overflow@lemmy.ml to Privacy@lemmy.ml · 2 months agoYour TV set has become a digital billboard. And it’s only getting worse.plus-squarearstechnica.comexternal-linkmessage-square11fedilinkarrow-up1114arrow-down18
arrow-up1106arrow-down1external-linkYour TV set has become a digital billboard. And it’s only getting worse.plus-squarearstechnica.comoverflow@lemmy.ml to Privacy@lemmy.ml · 2 months agomessage-square11fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 5 months agoHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.coexternal-linkmessage-square56fedilinkarrow-up1365arrow-down15
arrow-up1360arrow-down1external-linkHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.cooverflow@lemmy.ml to Privacy@lemmy.ml · 5 months agomessage-square56fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 5 months agoHow secure is Secure Erase (EACAS)?plus-squareeclecticlight.coexternal-linkmessage-square1fedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkHow secure is Secure Erase (EACAS)?plus-squareeclecticlight.cooverflow@lemmy.ml to Privacy@lemmy.ml · 5 months agomessage-square1fedilink
overflow@lemmy.ml to Libre Culture@lemmy.ml · 7 months agoOpen Source, Supply Chains, and Bears (oh my!)plus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkOpen Source, Supply Chains, and Bears (oh my!)plus-squarescottarc.blogoverflow@lemmy.ml to Libre Culture@lemmy.ml · 7 months agomessage-square0fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 7 months agoAndroid 15 may let you control when your location is shared with carriersplus-squarewww.androidauthority.comexternal-linkmessage-square12fedilinkarrow-up139arrow-down11
arrow-up138arrow-down1external-linkAndroid 15 may let you control when your location is shared with carriersplus-squarewww.androidauthority.comoverflow@lemmy.ml to Privacy@lemmy.ml · 7 months agomessage-square12fedilink
overflow@lemmy.ml to Security@lemmy.ml · 8 months agoSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comoverflow@lemmy.ml to Security@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 9 months agoHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comoverflow@lemmy.ml to Privacy@lemmy.ml · 9 months agomessage-square0fedilink
overflow@lemmy.ml to Security@lemmy.ml · 10 months agoWidespread Weak Keys in Network Devices - factorable.netplus-squarefactorable.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWidespread Weak Keys in Network Devices - factorable.netplus-squarefactorable.netoverflow@lemmy.ml to Security@lemmy.ml · 10 months agomessage-square0fedilink
overflow@lemmy.ml to Libre Culture@lemmy.ml · 1 year agoShould governments stop computer makers from restricting what we can install?plus-squareopen.substack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShould governments stop computer makers from restricting what we can install?plus-squareopen.substack.comoverflow@lemmy.ml to Libre Culture@lemmy.ml · 1 year agomessage-square0fedilink