ICE Is Going on a Surveillance Shopping Spree | Electronic Frontier Foundation
We need to have a hard look at the surveillance industry. It is a key enabler of vast and untold violations of human rights and civil liberties, and it continues to be used by aspiring autocrats to threaten our very democracy. As long as it exists, the surveillance industry, and the data it generates, will be an irresistible tool for anti-democratic forces.
Court Rules That Ripping YouTube Clips Can Violate the DMCA
A federal court in California has ruled that YouTube creators who use stream-ripping tools to download clips for reaction and commentary videos may face liability under the DMCA's anti-circumvention provisions -- a decision that could reshape how one of the platform's most popular content genres ope...
AI “digital helper” Lena Health breach exposed some Houston Methodist patients’ medical info (1)
On June 1, 2025, the California Applicants' Attorneys Association reported that Serviceaide, a provider of AI-powered healthcare software, had suffered a data b
SoundCloud Data Breach Impacts 29.8 Million Accounts
A data breach at SoundCloud exposed information tied to 29.8 million user accounts, according to Have I Been Pwned. While SoundCloud says no passwords or financial data were accessed, attackers mapped email addresses to public profile data and later attempted extortion.
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream… | Clara Hawking | 164 comments
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream consumer platform.
It explicitly acknowledges the collection and processing of sensitive personal information under US state privacy laws. Named directly:
• Racial or ethnic origin.
• Religious or philosophical beliefs.
• Mental and physical health data.
• Sexual orientation.
• Transgender or nonbinary status.
• Citizenship or immigration status.
• Precise location data.
The policy goes further.
TikTok is collecting far more than what users consciously share.
Under the updated policy, it gathers what you provide, what it observes automatically, and what it receives from third parties. That includes account details and identity verification documents, private messages, drafts and unpublished content, AI prompts and interactions, clipboard content, purchase and payment data, contact lists and social graphs, and an extensive set of technical signals such as device identifiers, keystroke patterns, battery state, audio configurations, and activity tracked across devices.
This is not incidental data leakage. It is formalized, permitted, and documented.
Images and video are treated as analyzable environments. TikTok states that it "identifies objects and scenery, detects faces and other body parts, extracts spoken words, and collects metadata describing how, when, where, and by whom content was created."
Post a photo near the Golden Gate Bridge and you are not just sharing a moment. You are generating structured data about place, time, environment, and your body, or body parts.
Photos and videos are not just content. They are raw material for computer vision, biometric analysis, and location inference.
Tik Tok will use all of the collected data, and maintains the right to sell all of it to interested third parties, from vendors to the federal government.
Leaders must act on this immdiately. Privacy policies are not background reading. They are power documents. When they change, accountability shifts with them.
If you are a user, a parent, a school, a youth facing organization, nonprofits, and public institutions that use TikTok as a communications channel, the update changes the governance calculus.
Engagement is not a neutral act. It carries serious legal and ethical obligations tied to data protection, duty of care, and institutional risk.
The new policy deserves close reading. At this stage of platform power, and scale of data collection, policy literacy is a governance responsibility, not a personal preference.
Read the policy here: https://lnkd.in/ejbm8THx | 164 comments on LinkedIn
Microsoft Gave FBI Keys To Unlock Encrypted Data, Exposing Major Privacy Concern
Thomas Brewster reports: Early last year, the FBI served Microsoft with a search warrant, asking it to provide recovery keys to unlock encrypted data stored on
Europeans encourage ditching big tech and going local| Cybernews
Driven by concerns over privacy and geopolitical vulnerability, Europeans are increasingly adopting local "app menus" and open-source software to reduce reliance on US big tech.
A few enterprising hackers have started projects to do counter surveillance against ICE, and hopefully protect their communities through clever use of technology.
'Everyone Hates OneDrive, Microsoft's Cloud App That Steals Then Deletes All Your Files' - Slashdot
Microsoft's OneDrive cloud storage service has drawn renewed criticism for a particularly frustrating behavior pattern that can leave users without access to their local files after the service automatically activates during Windows updates.
Author Jason Pargin recently outlined the problem: Windo...
7 CISA Security Rules Every Android User Should Know - BGR
From being extra careful with your browsing habits to downloading the latest security apps, here are the ways you can safeguard your Android from cyber threats.
TCEA Knowledge Booster - Technology Plan Implementation Guide
TCEA Knowledge Booster - Technology Plan Implementation Guide
Price: 29.00 USD
TCEA Knowledge Booster: Technology Plan Implementation Guide
The Technology Plan Implementation Guide is a practical, five-year companion for directors charged with turning a district technology plan into day-to-day progress. Built for real-world constraints, it provides frameworks, timelines, and checklists you can adapt, not one-size-fits-all mandates. Whether you’re starting from scratch or inheriting a plan midstream, you’ll get clear first-30-days actions, year-by-year priorities, and guidance that keeps momentum without burnout.
Kansas school district switches software, asks court to dismiss lawsuit for spying on students • Kansas Reflector
The Lawrence public school district switched digital surveillance software vendors for the new school year while facing litigation that accuses school officials of unconstitutional spying on students, including high school journalists.
Microsoft Disables Preview In File Explorer To Block Attacks - Slashdot
Slashdot reader joshuark writes: Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to block credential theft attacks via malicious documents, according to a report from BleepingComputer. This attack vector is pa...
Would you allow a stranger to drive a camera-equipped computer around your living room? You might have already done so without even realizing it.
The Beginning: A Curious Experiment
It all started innocently enough. I had recently bought an iLife A11 smart vacuum—a sleek, affordable, and technologically advanced robot
Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network
Total surveillance is Microsoft goal! (Opinion)-> “Microsoft… Teams…is about to launch a new feature…that…will automatically find and update a user’s work location based on their organization’s Wi-Fi network.”
Microsoft is about to launch a new feature in Teams that will help hybrid workers stay connected. This feature will automatically find and update a user’s work location based on their organization’s Wi-Fi network.
Microsoft puts Office Online Server on the chopping block
Office Online Server provides browser-based versions of Word, Excel, PowerPoint, and OneNote for customers who want to keep things on-prem without having to roll out the full desktop applications. Microsoft's solution is to move to Microsoft 365
Why Signal's Post-Quantum Makeover Is An Amazing Engineering Achievement - Slashdot
"Eleven days ago, the nonprofit entity that develops the protocol, Signal Messenger LLC, published a 5,900-word write-up describing its latest updates that bring Signal a significant step toward being fully quantum-resistant," writes Ars Technica:
The mechanism that has made this constant key e...
Discord Says 70,000 Users May Have Had Their Government IDs Leaked In Breach - Slashdot
An anonymous reader quotes a report from The Verge: Discord has identified approximately 70,000 users that may have had their government ID photos exposed as part of a customer service data breach announced last week, spokesperson Nu Wexler tells The Verge. A tweet by vx-underground said that the co...