Privacy News
Navigate the complex landscape of digital privacy, surveillance architecture, and data protection legislation. We cover major shifts in GDPR compliance, tech industry data harvesting practices, and the ongoing struggle between consumer anonymity and mass data collection.

Claude Desktop - Privacy Concerns Over Browser Access Settings
Claude Desktop is changing browser settings without user consent, raising serious privacy concerns. This could lead to regulatory scrutiny and loss of user trust. Experts warn this violates EU privacy laws.
Satoshi Nakamoto - Is Adam Back Really the Creator?
A New York Times article suggests Adam Back might be Bitcoin's creator, Satoshi Nakamoto. This claim raises important questions about identity and privacy in the crypto world. The discussion highlights the risks associated with revealing the identity of influential figures in cryptocurrency.

Elon Musk - Fails to Appear for French Police Questioning
Elon Musk missed a police interview regarding AI-generated sexual images on X. The investigation follows serious allegations of distributing child sexual abuse material. This case highlights the need for compliance with French laws and the responsibilities of tech platforms.

Notion Pages Expose Editors' Profile Photos and Emails
Notion is facing scrutiny after public pages leaked editors' personal information, including emails and profile photos. This raises serious privacy concerns for users. Organizations should act quickly to protect sensitive data.

Two-Factor Authentication - Enhancing Physical Security
Threat actors are now bypassing security systems outside IT. Implementing two-factor authentication can provide an essential extra layer of protection in physical spaces.

Push Notifications - How They Can Compromise Your Privacy
Push notifications can expose sensitive user information, raising serious privacy concerns. Apple and Google must enhance their protections to safeguard user data from law enforcement access.

Fiverr Privacy Incident - User Data Leaked to Google Indexing
Fiverr is facing a significant privacy incident after researchers discovered that sensitive user files, including tax forms and identification documents, were publicly accessible due to a misconfiguration with their third-party file storage service, Cloudinary.

Madison Square Garden's Surveillance - Tracking Controversies Exposed
Madison Square Garden's surveillance practices have sparked outrage. Under Jim Dolan, fans and critics are tracked using invasive technology. This raises serious privacy concerns for attendees and the public.

Apple AirTag - Replay Attack Misleads Location Tracking
A new study reveals that Apple AirTags can be tricked into showing false locations through replayed Bluetooth signals. This vulnerability poses significant privacy risks for users. Apple needs to address this flaw to ensure user safety.
Oklahoma and Alabama Enact Weak Privacy Laws for Consumers
Oklahoma and Alabama have enacted new privacy laws that lack meaningful protections for consumers. These laws mirror those in Virginia, raising concerns about data safety. Advocates are calling for stronger measures to safeguard personal information.

Wi-Fi Roaming Security - Best Practices for Providers
New guidelines for Wi-Fi roaming security have been released, focusing on authentication and encryption practices. These measures aim to protect user data across networks. Implementing these best practices is essential for enhancing security in public Wi-Fi environments.

Data Privacy for CISOs - Building a Privacy-First Strategy
CISOs can enhance data privacy with a privacy-first strategy. This guide covers data mapping, AI risks, and compliance tools. Protect sensitive data effectively.

EFF Calls on Kuwait to Release Journalist Ahmed Shihab-Eldin
The EFF is demanding the release of journalist Ahmed Shihab-Eldin, arrested in Kuwait for spreading alleged misinformation. His case raises serious concerns about press freedom. The situation reflects growing restrictions on free speech in the region.

Network Shutdowns - A Growing Tool for Government Control
Governments are increasingly using internet shutdowns to control information and suppress dissent. This affects millions globally, cutting access to vital services. Advocacy groups are fighting back to protect digital rights.

EFF at HOPE 26 - Join Us for Digital Rights Discussions
Join EFF at HOPE 26 this August to discuss vital topics like privacy and free speech. Engage with experts and support digital rights initiatives. Don't miss out!

Big Tech Ignoring User Opt-Out Requests - New Research Revealed
New research highlights major tech firms' failure to honor user opt-out requests for tracking, raising serious concerns about data privacy and compliance with California laws.

Microsoft Office Web Apps - New Sensitivity Labels Feature
Microsoft has rolled out a new feature for Office web apps, allowing users to apply sensitivity labels directly in the browser. This update enhances document protection and aligns web capabilities with desktop versions. Organizations should update training and security monitoring accordingly.

Russia Blocks Bluesky Social Media Amid Internet Crackdown
Russia has blocked access to Bluesky as part of a wider crackdown on foreign platforms. Users are affected as they seek alternatives to previously banned services. VPNs still allow access, but face increasing restrictions.

EFF Investigates Google - Broken Promise to Users Exposed
The EFF has filed a complaint against Google for failing to notify users before disclosing their data to law enforcement, highlighting serious privacy concerns.

Google Penalizes Back Button Hijacking Practices
Google is cracking down on back button hijacking, a deceptive practice affecting user navigation. Sites using this tactic will face penalties starting June 15, 2026. It's crucial for site owners to ensure compliance to avoid negative impacts on their search performance.
Google Privacy Hole Exposed - ICE Scammers Target Migrants
A recent vulnerability in Google's defenses has exposed user phone numbers to potential brute-force attacks, while ICE impersonators exploit this situation to target vulnerable migrants with scams. The incidents highlight the urgent need for stronger privacy protections.
Surveillance - Drug Cartel Uses Spyware Against FBI
A Mexican drug cartel has weaponized surveillance technology to spy on the FBI, raising serious privacy concerns. This chilling report highlights the dangers of ubiquitous surveillance. Learn about the implications for law enforcement and public safety.

EFF Leaves X - Digital Rights Advocacy Shift
EFF is leaving X after nearly 20 years due to declining engagement and concerns over user rights. This shift highlights the need for transparency and advocacy in digital spaces. Follow EFF on other platforms to stay informed about digital rights.

Experian Study Reveals Deep Skepticism of Facial Recognition
Experian's latest study shows that while Australians fear identity theft, they are skeptical of facial recognition technology. This skepticism poses challenges for businesses trying to enhance security without compromising privacy.

EFF Updates Guide on Surveillance Tech at US-Mexico Border
The EFF has released an updated guide on surveillance technology at the US-Mexico border. This resource is crucial for understanding how these technologies impact human rights. Advocates and the public can now better identify and report on surveillance tools used by Customs and Border Protection.

Dr. Jean Linis-Dinco - Activist Championing Digital Rights
Dr. Jean Linis-Dinco advocates for digital rights and human rights. She challenges oppressive systems that exploit technology for profit. Her work emphasizes accountability and justice in tech.

VIP Credential Monitoring - Protecting Sensitive Accounts
Credential theft is a growing threat to executives. Recorded Future's VIP Credential Monitoring safeguards sensitive accounts, ensuring rapid detection and response to breaches. Learn how to protect your organization today.
Gulf States Tighten Speech Restrictions Amid Ongoing Conflict
Gulf states are clamping down on speech amid ongoing conflict, leading to arrests and censorship. This crackdown threatens free expression and accountability across the region.

XChat - Elon Musk Launches Self-Destruct Messaging Feature
Elon Musk has launched XChat, a messaging app with self-destructing messages and end-to-end encryption. This aims to enhance user privacy and compete with secure platforms like Signal.

WhatsApp's Encryption Claims Called Consumer Fraud by Durov
Pavel Durov claims WhatsApp misleads users about encryption, exposing billions of messages. This raises serious privacy concerns for users relying on the platform.

FBI Accesses Encrypted Signal Messages via Push Notifications, Forensic Insights Revealed
The FBI's ability to access deleted Signal messages raises critical privacy concerns about mobile data management and forensic recovery techniques.
Internet Breaks Bullshit Detectors - AI and Propaganda Surge
AI-generated content is overwhelming verification systems, making it hard to tell what's real. This affects everyone online, especially journalists and researchers. As misinformation spreads, it's crucial to adopt a more skeptical approach to consuming content.

Law Enforcement - Tracking 500 Million Devices via Ad Data
Citizen Lab's investigation reveals that law enforcement agencies are using Webloc to track 500 million mobile devices through advertising data, raising significant privacy concerns.

Big Tech - User Data Exposure to US Authorities Revealed
A new report reveals that Google, Apple, and Meta shared data from over 3.5 million accounts with US authorities. This alarming trend raises significant privacy concerns. With requests increasing rapidly, users must be vigilant about their data security.

Gmail - End-to-End Encryption Now Available on Mobile
Google has rolled out end-to-end encryption for Gmail on mobile, enhancing security for enterprise users and ensuring compliance with data protection laws.

Session Messenger - Protecting Privacy Without Metadata
Session is a new messaging app that prioritizes user privacy by eliminating phone numbers and metadata collection. It uses encryption and decentralized networks for secure communication. This approach addresses growing privacy concerns in digital communication.

Health Insurance Lead Sites - Personal Data Sold Instantly
Health insurance lead generation sites are selling your personal data within seconds of form submission. This raises serious privacy concerns for consumers. Researchers tracked how data is misused and what you can do to protect yourself.

WhatsApp - New Username Feature Enhances Privacy Control
WhatsApp is rolling out a username feature that enhances user privacy by allowing communication without phone numbers. This feature includes a new security measure known as the username key, providing users with greater control over their interactions.

Sticky-note Security - Gym's 80s Horror Show Revealed
A gym's security blunder led to a guest hijacking equipment by finding a password on a sticky note. This incident highlights the need for better security practices. Learn how to protect connected devices from similar vulnerabilities.

EPIC Calls to Halt Meta’s Facial Recognition Glasses Plans
EPIC and over 70 organizations are calling for a halt to Meta's facial recognition glasses plans, citing significant privacy and safety risks.

Automation and NHI Security Risks - Key Findings Revealed
A new report highlights serious security risks linked to automation and non-human identities in enterprises. Over 40% of experts reported incidents last year. Organizations must improve management practices to protect their data.

TikTok Removes Covert Networks Amid Hungary Election Concerns
TikTok has taken action against covert networks spreading disinformation before Hungary's elections. Fake accounts targeted political content, raising serious concerns. The integrity of the electoral process is at stake as voters prepare to head to the polls.

Mass Surveillance - EFFector Explores Troubling Trends
The latest EFFector newsletter sheds light on mass surveillance issues. It reveals how crime prevention tech is misused, impacting civil liberties. Join the fight for privacy and free speech.

VeraCrypt - Windows Users May Face Boot Issues Soon
VeraCrypt's developer warns of potential boot issues for Windows users after Microsoft locked his account. This could prevent many devices from starting up. Users are advised to stay informed as the situation develops.

Browser Guard - Protecting Your Privacy from Extensions
Malwarebytes' Browser Guard now features Access Control, allowing users to manage website permissions for sensitive device access, enhancing online privacy.

Identity Visibility - Shrinking the IAM Attack Surface
Explore the growing risks of identity fragmentation and shadow AI in organizations, and learn how the IVIP model can enhance visibility and security.

Telegram Hacking Tools - Men Targeting Women Exposed
New research reveals men are using Telegram to buy hacking tools for harassment. This troubling trend highlights the urgent need for stricter online regulations. Victims, mainly women, face severe privacy violations. Action is needed to protect individuals from these abusive practices.

Fiber Optic Cables - New Threat as Hidden Microphones Exposed
Researchers have discovered a method to turn fiber optic cables into hidden microphones. This poses a serious privacy threat, allowing eavesdropping on conversations without detection. Organizations must be aware and implement countermeasures.

EU Parliament Blocks Mass-Scanning of Chats - Privacy Win
The EU Parliament has blocked plans for mass-scanning of private chats, marking a significant victory for privacy rights. Major tech companies may still engage in voluntary scanning, raising concerns. Ongoing negotiations over the Chat Control proposal could threaten these gains.

Continuous Identity Threat Detection - Why It Matters Now
ID Dataweb stresses the urgent need for continuous identity threat detection. With rising risks from social engineering and stolen data, organizations must adapt their security strategies. The evolution of identity management is crucial for protecting against modern threats.