The research for State of Surveillance showed that you can’t drive anywhere without going through a town, city or county that’s using public surveillance of some kind, mostly license plate reading cameras. I wondered how often I might be captured on camera just driving around to meet my reporters. Would the data over time display patterns that would make my behavior predictable to anyone looking at it?
So I took a daylong drive across Cardinal Country and asked 15 law enforcement agencies, using Freedom of Information Act requests, to provide me with the Flock LPR footage of my vehicle. My journey took me over 300 miles through slices of the communities those agencies serve, including the nearly 50 cameras they employ.
Googles Monopoly isn’t Search – It’s Data, About You
What can Google track of you across the web? The results may astound you with the ways that Google can follow you around the web. It is such pervasive surveillance network, that it is almost easier to ask, where they can’t’ track you than it is to ask where they can track you. As far as we can see from the outside-looking-in, there is no other entity even remotely close to being able to track you so extensively.
If you care at all about privacy (and you should), delete every Google app from your iPhone. Buy an iCloud+ subscription and enable Private Relay. Download 1Blocker and buy a lifetime subscription. Purchase StopTheMadness Pro. And change your default Safari search engine to DuckDuckGo.
Apple will soon support encrypted RCS messaging with Android users
Apple introduced RCS support to iPhones as part of an iOS 18 update in September. While Apple’s proprietary iMessage system already supported E2EE, this wasn’t extended to RCS messaging because the previous RCS standard didn’t provide cross-platform support. Google Messages also enabled E2EE by default for RCS texts, but only conversations between Google Messages users were E2EE, and not those exchanged with iMessage users or users of other RCS clients on Android.
This is huge. It will remove the palpable discomfort I feel when communicating with Android users resistant to installing Signal (which is a distinctly animated group, in my experience — one I have a very difficult time understanding).
Apple Photos phones home on iOS 18 and macOS 15
Of course, this user never requested that my on-device experiences be "enriched" by phoning home to Cupertino. This choice was made by Apple, silently, without my consent.
From my own perspective, computing privacy is simple: if something happens entirely on my computer, then it's private, whereas if my computer sends data to the manufacturer of the computer, then it's not private, or at least not entirely private. Thus, the only way to guarantee computing privacy is to not send data off the device.
Turn off Enhanced Visual Search (in the Settings app > Apps > Photos) on every device.
Google’s AI-powered smart glasses are a little closer to being real
Google is working on a lot of AI stuff — like, a lot of AI stuff — but if you want to really understand the company’s vision for virtual assistants, take a look at Project Astra. Google first showed a demo of its all-encompassing, multimodal virtual assistant at Google I/O this spring and clearly imagines Astra as an always-on helper in your life. In reality, the tech is somewhere between “neat concept video” and “early prototype,” but it represents the most ambitious version of Google’s AI work.
Watch this video and enjoy being mildly horrified, both by how thoughtless this technology will make us if we needn't be bothered to remember our friends' taste in books and also by just how much data Google will be hoovering up about every single thing we do.
These types of interactions with AI will become anodyne in short order, especially in younger generations, but imagine the implications of a network outage on an entire generation of people who will have have needed to remember or learn anything. (I say this as a stan of the Reminders app. I use it all the time, for everything, adding reminders via Siri on every connected device I own, but yes, it's been somewhat detrimental to my ability to remember certain things. And yeah, I'd be rightly fucked if every Apple device I had went dark all at once. But boy, is it useful.)
Have you ever wondered how many people asked AI which candidate to vote for in the last election? Do you think that number isn't going to grow dramatically over time?
Citi Bikes leave ‘digital exhaust’ that could help track a killer
An electric Citi Bike like the one reportedly used as a getaway vehicle after the murder of United HealthCare C.E.O. Brian Thompson creates “digital exhaust,” streams of data that can be used to track the rider, said David Shmoys, a computer scientist at Cornell University who helped design the system.
Between the creation of a Citi Bike account, connecting it to a credit card, undocking it, riding it around the city and docking it at a new location, every user creates many “streams of digital breadcrumbs” that can help Lyft, the company that operates Citi Bike, track the user’s location, and possibly their identity, Mr. Shmoys said.
Combined with the user’s phone data and location shared with cell towers, “It is amazing how much information is conveyed,” Mr. Shmoys said.
Never ride one of these.
U.S. officials urge Americans to use encrypted apps amid cyberattack
Amid an unprecedented cyberattack on telecommunications companies such as AT&T and Verizon, U.S. officials have recommended that Americans use encrypted messaging apps to ensure their communications stay hidden from foreign hackers.
The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yet been fully remediated. Officials on a news call Tuesday refused to set a timetable for declaring the country’s telecommunications systems free of interlopers. Officials had told NBC News that China hacked AT&T, Verizon and Lumen Technologies to spy on customers.
iMessage and FaceTime Audio, always. If you need to communicate with an Android user, Signal.
John Gruber on this developing story.
China’s Hacking Reached Deep Into U.S. Telecoms
China’s recent breach of the innermost workings of the U.S. telecommunications system reached far deeper than the Biden administration has described, the chairman of the Senate Intelligence Committee said on Thursday, with hackers able to listen in on telephone conversations and read text messages.
“The barn door is still wide open, or mostly open,” the Democratic chairman, Senator Mark Warner of Virginia, a former telecommunications executive, said in an interview on Thursday.
U.S. officials said that since the hack was exposed, the Chinese intruders had seemingly disappeared, suspending their intrusion so their full activity could not be discovered. But Mr. Warner said it would be wrong to conclude that the Chinese had been ousted from the nation’s telecommunications system, or that investigators even understood how deeply they were embedded.
The Secret System Behind Every Call You Make Is About to Change Hands
Every phone call you make and text you send passes through an invisible system so critical that the FBI queries it millions of times annually. Most Americans have never heard of it. But this “ultimate little black book”–a system that maps not just phone numbers, but traces the patterns of number ownership and manages important parts of our daily communications–is about to vanish behind layers of private ownership and regulatory resistance.
🚨🚨🚨
Inside the U.S. Government-Bought Tool That Can Track Phones at Abortion Clinics
The tool, called Locate X and made by a company called Babel Street, then narrows down to the movements of a specific device which had visited the clinic. This phone started at a residence in Alabama in mid-June. It then went by a Lowe’s Home Improvement store, traveled along a highway, went past a gas station, visited a church, crossed over into Florida, and then stopped at the abortion clinic for approximately two hours. They had only been to the clinic once, according to the data.
The device then headed back, and crossed back over into Alabama. The tool also showed their potential home, based on the high frequency at which the device stopped there. The tool clearly shows this home address on its map interface.
In other words, someone had traveled from Alabama, where abortion is illegal after the June 2022 overturning of Roe v. Wade, to an abortion clinic in Florida, where abortion is limited but still available early in a pregnancy. Based on the data alone, it is unclear who exactly this person is or what they were doing, whether they were receiving an abortion themselves, assisting someone seeking one, or going to the clinic for another reason. But it would be trivial for U.S. authorities, some of which already have access to this tool, to go one step further and unmask this or other abortion clinic visitors.
Don’t ever hand your phone to the cops
No matter what, teaching people they can add their IDs to their phones means some people will inevitably leave the house without physical ID, and that means creating the opportunity for cops to demand phones — which you should never, ever do.
Don't.
Ever.
This is among one of those many, many privacy stances most people do not understand. "I don't have anything to hide," they say. "Let the cops have my phone — I don't care." Or alternatively, "I don't care if Google tracks me — I don't have anything to hide."
Let's be honest — most people don't understand how a computer works, let alone how databases compiled by thousands of computers put together tracking profiles that know everything about them. They don't know how invasive it all is, how they're handing over their entire lives when they hand over their phones (or consent to tracking).
Police Searching for Teslas Near Crimes to Seize Their Camera Footage
Police officers are scanning for Teslas that may have ambiently recorded nearby crimes on their external cameras — and even going as far as to attempt to tow the vehicles away to inspect the footage.
President of the Richmond Police Officers Association Ben Therriault told the Chronicle that officers usually attempt to ask for the owner's consent first, but sometimes resort to towing the vehicles anyway.
Federal Appeals Court Finds Geofence Warrants Are “Categorically” Unconstitutional
…the court found that even though investigators seek warrants for geofence location data, these searches are inherently unconstitutional. As the court noted, geofence warrants require a provider, almost always Google, to search “the entirety” of its reserve of location data “while law enforcement officials have no idea who they are looking for, or whether the search will even turn up a result.” Therefore, “the quintessential problem with these warrants is that they never include a specific user to be identified, only a temporal and geographic location where any given user may turn up post-search. That is constitutionally insufficient.”
Hackers Steal Text and Call Records of ‘Nearly All’ AT&T Customers
Hackers broke into a cloud platform used by AT&T and downloaded call and text records of “nearly all” of AT&T’s cellular customers across a several month period, AT&T announced early on Friday.
The worst telcom hack in history. (That we know of.)
Shopping App Temu Is ‘Dangerous Malware,’ Spying On Your Texts, Lawsuit Claims
I don’t know this is true, but I feel that it’s true.
Why Your Wi-Fi Router Doubles as an Apple AirTag
Researchers from the University of Maryland say they relied on publicly available data from Apple to track the location of billions of devices globally — including non-Apple devices like Starlink systems — and found they could use this data to monitor the destruction of Gaza, as well as the movements and in many cases identities of Russian and Ukrainian troops.
At issue is the way that Apple collects and publicly shares information about the precise location of all Wi-Fi access points seen by its devices. Apple collects this location data to give Apple devices a crowdsourced, low-power alternative to constantly requesting global positioning system (GPS) coordinates.
Cops can force suspect to unlock phone with thumbprint, US court rules
The US Constitution's Fifth Amendment protection against self-incrimination does not prohibit police officers from forcing a suspect to unlock a phone with a thumbprint scan, a federal appeals court ruled yesterday. The ruling does not apply to all cases in which biometrics are used to unlock an electronic device but is a significant decision in an unsettled area of the law.
More important than ever:
How to quickly disable Face ID and Touch ID on iPhone (and iPad)
House Votes to Extend—and Expand—a Major US Spy Program
Section 702 permits the US government to wiretap communications between Americans and foreigners overseas. Hundreds of millions of calls, texts, and emails are intercepted by government spies each with the “compelled assistance” of US communications providers.
The government may strictly target foreigners believed to possess “foreign intelligence information,” but it also eavesdrops on the conversations of an untold number of Americans each year. (The government claims it is impossible to determine how many Americans get swept up by the program.) The government argues that Americans are not themselves being targeted and thus the wiretaps are legal. Nevertheless, their calls, texts, and emails may be stored by the government for years, and can later be accessed by law enforcement without a judge’s permission.
How Evangelicals Use Digital Surveillance to Target the Unconverted
The Mapping Center for Evangelism and Church Growth’s founder and president Chris Cooper suggests using the app to conduct neighborly activities such as putting on a barbecue for potential converts, but scattered throughout the app’s training and promotional videos are suggestions to undertake the controversial practice of “prayerwalking.” An idea becoming increasingly popular among Christian supremacist groups, prayerwalking involves believers flooding so-called “un-Christian” territories in order to combat “demonic strongholds.” In practice, it varies from blessing new neighbors to gathering groups to pray in front of everything from mosques to drag bars in service of “spiritual warfare.”
I don’t want to think less of these people, but they don’t make it easy.
Trump Gives CNBC a Rambling Answer on Why He Backtracked on TikTok Ban
“Frankly, there are a lot of people on TikTok that love it,” Mr. Trump said. “There are a lot of young kids on TikTok who will go crazy without it.”
“There’s a lot of good and there’s a lot of bad with TikTok,” he added, “but the thing I don’t like is that without TikTok, you can make Facebook bigger, and I consider Facebook to be an enemy of the people, along with a lot of the media.”
Mr. Trump tried to ban TikTok while in office, pushing its Chinese parent company, ByteDance, to sell the platform to a new owner or face being blocked from American app stores. A House committee advanced legislation last week that would similarly force TikTok to cut ties with ByteDance.
This says everything you need to know about Trump. He’ll say anything that serves him in the right now. He has no impulse control, he has no ability to think strategically, he has no long-term plan.
Banning TikTok (i.e. forcing ByteDance, a Chinese company, to sell off TikTok) is the right thing to do. It’s a parasite destroying the ability of people to think critically and deeply. It has decimated the attention spans of our young people, who don’t know a world without social media. TikTok is a cancer.
And so is Facebook. Merely forcing the sale of TikTok to an American company won’t fix the problem. Letting our corporations mine the attention of our young people is better than letting China do it, but not by much.
Start treating all social media like what it is: addictive advertising.
Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies
Modern cars are internet-enabled, allowing access to services like navigation, roadside assistance and car apps that drivers can connect to their vehicles to locate them or unlock them remotely. In recent years, automakers, including G.M., Honda, Kia and Hyundai, have started offering optional features in their connected-car apps that rate people’s driving. Some drivers may not realize that, if they turn on these features, the car companies then give information about how they drive to data brokers like LexisNexis.
Automakers and data brokers that have partnered to collect detailed driving data from millions of Americans say they have drivers’ permission to do so. But the existence of these partnerships is nearly invisible to drivers, whose consent is obtained in fine print and murky privacy policies that few read.
Especially troubling is that some drivers with vehicles made by G.M. say they were tracked even when they did not turn on the feature — called OnStar Smart Driver — and that their insurance rates went up as a result.
Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records
Not to beat a dead horse, but this should scare the hell out of of everyone. It’s the biggest privacy story of the year.
🚨🚨🚨
Getting your DNA or your loved ones’ DNA sequenced means you are potentially putting people who are related to those people at risk in ways that are easily predictable, but also in ways we cannot yet predict because these databases are still relatively new. I am writing this article right now because of the hack, but my stance on this issue has been the same for years, for reasons outside of the hack.
Secretive U.S. Surveillance Program Gives Cops Access to Trillions of U.S. Phone Records
Friendly reminder that regular ol’ phone call or green bubble text message is being spied on.
FaceTime, FaceTime Audio, and iMessage are not — they are encrypted.
If an iPhone user needs to communicate with an Android user, download Signal.