Here you go, proof that tracking won't stop until you delete "social media" apps off of your phone. Think again do you need app to communicate with your real friends instead of calling them? #punkprivacy #privacy
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers - Ars Technica
https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/
Some thoughts about what Joel expects out of blogging regularly, or having a website at all.
https://kevquirk.com/blog/blogging-expectations
And of course you can trust #Google silently installing an app called Android System Safetecore on your phone. It's for your own safety.
Sure, they might have your previous data.
But you know what they *don't* have?
They don't have your *future* data.
It's never too late to start improving your data privacy online. Every small step helps.
If you want to learn how Chinese phishing or "smishing" groups are turning phished card data into mobile wallets, check out today's story. The innovation coming out of these groups is remarkable, and includes mobile apps that let thieves relay "ghost tap" NFC transactions to a payment terminal from halfway around the world.
What I find most remarkable is how millions of businesses have spent years and billions of dollars upgrading payment terminals to use more secure chip-based cards. And now these phishers come along and just bypass all of that, creating Apple and Google mobile wallets with the phished card data and a one-time code.
Here's the lede:
Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.
https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets/
The latest episode of The Phillip Wylie Show has dropped and features Ben Sadeghipour, aka @nahamsec!
YouTube: https://youtu.be/Wmb6O5-lblE
Spotify: https://open.spotify.com/episode/066V2AztFNlLGxpUZ68vh6?si=PMt0nQIYTQWUREMJriOZEA
Apple: https://podcasts.apple.com/us/podcast/phillip-wylie-show/id1685564407?i=1000691203042
You nailed it @AuthorJMac ! 🖖
Edit : Original (and complete) post on March 29, 2024
« You know what the biggest problem with pushing all-things-AI is? Wrong direction.
I want AI to do my laundry and dishes so that I can do art and writing, not for AI to do my art and writing so that I can do my laundry and dishes. »
Cf. https://indiepocalypse.social/@AuthorJMac/112178826967890119
Do you enjoy privacy rights?
Because deregulation is how you lose them. Oh and also basic safety, and human rights.
Just so you know: https://www.huffpost.com/entry/elon-musk-regulations-default-gone_n_67a12742e4b09a02376043c7
Experienced technology entrepreneur on the quest for ethics and privacy. Follow #punkprivacy tag to get regular privacy tips. You can also follow @ethiork account to get information about progress of Ethiork project that enables people to own their data and protect their privacy.