The company is one of the largest providers of confidential information on the personal data market.
Specialists of the non-profit organization The Markup spent investigation into the service Life360, which allows tracking the geolocation of children. As it turned out, the company is one of the largest providers of confidential information in the personal data market.
The Markup contacted two former employees of the so-called “data brokers” Cuebiq and X-Mode. Life360 made about $ 16 million in 2020 from selling user data to dozens of different companies, according to whistleblowers. In addition, two former Life360 employees also told the organization about the company’s additional source of income.
According to a former X-Mode employee, the raw location data from Life360 was one of the most valuable offerings on the market due to the sheer volume and accuracy of the data. A former Cuebiq employee joked that the company would not be able to carry out its marketing campaigns without the constant stream of location data from Life360.
The functionality of the service allows you to prohibit the transfer of data, but this is not directly communicated to the user. This function is hidden in several sub-items of the settings, and consent to the use of information for commercial purposes is activated by default.
Whistleblowers said the company did not maintain adequate user anonymity and only removed names or home addresses prior to the sale. The rest of the information made it possible to easily identify the identity of the user. Any organization could become a buyer of data from Life360; the company did not enter into transactions only with government agencies.
The founder of the company, Chris Hulls (Chris Hulls) was unable to confirm or deny the results of the investigation.
Vulnerability in Safari could leak browser history and Google account information
Users of Apple devices have encountered a serious vulnerability in a proprietary browser. It allows attackers to access your browser history and some Google account information. The vulnerability exists in Safari 15 on all supported platforms, and even in third-party browsers running on iOS 15 and iPadOS 15, as it is related to the IndexedDB framework, which is used in many browsers to store data. It breaks the same-origin principle, which prevents documents and scripts from one location (such as a domain or protocol) from interacting with content from another. As a result, websites with the corresponding code have access to the above information.
Attackers only know the names of the records, not the values. However, this is enough to get the Google username, find the profile picture, and learn more about the user. The history can also be used to build a rudimentary profile of the sites he likes. As stated, the vulnerability cannot be hidden even in private browsing mode.
According to the source, he reported the problem to Apple on November 28, but the company has not yet fixed it with security patches.
Android users can now disable 2G for security
2G networks, like 3G networks, have become obsolete after the arrival first of 4G and later of 5G. However, as things have not been done as well as they should have been, we rely on them for mobile calls (operators without VoLTE) or to connect older IoT devices. For this reason, they have even considered switching off 3G before 2G, thus leaving more room for the development of 4G and 5G.
It is not a new concept, since we have been hearing about it for a long time, but everything was blown up about three years ago when the United States Department of Homeland Security (DHS) detected in Washington the presence of Stingrays, also known as “IMSI catcher”. These devices that connect to the mobile network act as fake repeaters and spy on the information that passes through them.
This includes access to calls, text messages or images sent without encryption. Basically, they force the use of older, outdated and less secure 2G technology to easily intercept communications. In fact, work has been done so that this no longer a problem with 5G since these mobiles will have a Subscription Permanent Identifier (SUPI). This will use the encryption key of the network operator and will allow the mobile to know if an antenna is legitimate.
Is the solution to disable 2G?
The EFF (Electronic Frontier Foundation) speaks of victory after learning that Android will allow you to disable 2G connections on your terminals. This is something that Google introduced at the end of last year and that we had not had much news about. They point out that it is a fantastic option to protect the privacy of users and the EFF applauds that the Internet giant has implemented it on mobile phones with its operating system. Now, the ball is in Apple’s court, which must also do so for the safety of its users.
To give us an idea, 2G is a technology created in 1991, so he is over 30 years old. That makes it have many problems because, in its design and conception, the circumstances and requirements were not the same as now. First of all, it has a very weak encryption between the repeater and the mobile, which allows the interception of the traffic. Second, it does not authenticate with the 2G tower in any way, allowing anyone to impersonate it.
To protect ourselves, the EFF invites us to deactivate 2G. To do this, we will go to Settings > Network and Internet > SIM cards > Allow 2G. By default, the option for our mobile to use 2G networks is activated. His thing would be to disable it, although this possibility would only be present in more modern mobiles such as the Pixel.
The big problem could be loss of coverage or problems making calls. If we live in areas dependent on 2G right now or if our operator does not allow us to make calls with the 4G network, it is possible that the remedy is worse than the disease. However, it will always be good to know that we have this possibility.
Chrome will restrict access to private networks for security reasons
The restrictions will be implemented through the implementation of the Private Network Access specification in the browser in the first half of 2022.
Chrome browser coming soon will start block sites from responding to and interacting with devices and servers on local private networks. The reason is security concerns and known cases of abuse.
The changes will be implemented by rolling out a new W3C specification called Private Network Access (PNA) to the browser in the first half of 2022. The new PNA specification adds a mechanism to Chrome through which sites can ask systems on local networks for permission to establish a connection.
Chrome will start sending a CORS pre-request before any private networks request for a subresource, Google explained. This preflight request is an explicit permission request from the target server. The preflight request will contain the new Access-Control-Request-Private-Network: true header, and the response will also need to contain the Access-Control-Allow-Private-Network: true header.
If local devices (servers, routers, etc.) do not respond, sites will not connect to them.
Since the early 2010s, cybercriminals have realized that browsers can be used as proxies to connect to internal corporate networks. For example, a malicious site may contain code that tries to connect to an IP address like 192.168.0.1, which is the address of most router administration panels.
When users visit such a malicious site, their browsers can automatically query the router without the users’ knowledge, sending malicious code capable of bypassing the router’s authentication and modifying its settings. This type of attack is not only theoretical and is periodically used in practice.
Variants of these attacks can also attack other local systems such as internal servers, domain controllers, firewalls, and even locally deployed applications (via a domain http://localhost or other locally defined domains).
By adding the PNA specification to Chrome and its permission negotiation system, Google intends to prevent such automated attacks.
According to Google, PNA is already shipping with Chrome 96, but full support will roll out this year in two phases to Chrome 98 (early March) and Chrome 101 (late May).
This could be the next great Motorola flagship, according to leaks
The new year has only just begun, and previews of what we could bring to see throughout it are already...
This Telegram feature allows you to store unlimited files online
Highly appreciated by Internet users for the transfer of unlimited files, the Telegram application receives a new very practical service....
The Tesla Cybertruck electric pickup truck will have a “little brother” in miniature form
While Elon Musk and Tesla continue to push back the start of production of the Cybertruck electric pickup truck to...
WhatsApp will soon be able to draw with different strokes
The Meta (former Facebook) team of the popular WhatsApp messenger is working on a new interesting feature for users. In...
News4 days ago
19-year-old hacker claims to have taken control of 25 Tesla cars around the world
Phones3 days ago
The first radical change in the iPhone for many years: iPhone 14 Pro and iPhone 14 Pro Max smartphones will receive a camera with a resolution of 48 megapixels
How To4 days ago
How to hide programs in Windows without uninstalling
Cinema6 days ago
Euphoria: who is Chloe Cherry, the Faye from season 2 of the series?