance and consumer rights—and for having a uniquely fragmented landscape of privacy laws. The privacy of health-related […]| Economic Sociology & Political Economy
Here’s a story for you. I was taking care of my dying mother and needed to get some more chemical for the pool. So I drive to the local pool store. But the owner wasn’t in. Just his kid or a yound cousin. When I was accidentally given the wrong pool chemical by a dumb … Continue reading The best way to solve a problem is to laugh at it| Metallicman
You have to be obsessive compulsive to avoid the privacy landmines that companies like OpenAI and Anthropic spread throughout their products. Yesterday I wrote a blog post about how the “How is Claude doing this session?” prompt seemed like a feature just designed to sneak more data from paying Claude users who had opted out… Continue reading Don’t even “Dismiss” the “How is Claude doing this session?” prompt, as it may compromise your chat session’s privacy| Key Discussions
I am a power user of AI models, who pays a premium for plans claiming to better-respect the privacy of users. (Btw, I am not a lawyer.)| Key Discussions
I recently built a new computer, something I’d been itching to do for a long time. Like most enthusiasts, I started with a modest gaming rig… but over time, ...| A Caffeinated Blog
The Austrian data protection authority, the DSB, has ruled that Microsoft 365 Education illegally tracks students. The software uses student data for its| Techzine Global
On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms. The post Dialing Back to Move...| Purism
In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo. The post Safety Without Surveillance: Designing Digital Sovereignty for All Ages appeared first on Purism.| Purism
The Justice Department and a coalition of states are pursuing antitrust action against Google, accusing it of running monopolistic ad-tech systems that exploit users and lock out competition. Regulators are weighing remedies that could force structural changes to Google’s ad empire. The post Purism Approach vs. Google Model appeared first on Purism.| Purism
Access 4 Learning's data privacy terms for schools and vendors| /dev/lawyer
On September 1, 2025, Texas amended its telephone solicitation law to include text messages and to add several new requirements, including a registration| Data Protection Report