Search
Content type: Guide step
Opt out of targeted ads
We have written before about the risks that targeted advertisements pose in regards to your digital privacy. To opt out of targeted ads on Windows, open the Start menu, go to Settings > Privacy > General, and disable all options (Fig. 1).
Content type: Guide step
Cómo desactivar los anuncios personalizados
Ya hemos escrito antes sobre los riesgos que suponen los anuncios personalizados para tu privacidad digital. Para cancelar los anuncios personalizados en Windows, abre el menú Inicio, ve a Configuración > Privacidad > General y desactiva todas las opciones (Fig. 1).
Content type: Guide step
uBlock Origin (que no debe confundirse con uBlock, que es un proyecto diferente) es un bloqueador de anuncios independiente y de código abierto que utiliza una lista depurada de servidores, y evita que tu navegador se conecte a estos servidores para mostrarte anuncios.
Nota: En el mercado hay muchos bloqueadores de anuncios y puedes ensayar alternativas. Al utilizar un bloqueador de anuncios independiente, de código abierto y gratuito, es más probable que evites usar productos con conflictos…
Content type: Guide step
Ad Blockers aim to prevent your browser from connecting to Ad servers and loading ads on webpages you are visiting. They can also block some parts of webpages that likely display ads. Blocking ads and connections to ad servers can help minimise the amount of data that the Adtech industry collects about you for targeted advertising.
Warning: Using an ad-blocker may cause some pages to display incorrectly or not at all. This guide also shows how you can modify the Ad Blocker's behaviour to allow…
Content type: Guide step
Para acceder a las configuraciones, haz clic en el menú de tres puntos de la parte superior derecha y pulsa Configuración > Privacidad, búsqueda y servicios (Fig. 1), o escribe edge://settings/privacy en la barra de direcciones URL y haz clic en intro.
Content type: Guide step
To access the settings, click on the three-dot menu on the upper right and then press Settings > Privacy, search, and services (Fig. 1), or type edge://settings/privacy in the URL bar and press Enter.
Content type: Guide step
Privacy Badger es una extensión para el navegador que bloquea los anuncios y los rastreadores para evitar que las empresas rastreen tus actividades en línea. Esta extensión lleva una lista actualizada de los rastreadores que detecta mediante pruebas automatizadas (que se hacen a través de servidores especializados y no desde tu computador) y periódicamente envía la lista actualizada a tu navegador. De este modo, cada vez que detecta nuevos servidores de anuncios (por ejemplo, si una nueva…
Content type: Guide step
Online trackers are small bits of code embedded directly into a website's main code which collect data points about you and your browsing activity. This may include the pages you visit, how long you spend on them, where you scroll and the links you click on. On top of the online advertising industry, there are other actors that can potentially make use of trackers to track your online activity, including governments and/or law enforcement agencies.
There are extensions you can add to your…
Content type: Guide step
Browser cookies allow websites to preserve session data such as your login credentials or items in your shopping basket so that you don't lose information when you close the page. Unfortunately, they are often abused to track your online activity across the web. Using a dedicated add-on, you can clean your cookies regularily to ensure that no unwanted cookie is kept in your browser, limiting the efficienty of online trackers.
This guide explain how to install Cookie AutoDelete, a web-browser…
Content type: Guide step
Las cookies permiten que los sitios web guarden los datos de una sesión, como las credenciales de acceso o los artículos en el carrito de compras, con el propósito de que no pierdas la información al cerrar la página. Desafortunadamente, con frecuencia se abuse de las cookies para rastrear tu actividad en línea en la web. Utilizar una extensión especializada te permite limpiar las cookies con regularidad para asegurarte de que tu navegador no guarde ninguna cookie no deseada, lo que permite…
Content type: Examples
As working from home expands, employers are ramping up surveillance using the features built into software such as Microsoft Teams and Slack, which report when employees are active, or requiring employees to attend early-morning video conferences with webcams switched on. In early 2020, PwC developed a facial recognition tool to log when employees are away from their home computer screens.
Source: https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-…
Content type: Examples
In October UK health officials discovered that limitations on the number of rows on an older version of Microsoft’s spreadsheet software Excel led the system to miss 16,000 positive coronavirus tests and fail to alert an estimated 50,000 people who had been in close contact with them that they should quarantine. About half of the missed cases are thought to have been in northwest England, where infection rates were already rising. The government’s science advisors recommended revamping the…
Content type: Explainer
The lead author of this piece is Elettra Bietti, a doctoral student at Harvard Law School and volunteer for Privacy International
Network effects
Social media companies and other digital business models are driven by so-called network effects. A network effect (also called a network externality) is a service’s propensity to improve functionally as the number of people using it and the amount of data collected through it increases. For example, as the number of Facebook users increases, Facebook…
Content type: News & Analysis
Banning TikTok? It's time to fix the out-of-control data exploitation industry - not a symptom of it
Chinese apps and tech companies have been at the forefront of the news recently. Following India's ban of 59 chinese apps in July, President Trump announced his desire to ban TikTok, shortly followed by his backing of Microsoft's intention to buy the US branch of its parent company ByteDance. Other than others lip syncing his public declaration, what does President Trump fear from this app, run by a firm, based in China?
It's all about that data
One clear answer emerges: the exploitation of…
Content type: Long Read
Immunity Passports have become a much hyped tool to cope with this pandemic and the economic crisis. Essentially, with immunity passports those who are 'immune' to the virus would have some kind of certified document - whether physical or digital. This 'passport' would give them rights and privileges that other members of the community do not have.
This is yet another example of a crisis-response that depends on technology, as we saw with contact-tracing apps. And it is also yet another…
Content type: Examples
Hours before OpenDemocracy filed suit to compel the UK government to release all the contracts governing its deals with a list of technology firms including Amazon, Microsoft, Google, Palantir, and Faculty, the UK government released the contracts. Faculty is being paid more than £1 million to provide AI services for the NHS, and the companies involved in the NHS data store project, including Faculty and Palantir, were originally granted intellectual property rights and were allowed to train…
Content type: Long Read
Over the last two decades we have seen an array of digital technologies being deployed in the context of border controls and immigration enforcement, with surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of people and undermining peoples’ dignity.
And yet this is happening with little public scrutiny, often in a regulatory or legal void and without understanding and consideration to the impact on migrant communities at the border and…
Content type: Examples
Contact tracing apps will only work effectively if people trust them and install them in sufficient numbers. Soon after its launch, however, the North Dakota contact tracing app people were already dropping it after posting complaints in the Google App store. In a survey of 798 Americans, researchers at Microsoft Research, Johns Hopkins University, and the University of Zurich found that nearly half said they would not install a COVID-19 contact tracing app that has false negatives or could…
Content type: Long Read
Photo by Cade Roberts on Unsplash
For those of you who don't spend the most productive part of your day scanning the news for developments about data and competition, here's what has been going on in the UK since summer 2019.
Basically, the UK competition authority started an investigation into online platforms and digital advertising last summer, and issued their preliminary findings in December 2019, concluding that Facebook and Google are very powerful in the search engine and social media…
Content type: News & Analysis
This week International Health Day was marked amidst a global pandemic which has impacted every region in the world. And it gives us a chance to reflect on how tech companies, governments, and international agencies are responding to Covid-19 through the use of data and tech.
All of them have been announcing measures to help contain or respond to the spread of the virus; but too many allow for unprecedented levels of data exploitation with unclear benefits, and raising so many red flags…
Content type: Examples
The World Health Organization will partner with major blockchain and technology companies to launch a distributed ledger-based platform to be dubbed "MiPasa" that it says will facilitate "fully private information sharing between individuals, state authorities, and health institutions" by cross-referencing siloed location and health data to create global insights. The WHO believes the system can ensure patient privacy. MiPasa also expects to host an array of publicly accessible analytics tools…
Content type: News & Analysis
Cloud extraction allows law enforcement agencies to take huge amounts of your data from the Cloud via a legal back door. If law enforcement seize your phone or take it from a victim of crime, they can extract tokens or passwords from the device which lets them get access to data from apps such as Uber, Instagram, Slack, Gmail, Alexa and WhatsApp.
In so doing, law enforcement agencies can avoid official channels through cloud companies such as Google, Apple…
Content type: Long Read
Mobile phones remain the most frequently used and most important digital source for law enforcement investigations. Yet it is not just what is physically stored on the phone that law enforcement are after, but what can be accessed from it, primarily data stored in the Cloud.
Cellebrite, a prominent vendor of surveillance technology used to extract data from mobile phones, notes in its Annual Trend Survey that in approximately half of all investigations, cloud data ‘appears’ and that…
Content type: News & Analysis
CC: BY (Kirill Sharkovski)-SA
Este artículo fue escrito por Jamila Venturini, Coordinadora regional de Derechos Digitales. El artículo fue publicado por primera vez aquí. This article is available in English.
La implementación de programas que condicionan el acceso a servicios básicos por medio de vigilancia estatal y privada agudizan la inequidad imperante en el continente.
Mientras la brecha entre ricos y pobres se incrementa en el mundo, América Latina sigue siendo la región donde la…
Content type: News & Analysis
Picture: CC: BY (Kirill Sharkovski)-SA
This article was written by Jamila Venturini from Derechos Digitales. The original version (in Spanish) is available here.
How implementing social protection programmes that condition access to basic services to state and private surveillance exacerbate the prevailing inequality on the continent.
While the gap between rich and poor is increasing in the world, Latin America remains the most unequal region of the world. According to the Economic…
Content type: News & Analysis
A new UK Times report claims that “WhatsApp, Facebook and other social media platforms will be forced to disclose encrypted messages from suspected terrorists, paedophiles and other serious criminals under a new treaty between the UK and the US.”
Several other media outlets have followed up on the report, with headlines such as “UK and US set to sign treaty allowing UK police ‘back door’ access to WhatsApp and other ‘end to end encrypted’ messaging platforms”.
While the…
Content type: News & Analysis
Citing inaccuracy, major manufacturer declines to combine facial recognition and body worn cameras - but accurate or not, real-time facial recognition should never be coupled with police body-worn cameras
Axon Enterprise Inc.—a major manufacturer of police body-worn cameras and digital evidence management systems that also partners with Microsoft to provide services to law enforcement—announced that the company would refrain from equipping police body-worn cameras with facial…
Content type: News & Analysis
Privacy International has joined a global coalition of privacy campaigners, tech companies, and technology experts to respond to proposals by British intelligence chiefs aimed at allowing them access to encrypted messaging apps such as WhatsApp or Signal.
If implemented, the proposals would allow government authorities to force messaging platforms to silently add a law enforcement participant to a group chat or call.
Such a capability poses serious threats to…
Content type: Examples
In November 2018, Germany's Federal Cyberintelligence Agency (Bundesamt für Sicherheit in der Informationstechnik, or BSI) released a highly detailed analysis of the myriad ways that Windows 10 tracks users and showing that only enterprise versions of Windows have the ability to turn them off. BSI found that under the Full Tracking setting Windows runs 534 tracking processes and 503 on the Basic setting. Enterprise versions have an extra "security" setting available that reduces the number to…
Content type: Examples
In November 2018, a report by the consultancy Privacy Company, on behalf of the Dutch Ministry of Justice, found that Microsoft could be breaking European data collection rules because its Office software was collecting large amounts of personal data including email subject lines and snippets of content typed into emails or Word. The data was originally transmitted to the US, but in an effort to comply with GDPR Microsoft had switched to storing the data in Europe. The Dutch government was…