<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ePanorama.net &#187; Spying</title>
	<atom:link href="http://www.epanorama.net/blog/category/spying/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 20:31:27 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>Baltic undersea cables cut again</title>
		<link>https://www.epanorama.net/blog/2024/12/27/baltic-undersea-cables-cut-again/</link>
		<comments>https://www.epanorama.net/blog/2024/12/27/baltic-undersea-cables-cut-again/#comments</comments>
		<pubDate>Fri, 27 Dec 2024 20:30:42 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Electrical power]]></category>
		<category><![CDATA[Finland]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Telecom and Networking]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196771</guid>
		<description><![CDATA[<p>Finland seized an oil tanker after the latest in a series of disruptions to undersea power and telecom infrastructure. Four telecommunication cables connecting Finland out of service. Finnish authorities board a ship in the Baltic Sea that the West suspects is linked to Russia, a day after an underwater Finland-Estonia electricity cable was cut and <a class="moretag" href="https://www.epanorama.net/blog/2024/12/27/baltic-undersea-cables-cut-again/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Finland seized an oil tanker after the latest in a series of disruptions to undersea power and telecom infrastructure. Four telecommunication cables connecting Finland out of service.</p>
<p>Finnish authorities board a ship in the Baltic Sea that the West suspects is linked to Russia, a day after an underwater Finland-Estonia electricity cable  was cut and several telecom fiber optic cables were damaged.</p>
<p>Lloyd’s List on-line magazine claims that Russia-linked cable-cutting tanker seized by Finland ‘was loaded with spying equipment’</p>
<p>The incident has intensified fears in Europe over a Russian hybrid war targeting critical infrastructure in the Baltic and beyond. Estonia navy to protect undersea power link after main cable damaged.</p>
<p>Sources:<br />
<a href="https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment">https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment</a><br />
<a href="https://www.nytimes.com/2024/12/26/world/europe/finland-estonia-cables-russia.html">https://www.nytimes.com/2024/12/26/world/europe/finland-estonia-cables-russia.html</a><br />
<a href="https://www.theguardian.com/world/2024/dec/25/finland-estonia-power-cable-hit-in-latest-baltic-sea-incident">https://www.theguardian.com/world/2024/dec/25/finland-estonia-power-cable-hit-in-latest-baltic-sea-incident</a><br />
<a href="https://yle.fi/a/74-20133531">https://yle.fi/a/74-20133531</a><br />
<a href="https://www.bbc.com/news/articles/c1elq7lx9qdo">https://www.bbc.com/news/articles/c1elq7lx9qdo</a><br />
<a href="https://www.aljazeera.com/news/2024/12/27/did-a-russian-shadow-ship-cut-the-finland-estonia-undersea-baltic-cable">https://www.aljazeera.com/news/2024/12/27/did-a-russian-shadow-ship-cut-the-finland-estonia-undersea-baltic-cable</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2024/12/27/baltic-undersea-cables-cut-again/feed/</wfw:commentRss>
		<slash:comments>44</slash:comments>
		</item>
		<item>
		<title>Stingray and Hailstorm</title>
		<link>https://www.epanorama.net/blog/2020/08/06/stingray-and-hailstorm/</link>
		<comments>https://www.epanorama.net/blog/2020/08/06/stingray-and-hailstorm/#comments</comments>
		<pubDate>Thu, 06 Aug 2020 18:36:23 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Telecom and Networking]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186660</guid>
		<description><![CDATA[<p>Security researchers say they have developed a new technique to detect modern cell-site simulators. Little is known about stingrays that exploit flaws in the way that cell phones connect to 2G cell networks, because they are deliberately shrouded in secrecy. Most of those flaws are fixed in the 4G networks, though not all. Newer cell <a class="moretag" href="https://www.epanorama.net/blog/2020/08/06/stingray-and-hailstorm/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Security researchers say they have developed a new technique to detect modern cell-site simulators.</p>
<p>Little is known about stingrays that exploit flaws in the way that cell phones connect to 2G cell networks, because they are deliberately shrouded in secrecy. </p>
<p>Most of those flaws are fixed in the 4G networks, though not all. Newer cell site simulators, called “Hailstorm” devices, take advantage of similar flaws in 4G that let police snoop on newer phones and devices. Researchers at the Electronic Frontier Foundation have discovered a new technique that can detect Hailstorm devices</p>
<p>Read more:</p>
<p><a href="https://techcrunch.com/2020/08/05/crocodile-hunter-4g-stingray-cell/?tpcc=ECFB2020">https://techcrunch.com/2020/08/05/crocodile-hunter-4g-stingray-cell/?tpcc=ECFB2020</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2020/08/06/stingray-and-hailstorm/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Mobile Apps Are Selling Your Location</title>
		<link>https://www.epanorama.net/blog/2018/12/10/mobile-apps-are-selling-your-location/</link>
		<comments>https://www.epanorama.net/blog/2018/12/10/mobile-apps-are-selling-your-location/#comments</comments>
		<pubDate>Mon, 10 Dec 2018 20:28:31 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Spying]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180738</guid>
		<description><![CDATA[<p>https://www.tomsguide.com/us/apps-selling-location,news-28798.html Back in October, Tom&#8217;s Guide reportedthat it&#8217;s possible for cheap mobile advertisements to spy on you through your phone. Sales of location-targeted advertising reached an estimated $21 billion this year. This morning, a report from the New York Times warns that smartphone apps do that also for profit: More than 1,000 popular apps contain <a class="moretag" href="https://www.epanorama.net/blog/2018/12/10/mobile-apps-are-selling-your-location/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.tomsguide.com/us/apps-selling-location,news-28798.html">https://www.tomsguide.com/us/apps-selling-location,news-28798.html</a><br />
<span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">Back in October,<span> </span></span><a href="https://www.tomsguide.com/us/mobile-ad-tracking-hack,news-28409.html" style="margin: 0px; padding: 0px; border: 0px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-numeric: inherit; font-variant-east-asian: inherit; font-weight: 400; font-stretch: inherit; line-height: inherit; font-family: Lato, " open sans="sans" source="source" pro="pro" arial="arial" _="_-webkit-text-stroke-width:_" _17.234px="_17.234px" baseline="baseline" none="none" rgb26="rgb26" _152="_152" _238="_238" pointer="pointer" rgb255="rgb255" _255="_255" normal="normal" _2="_2" left="left" _0px="_0px">Tom&#8217;s Guide reported</a><span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">that it&#8217;s possible for cheap mobile advertisements to spy on you through your phone. S<span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">ales of location-targeted advertising reached an estimated $21 billion this year.</span></span></p>
<p>This morning, a report from the<br />
<a class="hawk-link-parsed" href="https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html" style="margin: 0px; padding: 0px; border: 0px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-numeric: inherit; font-variant-east-asian: inherit; font-weight: 400; font-stretch: inherit; line-height: inherit; font-family: Lato, " open sans="sans" source="source" pro="pro" arial="arial" _="_-webkit-text-stroke-width:_" _17.234px="_17.234px" baseline="baseline" none="none" rgb26="rgb26" _152="_152" _238="_238" pointer="pointer" rgb255="rgb255" _255="_255" normal="normal" _2="_2" left="left" _0px="_0px">New York Times</a><span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left"> warns that smartphone apps do</span> that also for profit: <span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">More than 1,000 popular apps contain location-sharing code</span>.</p>
<p>PRIVACY TIP: <span style="color:rgb(38,51,65); font-family:Lato," opensanssourcesansproarial="opensanssourcesansproarial" _17.234px="font-size:_17.234px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left"> You can deny apps access your location by going into your Settings and revoking permissions.<span> </span></span></p>
<h1 class="rad-headline" style="font-size:34px; line-height:39px; font-weight:200; font-style:normal; font-family:nyt-cheltenham,georgia," timesnewromantimesserif="timesnewromantimesserif" _0px0px12px="margin:_0px0px12px" optimizelegibility="text-rendering:optimizelegibility" kern="font-feature-settings:kern" auto="_-webkit-font-smoothing:auto" rgb515151="color:rgb515151" normal="white-space:normal" _2text-indent0px="orphans:_2text-indent0px" none="text-transform:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" left="text-align:left">Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret</h1>
<p><a href="https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html?smid=tw-share">https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html?smid=tw-share</a></p>
<p class="rad-summary" style="margin:0px0px12px; font-size:18px; line-height:1.4375rem; font-weight:400; font-style:normal; font-family:nyt-cheltenham-sh,georgia," timesnewromantimesserif="timesnewromantimesserif" block="display:block" rgb153153153="color:rgb153153153" antialiased="_-webkit-font-smoothing:antialiased" optimizelegibility="text-rendering:optimizelegibility" kern="font-feature-settings:kern" normal="white-space:normal" _2text-indent0px="orphans:_2text-indent0px" none="text-transform:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" left="text-align:left">Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2018/12/10/mobile-apps-are-selling-your-location/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>EU censorship machines and link tax laws are nearing the finish line</title>
		<link>https://www.epanorama.net/blog/2018/05/29/eu-censorship-machines-and-link-tax-laws-are-nearing-the-finish-line/</link>
		<comments>https://www.epanorama.net/blog/2018/05/29/eu-censorship-machines-and-link-tax-laws-are-nearing-the-finish-line/#comments</comments>
		<pubDate>Tue, 29 May 2018 07:02:37 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Journalism and media]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Telecom and Networking]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177904</guid>
		<description><![CDATA[<p>Julia Reda (from European Parliament) writes at EU censorship machines and link tax laws are nearing the finish line page that EU governments agree on copyright reform, that needs EU parliament approval, to let news sites charge aggregators for snippets, force upload filters on websites. This sound to me like a pretty bad idea based <a class="moretag" href="https://www.epanorama.net/blog/2018/05/29/eu-censorship-machines-and-link-tax-laws-are-nearing-the-finish-line/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Julia Reda (from European Parliament) writes at <!--StartFragment--><a href="https://juliareda.eu/2018/05/censorship-machines-link-tax-finish-line/">EU censorship machines and link tax laws are nearing the finish line</a><!--EndFragment--> page that<br />
EU governments agree on copyright reform, that needs EU parliament approval, to let news sites charge aggregators for snippets, force upload filters on websites. This sound to me like a pretty bad idea based on what I have read &#8211; and I recommend you to read also to make your own mind on this.</p>
<p><a href="https://juliareda.eu/2018/05/censorship-machines-link-tax-finish-line/">P<!--StartFragment-->eople across the world are learning what they need to do to comply with</a> the <a href="http://www.epanorama.net/newepa/2018/04/06/wtf-is-gdpr/">EU General Data Protection Regulation</a>,<!--StartFragment--> and many are finding themselves <strong>wishing they had involved themselves in the debate</strong> when the law was decided more than two years ago.<!--StartFragment--> It seem that wide <a href="http://www.epanorama.net/newepa/2018/04/06/wtf-is-gdpr/">public debate was happening too late</a>. <!--EndFragment--><!--EndFragment--><!--EndFragment--></p>
<p>GDPR details have caused a lots of work and are in many details annoying (remember all kinds of &#8220;agree&#8221; pages and e-mails popping everywhere), but in general the aim for demanding companies to keep better record data of people is a good thing. So it seems that GDPR is generally good, but somewhat annoying.</p>
<p><!--StartFragment-->In stark contrast to the GDPR, <a href="https://juliareda.eu/2018/05/censorship-machines-link-tax-finish-line/">experts near-unanimously agree that the copyright reform law</a>, as it stands now, <a href="https://juliareda.eu/eu-copyright-reform/#criticism" target="_blank" rel="noopener">is really bad</a>. <!--StartFragment--><a href="http://data.consilium.europa.eu/doc/document/ST-8672-2018-INIT/en/pdf" target="_blank" rel="noopener">Their latest proposal</a> would still <a href="https://juliareda.eu/2018/05/censorship-machines-link-tax-finish-line/"><strong>force internet platforms to implement censorship machines</strong> – and <strong>makes a total mess out of the planned extra copyright for news sites</strong></a> by allowing each member state to implement it differently.<!--EndFragment--><!--EndFragment--></p>
<p style="text-align: justify;"><!--StartFragment--></p>
<p><!--EndFragment-->&nbsp;</p>
<p><!--StartFragment--><a href="https://juliareda.eu/2018/05/censorship-machines-link-tax-finish-line/"><strong>On the topic of copyright, you NOW have the chance to have an influence</strong></a> – a chance that will be long lost in two years, when we’ll all be “suddenly” faced with the challenge of having to implement <a href="https://juliareda.eu/eu-copyright-reform/censorship-machines/" target="_blank" rel="noopener">upload filters</a> and the <a href="https://juliareda.eu/eu-copyright-reform/extra-copyright-for-news-sites/" target="_blank" rel="noopener">“link tax”</a> – or running into new limits on what we can do using the web services we rely on. <!--StartFragment--><strong>If you are opposed to these ideas, please raise your voice now.</strong> <!--EndFragment--><!--EndFragment--></p>
<p><a href="https://openclipart.org/detail/227032/copyright-beware"><img class="alignnone" src="https://openclipart.org/image/2400px/svg_to_png/227032/copyright_beware.png" alt="" width="1999" height="2400" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2018/05/29/eu-censorship-machines-and-link-tax-laws-are-nearing-the-finish-line/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>A bug in cell phone tracking firm&#8217;s website leaked millions of Americans&#8217; real-time locations &#124; ZDNet</title>
		<link>https://www.epanorama.net/blog/2018/05/19/a-bug-in-cell-phone-tracking-firms-website-leaked-millions-of-americans-real-time-locations-zdnet/</link>
		<comments>https://www.epanorama.net/blog/2018/05/19/a-bug-in-cell-phone-tracking-firms-website-leaked-millions-of-americans-real-time-locations-zdnet/#comments</comments>
		<pubDate>Sat, 19 May 2018 13:17:16 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Spying]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177756</guid>
		<description><![CDATA[<p>https://www.zdnet.com/article/cell-phone-tracking-firm-exposed-millions-of-americans-real-time-locations/ Another week and another privacy disaster. Now a company that collects the real-time location data on millions of cell phone customers across North America had a bug in its website that may have exposed nearly every cell phone customer in the US and Canada, some 200 million customers. The LocationSmart page required explicit consent <a class="moretag" href="https://www.epanorama.net/blog/2018/05/19/a-bug-in-cell-phone-tracking-firms-website-leaked-millions-of-americans-real-time-locations-zdnet/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.zdnet.com/article/cell-phone-tracking-firm-exposed-millions-of-americans-real-time-locations/">https://www.zdnet.com/article/cell-phone-tracking-firm-exposed-millions-of-americans-real-time-locations/</a></p>
<p>Another week and another privacy disaster.</p>
<p>Now a<span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;"> company that collects the real-time location data on millions of cell phone customers across North America had a bug in its website </span>that <span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">may have exposed nearly every cell phone customer in the US and Canada, some 200 million customers.</span></p>
<p><span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">The <span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">LocationSmart</span></span> page<span> </span><a href="https://archive.li/TmOa6" style="text-decoration: none; cursor: pointer; color: rgb(17, 116, 199); font-family: Raleway, sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255);">required explicit consent</a> <span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">from the user before their location data can be used</span>, b<span style="color: rgb(8,14,20); font-family: Raleway,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">ut that website had a bug that allowed anyone to track someone&#8217;s location silently without their permission.</span></p>
<p><img class="alignnone wp-image-177755 size-full" src="http://www.epanorama.net/newepa/wp-content/uploads/2018/05/wpid-screenshot_20180519-160323971505361.png" width="1080" height="1920" data-temp-aztec-id="98f07c21-ef3c-481b-be49-8e5b3ba98e2b"></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2018/05/19/a-bug-in-cell-phone-tracking-firms-website-leaked-millions-of-americans-real-time-locations-zdnet/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It&#8217;s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You &#124; IFLScience</title>
		<link>https://www.epanorama.net/blog/2018/03/30/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you-iflscience/</link>
		<comments>https://www.epanorama.net/blog/2018/03/30/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you-iflscience/#comments</comments>
		<pubDate>Fri, 30 Mar 2018 07:49:55 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Spying]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176957</guid>
		<description><![CDATA[<p>http://www.iflscience.com/technology/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you/ It&#8217;s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You. Following the recent Cambridge Analytica scandal, many people are expressing concern about Facebook and how much it knows about them. &#8220;If the product is free, you are the product. If they&#8217;re making money, they probably have a lot of your data <a class="moretag" href="https://www.epanorama.net/blog/2018/03/30/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you-iflscience/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.iflscience.com/technology/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you/">http://www.iflscience.com/technology/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you/</a></p>
<p>It&#8217;s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You. Following the recent Cambridge Analytica scandal, many people are expressing concern about Facebook and how much it knows about them.</p>
<p>&#8220;If the product is free, you are the product. If they&#8217;re making money, they probably have a lot of your data to sell.&#8221;</p>
<p>Google is pretty much the master of collecting and monetizing big data. Apple knows a lot about you too.</p>
<p>TomTom obviously has a lot of data on where you&#8217;ve traveled. Amazon Alexa is always listening with microphones in Echo always on.</p>
<p>Twitter last year they updated their privacy policy in order to collect more data. <img src="http://www.epanorama.net/newepa/wp-content/uploads/2018/03/wpid-screenshot_20180330-1036361164321866.png" class="alignnone wp-image-176956 size-full" width="1080" height="1920"></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2018/03/30/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you-iflscience/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Permissionless data slurping: Why Google&#8217;s latest bombshell matters • The Register</title>
		<link>https://www.epanorama.net/blog/2017/11/23/permissionless-data-slurping-why-googles-latest-bombshell-matters-%e2%80%a2-the-register/</link>
		<comments>https://www.epanorama.net/blog/2017/11/23/permissionless-data-slurping-why-googles-latest-bombshell-matters-%e2%80%a2-the-register/#comments</comments>
		<pubDate>Thu, 23 Nov 2017 18:45:19 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Spying]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=61403</guid>
		<description><![CDATA[<p>https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: &#8220;When a wise man points at the Moon, an idiot looks at his finger.&#8221; Google may have been hoping that you were examining a finger, not reading&#160;a Quartz story&#160;yesterday, which reveals how Android phones send <a class="moretag" href="https://www.epanorama.net/blog/2017/11/23/permissionless-data-slurping-why-googles-latest-bombshell-matters-%e2%80%a2-the-register/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/">https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/</a></p>
<p>Somebody else than just your mobile operator gets to know where you are:</p>
<p><span style="color: rgb(0, 0, 0); font-family: Arimo, Arial, FreeSans, Helvetica, sans-serif; background-color: rgb(255, 255, 255);">According to an old Chinese proverb: &#8220;When a wise man points at the Moon, an idiot looks at his finger.&#8221; Google may have been hoping that you were examining a finger, not reading&nbsp;</span><a target="_blank" href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/" style="color: rgb(87, 121, 142); font-family: Arimo, Arial, FreeSans, Helvetica, sans-serif; background-color: rgb(255, 255, 255);">a Quartz story</a><span style="color: rgb(0, 0, 0); font-family: Arimo, Arial, FreeSans, Helvetica, sans-serif; background-color: rgb(255, 255, 255);">&nbsp;yesterday, which reveals how Android phones send location data to Google without you even knowing it.</span></p>
<p><a href="http://www.epanorama.net/newepa/wp-content/uploads/2017/11/wpid-screenshot_20171123-20444597027985.png"><img src="http://www.epanorama.net/newepa/wp-content/uploads/2017/11/wpid-screenshot_20171123-20444597027985.png" alt="" class="wp-image-61402 alignnone size-full" width="1080" height="1920"></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2017/11/23/permissionless-data-slurping-why-googles-latest-bombshell-matters-%e2%80%a2-the-register/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No, you’re not being paranoid. Sites really are watching your every move &#124; Ars Technica</title>
		<link>https://www.epanorama.net/blog/2017/11/21/no-youre-not-being-paranoid-sites-really-are-watching-your-every-move-ars-technica/</link>
		<comments>https://www.epanorama.net/blog/2017/11/21/no-youre-not-being-paranoid-sites-really-are-watching-your-every-move-ars-technica/#comments</comments>
		<pubDate>Tue, 21 Nov 2017 18:52:09 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=61362</guid>
		<description><![CDATA[<p>https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you&#8217;re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors&#8217; keystrokes, mouse movements, and scrolling behavior in real time&#8230; <a class="moretag" href="https://www.epanorama.net/blog/2017/11/21/no-youre-not-being-paranoid-sites-really-are-watching-your-every-move-ars-technica/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/">https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/</a></p>
<p>If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you&#8217;re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors&#8217; keystrokes, mouse movements, and scrolling behavior in real time&#8230;</p>
<p><a href="http://www.epanorama.net/newepa/wp-content/uploads/2017/11/wpid-screenshot_20171121-204415221627170.png"><img src="http://www.epanorama.net/newepa/wp-content/uploads/2017/11/wpid-screenshot_20171121-204415221627170.png" alt="" class="wp-image-61361 alignnone size-full" width="1080" height="1920"></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2017/11/21/no-youre-not-being-paranoid-sites-really-are-watching-your-every-move-ars-technica/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows &amp; Linux PCs</title>
		<link>https://www.epanorama.net/blog/2017/07/10/wikileaks-unveils-cia-implants-that-steal-ssh-credentials-from-windows-linux-pcs/</link>
		<comments>https://www.epanorama.net/blog/2017/07/10/wikileaks-unveils-cia-implants-that-steal-ssh-credentials-from-windows-linux-pcs/#comments</comments>
		<pubDate>Mon, 10 Jul 2017 13:54:00 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=57273</guid>
		<description><![CDATA[<p>http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1 WikiLeaks has today&#160;published&#160;the 15th batch of its ongoing&#160;Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems. BothanSpy&#160;implant is for Microsoft Windows Xshell client. Gyrfalcon&#160;targets the OpenSSH client on various distributions of Linux OS: CentOS, <a class="moretag" href="https://www.epanorama.net/blog/2017/07/10/wikileaks-unveils-cia-implants-that-steal-ssh-credentials-from-windows-linux-pcs/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1">http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1</a></p>
<p><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">WikiLeaks has today&nbsp;</span><a href="https://wikileaks.org/vault7/#BothanSpy" rel="nofollow" target="_blank" style="margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 17px; line-height: inherit; font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; vertical-align: baseline; color: rgb(66, 139, 202); outline: none; background-color: rgb(255, 255, 255);">published</a><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">&nbsp;the 15th batch of its ongoing&nbsp;</span><a href="http://thehackernews.com/2017/03/wikileaks-cia-vault7-leak.html" target="_blank" style="margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-stretch: inherit; font-size: 17px; line-height: inherit; font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; vertical-align: baseline; color: rgb(66, 139, 202); outline: none; background-color: rgb(255, 255, 255);">Vault 7 leak</a><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems.</span><br />
<span style="margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-weight: 600; font-stretch: inherit; font-size: 17px; line-height: inherit; font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; vertical-align: baseline; color: rgb(33, 33, 33); background-color: rgb(255, 255, 255);">BothanSpy</span><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">&nbsp;implant is for Microsoft Windows Xshell client. </span><span style="margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-weight: 600; font-stretch: inherit; font-size: 17px; line-height: inherit; font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; vertical-align: baseline; color: rgb(33, 33, 33); background-color: rgb(255, 255, 255);">Gyrfalcon</span><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">&nbsp;targets the OpenSSH client on various distributions of Linux OS: CentOS, Debian, RHEL (Red Hat), openSUSE and Ubuntu.</span><br />
<span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);">Both implants steal user credentials for all active SSH sessions and then sends them to a CIA-controlled server.</span><span style="color: rgb(33, 33, 33); font-family: &quot;Source Sans Pro&quot;, &quot;Helvetica Neue&quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; background-color: rgb(255, 255, 255);"><br />
</span></p>
<p><a href="http://www.epanorama.net/newepa/wp-content/uploads/2017/07/wpid-Screenshot_20170710-164958.png"><img src="http://www.epanorama.net/newepa/wp-content/uploads/2017/07/wpid-Screenshot_20170710-164958.png" alt="" class="wp-image-57272 alignnone size-full" width="1080" height="1920"></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2017/07/10/wikileaks-unveils-cia-implants-that-steal-ssh-credentials-from-windows-linux-pcs/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>OutlawCountry: CIA&#8217;s Hacking Tool For Linux Computers Revealed</title>
		<link>https://www.epanorama.net/blog/2017/07/03/outlawcountry-cias-hacking-tool-for-linux-computers-revealed/</link>
		<comments>https://www.epanorama.net/blog/2017/07/03/outlawcountry-cias-hacking-tool-for-linux-computers-revealed/#comments</comments>
		<pubDate>Mon, 03 Jul 2017 19:09:40 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Spying]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=57120</guid>
		<description><![CDATA[<p>https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/ Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with&#160;iptables command. Those rules can modify and&#160;redirect the network traffic. The OutlawCountry’s prerequisites for operation are <a class="moretag" href="https://www.epanorama.net/blog/2017/07/03/outlawcountry-cias-hacking-tool-for-linux-computers-revealed/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/">https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/</a></p>
<p><em style="box-sizing: border-box; color: rgb(34, 34, 34); font-family: &quot;PT Sans&quot;; font-size: 17px; background-color: rgb(255, 255, 255);">Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with&nbsp;iptables command. Those rules can modify and&nbsp;redirect the network traffic.</em><br />
<em style="box-sizing: border-box; color: rgb(34, 34, 34); font-family: &quot;PT Sans&quot;; font-size: 17px; background-color: rgb(255, 255, 255);"><span style="font-family: &quot;PT Sans&quot;; font-style: normal;">The OutlawCountry’s prerequisites for operation are a compatible 64-bit CentOS/RHEL 6.x operating system (Linux 2.6 kernel), shell access and root access to the target. The target must have a “nat” netfilter table.</span></em></p>
<p><em style="box-sizing: border-box; color: rgb(34, 34, 34); font-family: &quot;PT Sans&quot;; font-size: 17px; background-color: rgb(255, 255, 255);"><span style="font-family: &quot;PT Sans&quot;; font-style: normal;">You can read further details about OutlawCountry in this&nbsp;</span><a href="https://wikileaks.org/vault7/document/OutlawCountry_v1_0_User_Manual/OutlawCountry_v1_0_User_Manual.pdf" rel="nofollow" style="box-sizing: border-box; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; color: rgb(21, 129, 197); font-family: &quot;PT Sans&quot;; font-style: normal;">user manual</a><span style="font-family: &quot;PT Sans&quot;; font-style: normal;">.</span><span style="font-family: &quot;PT Sans&quot;; font-style: normal;"><br />
</span></em></p>
<p><a href="http://www.epanorama.net/newepa/wp-content/uploads/2017/07/wpid-Screenshot_20170703-215827.png"><img src="http://www.epanorama.net/newepa/wp-content/uploads/2017/07/wpid-Screenshot_20170703-215827.png" alt="" class="wp-image-57119 alignnone size-full" width="1080" height="1920"></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2017/07/03/outlawcountry-cias-hacking-tool-for-linux-computers-revealed/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
	</channel>
</rss>
