Forwarded from ATT • Tech News (Agam)
EU privacy regulator fines Meta 91 million euros over password storage
The Data Protection Commission (DPC) has levied a €91 million, or around $101.5 million, fine against Meta for maintaining some of its users' passwords without protection or encryption. The inquiry was opened after Meta informed the DPC five years ago, in 2019, that it had maintained passwords in 'plaintext' for many users, adding that they hadn't been accessed by people outside the corporation,
According to the DPC, passwords must not be stored as plaintext, considering the risks of abuse that arise from persons accessing such data. This most recent fine makes the total amount of GDPR fines slapped on Meta to €2.5 billion, including a record €1.2 billion fine in 2023 that Meta is appealing.
🔗 Reuters
🧑💻 @agamtechtricks
The Data Protection Commission (DPC) has levied a €91 million, or around $101.5 million, fine against Meta for maintaining some of its users' passwords without protection or encryption. The inquiry was opened after Meta informed the DPC five years ago, in 2019, that it had maintained passwords in 'plaintext' for many users, adding that they hadn't been accessed by people outside the corporation,
According to the DPC, passwords must not be stored as plaintext, considering the risks of abuse that arise from persons accessing such data. This most recent fine makes the total amount of GDPR fines slapped on Meta to €2.5 billion, including a record €1.2 billion fine in 2023 that Meta is appealing.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from NoGoolag
#Google helps #NSA track #Tor users with their ads - deliberate collusion aka "cooperation" - Part of Operation Jigsaw.
https://www.cnet.com/news/privacy/nsa-tracks-google-ads-to-find-tor-users/
#why
https://www.cnet.com/news/privacy/nsa-tracks-google-ads-to-find-tor-users/
#why
CNET
NSA tracks Google ads to find Tor users
The National Security Agency uses a bit of jiu-jitsu to turn the structure of Web ad networks against people who run Tor to remain anonymous.
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Watomatic - Auto reply for WhatsApp so you can stop using it
Watomatic sends an automated reply to everyone contacting you on WhatsApp. This is especially useful if you are planning to migrate away from WhatsApp but can also be used as a vacation responder.
⚒️ Features:
- Auto reply to every WhatsApp message
- Set your own auto reply message
- Auto reply to group chats
- Respects your privacy
- No analytics or tracking
- Free and open source
🔗 Links:
- Download from; GitHub, IzzySoft or F-Droid
- Screenshots
- Source code
🌐 @popmodsnetwork
🎁 Donate to our admins
🏷 Tags: #Android #Tools
Watomatic sends an automated reply to everyone contacting you on WhatsApp. This is especially useful if you are planning to migrate away from WhatsApp but can also be used as a vacation responder.
⚒️ Features:
- Auto reply to every WhatsApp message
- Set your own auto reply message
- Auto reply to group chats
- Respects your privacy
- No analytics or tracking
- Free and open source
🔗 Links:
- Download from; GitHub, IzzySoft or F-Droid
- Screenshots
- Source code
🌐 @popmodsnetwork
🎁 Donate to our admins
🏷 Tags: #Android #Tools
Forwarded from ATT • Tech News (أندرو تيت #KomaruGang)
WhatsApp and Cloudflare Launch Plexi for Enhanced Security
WhatsApp has teamed up with Cloudflare to enhance the security of end-to-end encrypted messages through a new auditing process for Key Transparency. This partnership introduces Plexi, an auditing tool designed to monitor and verify the integrity of public keys used in encryption, ensuring secure user communication.
Plexi functions as an independent auditor, checking the logs of public keys to confirm their accuracy and integrity during transmission. The auditing architecture, illustrated in the attached image, reinforces the trustworthiness of public keys, helping to prevent tampering and maintain secure communication for users.
🔗 WaBetaInfo
🧑💻 @agamtechtricks
WhatsApp has teamed up with Cloudflare to enhance the security of end-to-end encrypted messages through a new auditing process for Key Transparency. This partnership introduces Plexi, an auditing tool designed to monitor and verify the integrity of public keys used in encryption, ensuring secure user communication.
Plexi functions as an independent auditor, checking the logs of public keys to confirm their accuracy and integrity during transmission. The auditing architecture, illustrated in the attached image, reinforces the trustworthiness of public keys, helping to prevent tampering and maintain secure communication for users.
🔗 WaBetaInfo
🧑💻 @agamtechtricks
Forwarded from Gizchina.com
Millions of Androids Infected: How to Protect Your Device
https://www.gizchina.com/2024/09/30/millions-of-androids-infected-by-malware-how-to-protect-your-device/
https://www.gizchina.com/2024/09/30/millions-of-androids-infected-by-malware-how-to-protect-your-device/
Forwarded from Gizchina.com
Android 16 could possibly appear much earlier than expected
https://www.gizchina.com/2024/10/01/android-16-early-release-baklava/
https://www.gizchina.com/2024/10/01/android-16-early-release-baklava/
Forwarded from Mishaal's Android News Feed
The Android 16 codename has been revealed, and it isn't a dessert that starts with the letter W!
That might seem odd since Android 14's codename was Upside Down Cake & Android 15's was Vanilla Ice Cream, but the reason why makes sense once you read it.
That might seem odd since Android 14's codename was Upside Down Cake & Android 15's was Vanilla Ice Cream, but the reason why makes sense once you read it.
Android Authority
This is Android 16's codename — and it's not what you're expecting
The Android 16 codename has been revealed, and it isn't at all what you're expecting. In fact, it doesn't start with the letter "W" at all!
Forwarded from Mishaal's Android News Feed
Here's the Android 16 news I was ACTUALLY teasing today:
Google may release Android 16 much earlier than expected. Evidence and sources point towards a release happening in Q2 - not Q3 - of 2025!
Details + evidence can be found in my latest article on Android Authority.
Google may release Android 16 much earlier than expected. Evidence and sources point towards a release happening in Q2 - not Q3 - of 2025!
Details + evidence can be found in my latest article on Android Authority.
Android Authority
Google may release Android 16 much earlier than expected
Google may be planning to release Android 16 in Q2 of 2025, which is unusual since major Android versions typically arrive in Q3 or Q4.
Forwarded from @[_&
Check official statements from GOS team here:
https://grapheneos.org/faq#cellular-tracking
Legacy calls and texts should be avoided as they're not secure and trust the carrier / network along with having weak security against other parties. Trying to detect some forms of interception rather than dealing with the root of the problem (unencrypted communications / data transfer) would be foolish and doomed to failure.
Also more info on LTE only:
https://grapheneos.org/usage#lte-only-modehttps://grapheneos.org/usage#lte-only-mode
https://grapheneos.org/faq#cellular-tracking
Legacy calls and texts should be avoided as they're not secure and trust the carrier / network along with having weak security against other parties. Trying to detect some forms of interception rather than dealing with the root of the problem (unencrypted communications / data transfer) would be foolish and doomed to failure.
Also more info on LTE only:
https://grapheneos.org/usage#lte-only-modehttps://grapheneos.org/usage#lte-only-mode
GrapheneOS
GrapheneOS Frequently Asked Questions
Answers to frequently asked questions about GrapheneOS.
Forwarded from Mika L
Sorry for linking this, but this was source for latest finnish news regarding that...
https://about.fb.com/news/2024/09/an-update-on-how-were-building-safe-and-secure-third-party-chats-for-users-in-europe/
Short quote:
We’ve also gone above and beyond the “basic” features required for interoperable messaging under DMA, and we will provide rich messaging features such as reactions, direct replies, typing indicators, and read receipts. In accordance with the DMA, in 2025 we will include the option to create groups, and voice / video calling in 2027.
https://about.fb.com/news/2024/09/an-update-on-how-were-building-safe-and-secure-third-party-chats-for-users-in-europe/
Short quote:
We’ve also gone above and beyond the “basic” features required for interoperable messaging under DMA, and we will provide rich messaging features such as reactions, direct replies, typing indicators, and read receipts. In accordance with the DMA, in 2025 we will include the option to create groups, and voice / video calling in 2027.
Meta Newsroom
An Update on How We’re Building Safe and Secure Third-Party Chats for Users in Europe
As required by the Digital Markets Act (DMA) people using WhatsApp and Messenger in Europe have the option to connect with people using third-party
Forwarded from 安逸🕊️
Signal and Telegram are both messaging apps that emphasize privacy and security, but they have several key differences in terms of features, encryption, and overall approach to user data:
### 1. Encryption
- Signal: It uses end-to-end encryption (E2EE) by default for all conversations, including one-on-one chats, group chats, and voice/video calls. This means only the people involved in the conversation can read or hear the messages.
- Telegram: Telegram offers E2EE only in its "Secret Chats" feature, while regular chats are encrypted between the device and Telegram's servers (MTProto encryption). However, Telegram stores regular chat data on its cloud servers.
### 2. Cloud Storage
- Signal: Does not store user data on its servers. All conversations are stored locally on the user's device, and backups, if any, are also encrypted and managed by the user.
- Telegram: Stores regular chat data in the cloud, which allows for multi-device synchronization. Users can access their chat history from any device. Secret chats, however, are device-specific and not stored on Telegram's servers.
### 3. Open Source
- Signal: Both Signal's protocol (the encryption technology) and the app are fully open source. This transparency allows security experts to review the code for vulnerabilities.
- Telegram: Telegram's protocol (MTProto) is open source, but the server-side code is closed source, meaning the backend cannot be independently audited by external security experts.
### 4. User Base and Popularity
- Signal: Popular among users who prioritize privacy and security, such as journalists, activists, and privacy advocates.
- Telegram: More widely used with a broader range of features appealing to general users. It's popular for its large group chats, channels, and bots.
### 5. Features
- Signal: Focuses more on secure communication. It offers encrypted messages, voice and video calls, and some basic messaging features like disappearing messages and emoji reactions.
- Telegram: Has a much broader range of features like public channels, large group chats, customizable themes, file sharing up to 2GB, bots, animated stickers, and more, making it more feature-rich but less security-focused compared to Signal.
### 6. Privacy and Data Collection
- Signal: Collects minimal metadata. The only information Signal stores is the user’s phone number.
- Telegram: Collects more metadata than Signal, such as IP addresses, device details, and basic usage statistics. However, it claims not to share data with third parties or governments unless legally compelled.
### 7. Backup Options
- Signal: Does not offer automatic cloud backups to protect user privacy. Backups must be done manually by the user, and they are encrypted.
- Telegram: Stores messages and files in the cloud for regular chats, meaning users don't need to worry about losing data when switching devices.
### Summary:
- Signal is ideal for those who prioritize privacy and security above all else, offering robust end-to-end encryption for all forms of communication.
- Telegram provides a wider range of features and is more versatile for general users, though its security is not as rigorous as Signal's for regular chats.
### 1. Encryption
- Signal: It uses end-to-end encryption (E2EE) by default for all conversations, including one-on-one chats, group chats, and voice/video calls. This means only the people involved in the conversation can read or hear the messages.
- Telegram: Telegram offers E2EE only in its "Secret Chats" feature, while regular chats are encrypted between the device and Telegram's servers (MTProto encryption). However, Telegram stores regular chat data on its cloud servers.
### 2. Cloud Storage
- Signal: Does not store user data on its servers. All conversations are stored locally on the user's device, and backups, if any, are also encrypted and managed by the user.
- Telegram: Stores regular chat data in the cloud, which allows for multi-device synchronization. Users can access their chat history from any device. Secret chats, however, are device-specific and not stored on Telegram's servers.
### 3. Open Source
- Signal: Both Signal's protocol (the encryption technology) and the app are fully open source. This transparency allows security experts to review the code for vulnerabilities.
- Telegram: Telegram's protocol (MTProto) is open source, but the server-side code is closed source, meaning the backend cannot be independently audited by external security experts.
### 4. User Base and Popularity
- Signal: Popular among users who prioritize privacy and security, such as journalists, activists, and privacy advocates.
- Telegram: More widely used with a broader range of features appealing to general users. It's popular for its large group chats, channels, and bots.
### 5. Features
- Signal: Focuses more on secure communication. It offers encrypted messages, voice and video calls, and some basic messaging features like disappearing messages and emoji reactions.
- Telegram: Has a much broader range of features like public channels, large group chats, customizable themes, file sharing up to 2GB, bots, animated stickers, and more, making it more feature-rich but less security-focused compared to Signal.
### 6. Privacy and Data Collection
- Signal: Collects minimal metadata. The only information Signal stores is the user’s phone number.
- Telegram: Collects more metadata than Signal, such as IP addresses, device details, and basic usage statistics. However, it claims not to share data with third parties or governments unless legally compelled.
### 7. Backup Options
- Signal: Does not offer automatic cloud backups to protect user privacy. Backups must be done manually by the user, and they are encrypted.
- Telegram: Stores messages and files in the cloud for regular chats, meaning users don't need to worry about losing data when switching devices.
### Summary:
- Signal is ideal for those who prioritize privacy and security above all else, offering robust end-to-end encryption for all forms of communication.
- Telegram provides a wider range of features and is more versatile for general users, though its security is not as rigorous as Signal's for regular chats.