Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SP
Spotlight7573 @lemmy.world
Posts 11
Comments 246
Founder and CEO of Telegram messaging service arrested in France
  • Isn't the main problem that most people don't use the E2E encrypted chat feature on Telegram, so most of what's going on is not actually private and Telegram does have the ability to moderate but refuses to (and also refuses to cooperate)?

    Something like Signal gets around this by not having the technical ability to moderate (or any substantial data to hand over).

  • Ad industry initiative abruptly shuts down after lawsuit filed by Elon Musk’s X
  • A multi-billion dollar social media company sued an ad industry group that was trying to have help companies have some kind of brand safety standards to prevent a company's ads from appearing next to objectionable content. They reportedly had two full-time staff members. This isn't some big win, it's bullying itself.

  • 2.9 billion hit in one of the largest data breaches ever — full names, addresses and SSNs exposed
  • Basically with passkeys you have a public/private key pair that is generated for each account/each site and stored somewhere on your end somehow (on a hardware device, in a password manager, etc). When setting it up with the site you give your public key to the site so that they can recognize you in the future. When you want to prove that it's you, the website sends you a unique challenge message and asks you to sign it (a unique message to prevent replay attacks). There's some extra stuff in the spec regarding how the keys are stored or how the user is verified on the client side (such as having both access to the key and some kind of presence test or knowledge/biometric factor) but for the most part it's like certificates but easier.

  • ISPs Hijack Cloudflare/Google DNS Requests, Ending Site-Blocking Workarounds.
  • Don't most DoH resolversl settings have you enter the IP (for the actual lookup connection) along with the hostname of the DoH server (for cert validation for HTTPS)? Wouldn't this avoid the first lookup problem because there would be a certificate mismatch if they tried to intercept it?

  • 2.9 billion hit in one of the largest data breaches ever — full names, addresses and SSNs exposed
  • With a breach of this size, I think we're officially at the point where the data about enough people is out there and knowledge based questions for security should be considered unsafe. We need to come up with different authentication methods.

  • www.techdirt.com Congress Wants To Let Private Companies Own The Law

    It sounds absolutely batty that there is a strong, bipartisan push to lock up aspects of our law behind copyright. But it’s happening. Even worse, the push is on to include this effort to lock up t…

    Congress Wants To Let Private Companies Own The Law

    The Pro Codes Act has been submitted as an amendment to the "must pass" National Defense Authorization Act (NDAA). It allows copyrighted standards to be incorporated by reference into the law, preventing people from accessing or sharing these standards except through the systems the standards development organizations have that "makes all portions of the standard so incorporated publicly accessible online at no monetary cost and in a format that includes a searchable table of contents and index, or equivalent aids to facilitate the location of specific content. " Note that that does not include searchable text, the ability to access it without a login, or any ability to host it elsewhere (such as alongside the laws that incorporate it).

    The NDAA bill:

    https://rules.house.gov/bill/118/hr-8070

    The amendment:

    https://amendments-rules.house.gov/amendments/ISSA_180_xml240531155108634.pdf

    2
    Google Chrome is no longer 'deprecating third-party cookies'
  • I'd imagine that making it a user choice gets around some of the regulatory hurdles in some way. I can see them making a popup in the future to not use third-party cookies anymore (or partition per site them like Firefox does) but then they can say that it's not Google making these changes, it's the user making that choice. If you're right that there's few that would answer yes, then it gets them the same effective result for most users without being seen to force a change on their competitors in the ad industry.

    What's the UK CMA going to do, argue that users shouldn't be given choices about how they are tracked or how their own browser operates?

  • Google cancels plans to kill off cookies for advertisers
  • The plan was only to kill off third-party cookies, not first-party so being able to log into stuff (and stay logged in) was not going to be affected. Most other browsers have already blocked or limited third-party cookies but most other browsers aren't owned by a company that runs a dominant ad-tech business, so they can just make those changes without consulting anyone.

    Also, it looks like there might be some kind of standard for federated login being worked on but I haven't really investigated it: https://developer.mozilla.org/en-US/docs/Web/API/FedCM_API

  • Google cancels plans to kill off cookies for advertisers
  • They definitely knew it would impact their ad business but I think what did it was the competition authorities saying they couldn't do it to their competitors either, even if they were willing to take the hit on their own services.

    Impact on their business (bold added): https://support.google.com/admanager/answer/15189422

    • Programmatic revenue impact without Privacy Sandbox: By comparing the control 2 arm to the control 1 arm, we observed that removing third-party cookies without enabling Privacy Sandbox led to -34% programmatic revenue for publishers on Google Ad Manager and -21% programmatic revenue for publishers on Google AdSense.
    • Programmatic revenue impact with Privacy Sandbox: By comparing the treatment arm to control 1 arm, we observed that removing third-party cookies while enabling the Privacy Sandbox APIs led to -20% and -18% programmatic revenue for Google Ad Manager and Google AdSense publishers, respectively.
  • Mozilla acquired Anonym, an ad start-up
  • Looking at it most favorably, if they ever want to not be dependent on Google, they need revenue to replace what they get from Google and like it or not much of the money online comes from advertising. If they can find a way to get that money without being totally invasive on privacy, that's still better than their current position.

  • New York bans “addictive feeds” for teens
  • For scenario one, they totally need to delete the data used for age verification after they collect it according to the law (unless another law says they have to keep it) and you can trust every company to follow the law.

    For scenario two, that's where the age verification requirements of the law come in.

  • New York bans “addictive feeds” for teens
  • No, no, no, it's super secure you see, they have this in the law too:

    Information collected for the purpose of determining a covered user's age under paragraph (a) of subdivision one of this section shall not be used for any purpose other than age determination and shall be deleted immediately after an attempt to determine a covered user's age, except where necessary for compliance with any applicable provisions of New York state or federal law or regulation.

    And they'll totally never be hacked.

  • New York bans “addictive feeds” for teens
  • From the description of the bill law (bold added):

    https://legislation.nysenate.gov/pdf/bills/2023/S7694A

    To limit access to addictive feeds, this act will require social media companies to use commercially reasonable methods to determine user age. Regulations by the attorney general will provide guidance, but this flexible standard will be based on the totality of the circumstances, including the size, financial resources, and technical capabilities of a given social media company, and the costs and effectiveness of available age determination techniques for users of a given social media platform. For example, if a social media company is technically and financially capable of effectively determining the age of a user based on its existing data concerning that user, it may be commercially reasonable to present that as an age determination option to users. Although the legislature considered a statutory mandate for companies to respect automated browser or device signals whereby users can inform a covered operator that they are a covered minor, we determined that the attorney general would already have discretion to promulgate such a mandate through its rulemaking authority related to commercially reasonable and technologically feasible age determination methods. The legislature believes that such a mandate can be more effectively considered and tailored through that rulemaking process. Existing New York antidiscrimination laws and the attorney general's regulations will require, regardless, that social media companies provide a range of age verification methods all New Yorkers can use, and will not use age assurance methods that rely solely on biometrics or require government identification that many New Yorkers do not possess.

    In other words: sites will have to figure it out and make sure that it's both effective and non-discriminatory, and the safe option would be for sites to treat everyone like children until proven otherwise.

  • Microsoft is reworking Recall after researchers point out its security problems
  • I'm not sure I'm surprised at this point any more, just disappointed. All they have to do is just make a stable and secure platform to run apps on. They're going to run out of foot to shoot themselves in sooner or later if they keep this kind of thing up. Too many unforced errors.

  • Microsoft is reworking Recall after researchers point out its security problems
  • It should never have gotten to the external feedback stage because internal feedback should have been sufficient to kill the idea before it even got a name due to it being such a security and privacy risk. The fact that it didn't is worrying from a management perspective.

  • Microsoft is reworking Recall after researchers point out its security problems
  • To be fair to Microsoft, this was a local model too and encrypted (through Bitlocker). I just feel like the only way you could possibly even try to secure it would be to lock the user out of the data with some kind of separate storage and processing because anything the user can do can be done by malware run by the user. Even then, DRM and how it gets cracked has shown us that nothing like that is truly secure against motivated attackers. Since restricting a user's access like that won't happen and might not even be sufficient, it's just way too risky.

  • arstechnica.com Microsoft is reworking Recall after researchers point out its security problems

    Windows Hello authentication, additional encryption being added to protect data.

    Microsoft is reworking Recall after researchers point out its security problems

    > the company says that Recall will be opt-in by default, so users will need to decide to turn it on

    95
    www.bbc.com Google must face £13bn advertising lawsuit - UK court

    The search giant's parent Alphabet called the case 'incoherent' in arguments to get the case dropped.

    Google must face £13bn advertising lawsuit - UK court

    From the article: > Google must face a £13.6bn lawsuit alleging it has too much power over the online advertising market, a court has ruled. > > The case, brought by a group called Ad Tech Collective Action LLP, alleges the search giant behaved in an anti-competitive way which caused online publishers in the UK to lose money.

    And the actual case at the UK's Competition Appeal Tribunal:

    https://www.catribunal.org.uk/cases/15727722-15827723-ad-tech-collective-action-llp

    > The claims by Ad Tech Collective Action LLP are for loss and damage allegedly caused by the Proposed Defendants’ breach of statutory duty by their infringement of section 18 of the Competition Act 1998 and Article 102 of the Treaty on the Functioning of the European Union. The PCR seeks to recover damages to compensate UK-domiciled publishers and publisher partners, for alleged harm in the form of lower revenues caused by the Proposed Defendants' conduct in the ad tech sector.

    0

    Chrome Root Store policy update looking to require an automated option for obtaining certificates

    blog.chromium.org Unlocking the power of TLS certificate automation for a safer and more reliable Internet

    TL;DR: Automated certificate issuance and management strengthens the underlying security assurances provided by Transport Layer Security (TL...

    Unlocking the power of TLS certificate automation for a safer and more reliable Internet

    > Upcoming Policy Changes > > One of the major focal points of Version 1.5 requires that applicants seeking inclusion in the Chrome Root Store must support automated certificate issuance and management. [...] It’s important to note that these new requirements do not prohibit Chrome Root Store applicants from supporting “non-automated” methods of certificate issuance and renewal, nor require website operators to only rely on the automated solution(s) for certificate issuance and renewal. The intent behind this policy update is to make automated certificate issuance an option for a CA owner’s customers.

    5
    blog.chromium.org Unlocking the power of TLS certificate automation for a safer and more reliable Internet

    TL;DR: Automated certificate issuance and management strengthens the underlying security assurances provided by Transport Layer Security (TL...

    Unlocking the power of TLS certificate automation for a safer and more reliable Internet

    Google is looking to change the policy of the Chrome Root Store (used by Chrome to verify TLS certificates that protect websites and other services) to require "that applicants seeking inclusion in the Chrome Root Store must support automated certificate issuance and management". They can still provide a manual method for sites that want to get certificates the old way but they will need to have some kind of automated method available.

    0
    www.bleepingcomputer.com Google is enabling Chrome real-time phishing protection for everyone

    Google announced today that it is deprecating the standard Google Chrome Safe Browsing feature and moving everyone to its Enhanced Safe Browsing feature in the coming weeks, bringing real-time phishing protection to all users while browsing the web.

    Google is enabling Chrome real-time phishing protection for everyone

    > [...] > > To provide better security, Google introduced an Enhanced Safe Browsing feature in 2020 that offers real-time protection from malicious sites you are visiting. It does this by checking in real-time against Google's cloud database to see if a site is malicious and should be blocked. > > [...] > > Google announced today that it is rolling out the Enhanced Safe Browsing feature to all Chrome users over the coming weeks without any way to go back to the legacy version. > > The browser developer says it's doing this as the locally hosted Safe Browsing list is only updated every 30 to 60 minutes, but 60% of all phishing domains last only 10 minutes. This creates a significant time gap that leaves people are unprotected from new malicious URLs. > > [...]

    6
    www.bleepingcomputer.com Google is enabling Chrome real-time phishing protection for everyone

    Google announced today that it is deprecating the standard Google Chrome Safe Browsing feature and moving everyone to its Enhanced Safe Browsing feature in the coming weeks, bringing real-time phishing protection to all users while browsing the web.

    Google is enabling Chrome real-time phishing protection for everyone

    > [...] > > To provide better security, Google introduced an Enhanced Safe Browsing feature in 2020 that offers real-time protection from malicious sites you are visiting. It does this by checking in real-time against Google's cloud database to see if a site is malicious and should be blocked. > > [...] > > Google announced today that it is rolling out the Enhanced Safe Browsing feature to all Chrome users over the coming weeks without any way to go back to the legacy version. > > The browser developer says it's doing this as the locally hosted Safe Browsing list is only updated every 30 to 60 minutes, but 60% of all phishing domains last only 10 minutes. This creates a significant time gap that leaves people are unprotected from new malicious URLs. > > [...]

    0

    Chromium Blog: Towards HTTPS by default

    blog.chromium.org Towards HTTPS by default

    For the past several years, more than 90% of Chrome users' navigations have been to HTTPS sites, across all major platforms. Thankfully, th...

    Towards HTTPS by default

    cross-posted from: https://lemmy.world/post/3301227

    > Chrome will be experimenting with defaulting to https:// if the site supports it, even when an http:// link is used and will warn about downloads from insecure sources for "high-risk files" (example given is an exe). They're also planning on enabling it by default for Incognito Mode and "sites that Chrome knows you typically access over HTTPS".

    30

    Chromium Blog: Towards HTTPS by default

    blog.chromium.org Towards HTTPS by default

    For the past several years, more than 90% of Chrome users' navigations have been to HTTPS sites, across all major platforms. Thankfully, th...

    Towards HTTPS by default

    Chrome will be experimenting with defaulting to https:// if the site supports it, even when an http:// link is used and will warn about downloads from insecure sources for "high-risk files" (example given is an exe). They're also planning on enabling it by default for Incognito Mode and "sites that Chrome knows you typically access over HTTPS".

    2
    blog.chromium.org Protecting Chrome Traffic with Hybrid Kyber KEM

    Teams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography. Continuing with our strategy f...

    Protecting Chrome Traffic with Hybrid Kyber KEM

    A hybrid quantum-resistant Key Encapsulation Method combined with a regular elliptic curve backup will be available in Chrome 116 for securing connections.

    3
    blog.chromium.org Protecting Chrome Traffic with Hybrid Kyber KEM

    Teams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography. Continuing with our strategy f...

    Protecting Chrome Traffic with Hybrid Kyber KEM

    Google Chrome will soon be supporting a hybrid elliptic curve + quantum-resistant Kyber-768 system for key exchange in Chrome 116. This should provide some protection in case the quantum-resistant part has flaws, like some other proposed solutions have had. They're looking into this now to give time for it to get implemented by browsers, servers, and middleboxes, and hopefully prevent Harvest Now, Decrypt Later attacks.

    0