(1 February 2023)
The proposed Chat control EU law will not only seize totalitarian control of all private communication. It will also ban open source operating systems as an unintended consequence.
(1 February 2023)
The proposed Chat control EU law will not only seize totalitarian control of all private communication. It will also ban open source operating systems as an unintended consequence.
Privacy-focused RSS feed readers to help you stay up-to-date while preserving your privacy. Get the latest news and stories without compromising your personal information.
(Mar 27, 2021)
In the short term, Europe may be able to shrug off the illegality of its data-sharing practices under the GDPR, and please privacy advocates with adequacy reviews, but in the long term the violation of Europe’s own data privacy crownpiece is sure to harm its international credibility.
Dass besagte Section 702 verlängert wird, steht kaum außer Frage.
(14.06.2023)
In a joint written testimony from the Biden administration witnesses, the NSA, FBI and CIA all cited Section 702’s usefulness for cybersecurity.
(13.06.2023)
Officials from U.S. intelligence agencies backed reauthorization of Section 702 of the Foreign Intelligence Surveillance Act ahead of a U.S. Senate subcommittee hearing Tuesday. One official characterized a potential lapse or „unusable“ modifications to Section 702 as „grave national security risks.“ The support for full reauthorization came as 21 advocacy groups joined on a letter urging reform of Section 702. Meanwhile, the Office of the Director of National Intelligence issued a report regarding purchases of commercially available personal information by the U.S. intelligence community.
„Der Regierung wäre es nie erlaubt worden, Milliarden Menschen dazu zu verpflichten, jederzeit Geräte zur Standortüberwachung bei sich zu haben, ihre sozialen Interaktionen aufzuzeichnen oder lückenlose Aufzeichnungen ihrer Lesegewohnheiten vorzuhalten“, fasst das Office of the Director of National Intelligence zusammen. Doch Smartphones, vernetzte Fahrzeugen, Webtracking, das Internet der Dinge und „andere Innovationen“ hätten die gleichen Folgen, ohne dass die Regierung etwas tun müsse.
Die Art und Weise, wie US-Geheimdienste Daten aus verbundenen Fahrzeugen, Webbrowser-Aktivitäten und Smartphones sammeln und nutzen, steht zunehmend im Fokus. Dabei besteht die Gefahr, dass die unregulierte Verbreitung und der Verkauf von privaten Informationen amerikanischer Bürgerinnen und Bürger deren Privatsphäre bedroht. Der Bericht wurde vom Büro des Direktors der nationalen Geheimdienste (ODNI) veröffentlicht.
(27 January 2022, approved for release by ODNI on 5 June 2023)
(U) EXECUTIVE SUMMARY
(U) There is today a large and growing amount of what the U.S. Intelligence Community (IC) refers to as “Commercially Available Information” (CAI). As the acronym indicates, and as we use the term in this report, CAI is information that is available commercially to the general public, and as such, is a subset of publicly available information (PAI). We do not use the term CAI to include, and we do not address in this report, commercial information that is available exclusively to governments. The volume and sensitivity of CAI have expanded in recent years mainly due to the advancement of digital technology, including location-tracking and other features of smartphones and other electronic devices, and the advertising-based monetization models that underlie many commercial offerings available on the Internet. Although CAI may be “anonymized,” it is often possible (using other CAI) to deanonymize and identify individuals, including U.S. persons.
(…)
Today, in a way that far fewer Americans seem to understand, and even fewer of them can avoid, CAI includes information on nearly everyone that is of a type and level of sensitivity that historically could have been obtained, if at all, only through targeted (and predicated) collection, and that could be used to cause harm to an individual’s reputation, emotional well-being, or physical safety.
(…)
(U) A May 2014 report from the Federal Trade Commission (FTC) provides a similar account:
(U) Data brokers collect data from commercial, government, and other publicly available sources. Data collected could include bankruptcy information, voting registration, consumer purchase data, web browsing activities, warranty registrations, and other details of consumers’ everyday interactions.
(…)
1.3. (U) Examples of CAI. We do not attempt a comprehensive description of the scope and scale of data that are available as CAI, or the relevant markets, in part because they are so large and so dynamic. However, a few examples of CAI offerings will illustrate the current nature of available offerings:
• (U) “Thomson Reuters CLEAR is powered by billions of data points and leverages cutting-edge public records technology to bring all key content together in a customizable dashboard.”
• (U) LexisNexis offers more than “84B records from 10,000+ sources, including alternative data that helps surface more of the 63M unbanked/underbanked U.S. adults.”
• (U) Exactis has “over 3.5 billion records (updated monthly)” in its “universal data warehouse.”
• (U) PeekYou “collects and combines scattered content from social sites, news sources, homepages, and blog platforms to present comprehensive online identities.”
(…)
As the FTC explained in its May 2014 report:
(U) Data brokers rely on websites with registration features and cookies to find consumers online and target Internet advertisements to them based on their offline activities. Once a data broker locates a consumer online and places a cookie on the consumer’s browser, the data broker’s client can advertise to that consumer across the Internet for as long as the cookie stays on the consumer’s browser. Consumers may not be aware that data brokers are providing companies with products to allow them to advertise to consumers online based on their offline activities. Some data brokers are using similar technology to serve targeted advertisements to consumers on mobile devices.
(…)
2.2. (U) Examples of CAI Contracts. The IC currently acquires a large amount of CAI. Unclassified IC and other contracts for CAI can be found at Sam.Gov, a U.S. government website that allows searching by agency or sub-agency and by keywords, among other things. By way of example only, this website shows that the following agencies have, have had, have considered, or are considering the following contracts or proposals related to CAI:
• (U) The Federal Bureau of Investigation (FBI) with ZeroFox for social media alerting (15F06721P0002431)
• (censored)
• U) The Defense Intelligence Agency (DIA) for social media reports on individuals who are seeking a security clearance (HHM402-16-SM-CHECKS), and with LexisNexis for “retrieval of comprehensive on-line search results related to commercial due diligence from a maximum number of sources (news, company, public records, legal, regulatory financial, and industry information),” among other things (HHM402-21-Q-0094)
• (U) The U.S. Navy with Sayari Analytics, Inc. for access to its database that “contains tens of thousands of previously-unidentified specific nodes, facilities and key people related to US sanctioned actors including ‘2+3’ threats to national security” (N0001518PR11212)
• (U) Various offices within the Treasury Department for access to Banker’s Almanac (RFQ-FIN-55100-21-0010)
• (U) The Department of Defense (DOD) for access to Jane’s online (W31P4Q17T0009)
• (U) The Coast Guard with Babel Street for “Open Source Data Collection, Translation, Analysis Application” (70Z08419QVA044).
(U) In addition, DIA has provided the following information about a CAI contract in an unclassified and publicly-available paper sent to Congress on January 15, 2021:
(U) DIA currently provides funding to another agency that purchases commercially available geolocation metadata aggregated from smartphones.
……………………………………
The report was completed in January 2022 but only recently declassified. Democratic Sen. Ron Wyden of Oregon asked the ODNI for the report.
“Congress needs to pass legislation to put guardrails around government purchases, to rein in private companies that collect and sell this data, and keep Americans’ personal information out of the hands of our adversaries,” Wyden said in a statement Monday in response to the report.
(today)
FRITZ!Box 6690/ 09-Jun-2022 11:39
FRITZ!Box 6690 Cable/ 09-Jun-2022 11:45
beta/ 25-Mar-2019 13:41
fritzbox-3272/ 08-Nov-2017 12:28
fritzbox-3490/ 17-Nov-2017 14:33
fritzbox-4020/ 20-Nov-2017 11:54
fritzbox-4040/ 20-Nov-2017 11:54
(…)
(10. Sep. 2020)
Darüber laden Sie sich auf der AVM-Seite die Update-Dateien für Ihr Fritz!Box-Modell herunter. Dann melden Sie sich an der Fitz!Box an und klicken auf System > Update.
(August 15, 2022)
The Five Eyes (FVEY) surveillance alliance includes the following countries:
– Australia
– Canada
– New Zealand
– United Kingdom
– United States
(…)
The Nine Eyes countries include:
– 5 Eyes countries +
– Denmark
– France
– Netherlands
– Norway
(…)
The 14 Eyes surveillance countries include:
– 9 Eyes countries +
– Germany
– Belgium
– Italy
– Sweden
– Spain
(Mar 27, 2021)
In the short term, Europe may be able to shrug off the illegality of its data-sharing practices under the GDPR, and please privacy advocates with adequacy reviews, but in the long term the violation of Europe’s own data privacy crownpiece is sure to harm its international credibility.
(August 15, 2022)
The Five Eyes (FVEY) surveillance alliance includes the following countries:
– Australia
– Canada
– New Zealand
– United Kingdom
– United States
(…)
The Nine Eyes countries include:
– 5 Eyes countries +
– Denmark
– France
– Netherlands
– Norway
(…)
The 14 Eyes surveillance countries include:
– 9 Eyes countries +
– Germany
– Belgium
– Italy
– Sweden
– Spain
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
(August 15, 2022)
The Five Eyes (FVEY) surveillance alliance includes the following countries:
– Australia
– Canada
– New Zealand
– United Kingdom
– United States
(…)
The Nine Eyes countries include:
– 5 Eyes countries +
– Denmark
– France
– Netherlands
– Norway
(…)
The 14 Eyes surveillance countries include:
– 9 Eyes countries +
– Germany
– Belgium
– Italy
– Sweden
– Spain
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
As mentioned before, it’s impossible to make a router impervious to attacks. However, some simple protection methods will work as a deterrent, making the process complicated enough for most hackers to give up due to a skewed risk-reward ratio and time investment requirement.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
Tragen Sie die Adressen der Internetseiten, deren Aufruf Sie verbieten bzw. erlauben wollen, in der jeweiligen Filterliste ein:
1. Klicken Sie in der Benutzeroberfläche der FRITZ!Box auf „Internet“.
2. Klicken Sie im Menü „Internet“ auf „Filter“.
3. Klicken Sie auf die Registerkarte „Listen“.
4. Klicken Sie neben der benötigten Liste auf den Link „bearbeiten“.
5. Tragen Sie die Internetadressen ohne Präfix wie http, https oder www in das Eingabefeld ein. Drücken Sie nach Eingabe jeder Adresse die Leertaste.
Beispiel:
poker.com xxx.com aggro.tv
Klicken Sie zum Speichern der Liste auf „Übernehmen“.
Jetzt sind die Filterlisten eingerichtet.
Dieses FRITZ! Labor enthält neue Funktionen frisch aus der Entwicklung und erlaubt heute schon einen Ausblick auf zukünftige FRITZ!OS-Funktionen des nächsten großen Updates.
Internet:
NEU IP-Sperrliste für einkommende Pakete
The page shows the SSL/TLS capabilities of your web browser, determines supported TLS protocols and cipher suites and marks if any of them are weak or insecure, displays a list of supported TLS extensions and key exchange groups
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
Pretending to be a different browser can be useful in a number of different situations:
– Some web pages require you to log in or buy a subscription to view their content, but give full read access to search engines.
– Some web pages determine whether you‘re using a mobile or desktop browser based on your user-agent.
– Some web pages require you to use a specific browser to access their site.
– And potentially more…
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………
It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.
BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.
TouchVPN is is available for all devices. Sign up, install, and press connect.
It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.
BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Device Type / Model:
Operating System:
True Operating System Core:
Browser:
True Browser Core:
Browser Build Number / Identifier:
IP Address (WAN)
Tor Relay IP Address:
VPN IP Address:
Proxy IP Address:
Hostname:
Location:
Country:
Region:
City:
Latitude & Longitude:
Geolocation:
……………………………