'Cryptomator' 2.0 is Here and it Integrates Into iOS Files App

The team behind Cryptomator has rewritten the app in Swift, and with version 2.0 the app is completely integrated into the Files app. This means that your vaults are directly accessible from there. For example, you can now save and edit a Word document directly in an encrypted vault via the Files app. In addition, features like thumbnails, grid view, swiping through images, and drag & drop are possible with the new app. To summarize, Cryptomator gives you end-to-end encryption for your files. You can store them in Google Drive, iCloud Drive, Dropbox, and more. You can also store them offline in the Files app or on a hard drive.

New VPN Called 'Exidio dVPN' Runs on Sentinel's Node Network

Exidio is a new decentralized VPN application that uses the Sentinel blockchain, which itself is part of the Cosmos ecosystem. “Exidio dVPN is rewriting the true definition of what it means to be a VPN. This is made possible by the Sentinel blockchain where all the global, distributed nodes are sharing their available and unused bandwidth. So as long as the Sentinel blockchain stays active, the network of nodes that offer bandwidth to the network remain active.” Exidio claims that traffic is end-to-end encrypted with proven no data logging.

WhatsApp Users Can Enable Disappearing Messages by Default

WhatsApp is now letting users turn on disappearing messages for all chats by default.

Prior to Monday’s update, users had to manually enable ephemerality for each new chat with another individual. WhatsApp is additionally also giving users the option to have their messages disappear after 24 hours or 90 days, in addition to the seven-day period it originally introduced the feature with last year.

Verizon Automatically Tracks Your Data in New Update

In a new program called Verizon Custom Experience, the company is automatically opting customers in to track their data. But you can opt out.

A new program innocuously titled the “Verizon Custom Experience” is sold to users as a way for the company to “personalize our communications with you, give you more relevant product and service recommendations, and develop plans, services and offers that are more appealing to you.” To accomplish this, all a Verizon subscriber needs to do is… allow the company access to all the websites you visit, apps you use, as well as see everyone you happen to call and text.

Hundreds of Tor Servers From 'KAX17' Threaten to Deanonymize Users

Security researcher ‘Nusenu’ has uncovered hundreds of Tor servers belonging to an entity tracked as KAX17.

Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers with no contact details to the Tor network in industrial quantities, operating servers in the realm of hundreds at any given point.

KAX17’s focus on Tor entry and middle relays led Nusenu to believe that the group, which he described as “non-amateur level and persistent,” is trying to collect information on users connecting to the Tor network and attempting to map their routes inside it.

'Libreddit' is a New Frontend Client for Reddit Designed for Privacy

Libreddit is a new frontend for Reddit, written in Rust, that aims to preserve privacy. The developer shared the service on r/Privacy. “Reddit tracks a lot of data but Libreddit logs nothing and uses no JavaScript by default so client-side monitoring isn’t possible. There are 35 community-hosted instances that can be used to access Libreddit; one can spread their traffic across multiple for even more privacy. 7 of our instances are .onion hidden services so you can browse Libreddit using Tor.” Official Instance: https://libreddit.spike.codes.  If this gets too slow due to traffic, use another instance.

Tor Project Offers Rewards for More Servers During Decline

The Tor Project has seen a decline in relays and bridge servers, and offers rewards for people to help increase the network.

Rewards include the likes of hoodies, t-shirts, and stickers and are meant to provide some sort of meaningful gift to those who help keep the Tor anonymity network alive and resilient to censorship.

More specifically, the rewards will be provided to those who run Tor “bridges,” which serve as entry points into the Tor network for users located in countries that block access to Tor servers.

Musicians Call for Concert Venues to Drop Amazon Palm Scanning Technology

Musicians and activist groups are calling on Red Rocks Amphitheatre to stop its rollout of Amazon’s palm scanning tech.

The letter contributors are worried Amazon might send palm data to government agencies hoping to track activists and marginalized people, particularly in light of its past collaborations with police. They’re also concerned thieves might steal info from the cloud, and see AEG as inconsistent after it condemned the use of facial recognition in 2019.

Contract Lawyers Latest Sector to Face Remote Surveillance Programs

As WP reports, businesses are increasingly using surveillance software to monitor what their employees do on computers. Contract lawyers are the latest group to face this.

The monitoring is a symptom of “these pervasive employer attitudes that take advantage of these technologies to continue these really vicious cycles … that treat employees as commodities,” she said. “The irony in this situation is that it’s attorneys, who traditionally advocate for employee rights or justice when they’re made aware of intrusions like these.”

Proctoring Apps For Schools is Mass Surveillance for Kids

In an op-ed for Teen Vogue, writers from Fight For The Future argue that test proctoring apps that many schools use is mass surveillance of minors.

Remote proctoring software is, essentially, spyware that students are forced to install, typically as a browser plug-in or a computer program. Invasive features like keystroke logging, screen recording, network traffic monitoring, and video and audio recording are common. Many of the programs also collect tons of biometric data through eye-movement tracking and facial recognition.

Facebook Moves to Cancel its Facial Recognition System

Facebook announced it will cancel its facial recognition system responsible for cataloging its billion-strong user base.

Our technology will no longer automatically recognize if people’s faces appear in Memories, photos or videos. People will no longer be able to turn on face recognition for suggested tagging or see a suggested tag with their name in photos and videos they may appear in. We’ll still encourage people to tag posts manually, to help you and your friends know who is in a photo or video. This change will also impact Automatic Alt Text (AAT), a technology used to create image descriptions for people who are blind or visually impaired. AAT currently identifies people in about 4% of photos.

The above quote is probably the only useful part of the self-congratulatory update.

Blockchains Aren't as Private as You Think, But They Could Be

Cybersecurity expert Mashael Al Sabah was recently featured on MIT’s Business Lab podcast. She talks about privacy issues with blockchain technology and how they can be fixed. You can listen to the podcast with the link below (direct link on Apple Podcasts), and.or read the podcast transcript.

A lot of people think that they are completely anonymous when they use Bitcoin, and this gives them a false sense of security. In our research, what we did is that we crawled social media, like there’s popular forum for Bitcoin users called Bitcointalk.org, and we crawled Twitter as well for Bitcoin addresses that users attributed to themselves. In some forums, people share their Bitcoin addressees along with their profile information. So, now you have the public profile information, which includes usernames, emails, age, gender, city.

iMessages are End-To-End Encrypted But iCloud Backups Are Not

For Lifehacker, Jake Peterson wrote a reminder that under certain circumstances, Apple can theoretically access your iMessages.

Here’s the tricky thing; Messages in iCloud is end-to-end encrypted, just as you’d expect—that’s why there’s no way to access your messages on the web, such as by logging in to icloud.com. There’s one big problem, though: your iCloud Backup isn’t end-to-end encrypted—and Apple stores the key to unlock your encrypted messages within that backup.

Messages in iCloud has been a thing for a few years now, but you can turn it off.

WIN an iPhone 16 Pro Max!