I don't own a cellphone. Can this privacy-focused network change that? ~tech privacy Article 2072 words 4 votes
The leak of an internal Google database reveals thousands of potential privacy and security issues reported by employees ~tech google privacy security.cyber Article 287 words 21 votes
‘Neural network’ fake ID site goes dark after 404 Media investigation - Site creator denies illegal applications after boasting of them ~tech Link 23 votes
An instant fake ID factory - An underground website called OnlyFake is claiming to use “neural networks” to generate realistic looking photos of fake IDs for just $15 ~tech Article 294 words 25 votes
Impact: US FTC stops data broker X-Mode selling sensitive location data ~tech privacy Article 1060 words 16 votes
Marketing company claims that it actually is listening to your phone and smart speakers to target ads ~tech privacy Article 857 words 34 votes
AI cameras took over one small American town. Now they're everywhere ~tech privacy Article 1946 words 30 votes
‘Verified’ OSINT accounts are destroying the Israel-Palestine information ecosystem ~tech social media Article 1084 words 18 votes
ICE, CBP, Secret Service all illegally used US smartphone location data ~tech privacy Article 1326 words, published Oct 5 2023 30 votes
The secret weapon [leaked credit data] hackers can use to dox nearly anyone in America for $15 ~finance Article 3102 words, published Aug 22 2023 32 votes
Inside ShadowDragon, the tool that lets ICE monitor pregnancy tracking sites and Fortnite players ~tech privacy social media Article 1474 words, published Sep 18 2023 23 votes
Four former VICE Motherboard journalists founded an independent news company ~tech Article 1043 words 41 votes
Bloodied Macbooks and stacks of cash: Inside the increasingly violent Discord servers where kids flaunt their crimes ~life Article 2248 words 8 votes
UK proposes making the sale and possession of encrypted phones illegal ~tech privacy Article 10 votes
Revealed: US Military bought mass monitoring tool that includes internet browsing, email data ~tech privacy internet security.national Article 2589 words 11 votes
BMW wants to charge for heated seats. These grey market hackers will fix that. ~transport Article 1205 words 10 votes
780GB of data, tools, and source code were stolen from EA by purchasing a stolen cookie to get access to the company's Slack and social-engineering an IT Support employee ~tech security Article 75 words 21 votes
'Find this fuck:' Inside Citizen’s dangerous effort to cash in on vigilantism ~news crime Article 4586 words 12 votes
Inside Amazon’s secret program to spy on workers’ private Facebook groups ~tech privacy amazon facebook social media Article 7 votes
Hundreds arrested after European law enforcement agencies monitored over 100 million encrypted messages sent through Encrochat, a network used by criminals ~tech privacy Article 2927 words 20 votes
Inside the underground trade of pirated OnlyFans porn ~tech internet social media Article 2996 words 9 votes
Zoom iOS app sends data to Facebook even if you don’t have a Facebook account ~tech facebook ios privacy Article 667 words 10 votes
Leaked document shows how big companies buy credit card data on millions of Americans ~finance Article 1813 words, published Feb 19 2020 13 votes
Hackers are breaking directly into telecom companies to take over customer phone numbers ~tech security Article 984 words 10 votes
Ordinary Americans are using armies of phones to generate extra income for beer, diapers, and bills through ad fraud ~tech Article 2511 words 8 votes
As authoritarian governments surveil the internet, open source projects decide how to respond ~tech internet privacy Article 808 words 7 votes
China's border guards are installing malware onto the phones of travellers crossing its border ~tech Article 1358 words 8 votes
When Myspace was king, employees abused a tool called ‘overlord’ to spy on users ~tech privacy social media Article 1201 words 8 votes
Twitter has started researching whether white supremacists belong on Twitter ~tech social media Article 1187 words 21 votes
Snapchat employees abused data access to spy on users ~tech privacy social media Article 1309 words 11 votes
Compromised credentials for a Microsoft support agent enabled outside access to non-enterprise Hotmail, Outlook, and MSN emails for months ~tech security microsoft.outlook Article 683 words 9 votes
The impossible job: Inside Facebook’s struggle to moderate two billion people ~tech social media facebook Article 9455 words 14 votes