Apple Responds to Project Zero – Michael Tsai
https://mjtsai.com/blog/2019/09/06/apple-responds-to-project-zero/
https://mjtsai.com/blog/2019/09/06/apple-responds-to-project-zero/
https://www.cnbc.com/2019/09/04/youtube-to-pay-170-million-in-ftc-child-privacy-settlement.html
Google and YouTube knowingly and illegally monitored, tracked, and served targeted ads to young children just to keep advertising dollars rolling in
https://www.ft.com/content/e3e1697e-ce57-11e9-99a4-b5ded7a7fe3f
Google is secretly using hidden web pages that feed the personal data of its users to advertisers, undermining its own policies and circumventing EU privacy regulations
https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/
https://www.wired.com/story/ios-attack-watering-hole-project-zero/
the biggest known iPhone hacking incident of all time.
The hackers still made some strangely amateurish mistakes
https://daringfireball.net/linked/2019/08/26/facebook-clear-history
https://www.nytimes.com/interactive/2019/08/23/opinion/data-internet-privacy-tracking.html
This is happening every day, all the time, and the only reason we’re O.K. with it is that it’s happening behind the scenes […] If we all had pictures like this, we might revolt.
https://www.wired.com/story/hackers-steal-tesla-model-s-key-fob-encryption/
The same researchers who figured out how to clone a Tesla Model S key fob have done it again, cracking the replacement that was meant to fix the problem.
https://freedom-to-tinker.com/2019/08/23/deconstructing-googles-excuses-on-tracking-protection/
If an ad uses deeply personal information to appeal to emotional vulnerabilities or exploits psychological tendencies to generate a purchase, then that is a form of privacy violation—regardless of the technical details.
https://www.nytimes.com/2019/08/20/world/europe/denmark-cellphone-data-courts.html
some cellphone tracking data linked phones to the wrong cellphone towers
Facebook- og Twitterkontoer med opprinnelse i Kina [har] spredt og videreformidlet innhold som framstiller demonstrasjonene i Hongkong som ekstreme og voldelige.
https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/
an attacker in close proximity (WiFi), or an attacker who already hijacked our PC (USB), can also propagate to and infect our beloved cameras with malware
https://www.nytimes.com/2019/08/11/world/americas/youtube-brazil.html
YouTube’s search and recommendation system appears to have systematically diverted users to far-right and conspiracy channels in Brazil.
https://www.vice.com/en_us/article/evj4qw/these-iphone-lightning-cables-will-hack-your-computer
will give an attacker a way to remotely tap into your computer
https://www.vice.com/en_us/article/xweqbq/microsoft-contractors-listen-to-skype-calls
calls made using the app’s translation function
increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income. They also used cyberspace to launder the stolen money
https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest
the high-altitude balloons promise a cheap monitoring platform that could follow multiple cars and boats for extended periods