freddy@lemmy.oneMEnglish · 7 days agoPrivacy Guides is Hiringpinwww.privacyguides.orgexternal-linkmessage-square9fedilinkarrow-up175arrow-down10
arrow-up175arrow-down1external-linkPrivacy Guides is Hiringpinwww.privacyguides.orgfreddy@lemmy.oneMEnglish · 7 days agomessage-square9fedilink
ForgottenFlux@lemmy.worldEnglish · 14 days agoCompanies are finding new ways to monetize personal data, too often without proper notice or consent. ICYMI, three current examples that you may want to act on to opt out: PayPal, LinkedIn and 23andMeplus-squarefirewallsdontstopdragons.comexternal-linkmessage-square10fedilinkarrow-up1105arrow-down10
arrow-up1105arrow-down1external-linkCompanies are finding new ways to monetize personal data, too often without proper notice or consent. ICYMI, three current examples that you may want to act on to opt out: PayPal, LinkedIn and 23andMeplus-squarefirewallsdontstopdragons.comForgottenFlux@lemmy.worldEnglish · 14 days agomessage-square10fedilink
youmaynotknow@lemmy.mlEnglish · 17 days agoJMP.chat referral linkplus-squaremessage-squaremessage-square4fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1message-squareJMP.chat referral linkplus-squareyoumaynotknow@lemmy.mlEnglish · 17 days agomessage-square4fedilink
DeltaTangoLima@reddrefuge.comEnglish · 17 days agoIs there any privacy-friendly way to use Facebook on iOS?plus-squaremessage-squaremessage-square42fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1message-squareIs there any privacy-friendly way to use Facebook on iOS?plus-squareDeltaTangoLima@reddrefuge.comEnglish · 17 days agomessage-square42fedilink
ForgottenFlux@lemmy.worldEnglish · 18 days agoBig Tech is Trying to Burn Privacy to the Ground–And They’re Using Big Tobacco’s Strategy to Do It | ACLU of Northern CAplus-squarewww.aclunc.orgexternal-linkmessage-square0fedilinkarrow-up184arrow-down10
arrow-up184arrow-down1external-linkBig Tech is Trying to Burn Privacy to the Ground–And They’re Using Big Tobacco’s Strategy to Do It | ACLU of Northern CAplus-squarewww.aclunc.orgForgottenFlux@lemmy.worldEnglish · 18 days agomessage-square0fedilink
blibla@slrpnk.netEnglish · 21 days agoIs Cromite on Android a viable alternative to Firefox based browsers? Any Experience?plus-squaregithub.comexternal-linkmessage-square47fedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkIs Cromite on Android a viable alternative to Firefox based browsers? Any Experience?plus-squaregithub.comblibla@slrpnk.netEnglish · 21 days agomessage-square47fedilink
BodaciousMunchkin@links.hackliberty.orgEnglish · edit-225 days agoWHAT WILL A CASHLESS SOCIETY MEAN?plus-squareaeon.coexternal-linkmessage-square18fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkWHAT WILL A CASHLESS SOCIETY MEAN?plus-squareaeon.coBodaciousMunchkin@links.hackliberty.orgEnglish · edit-225 days agomessage-square18fedilink
ForgottenFlux@lemmy.worldEnglish · 26 days agoHungary's push for chat control failed as Dutch secret service opposes client-side scanning | For the umpteenth time, the EU Council can't agree on Chat Control - a great victory for privacyplus-squaretuta.comexternal-linkmessage-square4fedilinkarrow-up1127arrow-down10
arrow-up1127arrow-down1external-linkHungary's push for chat control failed as Dutch secret service opposes client-side scanning | For the umpteenth time, the EU Council can't agree on Chat Control - a great victory for privacyplus-squaretuta.comForgottenFlux@lemmy.worldEnglish · 26 days agomessage-square4fedilink
rottenwheel@lemmy.zipEnglish · 26 days ago❗️ PSA: Update your Tor browser as soon as possible; fixes a security vulnerability Mozilla has had reports of being exploited in the wildplus-squaremessage-squaremessage-square1fedilinkarrow-up185arrow-down10
arrow-up185arrow-down1message-square❗️ PSA: Update your Tor browser as soon as possible; fixes a security vulnerability Mozilla has had reports of being exploited in the wildplus-squarerottenwheel@lemmy.zipEnglish · 26 days agomessage-square1fedilink
ForgottenFlux@lemmy.worldEnglish · 1 month agoPayPal implements default data sharing with third parties: users must manually opt outplus-squarewww.techradar.comexternal-linkmessage-square9fedilinkarrow-up1202arrow-down10
arrow-up1202arrow-down1external-linkPayPal implements default data sharing with third parties: users must manually opt outplus-squarewww.techradar.comForgottenFlux@lemmy.worldEnglish · 1 month agomessage-square9fedilink
Jecogeo@mastodon.com.br · 1 month agocollaborators, it’s time to review the recommendation of Firefox as a good browser option…plus-squaremessage-squaremessage-square24fedilinkarrow-up137arrow-down10
arrow-up137arrow-down1message-squarecollaborators, it’s time to review the recommendation of Firefox as a good browser option…plus-squareJecogeo@mastodon.com.br · 1 month agomessage-square24fedilink
BrikoX@lemmy.zipEnglish · 1 month agoFTC Report Confirms: Commercial Surveillance is Out of Controlplus-squarewww.eff.orgexternal-linkmessage-square2fedilinkarrow-up1129arrow-down10
arrow-up1129arrow-down1external-linkFTC Report Confirms: Commercial Surveillance is Out of Controlplus-squarewww.eff.orgBrikoX@lemmy.zipEnglish · 1 month agomessage-square2fedilink
ForgottenFlux@lemmy.worldEnglish · 1 month agoThe Tor Project merges with Tails, a Linux-based portable OS focused on privacyplus-squaretechcrunch.comexternal-linkmessage-square5fedilinkarrow-up1145arrow-down10
arrow-up1145arrow-down1external-linkThe Tor Project merges with Tails, a Linux-based portable OS focused on privacyplus-squaretechcrunch.comForgottenFlux@lemmy.worldEnglish · 1 month agomessage-square5fedilink
ForgottenFlux@lemmy.worldEnglish · 2 months agoLinkedIn scraped user data for training AI before updating its terms of service and without obtaining user opt-in consentplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up159arrow-down10
arrow-up159arrow-down1external-linkLinkedIn scraped user data for training AI before updating its terms of service and without obtaining user opt-in consentplus-squaretechcrunch.comForgottenFlux@lemmy.worldEnglish · 2 months agomessage-square0fedilink
TheTwelveYearOld@lemmy.worldEnglish · 2 months agoHow do you filter ads and trackers outside of a browser while still using a VPN service?plus-squaremessage-squaremessage-square16fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1message-squareHow do you filter ads and trackers outside of a browser while still using a VPN service?plus-squareTheTwelveYearOld@lemmy.worldEnglish · 2 months agomessage-square16fedilink
TheTwelveYearOld@lemmy.worldEnglish · 2 months agoMaximizing privacy on Android without custom ROMs?plus-squaremessage-squaremessage-square10fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1message-squareMaximizing privacy on Android without custom ROMs?plus-squareTheTwelveYearOld@lemmy.worldEnglish · 2 months agomessage-square10fedilink
Elven_Mithril@lemmy.dbzer0.comEnglish · 2 months agoplease help me with some arguments for my wifeplus-squaremessage-squaremessage-square34fedilinkarrow-up141arrow-down10
arrow-up141arrow-down1message-squareplease help me with some arguments for my wifeplus-squareElven_Mithril@lemmy.dbzer0.comEnglish · 2 months agomessage-square34fedilink
BrikoX@lemmy.zip · edit-22 months agoMeta fixes easily bypassed WhatsApp ‘View Once’ privacy featureplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMeta fixes easily bypassed WhatsApp ‘View Once’ privacy featureplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zip · edit-22 months agomessage-square4fedilink
ForgottenFlux@lemmy.worldEnglish · 2 months agoSchool Monitoring Software Sacrifices Student Privacy for Unproven Promises of Safetyplus-squarewww.eff.orgexternal-linkmessage-square5fedilinkarrow-up185arrow-down10
arrow-up185arrow-down1external-linkSchool Monitoring Software Sacrifices Student Privacy for Unproven Promises of Safetyplus-squarewww.eff.orgForgottenFlux@lemmy.worldEnglish · 2 months agomessage-square5fedilink
BrikoX@lemmy.zip · 2 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comexternal-linkmessage-square33fedilinkarrow-up1215arrow-down10
arrow-up1215arrow-down1external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelplus-squarearstechnica.comBrikoX@lemmy.zip · 2 months agomessage-square33fedilink