• chevron_right

      Airbnb bans creepy surveillance cameras inside rentals starting April 30

      news.movim.eu / ArsTechnica · Monday, 11 March - 20:43

    camera hidden in flower pot indoors

    Enlarge (credit: Liudmila Chernetska/Getty )

    Airbnb, like hotels and rival vacation rental site Vrbo , will no longer allow hosts to record guests while they're inside the property. Airbnb previously allowed hosts to have disclosed cameras outside the property and in "common areas" inside, but Airbnb's enforcement of the policy and the rules' lack of specificity made camera use troubling for renters.

    Airbnb announced today that as of April 30, it's "banning the use of indoor security cameras in listings globally as part of efforts to simplify our policy on security cameras and other devices" and to prioritize privacy.

    Cameras that are turned off but inside the property will also be banned, as are indoor recording devices. Airbnb's updated policy defines cameras and recording devices as "any device that records or transmits video, images, or audio, such as a baby monitor, doorbell camera, or other camera."

    Read 11 remaining paragraphs | Comments

    • Sl chevron_right

      Contact publication

      pubsub.blastersklan.com / slashdot · Monday, 11 March - 18:18 edit · 1 minute

    Airbnb will no longer allow hosts to use indoor security cameras, regardless of where they're placed or what they're used for. In an update on Monday, Airbnb says the change to "prioritize the privacy" of renters goes into effect on April 30th. From a report: The vacation rental app previously let hosts install security cameras in "common areas" of listings, including hallways, living rooms, and front doors. Airbnb required hosts to disclose the presence of security cameras in their listings and make them clearly visible, and it prohibited hosts from using cameras in bedrooms and bathrooms. But now, hosts can't use indoor security cameras at all. The change comes after numerous reports of guests finding hidden cameras within their rental, leading some vacation-goers to scan their rooms for cameras. Airbnb's new policy also introduces new rules for outdoor security cameras, and will now require hosts to disclose their use and locations before guests book a listing. Hosts can't use outdoor cams to keep tabs on indoor spaces, either, nor can they use them in "certain outdoor areas where there's a great expectation of privacy," such as an outdoor shower or sauna.

    Read more of this story at Slashdot.

    Airbnb is Banning Indoor Security Cameras
    • wifi_tethering open_in_new

      This post is public

      yro.slashdot.org /story/24/03/11/1627246/airbnb-is-banning-indoor-security-cameras

    • chevron_right

      Spain tells Sam Altman, Worldcoin to shut down its eyeball-scanning orbs

      news.movim.eu / ArsTechnica · Wednesday, 6 March - 15:19

    A spherical device that scans people's eyeballs.

    Enlarge / Worldcoin's "Orb," a device that scans your eyeballs to verify that you're a real human.

    Spain has moved to block Sam Altman’s cryptocurrency project Worldcoin, the latest blow to a venture that has raised controversy in multiple countries by collecting customers’ personal data using an eyeball-scanning “orb.”

    The AEPD, Spain’s data protection regulator, has demanded that Worldcoin immediately ceases collecting personal information in the country via the scans and that it stops using data it has already gathered.

    The regulator announced on Wednesday that it had taken the “precautionary measure” at the start of the week and had given Worldcoin 72 hours to demonstrate its compliance with the order.

    Read 16 remaining paragraphs | Comments

    • Sc chevron_right

      Surveillance through Push Notifications

      news.movim.eu / Schneier · Monday, 4 March - 22:38 · 1 minute

    The Washington Post is reporting on the FBI’s increasing use of push notification data—”push tokens”—to identify people. The police can request this data from companies like Apple and Google without a warrant.

    The investigative technique goes back years. Court orders that were issued in 2019 to Apple and Google demanded that the companies hand over information on accounts identified by push tokens linked to alleged supporters of the Islamic State terrorist group.

    But the practice was not widely understood until December, when Sen. Ron Wyden (D-Ore.), in a letter to Attorney General Merrick Garland, said an investigation had revealed that the Justice Department had prohibited Apple and Google from discussing the technique.

    […]

    Unlike normal app notifications, push alerts, as their name suggests, have the power to jolt a phone awake—a feature that makes them useful for the urgent pings of everyday use. Many apps offer push-alert functionality because it gives users a fast, battery-saving way to stay updated, and few users think twice before turning them on.

    But to send that notification, Apple and Google require the apps to first create a token that tells the company how to find a user’s device. Those tokens are then saved on Apple’s and Google’s servers, out of the users’ reach.

    The article discusses their use by the FBI, primarily in child sexual abuse cases. But we all know how the story goes:

    “This is how any new surveillance method starts out: The government says we’re only going to use this in the most extreme cases, to stop terrorists and child predators, and everyone can get behind that,” said Cooper Quintin, a technologist at the advocacy group Electronic Frontier Foundation.

    “But these things always end up rolling downhill. Maybe a state attorney general one day decides, hey, maybe I can use this to catch people having an abortion,” Quintin added. “Even if you trust the U.S. right now to use this, you might not trust a new administration to use it in a way you deem ethical.”

    • Sl chevron_right

      Contact publication

      pubsub.blastersklan.com / slashdot · Thursday, 29 February - 22:42 edit · 1 minute

    An anonymous reader quotes a report from Ars Technica: Video doorbell cameras have been commoditized to the point where they're available for $30-$40 on marketplaces like Amazon, Walmart, Temu, and Shein. The true cost of owning one might be much greater, however. Consumer Reports (CR) has released the findings of a security investigation into two budget-minded doorbell brands, Eken and Tuck, which are largely the same hardware produced by the Eken Group in China, according to CR. The cameras are further resold under at least 10 more brands. The cameras are set up through a common mobile app, Aiwit. And the cameras share something else, CR claims: "troubling security vulnerabilities." Among the camera's vulnerabilities cited by CR: - Sending public IP addresses and Wi-Fi SSIDs (names) over the Internet without encryption - Takeover of the cameras by putting them into pairing mode (which you can do from a front-facing button on some models) and connecting through the Aiwit app - Access to still images from the video feed and other information by knowing the camera's serial number. CR also noted that Eken cameras lacked an FCC registration code. More than 4,200 were sold in January 2024, according to CR, and often held an Amazon "Overall Pick" label (as one model did when an Ars writer looked on Wednesday). CR issued vulnerability disclosures to Eken and Tuck regarding its findings. The disclosures note the amount of data that is sent over the network without authentication, including JPEG files, the local SSID, and external IP address. It notes that after a malicious user has re-paired a doorbell with a QR code generated by the Aiwit app, they have complete control over the device until a user sees an email from Eken and reclaims the doorbell. "These video doorbells from little known manufacturers have serious security and privacy vulnerabilities, and now they've found their way onto major digital marketplaces such as Amazon and Walmart," said Justin Brookman, director of tech policy at Consumer Reports, in a statement. "Both the manufacturers and platforms that sell the doorbells have a responsibility to ensure that these products are not putting consumers in harm's way."

    Read more of this story at Slashdot.

    Cheap Doorbell Cameras Can Be Easily Hijacked, Says Consumer Reports
    • wifi_tethering open_in_new

      This post is public

      yro.slashdot.org /story/24/02/29/2117215/cheap-doorbell-cameras-can-be-easily-hijacked-says-consumer-reports

    #Introduction time. My name is Ravi and I am from India. I am a #freesoftware and #privacy activist. I am a part of #prav (https://prav.app), a chat app focused towards mass adoption of #XMPP.

    I have studied postgraduate in #mathematics from Indian Statistical Institute, Kolkata and I currently work as a freelancer at artofproblemsolving.com. Additionally, I contribute to #debian, #openstreetmap and #libreoffice.

    I blog at https://ravidwivedi.in . Hope to meet nice people here.

    • chevron_right

      I regularly shared photos of my son on social media – until alarm bells started ringing | Hannah Nwoko

      news.movim.eu / TheGuardian · Monday, 26 February - 08:00

    Like millions of doting parents, I wanted to keep others abreast of my child’s milestones. But the ‘likes’ weren’t worth the risks

    Social media is a strange place. On the one hand it can be a relentlessly toxic, dark cluster of ill intent; on the other, it can act as the glue that binds us to new communities, friends of the past and family we’ve almost forgotten. Nostalgia kicks in when we scroll through Instagram or Facebook and see life milestones from decades gone by. It’s a gentle reminder of life’s simple preciousness.

    That’s why it makes perfect sense that, according to some estimates, 42% of parents in Britain share photos of their children online. More than 50% of those parents share these photos at least once a month. A 2018 report by the children’s commissioner found that parents share about 71 photos and 29 videos of their child every year on social media. On average, by the time the child is aged 13, parents have posted 1,300 photos and videos of them to social media.

    Continue reading...
    • chevron_right

      How your sensitive data can be sold after a data broker goes bankrupt

      news.movim.eu / ArsTechnica · Sunday, 25 February - 11:57

    Blue tone city scape and network connection concept , Map pin business district

    Enlarge (credit: Mongkol Chuewong, GettyImages )

    In 2021, a company specializing in collecting and selling location data called Near bragged that it was “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Last year the company went public with a valuation of $1 billion (via a SPAC ). Seven months later it filed for bankruptcy and has agreed to sell the company.

    But for the “1.6B people” that Near said its data represents, the important question is: What happens to Near’s mountain of location data? Any company could gain access to it through purchasing the company’s assets.

    The prospect of this data, including Near’s collection of location data from sensitive locations such as abortion clinics, being sold off in bankruptcy has raised alarms in Congress. Last week, Sen. Ron Wyden (D-Ore.) wrote the Federal Trade Commission (FTC) urging the agency to “protect consumers and investors from the outrageous conduct” of Near, citing his office’s investigation into the India-based company.

    Read 11 remaining paragraphs | Comments

    • chevron_right

      Avast ordered to stop selling browsing data from its browsing privacy apps

      news.movim.eu / ArsTechnica · Friday, 23 February - 20:37

    Avast logo on a phone in front of the words

    Enlarge (credit: Getty Images)

    Avast, a name known for its security research and antivirus apps, has long offered Chrome extensions, mobile apps, and other tools aimed at increasing privacy.

    Avast's apps would "block annoying tracking cookies that collect data on your browsing activities," and prevent web services from "tracking your online activity." Deep in its privacy policy, Avast said information that it collected would be "anonymous and aggregate." In its fiercest rhetoric, Avast's desktop software claimed it would stop "hackers making money off your searches."

    All of that language was offered up while Avast was collecting users' browser information from 2014 to 2020, then selling it to more than 100 other companies through a since-shuttered entity known as Jumpshot , according to the Federal Trade Commission. Under a proposed recent FTC order (PDF), Avast must pay $16.5 million, which is "expected to be used to provide redress to consumers," according to the FTC . Avast will also be prohibited from selling future browsing data, must obtain express consent on future data gathering, notify customers about prior data sales, and implement a "comprehensive privacy program" to address prior conduct.

    Read 9 remaining paragraphs | Comments