Forwarded from BlackBox (Security) Archiv
Use the DuckDuckGo Extension to Block FLoC, Google’s New Tracking Method in Chrome
Google has created a new tracking method called FLoC, put it in Chrome, and automatically turned it on for millions of users.
💡 FLoC is bad for privacy: It puts you in a group based on your browsing history, and any website can get that group FLoC ID to target and fingerprint you.
You can use the DuckDuckGo Chrome extension (pending Chrome Web Store's approval of our update) to block FLoC's tracking, which is an enhancement to its tracker blocking and directly in line with the extension's single purpose of protecting your privacy holistically as you use Chrome.
DuckDuckGo Search (via our website duckduckgo.com) is now also configured to opt-out of FLoC, regardless if you use our extension or app.
https://spreadprivacy.com/block-floc-with-duckduckgo/
https://www.theverge.com/2021/4/9/22376110/duckduckgo-privacy-floc-block-chrome-extension-advertising-tech
#ddg #DuckDuckGo #google #FLoC #chrome #browser #ad #targeting #tracking #cookies #DeleteGoogle
📡 @nogoolag 📡 @blackbox_archiv
Google has created a new tracking method called FLoC, put it in Chrome, and automatically turned it on for millions of users.
💡 FLoC is bad for privacy: It puts you in a group based on your browsing history, and any website can get that group FLoC ID to target and fingerprint you.
You can use the DuckDuckGo Chrome extension (pending Chrome Web Store's approval of our update) to block FLoC's tracking, which is an enhancement to its tracker blocking and directly in line with the extension's single purpose of protecting your privacy holistically as you use Chrome.
DuckDuckGo Search (via our website duckduckgo.com) is now also configured to opt-out of FLoC, regardless if you use our extension or app.
https://spreadprivacy.com/block-floc-with-duckduckgo/
https://www.theverge.com/2021/4/9/22376110/duckduckgo-privacy-floc-block-chrome-extension-advertising-tech
#ddg #DuckDuckGo #google #FLoC #chrome #browser #ad #targeting #tracking #cookies #DeleteGoogle
📡 @nogoolag 📡 @blackbox_archiv
Spread Privacy
Use the DuckDuckGo Extension to Block FLoC, Google’s New Tracking Method in Chrome
Google has created a new tracking mechanism called FLoC, put it in Chrome, and automatically turned it on for millions of users. It's bad for privacy, which is why we're now blocking it in the DuckDuckGo extension.
Forwarded from BlackBox (Security) Archiv
FLoC Block
Prevent Federated Learning of Cohorts aka FLoC ad-targeting code from running in Chrome.
FLoC, short for Federated Learning of Cohorts, is the new mechanism used by Google Chrome to group users into buckets based on their interests. You can read more about it here and why Brave and some other browsers have blocked it here. EFF did some analysis as well.
💡 How does this Chrome Extension help?
If you HAVE to use Chrome but don't like the idea of being grouped into a bucket (aka cohort) based on the websites you visit, this extension is a simple way to prevent FLoC from divulging your "cohort id" to websites. The extension removes document.interestCohort() from every page so that a website cannot get your cohort id.
💡 How do I install this extension?
👉🏼 Download flocblock.zip from https://github.com/ShivanKaul/flocblock/releases/latest. Direct link: https://github.com/ShivanKaul/flocblock/releases/download/v0.0.1/flocblock.zip
👉🏼 Extract extension.
👉🏼 Follow the instructions to load into Chrome.
https://github.com/ShivanKaul/flocblock
#floc #block #chrome #browser #tracking #tool
📡 @nogoolag 📡 @blackbox_archiv
Prevent Federated Learning of Cohorts aka FLoC ad-targeting code from running in Chrome.
FLoC, short for Federated Learning of Cohorts, is the new mechanism used by Google Chrome to group users into buckets based on their interests. You can read more about it here and why Brave and some other browsers have blocked it here. EFF did some analysis as well.
💡 How does this Chrome Extension help?
If you HAVE to use Chrome but don't like the idea of being grouped into a bucket (aka cohort) based on the websites you visit, this extension is a simple way to prevent FLoC from divulging your "cohort id" to websites. The extension removes document.interestCohort() from every page so that a website cannot get your cohort id.
💡 How do I install this extension?
👉🏼 Download flocblock.zip from https://github.com/ShivanKaul/flocblock/releases/latest. Direct link: https://github.com/ShivanKaul/flocblock/releases/download/v0.0.1/flocblock.zip
👉🏼 Extract extension.
👉🏼 Follow the instructions to load into Chrome.
https://github.com/ShivanKaul/flocblock
#floc #block #chrome #browser #tracking #tool
📡 @nogoolag 📡 @blackbox_archiv
GitHub
Release FLoC Block · ShivanKaul/flocblock
Contribute to ShivanKaul/flocblock development by creating an account on GitHub.
Forwarded from BlackBox (Security) Archiv
Developers, it’s time for you to choose a side - Clean up the web!
Will you help rid the web of privacy-invading tracking or be complicit in it?
🚮 Remove third-party scripts from Google, Facebook, etc.
This includes Google Analytics (one of the most prevalent trackers in the world), YouTube videos, Facebook login widgets, etc.
These scripts enable people farmers like Google and Facebook to track people across the web as they go from site to site. If you embed them in your site, you’re complicit in enabling this tracking.
And yes, that absolutely includes fucking Google AMP.
https://cleanuptheweb.org/
👉🏼 Read as well: Nobody is flying to join Google’s FLoC - #Brave, #Vivaldi, #Edge, and #Mozilla are all out
https://www.theverge.com/2021/4/16/22387492/google-floc-ad-tech-privacy-browsers-brave-vivaldi-edge-mozilla-chrome-safari
#cleanuptheweb #floc #google #DeleteGoogle #facebook #DeleteFacebook #tracking #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Will you help rid the web of privacy-invading tracking or be complicit in it?
🚮 Remove third-party scripts from Google, Facebook, etc.
This includes Google Analytics (one of the most prevalent trackers in the world), YouTube videos, Facebook login widgets, etc.
These scripts enable people farmers like Google and Facebook to track people across the web as they go from site to site. If you embed them in your site, you’re complicit in enabling this tracking.
And yes, that absolutely includes fucking Google AMP.
https://cleanuptheweb.org/
👉🏼 Read as well: Nobody is flying to join Google’s FLoC - #Brave, #Vivaldi, #Edge, and #Mozilla are all out
https://www.theverge.com/2021/4/16/22387492/google-floc-ad-tech-privacy-browsers-brave-vivaldi-edge-mozilla-chrome-safari
#cleanuptheweb #floc #google #DeleteGoogle #facebook #DeleteFacebook #tracking #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
The Verge
Nobody is flying to join Google’s FLoC
The future of the web is at stake
Forwarded from BlackBox (Security) Archiv
Tracking the WhatsApp habits of 5000 random Smartphones
In the previous blog post, we have seen that this is quite simple to hack the WhatsApp online status of a contact. A simple Online or last seen yesterday at 19:00 insight can be reverse engineered to leak phone habits at a couple of seconds accuracy.
‼️ There is an even more silly thing not mentioned yet: You can track any mobile phone ! So let’s play and scale to track 5000 random numbers.
Like previously, I am sharing the source code as a PROOF OF CONCEPT. You can jump straight to the end if you are more curious about the results than by the technical stuff I’m about to resume. We are reusing the previous code with Node.js, Puppeteer & Grafana.
https://jorislacance.fr/blog/2021/04/16/whatsapp-tracking-2
💡 Hack the WhatsApp status to track contacts
https://jorislacance.fr/blog/2020/04/01/whatsapp-tracking
💡 How a WhatsApp status loophole is aiding cyberstalkers
https://t.me/BlackBox_Archiv/2018
💡 Sudden New Warning Will Surprise Millions Of WhatsApp Users
https://t.me/BlackBox_Archiv/1987
💡 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (PDF)
https://t.me/BlackBox_Archiv/2042
#DeleteWhatsapp #user #tracking #whatsapp #thinkabout #change
📡 @nogoolag 📡 @blackbox_archiv
In the previous blog post, we have seen that this is quite simple to hack the WhatsApp online status of a contact. A simple Online or last seen yesterday at 19:00 insight can be reverse engineered to leak phone habits at a couple of seconds accuracy.
‼️ There is an even more silly thing not mentioned yet: You can track any mobile phone ! So let’s play and scale to track 5000 random numbers.
Like previously, I am sharing the source code as a PROOF OF CONCEPT. You can jump straight to the end if you are more curious about the results than by the technical stuff I’m about to resume. We are reusing the previous code with Node.js, Puppeteer & Grafana.
https://jorislacance.fr/blog/2021/04/16/whatsapp-tracking-2
💡 Hack the WhatsApp status to track contacts
https://jorislacance.fr/blog/2020/04/01/whatsapp-tracking
💡 How a WhatsApp status loophole is aiding cyberstalkers
https://t.me/BlackBox_Archiv/2018
💡 Sudden New Warning Will Surprise Millions Of WhatsApp Users
https://t.me/BlackBox_Archiv/1987
💡 All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (PDF)
https://t.me/BlackBox_Archiv/2042
#DeleteWhatsapp #user #tracking #whatsapp #thinkabout #change
📡 @nogoolag 📡 @blackbox_archiv
Joris La Cancellera
Tracking the WhatsApp habits of 5000 random Smartphones | Joris La Cancellera
Portfolio of Joris La Cancellera. Hacker on various things.
GitHub blocks Google FLoC tracking
Yesterday, GitHub announced rolling out a mysterious HTTP header on all GitHub Pages sites.
GitHub Pages enables users to create websites right from within their GitHub repository.
And it turns out, this header, now being returned by GitHub sites, is actually meant for website owners to opt-out of Google FLoC tracking.
BleepingComputer also noticed the entire github.com domain had this header set, indicating GitHub did not want its visitors to be included in Google FLoC's "cohorts" when visiting any GitHub page.
https://www.bleepingcomputer.com/news/security/github-blocks-google-floc-tracking/
#github #goolag #FLoC #tracking
Yesterday, GitHub announced rolling out a mysterious HTTP header on all GitHub Pages sites.
GitHub Pages enables users to create websites right from within their GitHub repository.
And it turns out, this header, now being returned by GitHub sites, is actually meant for website owners to opt-out of Google FLoC tracking.
BleepingComputer also noticed the entire github.com domain had this header set, indicating GitHub did not want its visitors to be included in Google FLoC's "cohorts" when visiting any GitHub page.
https://www.bleepingcomputer.com/news/security/github-blocks-google-floc-tracking/
#github #goolag #FLoC #tracking
BleepingComputer
GitHub disables Google FloC user tracking on its website
GitHub has announced rolling out a mysterious HTTP header on all GitHub Pages sites to block Google FLoC tracking.
Forwarded from BlackBox (Security) Archiv
Facebook and Instagram overlays in iOS stoke fears about apps being free of charge
Through grinding teeth, the social media market leader is implementing iOS 14's new privacy requirements. But it can't refrain from a warning finger in the process.
Facebook originally intended to use "educational screens" to reveal details about data usage. Now they seem to be part of a scaremongering campaign. The message: help keep Facebook and Instagram free, and give us access to your data! The hints seem to be a new way to fight back against Apple's tracking protection in iOS 14.5. Meanwhile, the company is enjoying great business, turning over $26.2 billion between January and March alone. The company had already announced that it will expect users to read page-long data protection declarations.
#facebook #DeleteFacebook #instagram #overlays #ios #ad #tracking
📡 @nogoolag 📡 @blackbox_archiv
Through grinding teeth, the social media market leader is implementing iOS 14's new privacy requirements. But it can't refrain from a warning finger in the process.
Facebook originally intended to use "educational screens" to reveal details about data usage. Now they seem to be part of a scaremongering campaign. The message: help keep Facebook and Instagram free, and give us access to your data! The hints seem to be a new way to fight back against Apple's tracking protection in iOS 14.5. Meanwhile, the company is enjoying great business, turning over $26.2 billion between January and March alone. The company had already announced that it will expect users to read page-long data protection declarations.
#facebook #DeleteFacebook #instagram #overlays #ios #ad #tracking
📡 @nogoolag 📡 @blackbox_archiv
#Google sued by DC and three states for ‘deceptive’ Android #location #tracking
https://www.theverge.com/2022/1/24/22898760/google-dc-washington-texas-indiana-attorneys-general-lawsuit-location-data-tracking
https://www.theverge.com/2022/1/24/22898760/google-dc-washington-texas-indiana-attorneys-general-lawsuit-location-data-tracking
The Verge
Google sued by DC and three states for ‘deceptive’ Android location tracking
Android’s interface is full of "misleading pressure tactics."
Apple is Still Tracking You Without Consent
In the current version of macOS, Monterey, on every system update on a system containing an M1 chip, such as all the new shiny/fast ARM (“Apple Silicon”) macs, the update process phones home to Apple to obtain a special boot signature, known in Apple jargon as a “ticket”.
It does this in a totally unencrypted fashion, over standard plaintext port 80 HTTP (the exact same protocol they banned for use by third party app developers in the App Store when transmitting private data like unique identifiers that serve as PII) to the host gs.apple.com. The HTTP request includes unchangable hardware unique identifiers (chip serial numbers known as ECIDs) that function as a supercookie, and it is visible to your local LAN, your ISP (or hotel or coffee shop), anyone monitoring the network backbones, and of course Apple.
This permits anyone listening to see the approximate location of the device, even if they are not proximate to it, because they can observe the client IP (which is equivalent to approximately city-level geolocation) and the serial number of the device.
Anyone watching the internet backbones and internet exchanges can see in which city each chip serial number (ECID) is located, and can see where they travel, as these updates are released several times per quarter. A new request is made on each system update, and users are prompted to enable automatic updates, enabling unattended tracking.
https://sneak.berlin/20220409/apple-is-still-tracking-you-without-consent/
#apple #tracking
In the current version of macOS, Monterey, on every system update on a system containing an M1 chip, such as all the new shiny/fast ARM (“Apple Silicon”) macs, the update process phones home to Apple to obtain a special boot signature, known in Apple jargon as a “ticket”.
It does this in a totally unencrypted fashion, over standard plaintext port 80 HTTP (the exact same protocol they banned for use by third party app developers in the App Store when transmitting private data like unique identifiers that serve as PII) to the host gs.apple.com. The HTTP request includes unchangable hardware unique identifiers (chip serial numbers known as ECIDs) that function as a supercookie, and it is visible to your local LAN, your ISP (or hotel or coffee shop), anyone monitoring the network backbones, and of course Apple.
This permits anyone listening to see the approximate location of the device, even if they are not proximate to it, because they can observe the client IP (which is equivalent to approximately city-level geolocation) and the serial number of the device.
Anyone watching the internet backbones and internet exchanges can see in which city each chip serial number (ECID) is located, and can see where they travel, as these updates are released several times per quarter. A new request is made on each system update, and users are prompted to enable automatic updates, enabling unattended tracking.
https://sneak.berlin/20220409/apple-is-still-tracking-you-without-consent/
#apple #tracking
sneak.berlin
Apple is Still Tracking You Without Consent
The personal website of Jeffrey Paul.
https://www.forbes.com/sites/bernardmarr/2018/09/16/smart-dust-is-coming-are-you-ready/
#smartdust #surveillance #stalking #tracking #iob
#smartdust #surveillance #stalking #tracking #iob
Forbes
Smart Dust Is Coming. Are You Ready?
Wireless devices that can monitor just about any environment, as well as store and transmit data are now the size of a grain of salt. These devices have plenty of real-world applications. However, there are some challenging issues to resolve before you see…
New documents reveal ‘huge’ scale of US government’s cell phone location data tracking
The Department of Homeland Security (DHS) used mobile location data to track people’s movements on a much larger scale than previously known, according to new documents unearthed by the American Civil Liberties Union (ACLU).
It’s no secret that U.S. government agencies have been obtaining and using location data collected by Americans’ smartphones. In early 2020, a Wall Street Journal report revealed that both Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) bought access to millions of smartphone users’ location data to track undocumented immigrants and suspected tax dodgers.
However, new documents obtained by the ACLU through an ongoing Freedom of Information Act (FOIA) lawsuit now reveal the extent of this warrantless data collection. The 6,000-plus records reviewed by the civil rights organization contained approximately 336,000 location points across North America obtained from people’s phones. They also reveal that in just three days in 2018, CBP obtained records containing around 113,654 location points in the southwestern United States — more than 26 location points per minute.
https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking
#dhs #location #tracking
The Department of Homeland Security (DHS) used mobile location data to track people’s movements on a much larger scale than previously known, according to new documents unearthed by the American Civil Liberties Union (ACLU).
It’s no secret that U.S. government agencies have been obtaining and using location data collected by Americans’ smartphones. In early 2020, a Wall Street Journal report revealed that both Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) bought access to millions of smartphone users’ location data to track undocumented immigrants and suspected tax dodgers.
However, new documents obtained by the ACLU through an ongoing Freedom of Information Act (FOIA) lawsuit now reveal the extent of this warrantless data collection. The 6,000-plus records reviewed by the civil rights organization contained approximately 336,000 location points across North America obtained from people’s phones. They also reveal that in just three days in 2018, CBP obtained records containing around 113,654 location points in the southwestern United States — more than 26 location points per minute.
https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking
#dhs #location #tracking
TechCrunch
New documents reveal ‘huge’ scale of US government’s cell phone location data tracking
In just one three-day span, DHS obtained over 113,000 location points — a fraction of the overall data it acquired without a warrant.
#Location #tracking of #phones is out of control
https://arstechnica.com/information-technology/2024/10/phone-tracking-tool-lets-government-agencies-follow-your-every-move/
Comments
https://arstechnica.com/information-technology/2024/10/phone-tracking-tool-lets-government-agencies-follow-your-every-move/
Comments
Ars Technica
Location tracking of phones is out of control. Here’s how to fight back.
Unique IDs assigned to Android and iOS devices threaten your privacy. Who knew?
Media is too big
VIEW IN TELEGRAM
Is Your Car Watching You?
Curious how deep the data collection goes with your ride? New Toyota 4Runner, it's practically a surveillance device. Turns out, it grabs all sorts of personal info—everything from your address to location and even biometrics! And ya know what? It doesn't stop there; your car’s data can be sold to advertisers and shared with the government. I opted out of all that snooping, but it's wild how sneaky this tracking is. Check your car now!
#cars #stalking #tracking
Curious how deep the data collection goes with your ride? New Toyota 4Runner, it's practically a surveillance device. Turns out, it grabs all sorts of personal info—everything from your address to location and even biometrics! And ya know what? It doesn't stop there; your car’s data can be sold to advertisers and shared with the government. I opted out of all that snooping, but it's wild how sneaky this tracking is. Check your car now!
#cars #stalking #tracking
#Google Starts #Tracking All Your Devices in 8 Weeks
https://www.forbes.com/sites/zakdoffman/2024/12/19/forget-chrome-google-will-start-tracking-you-and-all-your-smart-devices-in-8-weeks/
Comments
#why
https://www.forbes.com/sites/zakdoffman/2024/12/19/forget-chrome-google-will-start-tracking-you-and-all-your-smart-devices-in-8-weeks/
Comments
#why
Forbes
Forget Chrome—Google Starts Tracking All Your Devices In 8 Weeks
Digital fingerprinting is suddenly back and it will be everywhere—here's what you need to know.
Media is too big
VIEW IN TELEGRAM
⚡️WiFi Sensing Sees Through Walls
Comcast rolled out “WiFi Motion” to millions of routers. Once enabled, it tracks movement inside your home using signal strength between your router and devices.
Read full article on Substack
Xfinity admits it shares this motion data with law enforcement—no notice required.
This tech, called #WiFi sensing, has been around for over a decade. It can track movement through walls, detect gestures, and monitor activity—originally used for breath #tracking in hospitals.
Verizon and Google Nest offer similar tools. While sold as “security,” it opens the door to surveillance and #EMF exposure—linked to anxiety, fatigue, and more.
Now’s the time to go wired.
🪧 Watch this full episode
📱 Get private phones, laptops, and tablets
🔒 Webinar replay — EMR awareness w/ Geophilia
Comcast rolled out “WiFi Motion” to millions of routers. Once enabled, it tracks movement inside your home using signal strength between your router and devices.
Read full article on Substack
Xfinity admits it shares this motion data with law enforcement—no notice required.
This tech, called #WiFi sensing, has been around for over a decade. It can track movement through walls, detect gestures, and monitor activity—originally used for breath #tracking in hospitals.
Verizon and Google Nest offer similar tools. While sold as “security,” it opens the door to surveillance and #EMF exposure—linked to anxiety, fatigue, and more.
Now’s the time to go wired.
🪧 Watch this full episode
📱 Get private phones, laptops, and tablets
🔒 Webinar replay — EMR awareness w/ Geophilia