Catalin Cimpanu reports: Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons back to advertisers, data which contains sensitive information that state-sponsored actors can easily obtain via a subpoena. This attack model was brought to…
Category: Online
Revenge porn, cyber stalking to become crimes in Ireland
RTÉ reports: Revenge pornography and cyber stalking are set to become illegal offences, after Cabinet approved the drafting of a Non-Fatal Offences (Amendment) Bill to address loopholes in current legislation. It follows a report from the Law Reform Commission in September, which dealt with harmful communications and digital safety. Read more on RTÉ.
Study finds Pakistan’s telecom firms’ privacy, data protection policies inadequate
Ikram Junaidi reports: The privacy policies of telecommunications providers in Pakistan are inconsistent, lack adequate oversight and updates and are not always readily available to the public, research has found. The Digital Rights Foundation (DRF) on Friday released a report on ‘Telecoms Privacy and Data Protection Policies in Pakistan’, in which the NGO studied the…
Assaults on privacy in America
Jonathan Shaw writes: Do people behave differently when they think they are being watched? When former National Security Agency contractor Edward Snowden revealed the mass surveillance of American citizens in June 2013, the question suddenly grew in importance. Can the behavior of an entire population, even in a modern democracy, be changed by awareness of…