Track the members of your group.  

How G.M. Tricked Millions of Drivers

How G.M. Tricked Millions of Drivers Into Being On (Including Me)

This reporter and her husband bought a Bolt in December. Two risk-profiling companies had been getting detailed data about their driving ever since.

cant quit third-party delays shut down for a third time

Ich frage mich, wieso Webseiten von Zeitungen immernoch nicht:

- ihre Daten selber hosten
- Tracker und Werbung einbinden
- unbenutzbare Webseiten bauen

Was ist da los
- zeit.de
- sz.de
- faz.net
- ...

Gegen berwachung wettern und die Besucher der Webseiten tracken lassen.

Abgesehen davon werden immernoch nicht Quellen von Recherchen genannt. Wie soll man diese Medien denn ernstnehmen

We fool ourselves if we think governments aren't spying on their citizens. It's one of those things that snuck in and stayed, and is not going away but expanding.

"Poland's prosecutor general says previous government used spyware against hundreds of people"

"Polands prosecutor general has told the parliament that powerful Pegasus spyware was used against hundreds of people during the former government in Poland"

In dem Link ist laut Developer-Console immerhin nur noch ein einziges Cookie von archive.is selber dabei.

Aber was mir jetzt aber trotzdem ein bisschen unangenehm auffllt (und von geblockt wurde): Warum dieses Zhlpixel nach Russland

<noscript><div style="position:absoluteleft:-10000px">
<img src="//top-fwz1.mail.ru/counterid=2825109js=na" style="border:0" height="1" width="1"/>
</div></noscript>

Und warum wird fr meine externe IP Adresse (127.0.0.1 als Beispiel!) eine eindeutige Subdomain ala
"1.0.0.127.de.inc6.377500215.pixel.archive.is" von archive.is mit einem weiteren Zhlpixel angesurft

According to a study by (author of the app "Tracker Control")

" 85% of apps
from 2017 could send data to Alphabet/Google, compared to 89% in 2020. Apps
still widely send personal data to tracking companies based in a third-party country
without an adequate level of data protection, particularly to those in the US "

This study received the Stefano Rodot Award btw (see ) congrats to Konrad!

This guy made a tool that beeps every time a website sends data about you to Google. The beeps blur into a continuous buzz:

I use Privacy Badger (, blocks trackers), uBlock Origin (, adblocker), Firefox, and the SearXNG search engine ( or find instances at ), but it's annoying I have to.

It's not the browser sending data to trackers. It's the webpages that load these tracking URLs and force browsers to do this!

Cache is king

Earlier in the day than my previous articles! Latest entry in the A-to-Z of Blogging Challenge is titled "T is for 'Tracking'" in which I write about my disdain for tracking components in URLs.

I was sufficiently annoyed to write a tool to strip out tracking elements:

Feedback welcome (here, on the blog article, or via github)

New game. The rules are simple:

You send me an email that contains tracking links I unsubscribe. Can't be simpler really.

Tracking

A new assistant is being integrated into the search experience on Facebook and Instagram. Problem is, someone forgot to tell it what it can and cant do.

NextDNS or Pi-hole (self-hosted) are DNS level blockers that more people really should use.


My a naich 98 partner zpracovvme daje nsledujcm zpsobem ...

Laughs in Temporary Containers

GPS tracking reveals koalas Phascolarctos cinereus use mosaics of different forest ages after environmentally regulated timber harvesting

"We located koalas for capture using day searches, nocturnal spot-lighting, koala detection dogs and dawn drone flights. Once located, koalas were either captured by trapping or flagging by a tree climber using an extended pole. Animals were anesthetized to allow appropriate fitting of collars."
>>
Law, B., Gonsalves, L., Slade, C., Brassil, T. & Flanagan, C. (2024) GPS tracking reveals koalas Phascolarctos cinereus use mosaics of different forest ages after environmentally regulated timber harvesting. Austral Ecology, 49, e13518. Available from:

"The Next US President Will Have Troubling New Surveillance Powers"

"Over the weekend, President Joe Biden signed legislation not only reauthorizing a major FISA spy program but expanding it in ways that could have major implications for privacy rights in the US."

And then there's this GDPR warning in Webflow when you try and use a Google font. Google will track your end users' IP addresses.

Das und Bezahl-Sperre fr seine redaktionellen Artikeln anbietet ist nichts dagegen zu sagen, aber die Armada von tracking Anbietern auf Heise, die den Rest begleiten, empfinde ich als heftig. Muss das sein

Ich musste soeben den auf meinem Smartphone installieren, um eine digitale Fahrkarte nutzen zu knnen.

Hasse alles daran.

Hoffe, Blokada und /e/s advanced privacy verhindern den schlimmsten Datenabfluss. (Nehme gerne Alternative fr Digitale Tickets, falls es sowas gibt.)

praktisch gar nicht ... ich habe einen Router/Client mit Dachantenne plus einen Client fr unterwegs - war mal technisch interessant, ist ein faszinierendes Konzept, einen praktischen Nutzen sehr ich aber derzeit nicht.

Praktisch nutze ich im Bereich und rund um Haus und Grundstck mit 2 eigenen Gateways. GPS- klappt hier in der Region auch recht gut aufgrund passabler Coverage mit Gateways ...

EU verlangt von Online-Plattformen Gratis-Dienste ohne personalisierte Werbung heise online

Friday Squid Blogging: Squid Trackers

A new bioadhesive makes it easier to attach trackers to squid.
Note: the article does not discuss squid privacy rights.
As usual, you ca...

Friday Squid Blogging: Squid Trackers

Du hast keinen uBlock Origin gegen und . Das gibt es als Erweiterung fr die gngigen Browser.

Der perfekte fr ein verregnetes Wochenende aus dem Dossier and :

Auch Kisha kriegt keinen Kredit: und durch und automatisierte

Auch eine Art von : findet sein -getriebenes Ttungssystem AIP, das u.a. zur militrischen Drohnensteuerung und Angriffsplanung eingesetzt wird, etwas unterbeschftigt und bietet es jetzt der Werbeindustrie fr verbessertes an. Absolut folgerichtig angesichts dessen, wie sehr die intelligence community auf -Daten zurckgreift. Und naja: ob Zielerfassung hier oder Zielerfassung da - was soll's.

Die macht Druck fr mehr im Internet.


Ist ja eine nette Idee, und ich htte auch gerne mitgeraten. Aber eine deutlich zweistellige Anzahl bler Domains, von denen Tracker und Werbung nachgeladen werden sollen Nein danke, mit ist schon schlecht.

The is quite flexible. I compiled a list of examples:

What I like: edit a copy of any on the web and embed it. .

I am wondering how people use it. As I am not them on my hosted instance, I do not know. If you use it, please get in touch :)

Hat sich, so frage ich mich schonmal jemand aus der bubble kompetent mit dem z. B. bei auseinandergesetzt Hintergrund, der Anbieter will seinen Kunden den Zugang zu den eigenen Dokumenten, wie Rechnung etc. nur noch ausschlielich ber eine mit verseuchte App anbieten. retrt erwnscht.

EU verlangt von Online-Plattformen Gratis-Dienste ohne personalisierte Werbung

Die EU-Aufsichtsbehrden fordern groe Online-Plattformen zu einer akzeptablen Alternative ohne Datenfreigabe auf, statt nur "Zustimmen oder zahlen" anzubieten.

Mobile Network Surveillance Tracking Methods and How to Mitigate Against ThemThis list is not exhaustive by any means, but it will serve as a good introduction. I am working on a proper longform post to simplify and flesh out this topic with more detailed, actionable advice.#cybersecgirl #mobile #tracking #privacytechprohttps://techcrunch.com/2023/12/16/google-geofence-warrants-law-enforcement-privacy/FBI / Cast Cellular Analysis and Geo-Location Guide 2019 (Unclassified)https://s3.documentcloud.org/documents/21088576/march-2019-fbi-cast-cellular-analysis-geo-location-field-resource-guide.pdfMobile Network Surveillance tracking methods include:Geofencing, Geolocation Trilateration Triangulationhttps://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracyStingrays / Aerial Stingrays (Dirtboxes)https://sls.eff.org/technologies/cell-site-simulators-imsi-catchershttps://puri.sm/posts/taking-the-sting-out-of-stingray/IMSIhttps://www.kicksecure.com/wiki/MobilePhoneSecurity#InternationalMobileSubscribedIdentity(IMSI)https://www.whonix.org/wiki/SurveillanceCapabilitiesMalicious SMS Re-Routinghttps://www.kicksecure.com/wiki/MobilePhoneSecurity#MaliciousSMSRe-routingMobile Device Privacy and Securityhttps://www.kicksecure.com/wiki/MobilePhoneSecurity#TelephonyProtocolsBluetoothhttps://arxiv.org/pdf/2107.05868Airtagshttps://arstechnica.com/gadgets/2023/05/nypd-urges-citizens-to-buy-airtags-to-fight-surge-in-car-thefts/Full resources: https://buggedplanet.info/index.phptitle=MainPageSome Mitigations:Use GrapheneOS. #GrapheneOS is able to turn off Wifi and bluetooth scanning + GPS.https://i.nostr.build/Q7e6K.jpg Faraday bags, airplane mode, modem and sensor kill switches, always-on VPN. Do not autoconnect to WiFi or Bluetooth (keep off when not in use)RFID (keep off when not in use)IMEI changehttps://www.srlabs.de/blog-post/blue-merlehttps://github.com/srlabs/blue-merleBluetoothhttps://github.com/Semper-Viventem/MetaRadarAirGuardhttps://discuss.privacyguides.net/t/airguard-foss-airtag-detector/12391https://github.com/seemoo-lab/AirGuard

Link ohne

Genial, ein Sampler als Plugin verfgbar fr Linux/Mac/Windows

Part3:

Multi-factor authentication / 2FA:
- I use Authy as an authenticator app, and enable 2FA on every site that offers it. But if you only use it for your e-mail provider, that'sa major improvement.

Extra indulgence:
- I've subscribe to Incogni for one year. They will try to get your e-mail address removed with as many data brokers as possible. Unfortunately only for one e-mail address.

I think that's everything, but I'm open for other tips and tricks. Sorry for the long post.

Part 2:

Disposable e-mail addresses:
I only use my real e-mail address for truly trusted recipients. What about all others Well...
- SimpleLogin.io will allow you to create as many e-mail addresses as you like (only about 5 in a free account though). I've added my own custom domain. Added bonus is that you can see which e-mail addresses generate spam. In that case disabling the address is simple.

Secure cloud storage:
I wanted to stop using Google Drive, because, well, Google
- pCloud will let you buy (not rent) cloud space, buy once and keep using it as long as you like. pCloud is a Swiss company, so protected by strict privacy law. It also integrates nicely with Linux, WIndows or MacOS

Passwords:
- Bitwarden does this pretty well and secure. I used to use LastPass, but in the end it leaked like a sieve

Just in case you're interested, this is how I try to stay secure and private online.
(multipart)

Ads and trackers:
Malware is dangerous, trcking kills your privacy and ads are simply annoying and slow down your browsing, so:
- NextDNS will filter out most ads, malware and trackers. Aditionally, you get encrypted DNS and if necessary some extra filters like gambling or porn
- The uBlock Origin browser plugin does the same blocking, I've added it in case NextDNS misses something
- The Trace Online Tracking Protection browser plugin will prevent browser fingerprinting, this only seems to work on Linux, not on my Chromebook. Just have a peek at ...
- Don't use Chrome browser (or Edge). I'm using Firefox on Linux and Kiwi on Android. Brave browser is also quite good.

Fascinating.

"This paper proposes mSAIL, 8 8 2.6 mm and 62 mg embedded system for monarch migration tracking, constructed using 8 prior custom-designed ICs providing solar energy harvesting, an ultra-low power processor, light/temperature sensors, power management, and a wireless transceiver, all integrated and 3D stacked on a micro PCB with an 8 8 mm printed antenna."

Androids AirTag competitor gears up for launch, thanks to iOS release

A and baseband is to be considered at all times, and even if people were to tunnel everything via / that won't avoid the and "" aspect.

Ideally we'd have stuff like the & ready to , but sadly I've to still work on getting the necessary done based upon / .

Granted, the best thing one can do is to bounce public WiFis with anonymized MAC addresses...

That works okay with Tor Bridges, but won't work in like where you only have a national intranet and the only options you have to get any access is through smuggled SIMs at the Chinese and Russian Border...








portrait