PrivacyGroup: Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
mNo edit summary
(Add Netherlands, Denmark banning Google products for education)
Line 14: Line 14:
[[File:Calvin-messing-with-data-2.jpg|size=400px|frame|An early insight from Calvin. [[Calvin_messing_with_data|Click for the rest]] ]]
[[File:Calvin-messing-with-data-2.jpg|size=400px|frame|An early insight from Calvin. [[Calvin_messing_with_data|Click for the rest]] ]]


* [https://www.technologyreview.com/2022/05/24/1052653/clearview-ai-data-privacy-uk/ UK joins Italy in large fine of Clearview AI] - In addition to Italy, "[a]uthorities in Australia, Canada, France, and Germany have reached similar conclusions" about Clearview's privacy violations. The UK's information commission worked with its Australian counterpart for the investigation.  
* [https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/ Netherlands bans the use of current versions of Google's email and cloud services in the education sector]. Denmark has [https://tutanota.com/blog/posts/denmark-bans-google-email-and-cloud-services-due-to-privacy-concerns/ done the same], expressing "serious criticism and banning Google Workspace." Perhaps it is time for a more [https://yewtu.be/watch?v=pXFslDTSy-k user-operated Internet] for education. <span style="color:red">NEW</span>
* [https://www.technologyreview.com/2022/05/24/1052653/clearview-ai-data-privacy-uk/ UK joins Italy in large fine of Clearview AI] - In addition to Italy, "[a]uthorities in Australia, Canada, France, and Germany have reached similar conclusions" about Clearview's privacy violations. The UK's information commission worked with its Australian counterpart for the investigation.
* [https://www.euractiv.com/section/data-protection/news/leak-commission-to-force-scanning-of-communications-to-combat-child-pornography/ Leak shows new Chatcontrol in the EU to include generalized scanning obligation to read every person's private texts] - The consequences of mistakes by suspicionless monitoring like this, whether automated or not, are different from the consequences of investigations that require some standard to be met (as current approaches to the problem do).
* [https://www.euractiv.com/section/data-protection/news/leak-commission-to-force-scanning-of-communications-to-combat-child-pornography/ Leak shows new Chatcontrol in the EU to include generalized scanning obligation to read every person's private texts] - The consequences of mistakes by suspicionless monitoring like this, whether automated or not, are different from the consequences of investigations that require some standard to be met (as current approaches to the problem do).
* [https://theintercept.com/2022/04/22/anomaly-six-phone-tracking-zignal-surveillance-cia-nsa/ Contractor claims it can track 3 billion phones in real time]
* [https://theintercept.com/2022/04/22/anomaly-six-phone-tracking-zignal-surveillance-cia-nsa/ Contractor claims it can track 3 billion phones in real time]
Line 51: Line 52:
* [https://motherboard.vice.com/en_us/article/53ddwb/uber-knows-too-much-about-you Uber tracked taxi drivers who went to protests, and fired them]
* [https://motherboard.vice.com/en_us/article/53ddwb/uber-knows-too-much-about-you Uber tracked taxi drivers who went to protests, and fired them]
* [https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/ Remote code execution vulnerability found in Zoom] - Affects the app, not web-based access. Zoom is [https://gist.github.com/dacruz21/dd2480f195f5b48a9ab7af8b41c21404 considered harmful].
* [https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/ Remote code execution vulnerability found in Zoom] - Affects the app, not web-based access. Zoom is [https://gist.github.com/dacruz21/dd2480f195f5b48a9ab7af8b41c21404 considered harmful].
* [[Media:google-data-collection.png|Google apps' data collection is embarrassing to them]] - Quietly collecting this much on users' every move works better than doing so openly, so they fought Apple's demand for transparency.
* [[Media:Google-data-collection.png|Google apps' data collection is embarrassing to them]] - Quietly collecting this much on users' every move works better than doing so openly, so they fought Apple's demand for transparency.
* [https://nitter.net/Ammir/status/1353644795139411970 Signal blocked at the ISP level by Iran] - Centralization is a design weakness, and Signal defends its centralization aggressively. Consider Briar, deltachat, or Matrix chat (which combines many services) instead.
* [https://nitter.net/Ammir/status/1353644795139411970 Signal blocked at the ISP level by Iran] - Centralization is a design weakness, and Signal defends its centralization aggressively. Consider Briar, deltachat, or Matrix chat (which combines many services) instead.
* [[Media:ua-privacy-policy.png|University of Arizona Privacy Statement page is rife with trackers]] - Report a concern [https://privacy.arizona.edu/report here]
* [[Media:Ua-privacy-policy.png|University of Arizona Privacy Statement page is rife with trackers]] - Report a concern [https://privacy.arizona.edu/report here]
* [https://tucson.com/news/local/police-have-right-to-a-suspects-internet-info-without-a-warrant-arizona-supreme-court-rules/article_a15d6061-c993-5dcd-869c-94179759a89e.html AZ Supreme Ct. rules Internet users have no reasonable expectation of privacy for the information available to their ISPs] - No warrant required means the risk to privacy for ordinary, innocent people increases. Fitting a pattern, a case about child exploitation is leveraged for wide impact. See tips below on using Tor or VPNs to secure your information from your ISP.
* [https://tucson.com/news/local/police-have-right-to-a-suspects-internet-info-without-a-warrant-arizona-supreme-court-rules/article_a15d6061-c993-5dcd-869c-94179759a89e.html AZ Supreme Ct. rules Internet users have no reasonable expectation of privacy for the information available to their ISPs] - No warrant required means the risk to privacy for ordinary, innocent people increases. Fitting a pattern, a case about child exploitation is leveraged for wide impact. See tips below on using Tor or VPNs to secure your information from your ISP.
* [https://apnews.com/article/technology-richmond-virginia-courts-a7962e1893efa9b34b26c972282afb4c 4th Circuit Ct of Appeals to take up challenge to use of Military Wide-Area Persistent Surveillance  technology in Baltimore] - Increasing use of [https://en.wikipedia.org/wiki/Wide-area_motion_imagery WAPS] is mentioned below multiple times; this is part of a history.
* [https://apnews.com/article/technology-richmond-virginia-courts-a7962e1893efa9b34b26c972282afb4c 4th Circuit Ct of Appeals to take up challenge to use of Military Wide-Area Persistent Surveillance  technology in Baltimore] - Increasing use of [https://en.wikipedia.org/wiki/Wide-area_motion_imagery WAPS] is mentioned below multiple times; this is part of a history.
* [https://arstechnica.com/?p=1733317 WhatsApp pulls a switcheroo] - Facebook (owner of WhatsApp) now gets your phone number, among other things.
* [https://arstechnica.com/?p=1733317 WhatsApp pulls a switcheroo] - Facebook (owner of WhatsApp) now gets your phone number, among other things.
* [[Media:tucson-ring-2-dec.png|Police Departments around Tucson now do have agreements with Ring]] - See below for earlier news on this. An up to date record of police requests for video from private users of Ring doorbells [https://www.google.com/maps/d/embed?mid=1eYVDPh5itXq5acDT9b0BVeQwmESBa4cB&ll=32.849272345586925%2C-111.81079804113006&z=8 here]
* [[Media:Tucson-ring-2-dec.png|Police Departments around Tucson now do have agreements with Ring]] - See below for earlier news on this. An up to date record of police requests for video from private users of Ring doorbells [https://www.google.com/maps/d/embed?mid=1eYVDPh5itXq5acDT9b0BVeQwmESBa4cB&ll=32.849272345586925%2C-111.81079804113006&z=8 here]
* [https://manuals.info.apple.com/MANUALS/1000/MA1976/en_US/device-and-data-access-when-personal-safety-is-at-risk.pdf Apple's official guide to avoiding abuse of iOS features] - Addresses problems of stalking, IPV, and other cases where personal safety is at risk.
* [https://manuals.info.apple.com/MANUALS/1000/MA1976/en_US/device-and-data-access-when-personal-safety-is-at-risk.pdf Apple's official guide to avoiding abuse of iOS features] - Addresses problems of stalking, IPV, and other cases where personal safety is at risk.
* [https://blog.mozilla.org/blog/2020/10/20/mozilla-reaction-to-u-s-v-google/ Mozilla argues against antitrust Google case] - Not mentioned, but by now well-known: Mozilla gets the lion's share of its funding from an arrangement to have Google as the default search engine in Firefox.
* [https://blog.mozilla.org/blog/2020/10/20/mozilla-reaction-to-u-s-v-google/ Mozilla argues against antitrust Google case] - Not mentioned, but by now well-known: Mozilla gets the lion's share of its funding from an arrangement to have Google as the default search engine in Firefox.
Line 112: Line 113:
* [http://motherboard.vice.com/read/warrant-canary-for-activist-email-service-riseup-seemingly-expires <b>Riseup warrant canary expires, Riseup is alerted, but the canary is not updated.</b>]  
* [http://motherboard.vice.com/read/warrant-canary-for-activist-email-service-riseup-seemingly-expires <b>Riseup warrant canary expires, Riseup is alerted, but the canary is not updated.</b>]  
* [http://www.reuters.com/article/us-usa-cyber-congress-idUSKBN13P2ER FBI now can compromise computers outside the jurisdiction of the court issuing the warrant, including overseas.]   
* [http://www.reuters.com/article/us-usa-cyber-congress-idUSKBN13P2ER FBI now can compromise computers outside the jurisdiction of the court issuing the warrant, including overseas.]   
* Trump pick for CIA head, Mike Pompeo, [[Media:pompeo_surveillance.pdf|says in the Wall Street Journal]] that "the use of strong encryption in personal communications may itself be a red flag" that a person is a terrorist.
* Trump pick for CIA head, Mike Pompeo, [[Media:Pompeo surveillance.pdf|says in the Wall Street Journal]] that "the use of strong encryption in personal communications may itself be a red flag" that a person is a terrorist.
* [https://www.theguardian.com/world/2016/nov/19/extreme-surveillance-becomes-uk-law-with-barely-a-whimper Extreme surevillance via "Snooper's Charter" is now law in the UK]. Among other things, requires internet providers to log websites that their customers connect to.  
* [https://www.theguardian.com/world/2016/nov/19/extreme-surveillance-becomes-uk-law-with-barely-a-whimper Extreme surevillance via "Snooper's Charter" is now law in the UK]. Among other things, requires internet providers to log websites that their customers connect to.  
* [http://www.theverge.com/2016/10/27/13428976/fcc-passes-isp-privacy-rules FCC requires customer opt-in for ISPs to share "sensitive data", opt-out for "other" data. Previously there was no regulation)]
* [http://www.theverge.com/2016/10/27/13428976/fcc-passes-isp-privacy-rules FCC requires customer opt-in for ISPs to share "sensitive data", opt-out for "other" data. Previously there was no regulation)]
Line 121: Line 122:
* [https://www.justsecurity.org/28386/omnicisa-pits-government-against-self-privacy/ Cybersecurity Sharing Act added at the last minute to a 2K page omnibus spending bill]
* [https://www.justsecurity.org/28386/omnicisa-pits-government-against-self-privacy/ Cybersecurity Sharing Act added at the last minute to a 2K page omnibus spending bill]
* [http://www.theatlantic.com/politics/archive/2015/05/mystery-planes-in-the-skies-above-baltimore/392627/ police and drone use in Baltimore]
* [http://www.theatlantic.com/politics/archive/2015/05/mystery-planes-in-the-skies-above-baltimore/392627/ police and drone use in Baltimore]
* [[Media:UN_Report_on_Encryption_as_right.odt| U.N. Report on Encryption as a right.]] "... [T]he present report examines two linked questions. First, do the rights to privacy and freedom of opinion and expression protect secure online communication, specifically by encryption or anonymity? And, second, assuming an affirmative answer, to what extent may Governments, in accordance with human rights law, impose restrictions on encryption and anonymity?"
* [[Media:UN Report on Encryption as right.odt| U.N. Report on Encryption as a right.]] "... [T]he present report examines two linked questions. First, do the rights to privacy and freedom of opinion and expression protect secure online communication, specifically by encryption or anonymity? And, second, assuming an affirmative answer, to what extent may Governments, in accordance with human rights law, impose restrictions on encryption and anonymity?"
* [http://www.wired.com/2015/07/googles-ad-system-become-big-control/ CMU study supports that Google cannot police abuse of its ad system, resulting in violation of privacy]
* [http://www.wired.com/2015/07/googles-ad-system-become-big-control/ CMU study supports that Google cannot police abuse of its ad system, resulting in violation of privacy]
* CEO of Hacking Team [http://www.businessinsider.com/interview-with-hacking-team-ceo-david-vincenzetti-2015-7?r=UK&IR=T interviewed on BusinessInsider]
* CEO of Hacking Team [http://www.businessinsider.com/interview-with-hacking-team-ceo-david-vincenzetti-2015-7?r=UK&IR=T interviewed on BusinessInsider]
Line 232: Line 233:


== Why care about privacy? ==
== Why care about privacy? ==
* [[media:cybercrime_class__privacy.pdf|Little talk on privacy that David gave to a class here at the University of Arizona]]
* [[Media:Cybercrime class privacy.pdf|Little talk on privacy that David gave to a class here at the University of Arizona]]
* [[media:Sidi_privacy_and_data_quality.ogv|5 min recorded presentation David gave to local businesses on why they should care about privacy]]
* [[Media:Sidi privacy and data quality.ogv|5 min recorded presentation David gave to local businesses on why they should care about privacy]]
* [https://donottrack-doc.com/en/episode/1 DoNotTrack documentary]
* [https://donottrack-doc.com/en/episode/1 DoNotTrack documentary]
* [https://www.youtube.com/watch?v=pcSlowAhvUk Why privacy matters]
* [https://www.youtube.com/watch?v=pcSlowAhvUk Why privacy matters]
Line 267: Line 268:
* [https://www.youtube.com/watch?v=n8WVo-YLyAg Social media information given at the border accessible via very insecure PSN] -- Video from latest CCC shows the terrible security of airline travel information. In the QA (but the whole video is very interesting) it is said that social media information gathered at the border for travellers to the US on visitor visas is linked to PSNs, which are horribly insecure. UPDATE (16 Jan.) -- A [https://www.safetydetective.com/blog/major-security-breach-discovered-affecting-nearly-half-of-all-airline-travelers-worldwide/ big breach] at Amadeus.
* [https://www.youtube.com/watch?v=n8WVo-YLyAg Social media information given at the border accessible via very insecure PSN] -- Video from latest CCC shows the terrible security of airline travel information. In the QA (but the whole video is very interesting) it is said that social media information gathered at the border for travellers to the US on visitor visas is linked to PSNs, which are horribly insecure. UPDATE (16 Jan.) -- A [https://www.safetydetective.com/blog/major-security-breach-discovered-affecting-nearly-half-of-all-airline-travelers-worldwide/ big breach] at Amadeus.
* A series of privacy talks recently ended at The University of Arizona. UPDATE: you may need to download the files and play them locally, if your browser complains about playing them. Cached copies of  
* A series of privacy talks recently ended at The University of Arizona. UPDATE: you may need to download the files and play them locally, if your browser complains about playing them. Cached copies of  
** [[Media:health.m4a|Privacy and Health]] ([[health_conversation|comments here]]),  
** [[Media:Health.m4a|Privacy and Health]] ([[health_conversation|comments here]]),  
** [[Media:media.m4a|Privacy and the Media]] ([[media_conversation| comments here]]), and  
** [[Media:Media.m4a|Privacy and the Media]] ([[media_conversation| comments here]]), and  
** [[Media:corporations.m4a|Privacy and Commercial Data Collection]] ([[corporation_data_collection_conversation|comments here]]).
** [[Media:Corporations.m4a|Privacy and Commercial Data Collection]] ([[corporation_data_collection_conversation|comments here]]).
* [[media:Snowden_startpage.m4a|Snowden talked in a startpage.com-hosted interview in the Netherlands about privacy after the election of Trump in the U.S.; his pardon]] Mirrored here locally, so you can jump around the video (originally live-broadcast)
* [[Media:Snowden startpage.m4a|Snowden talked in a startpage.com-hosted interview in the Netherlands about privacy after the election of Trump in the U.S.; his pardon]] Mirrored here locally, so you can jump around the video (originally live-broadcast)
* [[media:Snowden_at_ua.ogg|Edward Snowden came to the UA to talk privacy with Glen Greenwald and Noam Chomsky.]] I mirrored the video, originally available only via flash. This is audio only.  
* [[Media:Snowden at ua.ogg|Edward Snowden came to the UA to talk privacy with Glen Greenwald and Noam Chomsky.]] I mirrored the video, originally available only via flash. This is audio only.  
* [[media:Snowden_on_vice.mp4|Edward Snowden discusses removing mounted microphones and cameras from cellphones, excesses of U.S. intelligence]]
* [[Media:Snowden on vice.mp4|Edward Snowden discusses removing mounted microphones and cameras from cellphones, excesses of U.S. intelligence]]


==Miscellaneous==
==Miscellaneous==

Revision as of 22:12, 26 July 2022

This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!

Hooray! 100K 275K 300K 350K 400K450K views

Calendar

Events in this calendar are to privacy-related events. Click an event for more details, and links. <EventCalendar> namespace = PrivacyGroup_Event aspectratio = 1.35 </EventCalendar>

News

An early insight from Calvin. Click for the rest

WYDEN: "Would you agree to inform Americans about any circumstances in which the Intelligence Community purchases their data, and the legal basis for doing it?"

HAINES: "...I would try to publicize essentially a framework that helps people understand the circumstances under which we do that, and the legal basis that we do that under."

Wyden's activities since the hearing reflect that Haines's answer to the question about transparency in this area was basically "no." It is unclear whether the framework Haines mentions is in the 2021 SIGINT annex to the DoD Manual S-5240.01-A, since that document is redacted.

Tools help

People often tell me they are unsure about which privacy-enhancing technologies to use, and how to set them up. Here are some suggestions.

secure hardware elements

operating systems

  • Qubes ...OK, not an OS... (also here is a brief description of getting wireless networking working)
  • Tails
  • OpenBSD - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
  • Debian:
    • the machine-id is a more stable identifier than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though (and can be done without the "unpredictable consequences" mentioned without explanation in the link)! Follow these instructions. Devuan, a systemd-free fork of Debian, patched this. The instructions here assume systemd).

censorship resistance

  • Psiphon - I don't know how good this is yet. Here's a contributor talking about it at a previous CCC.

anonymous browsing

browsers

  • Tor Browser for everyday Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.
    • Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it here, (check under "Protocol Details" to see if "Sessions tickets" is yes.)
    • A fun and useful thing to do is build your own browser to scratch your own itch. For example, if you don't like some CAs after the DarkMatter fiasco, you might rip them out (just saying). It's unfortunately kind of annoying to figure out how to do it, but fortunately I've already done that: see here.
  • Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!
  • Why not Chrome/Chromium? -- It does have a sandbox, but it is also the most privacy invasive browser (of the major ones). Also Google controls the extensions for it, and they are sometimes unjust.

browser tools

these all work with Tor Browser, Icecat, or (vanilla) Firefox.

  • Firefox extension spoofing Google's FLoC! - FLoC's cohort IDs can be correlated to identify users. Rather than having server operators send an opt-out header, do your part as a user and send a random ID! (Note: Requires resetting the User-Agent to Chromium).
  • Try blackhole-ing tracking domains with this handy list, formatted for ready inclusion in your /etc/hosts file from the trackers listed in the Exodus ETIP (shoutout to the Yale Privacy Project contributions). Now visit a site and watch the 0B transfers flow.
  • Random Agent Spoofer (blocks a variety of fingerprinting attacks)
  • RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
  • NoScript
  • PrivacyBadger (EFF)
  • Self-Destructing Cookies
  • HTTPS Everywhere (EFF)
  • BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache)
  • decentraleyes - runs CDN scripts locally, rather than using remote CDNs (which is trackable)
  • Privacy Settings (the plugin) -- Gives quick access to useful privacy settings in the browser, with toggle switches.
  • Update Scanner -- Useful for watching privacy policies for changes (since that is your obligation, as a continuing user of the site. Often such changes are not highlighted; only a new version is posted).

testing for problems

facial recognition

chat

  • Matrix combines a zillion services into one - Not just more private, but more convenient. IRC, Slack, Signal, SMS, WhatsApp, Mastodon, Twitter, Discord, Tox, iMessage, and many more. Contact me if you'd like to use my instance, which supports many bridges.
  • OTR is not a great idea - OTR became well known after a few high-profile uses, but nowadays it's not a great idea. Biggest problem is forward secrecy, especially since quantum computing is not a question of if, but when. I disagree with one of the article's alternatives, Signal, since it's centralized and coerce-able, but some OMEMO implementations are OK (more on that soon).

other tools

  • Standard SKS servers for PGP keys are broken, use Hagrid servers instead - A good one to use to keep your keys up to date (see parcimonie, below) is keys.openpgp.org.
  • Security freeze for great good -- Prevent not just identity theft, but resale of your data by the Credit Reporting Agencies with a security freeze.
  • Keep your PGP keys up to date, privately -- Parcimonie updates your keyring over tor (catching revocations and expirations), at random intervals. It leaves open a connection to tor for a long time, so you may want to run it as a cron job and kill it after some interval.
  • anonymize scanned printouts from printers using tracking dots. From TUD, where lots of useful privacy tools have been created (kudos)
  • Protecting against baseband firmware backdoors, and provider backdoors-- A little outdated, but still full of good stuff. This is a comprehensive approach; for specific tools see below. EDIT: RIP Copperhead OS.
  • Silence SMS/MMS. Recommended -- Mark Zuckerberg says: "many people use Messenger on Android to send and receive SMS texts. Those texts can't be end-to-end encrypted because the SMS protocol is not encrypted." Well, I guess I wouldn't expect much understanding of privacy tech from Mr. Zuckerberg.
  • Noise is just like Signal, but without the hard dependency on Google Play Store. It is therefore better! But Silence is better still...
  • Get an RSS feed reader to keep up to date on privacy-related sites. For example *cough* subscribe to the PrivacyGroup's feed (It's good to use a secure RSS reader. For mobile there is Courier from The Guardian Project).
  • Youtube-dl -- Downloads a variety of streaming formats -- not just for youtube! Can be used with torify (see below) to anonymously view streaming video/audio that otherwise compromises privacy (e.g., flash). Note the version in packages is often not up to date--install the latest with pip to get a version that actually works.
  • Torify -- A SOCKS proxy to the Tor network, and a wrapper to use it, so you can e.g. look up GPG keys, or perform WHOIS queries, anonymously.
  • Get a GPG key
  • installing the latest GPG
  • Get a Gnuk token! -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself
  • secure SSH

Other Sites with Tools for Protecting Your Digital Rights

Tools for Making Consent to Privacy Policies More Informed

Why care about privacy?

Anonymity

Giving up privacy

How universities can help

Videos

Miscellaneous

Privacy theme music!