The FemtoStar Project aims to be an alternative to available connectivity services, FemtoStar is developing a satellite network for transparent, fundamentally anonymous and censorship-resistant communication you can manage yourself. All you need is a user terminal that connects to the network of FemtoStar-satellites and you are...
NHS England says it “only shares de-identified data with organisations". But privacy experts have criticised this position "given the richness of the data and the relative ease by which re-identification could occur." The datastore also contains “workforce analytics” data and something called “strike analysis”, which...
This is a complete rewrite in Rust of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improve security by reducing the attack surface....
Germany’s federal and state data protection authorities (DSK) have raised concerns about the compatibility of Microsoft 365 with data protection laws in Germany and the wider European Union....
These days, social media gets all the attention, but the Bulletin Board System (BBS), a relic from a kinder, gentler time in computer communications, persists. Each BBS is its own retro-flavored community with messages, text-based games, and files you can download. And you can still connect to one today....
The device, nicknamed Wi-Peep, can fly near a building and then use the inhabitants' Wi-Fi network to identify and locate all Wi-Fi-enabled devices inside in a matter of seconds....
You can append to your existing e-mail address in various ways, and this could be pretty useful for seeing who leaked your e-mail address to spammers. For example, for your bank, give them the address myaddress+banking@gamil.com. Then, if spammers send to that address, you can quickly see where they got the e-mail address from!...
Once your archive is on your machine, you will have a browsable HTML archive of your tweets, direct messages, and moments including media like images, videos, and GIFs. This is nice, but it also has a few flaws. For one, you can’t easily copy your Tweets somewhere else, for example, into your website because they are stored in...
An interesting read at the linked article below. Whilst it is a given that eSIMs (and their successor) are going to happen, there are clearly some rough edges that need to be worked on. What was going to be greater freedom to switch SIMs, could end up being a bit of a lock-in with an existing eSIM ;-)...
Yes, progress with Bluesky has been super slow (a bit like Tim Berners-Lee’s Solid) but at least we now know what protocol it will use, which will help explain a bit more about what could be expected....
Big Tech wants to kill the password, with “Passkeys” being the hot, new password replacement standard on the block. Passkeys are backed by Google, Apple, Microsoft, and the FIDO Alliance, so expect to see them everywhere soon. iOS picked up the standard in version 16, and now Google is launching passkey betas on Chrome and...
Google Camera and its post-processing algorithms undoubtedly changed the game in terms of what we expect from smartphone cameras, elevating the Google Pixels to some of the best Android phones you can buy for the camera. That’s the exact reason why Google Camera ports are so highly requested for non-Google devices. With the...