<b>Google tried to quietly</b> <b>kill open source apps.</b> <b>It's a pretty crazy story.</b> <b>Signal is fighting back against</b> <b>Microsoft's recall feature</b> <b>in a really clever way.</b> <b>New Orleans set a new</b> <b>record in dystopian surveillance</b> <b>and a lot more from the last two weeks.</b> <b>Welcome to Surveillance Report 226,</b> <b>where we're here to give you</b> <b>the privacy and security news.</b>
<b>I'm Henry from Techware.</b> <b>I'm Nathan from The New Oil.</b> <b>And today we want to welcome our brand</b> <b>new sponsor, Proton Pass.</b> <b>We're both a big fan of Proton Pass.</b>
<b>They are from the same team, as you all</b> <b>know, from ProtonMail and ProtonVPN.</b> <b>And they have become a</b> <b>must-have in my privacy toolkit.</b> <b>And it's something that I use on a daily</b> <b>basis across all my devices.</b> <b>What I really love about it</b> <b>is the Hide My Email feature.</b> <b>So if you ever use Simple Login, it</b> <b>actually integrates with Simple Login.</b>
<b>So you can view all of your Proton Pass</b> <b>aliases in Simple Login.</b> <b>And that way, it's all</b> <b>under the same suite.</b> <b>But it also monitors</b> <b>everything on a dark web for you.</b> <b>So you can check if you're</b> <b>caught in the data breaches</b> <b>that we talk about automatically.</b> <b>It has an integrated 2FA authenticator,</b> <b>which allows you to keep your TOTP</b> <b>codes all in one place.</b>
<b>And it syncs on every major device and</b> <b>every major browser.</b> <b>The really cool thing about Proton is</b> <b>they don't have any venture capitalists.</b> <b>And so they just have</b> <b>their own revenue models.</b> <b>And they're able to do things like</b> <b>sponsor this podcast.</b>
<b>And the premium plan is very affordable.</b> <b>At $249 a month, they</b> <b>also have different plans</b> <b>that you can get as part of</b> <b>their broader Proton suite.</b> <b>And that's less than a</b> <b>coffee for actual peace of mind.</b> <b>And it's very easy to import from</b> <b>anything else like Bitwarden or KeePass</b> <b>if you're looking to try something inside</b> <b>the Proton ecosystem.</b> <b>So if you want to get</b> <b>started with a password manager</b> <b>that we both really enjoy, check out down</b> <b>below proton.me slash surveillance</b>
<b>report.</b> <b>And we'll leave that down below.</b> <b>And you'll also get 50%</b> <b>off for a limited time</b> <b>if you go through that link.</b> <b>We want to give a big thank you to Proton</b> <b>for sponsoring this video</b> <b>and helping everyone stay a little bit</b> <b>more private in what I think</b> <b>is probably the most usable password</b> <b>manager experience to date.</b>
<b>[MUSIC PLAYING]</b> <b>And now we're going to go into the</b> <b>highlight story, which</b> <b>we've kind of merged a</b> <b>couple related stories,</b> <b>starting with this really weird thing</b> <b>that happened, especially</b> <b>with Next Cloud.</b> <b>So this is a quote from</b> <b>Next Cloud that they said,</b> <b>Google wanted that.</b> <b>And what they're saying is that they</b> <b>described Android's permissions</b> <b>as gatekeeping.</b> <b>So Next Cloud states that</b> <b>it had read and write access</b> <b>to all file types since</b> <b>its first Android app.</b> <b>In September 2024, a Next Cloud Android</b> <b>update with all file access</b> <b>was refused out of the</b> <b>blue with the request</b> <b>that the app use a more</b> <b>privacy aware replacement.</b> <b>Next Cloud states that it had provided</b> <b>background and explanations</b> <b>but received the same copy</b> <b>and paste answers or links</b> <b>to documentation from Google.</b>
<b>Now Next Cloud eventually</b> <b>issued an update of its app</b> <b>and restricted uploads to media files.</b> <b>Downloading and sideloading Next Cloud</b> <b>app from the F-Droid external store</b> <b>and granting the app</b> <b>necessary permissions</b> <b>restores the ability to upload any files</b> <b>to a Next Cloud instance.</b> <b>The company told the register that it had</b> <b>more than 800,000 Android users.</b> <b>So that's the story.</b> <b>But just to kind of</b> <b>recap what happened there,</b> <b>there are different ways</b> <b>to get files on your system.</b> <b>And Next Cloud was, for</b> <b>all intents and purposes,</b> <b>using it for the correct purposes.</b>
<b>They wanted the full</b> <b>broad permission to just have</b> <b>access to all of your files on your phone</b> <b>so you can actually use Next Cloud as</b> <b>it's a file storage program that</b> <b>probably wants access to a lot more</b> <b>things than just a specific folder</b> <b>or a specific file on your system.</b> <b>But Google kept rejecting</b> <b>this for really no reason</b> <b>and giving typical Google support that</b> <b>you might expect, which</b> <b>is probably just AI or just copy and</b> <b>pasted responses from someone</b> <b>on the other side of the keyboard.</b> <b>So this is what really</b> <b>frustrates me about this stuff,</b> <b>is that it feels like</b> <b>Next Cloud was very patient.</b> <b>If you're keeping track of the dates,</b> <b>this happened in September of 2024,</b> <b>which means they've been dealing with</b> <b>this for months now.</b> <b>And they were halfway</b> <b>through 2025 at this point.</b>
<b>And it wasn't until, as far as</b> <b>I can tell from the timeline,</b> <b>Next Cloud came</b> <b>forward and made this public,</b> <b>and there started to be</b> <b>press coverage around this,</b> <b>that Google finally</b> <b>said, OK, we'll fix it,</b> <b>and now it's going to be fixed.</b> <b>And Next Cloud is working on an update</b> <b>that they hope to have live</b> <b>within the next week.</b> <b>So a lot of little takeaways here.</b>
<b>One, you are at the</b> <b>whim of Google and Apple</b> <b>when you're on centralized app stores.</b> <b>And so this is why things like F-Droid,</b> <b>things like even Optanium,</b> <b>are a really cool way to get apps.</b> <b>And we really want to see</b> <b>Apple open up the app store</b> <b>so that we get more</b> <b>sideloading outside of Europe,</b> <b>so that we see those</b> <b>similar options exist on iOS.</b> <b>If you're already on</b> <b>Android, you can already</b> <b>start taking advantage of this, because</b> <b>as far as I can tell,</b> <b>this permission did exist outside of the</b> <b>Google Play Store variant of Next</b> <b>Cloud.</b>
<b>So you always had a</b> <b>better version of Next Cloud</b> <b>if Google wasn't managing</b> <b>the app, which is a bit ironic.</b> <b>So those are kind of my takeaways.</b> <b>And I'll let Nate speak to this before we</b> <b>touch on positive Google</b> <b>and Android news right after that.</b>
<b>Now, you pretty much nailed it.</b> <b>Real quick, I actually did look up Next</b> <b>Cloud in the Play Store.</b> <b>And it has over a million downloads.</b> <b>So it says they have</b> <b>over 800,000 Android users.</b>
<b>A good chunk of those are probably</b> <b>downloading directly</b> <b>from the Play Store.</b> <b>It does say it was updated on May 19th,</b> <b>and it says it brings back the managed</b> <b>external storage permission.</b> <b>So that should be live now if any of you</b> <b>are using Next Cloud from the Play Store.</b>
<b>And then you kind of hit my other thing.</b> <b>There's people who-- we've</b> <b>talked about this before.</b> <b>We did a Q&A about app stores and whether</b> <b>it's best to use the app store,</b> <b>like FDroid or Obtanium.</b> <b>And we kind of said that</b> <b>there's pros and cons to each.</b> <b>In different ones, you're</b> <b>trusting different people</b> <b>with different features</b> <b>and different motivations.</b>
<b>And I think this really makes it clear,</b> <b>because there are people out there</b> <b>who would say, for</b> <b>example, never ever use FDroid.</b> <b>It's not safe.</b> <b>Only use the Play Store.</b> <b>And even if you subscribe to that, well,</b> <b>FDroid's really not safe.</b> <b>If you believe that, OK, fine.</b> <b>But there's Obtanium.</b>
<b>There's-- I don't</b> <b>think it's on a crescent.</b> <b>But there are other</b> <b>ways to do this stuff.</b> <b>And yeah, you kind of hit</b> <b>that on the head is be aware.</b>
<b>And we've seen this with like IVPN.</b> <b>They had to remove some functionality</b> <b>because it blocked ads.</b> <b>And--</b> <b>That's a great example.</b> <b>Thanks for bringing that one up.</b>
<b>For those who don't know, they had this</b> <b>really hardcore anti-Google feature</b> <b>in IVPN that blocked all Google domains,</b> <b>and Google wouldn't approve it.</b> <b>It was all big tech, not just Google.</b> <b>It was like meta, Amazon.</b> <b>It is very hardcore.</b>
<b>They are not exaggerating.</b> <b>Yeah, so just like you</b> <b>said, it's just be aware.</b> <b>You know, there may be pros to Google.</b> <b>We mentioned they're</b> <b>tightening up their Play integrity</b> <b>and scanning the apps and stuff.</b>
<b>But at the same time,</b> <b>they might force developers</b> <b>to remove permissions that</b> <b>are useful or you may want.</b> <b>So--</b> <b>Yeah, and I mean on that note, on the</b> <b>topic of locking down,</b> <b>Android 16 on the more positive front is</b> <b>expanding their advanced protection</b> <b>with device level security.</b> <b>So specifically, in this-- I'm quoting a</b> <b>lot of the article here.</b>
<b>They're activating verified boot and</b> <b>runtime integrity checks,</b> <b>strong sandboxing, USB port lockdown, app</b> <b>isolation, automatic device</b> <b>reboots when idle for 72 hours, and</b> <b>Google Play Protect with enhanced app</b> <b>scanning.</b> <b>It also eliminates the ability to turn</b> <b>off or weaken core security settings</b> <b>and enforces secure settings across</b> <b>Google Apps like Chrome, messages,</b> <b>and phone, as well as third party apps</b> <b>that opt into the integration,</b> <b>which should be interesting to see how</b> <b>people utilize that.</b> <b>Finally, it introduces new protections</b> <b>like intrusion logging</b> <b>and blocking auto</b> <b>reconnects to insecure networks.</b> <b>So intrusion logging is a new</b> <b>system that logs device events</b> <b>in a privacy preserving, tamper-proof,</b> <b>cloud-stored log, which</b> <b>is useful for investigating compromises.</b>
<b>And the data will only</b> <b>be accessible by the user</b> <b>and protected with end-to-end encryption.</b> <b>Auto reconnection blocks</b> <b>concerns over weak Wi-Fi networks</b> <b>that don't require passwords or use WEP,</b> <b>which is essentially cracked at this</b> <b>point and is all practically</b> <b>like having nothing, mitigating</b> <b>the risk of passive surveillance or</b> <b>captive portal attacks.</b> <b>So we just had a back and forth because</b> <b>we wanted to clarify and make</b> <b>sure we got it right that this is, in</b> <b>fact, referring to Google's advanced</b> <b>protection program.</b> <b>So this is an expansion of that program.</b> <b>This isn't specifically an Android thing,</b> <b>but it seems like Android is essentially</b> <b>getting more security hardening</b> <b>if you are integrated into that program,</b> <b>which is a program that if you have</b> <b>to use a Google account for anything, we</b> <b>do both highly recommend utilizing.</b> <b>It does lock down your</b> <b>Google account significantly,</b> <b>and it gives you cool security benefits.</b>
<b>But you're only going to see these</b> <b>benefits that we're</b> <b>talking about if you're</b> <b>using something like stock Android, but</b> <b>you can find some of those benefits</b> <b>on other custom ROMs as well.</b> <b>So it's kind of this messy situation, and</b> <b>you have a lot of ways</b> <b>of using this information.</b> <b>My guess, actually, is</b> <b>that this is supposed</b> <b>to be competing against</b> <b>Apple's lockdown mode,</b> <b>and they're trying to have</b> <b>more of these integrations</b> <b>on the local side of things on Android to</b> <b>compete against Apple's lockdown mode,</b> <b>is my guess.</b> <b>So apart from just</b> <b>the advanced protection,</b> <b>there are some other</b> <b>things in Android 16, which</b> <b>is to protect users from</b> <b>phone scammers and malware apps.</b> <b>Google is releasing</b> <b>something called Key Verifier, which</b> <b>is a mechanism in the Messages app, which</b> <b>is designed to fight text-based fraud</b> <b>and impersonation by verifying the</b> <b>identity of the other party</b> <b>with public encryption keys associated</b> <b>with contacts, which also sounds</b> <b>kind of similar to the way that maybe I'm</b> <b>misinterpreting the feature here,</b> <b>but it sounds similar to</b> <b>Apple's contact key verification.</b> <b>And then Google also</b> <b>improved theft protection features</b> <b>by turning Find My</b> <b>Device into Find Hub, which</b> <b>is a feature that also covers lost items</b> <b>and works with Bluetooth tags</b> <b>and with the</b> <b>partnership of multiple airlines.</b>
<b>There's a couple others, but those are</b> <b>the main ones related to privacy</b> <b>and security, and it</b> <b>sounds like Google is just</b> <b>trying to match a lot of</b> <b>Apple's features that they've</b> <b>been baking in the last several years for</b> <b>their privacy and security.</b> <b>So it's kind of cool to</b> <b>see Google release those.</b> <b>Most of these are nothing but</b> <b>good if you end up using them.</b> <b>And I guess if you're already going to be</b> <b>on a stock Android device</b> <b>and you already are</b> <b>putting your trust in Google,</b> <b>then there's no reason that</b> <b>I can find not to enable this</b> <b>if you're not already</b> <b>looking at the alternatives.</b> <b>Just one thing that was in the article</b> <b>is that it is important to note that the</b> <b>availability for some</b> <b>of the features depends on the</b> <b>manufacturer and the type of device</b> <b>and will present later this year.</b>
<b>So in other words, if you're on certain</b> <b>phone manufacturers who</b> <b>shall remain nameless from Asia, who are</b> <b>notorious for removing</b> <b>perfectly good security features for no</b> <b>reason that makes sense,</b> <b>you may not get any of these protections.</b> <b>That's one more reason</b> <b>we're a fan of going with pixels</b> <b>if you decide to go the Android route.</b> <b>I would love to know, but</b> <b>my guess is a lot of this</b> <b>will probably be pixel</b> <b>only just based on history</b> <b>and how much these</b> <b>features actually find themselves</b> <b>in other manufacturers.</b>
<b>With that, we'll move into data breaches.</b> <b>And we have a ton, as you</b> <b>would expect from two weeks.</b> <b>So we're going to do that</b> <b>thing where we just kind of pick</b> <b>the biggest ones that</b> <b>likely impact the most people.</b> <b>And then the rest of</b> <b>them will be abbreviated.</b>
<b>So the first one comes to the UK.</b> <b>It says, "Marx and Spencer confirms</b> <b>customer data stolen</b> <b>in cyber attack and</b> <b>forces password resets."</b> <b>There was a cyber attack last month that</b> <b>I think we mentioned.</b>
<b>I've definitely seen it</b> <b>popping up in my news feed,</b> <b>but we didn't really directly discuss it</b> <b>because at the time,</b> <b>we didn't know for sure if</b> <b>it was a data breach or just</b> <b>a cyber attack.</b> <b>But now we know it was a data breach.</b> <b>So the attack occurred</b> <b>on April 22nd in 2025.</b> <b>There is no evidence that</b> <b>the information has been shared</b> <b>and it does not include</b> <b>usable card or payment details</b> <b>or account passwords.</b> <b>So there is no need for</b> <b>customers to take any action</b> <b>according to Marx and Spencer.</b> <b>They said that despite these assurances,</b> <b>all customers with active accounts</b> <b>will be prompted to reset</b> <b>their password next time</b> <b>they attempt to log in.</b>
<b>And the data that was</b> <b>stolen includes full name, email</b> <b>address, home address,</b> <b>phone number, date of birth,</b> <b>online order history, household</b> <b>information, whatever</b> <b>that means, SPARKs pay reference numbers,</b> <b>and masked payment card</b> <b>details, as in the last four</b> <b>of your card number.</b> <b>Next article is from Coinbase.</b> <b>This was a big one.</b>
<b>Coinbase is probably the</b> <b>most popular exchange out there</b> <b>in the cryptocurrency ecosystem.</b> <b>And there is a data breach that exposed</b> <b>customer information</b> <b>and government IDs.</b> <b>This was a pretty sophisticated attack.</b> <b>Essentially what</b> <b>happened is a group of people</b> <b>were in some way bribed</b> <b>because they outsourced</b> <b>their customer support.</b> <b>And so they started</b> <b>just sending over user data</b> <b>that that customer support had access to.</b> <b>Now, they fired those insiders after they</b> <b>were detected while accessing systems</b> <b>without authorization,</b> <b>but not before they exfiltrated</b> <b>information from the devices.</b>
<b>So this included names,</b> <b>addresses, phone numbers,</b> <b>email addresses, last</b> <b>four social security numbers,</b> <b>partial bank account</b> <b>numbers, and some bank account</b> <b>identifiers, government</b> <b>ID images, account data,</b> <b>balance and transaction history, and</b> <b>limited corporate data</b> <b>related to Coinbase.</b> <b>There was this whole video posted</b> <b>from the CEO of</b> <b>Coinbase, where he was like,</b> <b>we're not going to pay $20</b> <b>million ransom because that's</b> <b>what the attackers were asking for.</b> <b>Instead, we're going to</b> <b>put a $20 million reward</b> <b>fund for any leads that can</b> <b>help find the attackers who</b> <b>coordinated the attack.</b>
<b>They said that no</b> <b>passwords, private keys, or funds</b> <b>were exposed and Coinbase</b> <b>Prime accounts are untouched.</b> <b>We'll reimburse customers who</b> <b>are tricked into sending funds</b> <b>to the attacker.</b> <b>And the updated story says</b> <b>the number of people impacted</b> <b>is almost 70,000.</b> <b>I'm going to go ahead and group the next</b> <b>several data breaches.</b> <b>The UK legal aid agency</b> <b>confirms applicant data</b> <b>was stolen in a data breach.</b> <b>The Australian Human Rights Commission</b> <b>was leaking documents to search engines,</b> <b>and Nova Scotia Power confirmed that</b> <b>attackers stole customer</b> <b>data in a cyber attack.</b>
<b>OK, and then I'm also going</b> <b>to group up the next few here.</b> <b>So a mysterious</b> <b>database of 184 million records</b> <b>exposes a vast array</b> <b>of login credentials.</b> <b>And actually, the credentials are from</b> <b>some serious companies.</b> <b>So among the exposed accounts are</b> <b>ones linked to dozens</b> <b>of governments as well.</b> <b>Twilio has denied a breach</b> <b>following a leak of alleged</b> <b>Steam 2FA codes.</b>
<b>Cocos by stalkerware apps</b> <b>go offline after data breach.</b> <b>Broadcom employee data</b> <b>stolen by ransomware crooks</b> <b>following hit on payroll provider.</b> <b>Fashion giant Dior has</b> <b>disclosed a cyber attack</b> <b>in warns of data breach</b> <b>and SK Telecom, South Korea,</b> <b>I assume, says malware</b> <b>breach lasted three years,</b> <b>impacted 27 million numbers.</b> <b>We're trying to keep it short this week.</b> <b>So if you want to follow</b> <b>up on any of those stories,</b> <b>we have more in the</b> <b>show notes down below.</b>
<b>Next, we'll go into the companies.</b> <b>And we're going to start off with Meta.</b> <b>So first up, Meta is making users</b> <b>who opted out of AI</b> <b>training opt out again.</b> <b>So this comes from Noib, who</b> <b>have sent a cease and desist</b> <b>to Meta on Wednesday, threatening</b> <b>to pursue a potentially</b> <b>billion dollar class action</b> <b>to block Meta's AI training,</b> <b>which starts soon in the European Union.</b> <b>In the letter, Noib notes</b> <b>that Meta only recently notified</b> <b>EU users on its platforms</b> <b>that they had until May 27th</b> <b>to opt their public posts</b> <b>out of Meta's AI training data sets.</b> <b>According to Noib, Meta</b> <b>is also requiring users</b> <b>who already opted out</b> <b>in 2024 to opt out again,</b> <b>or forever lose the</b> <b>opportunity to keep their data</b> <b>opted out of Meta's models.</b>
<b>That's a seeming violation</b> <b>of the GDPR, Noib alleges,</b> <b>and they said that this</b> <b>lack of clarity for users</b> <b>who opt out makes it harder to trust</b> <b>that users can ever truly opt out.</b> <b>The letter accused</b> <b>Meta of further deceptions</b> <b>like planning to seize data</b> <b>that users may not consider public,</b> <b>such as disappearing stories.</b> <b>Noib said that differs</b> <b>significantly from AI crawlers</b> <b>scraping information</b> <b>posted on a public website.</b>
<b>According to Noib,</b> <b>there would be no issue</b> <b>with WhatsApp's AI training</b> <b>if Meta would use a consent-based model</b> <b>rather than requiring rushed opt outs.</b> <b>Meta is claiming legitimate interest</b> <b>for collecting this data.</b> <b>Next one, Meta threatens to pull Facebook</b> <b>and Instagram out of</b> <b>Nigeria over $290 million fine.</b> <b>This comes from Slashdot who is</b> <b>summarizing tech dirt.</b> <b>They said, "As with earlier EU fines</b> <b>imposed on the company,</b> <b>the sticking point is Meta's refusal</b> <b>to comply with local privacy laws.</b>
<b>Meta's current revenues in</b> <b>Nigeria are relatively small,</b> <b>but its market shares are high.</b> <b>Facebook alone reaches</b> <b>about 51.2 million users</b> <b>as of May 2024,</b> <b>which is more than a</b> <b>fifth of the population.</b>
<b>Instagram had 12.6 million Nigerian users</b> <b>as of November, 2023,</b> <b>while WhatsApp had about 51 million users</b> <b>making Nigeria the 10th</b> <b>largest market globally</b> <b>for the messaging app.</b> <b>Since many Nigerians</b> <b>depend on Meta's platform,</b> <b>the company might be hoping</b> <b>that there will be public</b> <b>pressure on the government</b> <b>not to impose the fine</b> <b>in order to avoid a</b> <b>shutdown of the services,</b> <b>but it's hard to see</b> <b>Meta carrying out its threat</b> <b>to walk away from a country</b> <b>expected to be the</b> <b>third most populous nation</b> <b>in the world by 2050."</b> <b>And then the last one,</b> <b>Meta's to start selling</b> <b>its Ray-Ban smart</b> <b>glasses in India on May 19th.</b> <b>So that date came and went.</b> <b>Meta said that its smart glasses</b> <b>would be available for</b> <b>sale in India starting in May</b> <b>at a starting price of 29,990,</b> <b>I believe rupees is</b> <b>what they use in India.</b>
<b>I'm not gonna fact check myself</b> <b>and hope that the</b> <b>comments don't string me up,</b> <b>which is about 353 US dollars.</b> <b>The smart glasses are currently available</b> <b>for pre-order on Ray-Ban site</b> <b>and would be stocked in</b> <b>Ray-Ban stores at launch.</b> <b>Meta said the glasses launching in India</b> <b>will support Meta AI.</b> <b>It can answer questions</b> <b>about what's in front of you,</b> <b>translate audio and video,</b> <b>send messages via your</b> <b>phone, make calls and more.</b> <b>The glasses currently</b> <b>support live translation</b> <b>for English, French,</b> <b>Italian, and Spanish,</b> <b>even when users are offline,</b> <b>but notably it hasn't added support</b> <b>for Indian languages yet.</b> <b>License plate reader company Flock</b> <b>is building a massive people lookup tool.</b>
<b>This is an ALPR company,</b> <b>which is Automatic License Plate Readers.</b> <b>And these cameras are installed</b> <b>in more than 5,000 communities in the US.</b> <b>And it's building a</b> <b>product that will use people</b> <b>lookup tools, data</b> <b>brokers, and data breaches</b> <b>to jump just from a</b> <b>license plate reader to a person,</b> <b>allowing police to</b> <b>much more easily identify</b> <b>and track the</b> <b>movements of specific people</b> <b>around a country without</b> <b>a warrant or court order.</b> <b>They actually obtained a meeting audio</b> <b>where a Flock employee talked</b> <b>about where they source data.</b>
<b>The first is data breaches.</b> <b>One example the employee pointed to</b> <b>was a 2021 data breach</b> <b>impacting users of Park Mobile,</b> <b>which is an app that</b> <b>allows users to pay for parking</b> <b>without physically</b> <b>going to the parking meter</b> <b>or in some lots where</b> <b>meters no longer exist.</b> <b>The data included license plate numbers</b> <b>with the owner's</b> <b>associated email addresses,</b> <b>phone numbers, and in some</b> <b>cases, mailing addresses.</b> <b>The second was</b> <b>commercially available data</b> <b>with the employee</b> <b>explicitly naming credit bureaus</b> <b>like Equifax and TransUnion.</b> <b>The third is public records</b> <b>such as marriage licenses,</b> <b>property records, and</b> <b>campaign finance records.</b>
<b>Typically, police</b> <b>officers do not obtain a warrant</b> <b>before using Flock or</b> <b>other companies' ALPR systems.</b> <b>This is part of the</b> <b>retraction to law enforcement,</b> <b>which is private</b> <b>companies installing cameras</b> <b>around a country so that</b> <b>they can essentially bypass</b> <b>all of the things that they're not</b> <b>supposed to be bypassing,</b> <b>like needing to get a warrant</b> <b>for basic human information.</b> <b>I'm gonna take the next two</b> <b>because they're both Microsoft.</b> <b>So first up, New South</b> <b>Wales Education Department</b> <b>caught unaware after Microsoft Teams</b> <b>began collecting</b> <b>students' biometric data.</b>
<b>So late last year, Microsoft announced</b> <b>that it would enable</b> <b>data collection by default,</b> <b>commencing in March for a Teams feature</b> <b>known as voice and face enrollment.</b> <b>In Teams, this creates a</b> <b>voice and face profile,</b> <b>quote unquote</b> <b>profile, for each participant</b> <b>in Teams' meeting, which</b> <b>the company said improves</b> <b>the audio quality,</b> <b>reduces background noise,</b> <b>and enables the software to tell who is</b> <b>speaking in meetings.</b> <b>The data is also fed into</b> <b>Microsoft's LLM co-pilot</b> <b>to improve accuracy and</b> <b>transcription or summaries</b> <b>when that is enabled in those meetings.</b> <b>Guardian Australia</b> <b>revealed that when enrollment</b> <b>for Teams was switched on in March,</b> <b>the department was</b> <b>caught unaware for a month.</b> <b>The feature was switched off in April</b> <b>and the profiles were</b> <b>deleted within 24 hours</b> <b>of the department becoming aware,</b> <b>but the Education</b> <b>Department did not answer questions</b> <b>about the number of students or staff</b> <b>who had biometric data collected on them,</b> <b>or if those affected had been informed.</b>
<b>Microsoft retains a copy of the data</b> <b>while a user is</b> <b>enrolled and a user can choose</b> <b>to delete the profile at any point.</b> <b>If a user deletes their Teams account,</b> <b>Microsoft states on its website</b> <b>that it deletes</b> <b>biometric data within 90 days.</b> <b>And then the second</b> <b>story is about Windows 11.</b>
<b>I think this came from Ars Technica.</b> <b>It said, "Windows 11's</b> <b>most important new feature</b> <b>is post-quantum cryptography.</b> <b>Here's why.</b> <b>For those who don't know,</b> <b>post-quantum cryptography</b> <b>is necessary, it is, I</b> <b>wouldn't say it's necessary yet,</b> <b>but it will likely</b> <b>become necessary in the future</b> <b>and it's basically the</b> <b>next step in cybersecurity.</b> <b>So basically Microsoft</b> <b>is updating Windows 11</b> <b>with a new set of encryption algorithms</b> <b>that can withstand future</b> <b>attacks from quantum computers.</b> <b>For context, the article says that RSA</b> <b>and elliptic curve encryption keys,</b> <b>which are currently the standard,</b> <b>securing web connections</b> <b>would require millions of years</b> <b>to be cracked by today's computers.</b>
<b>A quantum computer</b> <b>could crack the same keys</b> <b>in a matter of hours or even minutes.</b> <b>So at Microsoft's Build</b> <b>2025 conference on Monday,</b> <b>the company announced</b> <b>that the availability</b> <b>of quantum resistant</b> <b>algorithms to SimCrypt,</b> <b>the core cryptographic code</b> <b>in the library in Windows,</b> <b>the updated library is</b> <b>available in Build 27852</b> <b>and higher versions of Windows 11.</b> <b>Additionally, Microsoft</b> <b>has updated SimCrypt OpenSSL,</b> <b>which is its open source project</b> <b>that allows the</b> <b>widely used OpenSSL library</b> <b>to use SimCrypt for</b> <b>cryptographic operations.</b>
<b>So basically it has</b> <b>gone with MLKEM and MLDSA,</b> <b>which are approved by NIST currently.</b> <b>These are the current standards that</b> <b>everybody has decided</b> <b>to go all in on for cybersecurity.</b> <b>They were previously</b> <b>known as crystals kyber</b> <b>and crystals dilithium.</b> <b>Telegram gave authorities</b> <b>data on more than 22,000 users.</b> <b>So this actually comes full circle</b> <b>because Nate and I did this</b> <b>whole thing way back in a day</b> <b>where we were like, look,</b> <b>they say they have a transparency page,</b> <b>but if you go to their transparency page,</b> <b>it doesn't say they've</b> <b>ever disclosed any information</b> <b>despite there being</b> <b>verifiable data that they have.</b> <b>So here's a crazy update to that.</b>
<b>Turns out that that</b> <b>Telegram bot gives you data</b> <b>where your IP address is coming from.</b> <b>So it was only giving us</b> <b>transparency data in the US.</b> <b>I'm pretty sure it</b> <b>was still lying though,</b> <b>because 404 put out a story.</b>
<b>It might've still been lying,</b> <b>but what we said back then,</b> <b>it wasn't actually legit</b> <b>because what we said was,</b> <b>we have this</b> <b>verifiable data that they gave</b> <b>to the Indian government, to the</b> <b>Brazilian government,</b> <b>and this is factual, but</b> <b>we're going on their bot</b> <b>and it's saying they</b> <b>never handed over data.</b> <b>But technically we were</b> <b>accessing it from the US.</b> <b>Anyway, it's just a super untransparent</b> <b>way of doing things.</b>
<b>It doesn't make any sense.</b> <b>So this website that</b> <b>they link in the show notes</b> <b>that you should check</b> <b>out is a GitHub page.</b> <b>It's open source that actually compiles</b> <b>all this data globally so you can see it</b> <b>without needing to open Telegram.</b> <b>It's all open source</b> <b>and it's all on GitHub</b> <b>and you can see the raw</b> <b>data of the amount of data</b> <b>they give out to all these countries.</b> <b>I just said data a lot of times.</b>
<b>It's just in the first few months</b> <b>that that number was reported</b> <b>and it's a massive jump</b> <b>from the same period in 2024</b> <b>where Telegram saw</b> <b>only 5,826 of its users</b> <b>where they only</b> <b>handed over that much data.</b> <b>And the last story in the company section</b> <b>is just a quick update.</b> <b>Regeneron</b> <b>Pharmaceuticals is going to buy 23andMe</b> <b>and its data for $256 million.</b> <b>The deal is still subject to approval</b> <b>by the US bankruptcy</b> <b>court for the Eastern District</b> <b>of Missouri pending approval.</b> <b>It is expected to close in the third</b> <b>quarter of this year.</b>
<b>They did say we're gonna abide by</b> <b>23andMe's privacy policy.</b> <b>We don't know what</b> <b>they're gonna do with this data.</b> <b>We don't know if they're</b> <b>gonna spend 23andMe back up</b> <b>and keep trying to collect data.</b> <b>We don't know anything.</b> <b>All right, I got a big story</b> <b>here in the research section.</b> <b>So researchers</b> <b>scraped 2 billion with a B,</b> <b>Discord messages and</b> <b>published them all online.</b>
<b>So this is a massive database</b> <b>of more than 2 billion Discord messages</b> <b>and they scraped this</b> <b>using Discord's public API.</b> <b>It was pulled from over 3,000 servers</b> <b>and covers posts made</b> <b>between 2015 and 2024.</b> <b>The researchers claim</b> <b>they've anonymized the data,</b> <b>but it's hard to</b> <b>imagine anyone is comfortable</b> <b>with almost a decade of</b> <b>their Discord messages</b> <b>sitting in a public JSON file online.</b>
<b>That's from the article.</b> <b>Separately, a different programmer</b> <b>released a Discord tool</b> <b>called Searchcord based</b> <b>on a different data set</b> <b>that shows non-anonymized chat histories.</b> <b>A team of 15 researchers</b> <b>at the Federal</b> <b>University of Minas Gerais.</b> <b>It was part of their research project</b> <b>and it's part of a paper that</b> <b>was called Discord Unveiled,</b> <b>a comprehensive data set</b> <b>of public communication,</b> <b>which they say was created so that other</b> <b>teams of researchers</b> <b>could have a database</b> <b>of online discussions</b> <b>to use when studying</b> <b>mental health and politics</b> <b>or training bots.</b> <b>The amount of data is massive.</b>
<b>There's over 2 billion</b> <b>messages from over 4 million users</b> <b>across 3,167 servers,</b> <b>approximately 10% of the servers</b> <b>listed in Discord's Discovery tab.</b> <b>These are user generated, it can be set</b> <b>to public or private</b> <b>and newcomers can find</b> <b>the public servers using it.</b> <b>They replaced the user names with</b> <b>generated pseudonyms,</b> <b>hashed and truncated</b> <b>users and message IDs</b> <b>and removed other</b> <b>identifying features entirely.</b> <b>And they said that all data</b> <b>collection adhered strictly</b> <b>to Discord's API guidelines and</b> <b>anonymization techniques</b> <b>were applied to ensure</b> <b>compliance with privacy standards.</b> <b>The paper also pointed</b> <b>out that all these messages</b> <b>were scraped from public spaces.</b> <b>All data was sourced from groups</b> <b>that are explicitly considered public</b> <b>according to Discord's terms of use,</b> <b>whichever user agrees to upon signing up.</b>
<b>Even with the pains</b> <b>taken to anonymize the data,</b> <b>the scrape appears to be against</b> <b>Discord's terms of service.</b> <b>A Discord developer policy</b> <b>which covers the use of its API is clear.</b> <b>Do not mine or scrape any</b> <b>data, content or information</b> <b>available on or through Discord services.</b> <b>Some form of this</b> <b>prohibition against scraping</b> <b>has been in place since at least 2020.</b>
<b>Next up, we have some good news actually.</b> <b>Bluetooth 6.1 enhances privacy with</b> <b>randomized RPA timing.</b> <b>I'm just gonna condense this one.</b> <b>RPA is resolvable private address</b> <b>and basically, let's see,</b> <b>currently RPA's are</b> <b>updated at fixed intervals,</b> <b>usually every 15 minutes,</b> <b>which introduces a</b> <b>level of predictability.</b> <b>This predictability can be</b> <b>exploited in correlation attacks</b> <b>making long-term tracking possible.</b>
<b>Bluetooth 6.1 will randomize it</b> <b>between eight and 15 minutes by default,</b> <b>but you can also, I'm</b> <b>assuming this is developers</b> <b>and not end users, you</b> <b>can also set custom values</b> <b>ranging between one second and one hour.</b> <b>6.1 has made exciting steps forward,</b>
<b>but it's important to understand</b> <b>that the actual support</b> <b>and hardware and firmware</b> <b>may take years to arrive.</b> <b>The first wave of chips with 6.1</b> <b>should not realistically</b> <b>be expected before 2026.</b> <b>And even then, early implementations</b> <b>may not immediately expose</b> <b>all newly available features</b> <b>as testing and</b> <b>validation may be required.</b> <b>A new Intel CPU flaw leaks sensitive data</b> <b>from privileged memory.</b> <b>So this is called</b> <b>branch privilege injection</b> <b>is the kind of flaw and</b> <b>it's an all modern Intel CPUs</b> <b>and it allows attackers to</b> <b>leak data from memory regions</b> <b>allocated to privileged software</b> <b>like the operating system kernel.</b>
<b>Typically, these are</b> <b>populated with information</b> <b>like passwords, cryptographic keys,</b> <b>memory of other processes</b> <b>and kernel data structures.</b> <b>So protecting these from</b> <b>leakage is pretty important.</b> <b>There's a lot more</b> <b>details in the article.</b> <b>This is really technical stuff.</b> <b>So they tested this and</b> <b>they found that everything back</b> <b>from like the seventh gen Kaby Lake</b> <b>all the way to more</b> <b>modern CPUs are impacted.</b>
<b>And they did not test</b> <b>older generations at this time,</b> <b>but since they do not support enhanced</b> <b>indirect branch restricted speculation,</b> <b>which is EIBRS for short,</b> <b>they're less relevant</b> <b>to the specific exploit.</b> <b>So although the attack</b> <b>was demonstrated on Linux,</b> <b>the flaw is present</b> <b>on the hardware level.</b> <b>So it's exploitable on windows too.</b> <b>The researchers reported</b> <b>their findings to Intel</b> <b>in September of 2024 and the tech giant</b> <b>released micro code</b> <b>updates that mitigate this</b> <b>on impacted models.</b> <b>The firmware mitigations introduced a</b> <b>2.7% performance overhead</b> <b>while software mitigations</b> <b>have a performance impact</b> <b>between 1.6% and 8.3%</b>
<b>depending on the CPU.</b> <b>The risk is low for regular users</b> <b>and attacks have</b> <b>multiple strong prerequisites</b> <b>to open up realistic</b> <b>exploitation scenarios.</b> <b>That being said applying the latest BIOS</b> <b>or UEFI and OS updates is recommended.</b> <b>ETH Zurich will present the</b> <b>full details of their exploit</b> <b>in a technical paper at the upcoming</b> <b>use next security 2025.</b> <b>O2 UK patches bug</b> <b>leaking mobile user location</b> <b>from call metadata.</b> <b>So O2 UK is a British</b> <b>telecom service provider</b> <b>owned by Virgin media.</b>
<b>As of March, 2025, they</b> <b>report having nearly 23 million</b> <b>mobile customers and 5.8</b> <b>million broadband clients</b> <b>across the UK, making them</b> <b>one of the major providers</b> <b>in the country.</b> <b>In March, 2017, they</b> <b>launched a service called</b> <b>IP multimedia</b> <b>subsystem branded as 4G calling</b> <b>for better audio quality and line</b> <b>reliability during calls.</b> <b>However, a researcher</b> <b>discovered while analyzing</b> <b>the traffic of a call</b> <b>that signaling messages</b> <b>and the SIP headers specifically exchange</b> <b>between the communication</b> <b>parties were far too verbose</b> <b>and revealing including IMSI,</b> <b>IMEI and cell location data.</b> <b>For those who don't</b> <b>know those first two are</b> <b>basically unique identifiers.</b>
<b>I think technically they can be spoofed,</b> <b>but also in some places</b> <b>I know that's illegal.</b> <b>Using the network signal guru</b> <b>app on a rooted Google pixel</b> <b>eight, the researcher</b> <b>intercepted the raw IMS signaling</b> <b>messages exchanged during a</b> <b>call and decoded the cell ID</b> <b>to find the last cell tower the call</b> <b>recipient connected to.</b> <b>Then he used public tools</b> <b>that provide cell tower maps</b> <b>to find the geographic</b> <b>coordinates of the tower.</b> <b>For urban areas where</b> <b>the coverage is dense,</b> <b>the accuracy would reach</b> <b>a hundred square meters.</b>
<b>In rural areas,</b> <b>geolocating would get less precise</b> <b>but could still be</b> <b>revealing for the target.</b> <b>The researcher found</b> <b>the trick also worked</b> <b>when the target was abroad as he located</b> <b>a test subject in Denmark.</b> <b>A Virgin media spokesperson confirmed</b> <b>that the fix had been implemented,</b> <b>noting that customers do</b> <b>not have to take any action</b> <b>to protect themselves.</b> <b>Bleeping computer asked O2</b> <b>whether this flaw was known</b> <b>to be exploited and if</b> <b>they plan to inform customers</b> <b>accordingly but did</b> <b>not receive an answer.</b> <b>Okay, Windows 11 and</b> <b>Red Hat Linux were hacked</b> <b>on their first day of Pwn to Own.</b>
<b>And we cover this every year.</b> <b>There's always some</b> <b>exploits that come out of this.</b> <b>And there were two</b> <b>vulnerabilities in Red Hat Linux,</b> <b>three in Windows 11, one in VirtualBox</b> <b>and one in NVIDIA</b> <b>Triton Interface Server.</b> <b>While the 2024 Tesla Model</b> <b>3 and the 2025 Tesla Model Y</b> <b>bench top units were</b> <b>also available as targets,</b> <b>no attempts have been registered</b> <b>before the competition started.</b>
<b>So during the second day of</b> <b>Pwn to Own in Berlin 2025,</b> <b>competitors earned over 400 grand</b> <b>after exploiting zero-day</b> <b>bugs and multiple products,</b> <b>including Microsoft</b> <b>SharePoint, VMware ESXi,</b> <b>Oracle VirtualBox,</b> <b>Red Hat Enterprise Linux</b> <b>and Mozilla Firefox.</b> <b>And then day three on the third day team</b> <b>and then reverse tactics again,</b> <b>the hacked VMware's Hypervisor software</b> <b>using an exploit chain</b> <b>abusing an integer overflow</b> <b>and an uninitialized</b> <b>variable bug to earn $112,500</b> <b>and take third place in the ranks.</b> <b>Now we'll go into the politics section</b> <b>and we'll try to keep these quick.</b> <b>The first one, so the headline says</b> <b>Trump signs controversial law</b> <b>targeting non-consensual sexual content.</b> <b>Basically things like</b> <b>deepfakes, revenge porn,</b> <b>anything that depicts a real person</b> <b>without their consent</b> <b>can be taken down.</b> <b>It is nicknamed the Take It Down Act.</b>
<b>It requires platforms to remove</b> <b>non-consensual instances</b> <b>of intimate visual</b> <b>depiction within 48 hours</b> <b>of receiving a request.</b> <b>Companies that take</b> <b>longer or don't comply at all</b> <b>could be subject to penalties</b> <b>to roughly $50,000 per violation.</b> <b>The law will go into</b> <b>effect within the next year</b> <b>and enforcement will be left up</b> <b>to the Federal Trade Commission or FTC.</b>
<b>Free speech advocates are concerned</b> <b>at a lack of guardrails.</b> <b>For example, the law is modeled</b> <b>after the Digital</b> <b>Millennium Copyright Act or DMCA,</b> <b>which is currently the most effective way</b> <b>to take down content,</b> <b>which basically says this</b> <b>is copyrighted material,</b> <b>you need to take it down.</b> <b>Companies can be held financially liable</b> <b>for ignoring valid requests of the DMCA,</b> <b>which has motivated many firms</b> <b>to err on the side of caution</b> <b>and preemptively remove content</b> <b>before a copyright</b> <b>dispute has been resolved.</b>
<b>For years, fraudsters</b> <b>have abused the DMCA takedown</b> <b>to get content censored for reasons</b> <b>that have nothing to do</b> <b>with the infringements.</b> <b>The DMCA does include</b> <b>provisions that allow fraudsters</b> <b>to be held financially liable</b> <b>when they make false claims.</b> <b>Take it down could be a less risky</b> <b>pathway for fraudsters.</b> <b>It does not include</b> <b>robust deterrence provisions</b> <b>requiring only the</b> <b>takedown requesters exercise,</b> <b>quote unquote, good faith</b> <b>without
2025-05-27 17:10