Monthly Archives: June 2020

Changes in Executive Order raise eyebrows – Daily Nation

Posted: June 7, 2020 at 9:44 am

By JOHN KAMAU

By making subtle changes within the structure of government, including the name of his office from The Presidency to the Executive Office of the President, President Uhuru Kenyatta has left many confused on the hidden political agenda.

Executive Order No. 1 of 2020 issued Wednesday evening caused a stir with some commentators interpreting the changes to mean the Deputy President's office had been downgraded and tucked under the Executive Office of the President.

This innocent looking nomenclature change has huge legal implications... President denotes singularity of power ... Presidency is shared power, lawyer Donald Kipkorir said in a message on Twitter.

But some constitutional lawyers said nothing has changed, explaining the order as a mere regularisation of changes in government.

In the reorganisation, the National Development Implementation and Communication Committee, headed by Dr Fred Matiangi is not listed as one of the functions of the Interior ministry. Instead, a new role designated as Oversight and Co-ordination in delivery of National Priorities and Flagship Programmes has been created.

Whether the creation of the Cabinet as an institution under OP will lead to power shifts is not clear.

In the previous order, the Cabinet did not exist under institutions and was only listed as a function within the Presidency. It now means that President Kenyatta will have to appoint a substantive Secretary to the Cabinet, a position that is highly regarded within the government.

With the ongoing shifts in the political arena, whoever gets the seat will assume a superior position. The position was scrapped after President Kenyattas attempt to appoint Monica Juma into the seat hit a snag when he failed to get parliamentary approval in 2015.

By renaming the Presidency, the President also appeared to whittle down some of the glamour that comes with a presidential system perhaps in preparation for the constitutional changes proposed under the Building Bridges Initiative.

With this arrangement, DP William Ruto does not get any portfolio, and has to wait to be assigned duties. While he did not appoint his own staff, and his accounting officer was the State House Comptroller, Dr Ruto appears not to have lost anything other than glamour.

Also now within the Office of the President is the Nairobi Metropolitan Services (NMS) headed by Major General Mohamed Badi.

The NMS will now draw its funding from the Consolidated Funds Services (CFS), according to the new order. The order of January 14, and revised last month, thus gives NMS legal backing.

Without a legal instrument, the legitimacy of NMS has always been a subject of discussion with opinion among MPs divided whether it should draw funding from the CFS or the County Revenue Fund (CRF).

The PO shall also now be in charge of parliamentary liaison as well as co-ordination of constitutional commissions. The latter is likely to raise eyebrows considering that the commissions are supposed to be independent from the other arms of government.

In February, State House brokered a deal with Nairobi City County that saw the national government take over key functions from the devolved unit. Planning and management, transport, public works, health and ancillary services were transferred in the deal, which became effective on March 15. However, the NMS ran into headwinds in executing its functions after Governor Mike Sonko declined to sign the Countys Supplementary Appropriation Bill, 2020, effectively locking out of the Sh15 billion to implement the functions.

To save the NMS from a financial crisis, the national government allocated it Sh1.5 billion in the Supplementary Budget II approved by the National Assembly in April. In the 2020/21 budget estimates, the National Treasury has allocated NMS Sh27.9 billion.

This week, President Kenyatta and former Prime Minister Raila Odinga were sighted in Nairobi, at night inspecting the work being carried out by the NMS. The NMS is one of the projects that the President is updated on daily.

The executive order is copied to all key government institutions includng the Attorney-General, Cabinet Secretaries, Chief Administrative Secretaries, Principal Secretaries.

Why an executive order that was issued on May 11 was released Wednesday remains baffling.

Additional reporting by David Mwere.

See more here:

Changes in Executive Order raise eyebrows - Daily Nation

Posted in Singularity | Comments Off on Changes in Executive Order raise eyebrows – Daily Nation

Tor Browser Makes it Easier to Visit Mainstream Websites’ .Onion Addresses – PCMag

Posted: at 9:43 am

Curious to know which of your favorites websites also run on the dark web?

On Tuesday, the nonprofit behind the Tor Browser released an update that promises to help mainstream websites better promote their alternative .onion addresses to the public.

For the first time, Tor Browser users on desktop will be able to opt-in for using onion sites automatically whenever the website makes them available, the Tor Project said in a blog post.

The new feature arrives in version 9.5, which is now available for download. Users will be able to take advantage of the change when they visit a traditional website that also runs a .onion address. When this occurs, the Tor browser will activate an icon in the HTTP web address bar that says .onion available, which you can click on to be redirected to the alternative site.

In addition, the browser will show a pop-up that says: Theres a more private and secure version of this site available over the Tor network via onion services. Itll then take you to the browsers settings, where you can choose whether to always opt into visiting the websites .onion address automatically, or do so selectively.

The change promises to help users take full advantage of Tors anonymity-protecting technologies, which can prevent ISPs and government authorities from surveilling your internet activities. Currently, you can use the Tor Browser to visit any mainstream website. In return, the software will encrypt and ferry your internet connection through a collection of volunteer-operated servers, scrambling your digital tracks.(On the downside, website load times can take longer.)

The setup can prevent snoopers from gathering a full picture of your internet activities. However, using the Tor Browser to visit the open internet can still leak some metadata of your website lookups to ISPs across the globe. So for more complete internet anonymity, its best to use Tor to visit a websites dedicated .onion address, which can't be accessed with a normal browser.

These onion services have been designed to operate outside the normal internet. Instead, a .onion address will leverage the Tor network to reside inside the dark web, never exposing your computers metadata to the open internet.

The New York Times, the BBC, and Pornhub, among many others, all offer Tor mirror sites as a workaround to bypass government surveillance and censorship in foreign countries. However, the drawback with onion services is how they use random characters as web addresses, making them hard to remember. (For instance, Pornhub's Tor mirror site is located at http://pornhubthbh7ap3u.onion/.)

The new feature from Tor Browser should help fix this, but itll be up to website publishers to trigger the notification icon when users visit their sites on the open internet. Currently, the Tor Projects own website and the investigative news organization ProPublica have activated the feature.

Excerpt from:
Tor Browser Makes it Easier to Visit Mainstream Websites' .Onion Addresses - PCMag

Posted in Tor Browser | Comments Off on Tor Browser Makes it Easier to Visit Mainstream Websites’ .Onion Addresses – PCMag

Tor Browser 9.5 arrives with the option to automatically switch to more secure Onion versions of sites – BetaNews

Posted: at 9:43 am

Increasing numbers of internet users are becoming aware of the privacy and security implications of being online, and it is for this reason that secure browsers such as Tor are growing in popularity. Now, with the release of Tor Browser 9.5, the browser features an option that can automatically switch to the secure .onion version of a site if one is available.

In short this means that sites are able to actively promote the fact that they have a secure .onion site available. Publishers now can advertise their onion service to Tor users by adding an HTTP header, so if someone visits the regular version of a website, a notification will appear informing them of the more secure option.

Site owners just need to add the Onion-Location header to pages. Visitors will be offered to the chance to opt-in to upgrade to the onion service on their first use. While this is an extremely important change in Tor 9.5, it is far from the only thing that's new in this version of the browser.

There are also changes to Onion Authentication which allow it to manage authentication keys and tokens via about:preferences#privacy in the Onion Services Authentication section. Like other browser, Tor has improved its URL bar security notifications so users are made aware of when they are visiting secure sites, unsecure sites, or those which contain mixed content.

Error messages have also been improved so in the event that a .onion site is inaccessible, it is no longer the case that a standard Firefox (the browser on which Tor is based) error message is displayed. Instead, Tor now shows a simple diagram to illustrate where along the line the problem exists.

This particular build of the browser also marks the start of experimenting with ideas that will hopefully lead to .onion addresses that are easier to remember. The team behind the browser says: "we partnered with Freedom of the Press Foundation (FPF) and the Electronic Frontier Foundation's HTTPS Everywhere to develop the first proof-of-concept human-memorable names for SecureDrop onion services addresses".

Originally posted here:
Tor Browser 9.5 arrives with the option to automatically switch to more secure Onion versions of sites - BetaNews

Posted in Tor Browser | Comments Off on Tor Browser 9.5 arrives with the option to automatically switch to more secure Onion versions of sites – BetaNews

The Dark Web Explained, and how to access it – Techjaja

Posted: at 9:43 am

Sites that carry the most traffic in the world like Google, YouTube, Facebook are already known to us all. But did you know that this is just a drop in the ocean on the internet? There are many websites that are very popular but are hidden away and you cannot find them by searching your popular search engines. That space is where the Dark Web and the Deep Web exist.

- Advertisement -

To understand the Dark Web or Darknet, we need to first attempt to define it more. Its is composed of many websites on an encrypted network with hidden IP addresses all of which gives users strong anonymity protection. In simple terms, no one can see what you are doing while you are there.

When one opens up a website, they strive to ensure that the site is indexed by search engines like Google, Bing or Yandex, but for the dark web, you can only access them with special anonymity browsers, which include Freenet, I2P, and The Onion Router also known as TOR browser.

These two are always confused. The Deep Web is all the sites on the web that cant be reached with a search engine. Although this includes sites on the Dark Web, it also includes sites that serve more mundane functions, such as business intranets, webmail platforms, databases, online banking platforms, and services that usually require a password or other means of authentication.

These are found and accessed directly with a URL or IP address and are hidden behind firewalls, paywalls, and HTML forms. Because all these other pages are included in the Deep Web, the Deep Web is actually far more vast than the regular internet (also known as the Clear Web).

Users of the Dark Web are assured of full anonymity but this also yields a great breeding ground for illegal activities. They use this space to buy or sell illegal goods such as stolen data, unprescribed drugs, or dangerous weapons.

The Dark Web can also be used for legitimate reasons. We have seen whistleblowers, activists, journalists, and others who need to share sensitive information, especially on political figures. This has made it popular as a lot in exposing information that would have not been known to the public for fear of political persecution or retribution by their government or other powerful actors.

In some countries, security and intelligence agencies also use it to monitor terror groups and track cybercriminals. In what may come as a surprise to many, corporate IT departments frequently crawl the Dark Web in search of stolen data and compromised accounts, and individuals may use it to look for signs of identity theft.

- Advertisement -

One of the most defining era of the Dark web was during the times of WikiLeaks the website that publishes classified official materials which also has a home on the Dark Web. Big companies like Facebook also maintain some form of presence there in order to make itself accessible in countries where it is censored by the government.

There are many ways to access the Dark web, but the most popular one is Tor browser. It used a highly secured network of volunteer relays around the world through which users internet connections pass through.

You will need to download and install the Tor browser bundle. Tor URLs end in the domain.onion and not domain.com. Website addresses here are not simple to memorize and they often change their URLs in order to evade detection and DDoS attacks.

When youre on the Dark Web, ISPs and by extension, the government might not be able to view your activity, but they will know you are on the Tor Network. This alone is enough to raise eyebrows in some countries.

It is very paramount that you access the Dark Web while using a VPN before going through the Tor Network. With this method, your ISP only sees the encrypted VPN traffic, and wont know youre on the Tor network.

We recommend you use a trusted VPN provider, one that doesnt track your activities when you log on. Finally, always connect to your VPN first before opening the Tor browser.

If you want to remain totally secure on the Dark Web, you should take the following extra security measures including:

- Advertisement -

Visit link:
The Dark Web Explained, and how to access it - Techjaja

Posted in Tor Browser | Comments Off on The Dark Web Explained, and how to access it – Techjaja

Dark web is the underworld of cyberspace – MyRepublica

Posted: at 9:43 am

In January 2020, several European news outlets, including The Daily Telegraph, reported that a famous set of antique jewellery were offered for ransom on the dark web. The diamond studded pieces worth almost a billion dollars were looted from a museum in Dresden in 2019. It was reported that Israeli investigators were offered a few of the pieces as a ransom. The messages on the dark web also claimed that it would be futile to try to identify and locate them. The ransom was also to be paid off in Bitcoin, a digital currency.

Imagine a standard business scenario. A business based on sales of a product or service needs a market, a set of products, a marketing campaign. Add to that the corollary mechanisms of customer support, complaints handling and the mechanism becomes a full-fledged commerce. Products, prices, market forces, supply, demand, buyers, sellers and so on.

The dark trade

If a product is not a legal product but still sought after by people in the market, buying would also be as illegal as selling. So neither the seller nor the buyer want to be visible to the outside world. They want to be anonymous, at least to produce, sell, buy and consume illicit products. Suddenly the whole market ecosystem for such products goes underground or anonymous. No mass marketing, no billboards, no well-known addresses, no public phone numbers. Still the market continues to operate and business thrives. While ensuring anonymity and hiding the activity, the buyers continue buying, sellers continue selling, dodging the authorities and thriving in darkness. The normal society cannot see. It is dark from their perspective.

The dark network

The Internet also functions like a normal social mechanism. Activities happen. Correspondences take place. Business and commerce is carried out. People can search things. People can publish things that can be searched by others. That is the normal, visible Internet. Like the hidden world of illegal trade, there is also a hidden Internet, though not fully illegitimate. On the illegitimate side, people access, buy and sell drugs, weapons, child pornography and many other illegal stuff using the platform of this hidden Internet. People with radical and extreme agenda use it to recruit cadets and lure victims.

As it is not seen by the normal populace, it is aptly called the dark net, the dark web etc. The dark net uses all the technologies of the normal Internet combined with specific practices, tools and technologies to make the content and transactions not visible to the normal audience. Like the illegal physical market, the people transacting on the dark web need to be specifically aware of the products, services and the places to conduct transactions. You have to belong to the underworld to access it. Or you have to be drawn into it, by those already inside it.

However, the dark net that is used for illegal activity and trade is only a small fraction of the so-called deep web which is much larger than the visible Internet. Only a small portion of the activities performed in this hidden network is illegal.

How to access it?

As is obvious, the dark net is not accessible through standard means. The sites cannot be browsed with normal, day-to-day Internet browsers. Specially designed browser software is needed to access the darknet. On top of that, the user needs to specifically know what he or she is accessing. In the normal scheme of things, Internet surfing usually starts with a search engine. Just type in the things you want to search into the search box and the rest is done by the engine. You are guided to the site containing information about the searched topic. But the dark net is different. Its contents cannot be searched using standard search engines. Search engines cannot crawl and index their contents. Special tools such as the TOR (The Onion Router) browser are used to browse the darknet. These browsers are designed to anonymize the Internet surfer and make access possible to the underworld of the Internet.

The TOR project has the word Onion in it to reflect the many layers that it has to traverse to achieve anonymity. The client computer using the TOR browser thus cannot access the information source directly. It goes through a multiple layer of servers or devices before reaching the actual source of data. This multilayer abstraction is intended to ensure the anonymity of the user so that neither the content source nor the user can be traced using standard Internet tools.

Why is it dark?

The normal or clear net is made visible to the world by various technologies. The foremost is the ability of search engines such as Google to search and index the web pages. Another technology powering the clear net is the domain name system or the DNS. It translates the common internet addresses such as abc.com to the actual address used by computers, aka the IP address. However, most of the dark net sites are visible only through IP addresses. So they cannot be accessed through common domain names. That makes it so much more difficult to remember, manage and keep track of these addresses. Since the access modality and the general structure is not visible through usual means, it is referred to as dark. Its name dark is further accentuated by the illegal and dark activities performed with the help of the platform.

Once you get the means and the knowhow to enter the dark net though, it might be as luminous as any other Internet content. If one gets exposure inadvertently or is drawn into it, the dark net may truly have a very dark side indeed.

Why is it used for crime?

The first aim of a criminal is not to get caught. For that, they want as little of the trail of their activity to be maintained as possible. Since the dark net has some provisions to help enhance anonymity, criminals love it. Because of the increased difficulty to trace an event back to the person, the illegal activities are hard to track and control. That is perhaps the main driver of high use of dark net for criminal activity and for spreading illegal material. Commercial transactions dealing in arms, drugs, child pornography or weapons can be easily performed with reduced risk of prosecution. Moreover, the financial transactions are performed using digital currency or shady bank accounts which are difficult to locate and trace back to a person.

Apart from trade, activities such as propaganda spreading, recruiting radicals for extremism etc. are also performed using network platforms provided by the dark web. German data security firm GDATA lists some of the things traded on the darknet. They include items ranging from forged credit card numbers to arms and ammunition, contract killers to counterfeit IDs and university degrees, computer viruses and malware to deadly poison, marijuana to even Uranium. The actual gamut of items traded over the dark net would obviously be much wider and more sinister.

Is it only illegal?

No. The darknet was originally not intended for illegal activity. In the late 1990s, the encrypted and hidden communication channel was envisaged to protect the sensitive communication of spies. While full realization of the dream was not achieved, the concept soon bifurcated into a network of activists for human rights and political dissent.

Apart from the various distinct uses of its own, the dark web or the deep web also has a major role in keeping the normal Internet operational. Every legitimate website or network service has a hidden mechanism that need not and should to be exposed. These include the mechanism to manage the content, network and infrastructure of the normal network. Such privileged and internal activities are restricted to the hidden network. This same hidden network and related technologies evolved into the dark web. In terms of the resources, content volume and physical infrastructure, the hidden network is much larger than the visible network.

Moreover, the darknet is also useful for perfectly logical and positive activities. For example, an investigative journalist might want to use the dark web to covertly plan her research and sting operations. The platform can also be used for citizen activism against an authoritarian regime. This group of users, though having legitimate intentions, usually resort to the dark net to ensure anonymity and escape persecution, censorship and threat from authorities or society.

Darknet or dark web or deep web is a network similar to the visible Internet. The differentiator is the visibility of the network resources and the anonymity of the involved parties. It is a legal and legitimate network infrastructure that enables the visible network to function properly. It also enables a lot of online activity that cannot be performed in the open Internet because of the need of secrecy, anonymity or even persecution and fear from others. This ability to ensure anonymity is also being used for illegal activities. Still its good uses and importance for overall cyberspace is far greater compared to the bad uses. The dark nature has some benefits that are being used for good causes as well. Dark web is both the bedrock of cyberspace with positive and critical use as well as an underworld of the Internet having negative uses.

View post:
Dark web is the underworld of cyberspace - MyRepublica

Posted in Tor Browser | Comments Off on Dark web is the underworld of cyberspace – MyRepublica

How to Track the Tech Thats Tracking You Every Day – Gizmodo Australia

Posted: at 9:43 am

Its easy to feel helpless right now. Cities across the country are seeing unarmed protesters maimed by police officers who enjoy both the full support of the current presidential administration and of the American legal system itself. Congress is, in 2020, debating whether to make lynching a federal hate crime. And theres still a pandemic happening! Meanwhile, even the people who emerge from this moment unscathed physically will, undoubtedly, find their digital lives compromised in more ways than we can possibly fathom.

This last bit, at least, is something we can make meaningful progress on without risking life and limb. But that doesnt mean it will be easy.

One of the cruelest ironies is that the more you learn about digital privacy, the more helpless you feel. Were told that the privacy-protecting laws passed both here and abroad will actually protect us from data-hoovering tech, but a bit of research shows that they actually dont. Were told that wearing a mask the way many of us are right now is a simple enough trick to throw off facial recognition systems, but a bit of reading shows that companies are actively trying to subvert that limitation. A big of digging shows that every major tech company preaching privacy ideals is, in fact, full of shit.

After writing this week about the pipeline between your phone and the cops, my messages were flooded with questions from folks in the activist space trying to mitigate their digital footprint across all of their myriad devices. In turn, I was flooded with something close to guilt.

Even though theres plenty of extremely thorough guides for what the Electronic Frontier Foundation calls surveillance self defence, ultimately, any research about the apps we open or sites we browse are, at the baseline, going to be based on the assumption that these companies are telling us the truth. Its why so many companies get away with saying that they dont sell data, even when theyre blatantly sharing it somewhere out of sight; theyre running off of the assumption that we wont know enough to prove otherwise. And for the most part, theyre right.

Companies like Facebook and Google might not be loyal or particularly honest to you and me, but they have to be honest to the folks they do business with: the millions of advertisers, the dozens of partners in the adtech space or otherwise, and, of course, the sea of investors and venture capitalists raking in cash somewhere on the other side.

For folks trying to get a grip on their digital privacy whether youre an activists or not the best thing you can do is think about your data the same way these companies do: as a business. And while I cant, in good faith, give you The Top Ten Apps That Are An Activists Best Friend, I can give you some tips for surfing more thoughtfully.

Depending on your own privacy preferences, you can get away with using one or the other, both, or none at all. If youre trying to fly under the radar of ad-targeting tech, browsers like Firefox can help where Googles incognito mode cant. Meanwhile, virtual private networks (VPNs) can mask your web activity from any ISPs that might want to pawn it off for cash, while also cloaking your IP address from any advertisers (or authorities) looking to exploit it. That said, VPNs are notoriously unregulated and have been found pawning off this exact data themselves on more than one occasion, so its not a bad idea to research the company behind the network in question. (We have a handy guide on the subject.)

If you want to be really tough to track, the Tor browser might be your best bet but it comes with its own issues. The relay-system thats used on the backend to obfuscate your identity is incredibly powerful, but it can also make browsing pretty slow and inconvenient overall. And ironically, using the super-secure browser comes packaged with the risk of flagging the same authorities youre probably trying not to tip-off.

At the very least, I highly recommend following the Intercepts step-by-step guide on keeping your digital footprint on lock, since some tools they list do double-duty in keeping your data buried from bad actors and advertisers. Folks who are (understandably) sceptical of any privacy-centric tech can also take steps to monitor any data detritus that might still be leaking out.

Back in 2018, Gizmodo published a handy how-to on using network-monitoring tech like Wireshark for this exact purpose but the setup takes a bit of coding know-how. The same goes for using Charles Proxy, the traffic-monitoring tool that I personally use to track the third-parties getting data thats pulled from any apps on my phone. For folks who want to delve into those details, there are some great guides breaking down the basics from a beginner-friendly point of view.

Those of you who want to steer-clear of programming because its a pain in the arse, because its dominated by sexists, or because Tim Cook lied about how fun it actually is you still have ways to snoop on snoopers. Services liked Built With, for example, can break down the trackers that might be lurking on a given site, and tools like Ghostery and Privacy Badger can give you ways to block them.

Mobile data can be a bit tricker to investigate in a code-free way, but not impossible. Apple makes it easy for iOS users to check in on the permissions their apps might be requesting from them, and the permissions pulled from millions of Android apps can be freely browsed online (or pulled yourself), with one of the tools built by Androids community of rabid fanboys. And on both operating systems, paid-for services like App Figures or App Annie can help you break down whether an app comes packaged with any third-party adtech software (also known as an SDK) to do any data hoovering.

Depending on the national authority you ask, personal data can mean any number of things but I always try to imagine it as the worlds most disappointing layer cake, with our phones at one side and a data broker on the other. Even if the third parties youre finding seem innocuous at first glance, naming and shaming them can get you further from the app or site thats snooping on your location, and closer to a shadowy company thats handing off that data to the cops (or anyone else, really).

Depending on the app in question, you might see your data sometimes really sensitive data! being pulled to one actor, or five, or 10, or 20. Depending on how you handle this sort of stuff, you might feel rage, despair, or some kind of morbid relief that your encroaching tech paranoias are justified. And thats ok! Feeling like shit means youre doing this right.

That really depends on the app or site in question, the data in question, and who youre hiding from among other things. Parsing this stuff can take hours (or longer), which is why you can always tip us off if theres a service you think is worth digging into.

Ultimately, the popularity of third-party trackers either from a household name in tech or one youve never heard of lies in the fact that theyre easy for devs to onboard and understand them. And if devs can browse them, you can, too.

Heres an example: While Zoom might not tell you what kind of intel its mining from your calls and handing to the feds, any intel the video-call app shares with Facebook needs to fit into one of the many predetermined boxes laid out in the softwares code. When Zoom, or any other app that might be sharing data with Facebook, well, shares your data with Facebook, the company has to explicitly lay out how that data might be defined. And while the definitions might include all sorts of creepy stuff like every time you open the app or click on an ad tapping your calls isnt on the list. The way were defining data here matters.

Back in 2019, a survey from the American Press Institute found that nearly three-fourths of Americans agree in the importance of reporters holding those in power to account and Im definitely part of that majority. But calling out authorities becomes trickier when abuses of power are systemic and slow, rather than sudden. Calling out a cop on racist behaviour is easier when its horrifically obvious . Similarly, calling out tech companies is easier when we see them pawning off our data to ICE, but harder when that datas pawned off slowly and behind the scenes.

Corruption begets corruption, whether were talking about civil rights or digital privacy, and turning those tides will take mass action from all of us in our own way. For combating institutional racism, this might mean donating to a cause you care deeply about or taking part in the protests happening outside. For taking control of your online life, it means fucking with apps.

Looking for ways to advocate for black lives? Check out this list of resources by our sister site Lifehacker for ways to get involved.

More:
How to Track the Tech Thats Tracking You Every Day - Gizmodo Australia

Posted in Tor Browser | Comments Off on How to Track the Tech Thats Tracking You Every Day – Gizmodo Australia

Google removes app that claimed to detect Chinese apps on Indian phones – CNN

Posted: June 6, 2020 at 6:10 pm

"Remove China Apps" was not available on the Google Play Store on Wednesday, a little over two weeks after it launched with the assurance that it could help Indians identify apps made by Chinese developers.

Anti-Chinese sentiment has been rising in India in recent weeks as the two countries feud over a border dispute.

Remove China Apps was downloaded more than 4 million times before it was taken down, according to analytics company Sensor Tower. In India, nearly 160,000 users gave the app a 5-star rating on the Play Store before it was taken down.

But it was not entirely successful in detecting apps from Chinese developers, according to some users.

On Tuesday, user Sridhar Toopurani wrote in a review of the app that "while the concept is good ... it did not detect MI Video, Helo etc."

The incident, at a remote, mountainous crossing close to Tibet, was the latest in a long line of border flare-ups between the neighboring powers, and has fueled a fresh round of anti-China sentiment in India.

Sonam Wangchuk, an education reformer who was also the inspiration for a popular movie character in India, asked fellow Indians to boycott all things Chinese in response to the border standoff.

He shared a video on YouTube last week, urging Indian citizens to stop buying Chinese goods, to "use your wallet power ... and stop virtually financing the current military bullying." The video has been viewed more than 3.7 million times.

Actor Arshad Warsi addressed his 2.2 million followers on Twitter, saying he is "consciously going to stop using everything that is Chinese."

"As they are a part of most of the things we use, it will take time but I know, one day I'll be Chinese free. You should try it too," he added.

The Remove China App caught the attention of Chinese state-run tabloid The Global Times.

Tensions between the two countries are escalating, but they also have a longstanding business relationship.

Chinese investors have also poured a lot of money into some of India's buzziest tech startups.

Vedika Sud contributed to this report.

Originally posted here:

Google removes app that claimed to detect Chinese apps on Indian phones - CNN

Posted in Google | Comments Off on Google removes app that claimed to detect Chinese apps on Indian phones – CNN

Google will give every employee $1,000 to WFH. Its head of wellness explains why – FOX5 Las Vegas

Posted: at 6:10 pm

Most of Google's US workforce has been working remotely since March due to the coronavirus. And last month, CEO Sundar Pichai said he expects most employees will largely be working from home for the rest of the year.

As the wellness and resilience lead at Google, it's Lauren Whitt's job to make sure Google employees remain healthy and have access to mental health and wellness resources during these uncertain times.

And that is no small task.

There are 10 members of the global well-being and mental health teams, who work with all of Google's employees across the globe.

To help with the shift to working from home, the company has offered virtual training and classes. And it has shifted some of its notorious perks online. Google also recently offered all employees a $1,000 allowance to spend on equipment to help outfit their home workspaces.

CNN Business spoke with Whitt about Google's recent wellness efforts during the pandemic. Here's what she had to say about what Google is doing to promote mental health and well being (This interview has been edited for clarity and length):

What role do managers have when it comes to their team's mental health? And what can they do to make sure their workers' are doing OK?

We are asking them to check in on the well-being of their team, to ask about how their team is doing. We do not want our managers to be therapists, counselors, advisers in any way on the mental health space. We do want them to check in on: 'How is your well being?' 'How are you doing?' 'How is life going for you right now?' And if there are signs or indications that there may be something going on, to be able to connect the Googler with the wealth of resources and suite of services that we have available.

The final thing that we are asking managers to do is to lead with intention with their own role modeling of well-being behavior.

We all have mangers, we all know that we often will see what our managers are doing before we hear what they are telling us to do. And so we are asking managers to lead by example and to role model well-being and detachment and recovery in their own lives as well.

The shift from working in an expansive workspace with lots of perks to being at home all the time can be tough. How are you helping workers adapt to their new reality?

I have been so impressed with Googlers' grassroots efforts to create a community and to create so much connection between what they were doing in the office to what they are doing at home.

When we are on-site, many offices have fitness centers and those coaches have taken those programs and those classes online and are doing them virtually so Googlers are still able to work out from home with people they used to work out with in the office using milk jugs and different crazy things that are around the house.

We all miss the fantastic food that we had in Google cafes and many of our cafe teams and chefs are beginning to offer virtual classes online -- so How to Cook classes for us to be able to pick up some of those unique and fun skills.

We have groups of Googlers that are doing virtual meditation and mindfulness classes -- programs called "gPause." We have peer-to-peer mental health support through our Blue Dot community so a lot of the things that were happening in the offices, we are just bringing them virtually.

Tell me about Google's decision to offer $1,000 to employees to equip their home offices. How important is the workspace?

For us to be able to provide resources for Googlers to set up the most productive workstation at home so that they have an opportunity to separate 'When I am in this space I am focused on my work and I am focused on these things, and when I step away from this space I am able to detach from work, I am able to connect with my family, my friends, my pets, the people in my community outside of this work box' is really important.

The routine and the habits that we used to have in the office are so important for us to translate those and set new routines and new habits into the workspace and work setup that we have at home.

That is really critical for us long term, as well as from a health perspective -- making sure that we have the best opportunity for ergonomically correct chairs, eye-line for monitors and those sorts of opportunities as well.

Are there any certain areas of wellness that you are focusing on more right now?

We are continuing to invest in this concept of resilience, the ability to recognize how to be present in this moment, to face the task at hand, and to focus on what can you do today?

We will continue our messages of ergonomics of proper alignments of your workspace, of having a chair that suits and supports your back, having the ergonomics and being able to alleviate some of those low back pains and muscular skeletal issues.

I think we are looking into the future, on what health and wellness will look like. How will we continue to support Googlers in their home environment and in their return to work environment to ensure that movement is a priority, that sleep is the No. 1 priority for us, and that nutrition will continue to matter to Googlers, independent of where they are working.

You say building resilience is important in a time like this. How are you helping employees develop that?

We spent a couple years really focused on making sure we had the resources and tools for Googlers to be able to focus on their mental health and get the support they need in that space.

About two years ago, we started to shift and say: 'OK, we have those tools and resources available, what is next? How do we now really focus on the ability to cope with stress, bounce back from adversity and understand that we can rebound to be able to recover from difficult challenges?'

We launched a check-in in the fall, we call it the T.E.A. [Thoughts, Energy, Attention] check-in. Our T.E.A. check is basically: where are your thoughts, where is your energy and where is your attention? And as we look at those three...is it time to take on a challenging project? Is [your energy] low? Do you need to jump up and down? Do you need to step away? Do you need to take a nap? And where is your attention? What is the one thing you can focus on today that you can control, that you can influence, that will give you purpose and meaning and optimism for today?

What is Google doing to address burnout, especially now that everyone is at home and work-life balance is harder to achieve?

One of our primary messages right now around burnout is being intentional about the recovery and the rest and the opportunity to turn things off, shift your focus to non-work activities. As Googlers are doing that, they are realizing that as they do recover and detach, they are able to come back to the work or come back to solving that problem with a refreshed, renewed excited perspective.

We often approach the conversation of burnout with very intentional practical ways to step away from your computer every 90 minutes, to get outdoors, even if you just need to do pushups or jumping jacks or stand up in between meetings and move around and shake it out, what are these ways to be able to shift your focus during and throughout the day.

Also for us, is continuing to encourage Googlers to take vacation, to step away from the work, even though you can't travel in many cases, to be able to invest in using that vacation time as recovery time.

Tell me about Google's Blue Dot Program pre-pandemic and what it looks like now.

The Blue Dot Program is our peer-to-peer mental health community. We started this program a number of years ago as Googlers wanted an opportunity to be able to talk about hard things, but they didn't necessarily feel like it was clinical. They wanted just a peer's perspective, somebody who had been through it, who had been where they were.

That group has pivoted in a really impressive way. They are operating virtual office hours, we have different places online where you can connect virtually over Google Meet video calls to be able to talk about those things.

Although the face-to-face component of that program has shifted, they have taken it virtually through Google tools and are continuing to really innovate around new ideas to be able to connect and support each other and those who are interested in joining moving forward.

View original post here:

Google will give every employee $1,000 to WFH. Its head of wellness explains why - FOX5 Las Vegas

Posted in Google | Comments Off on Google will give every employee $1,000 to WFH. Its head of wellness explains why – FOX5 Las Vegas

Google says foreign hackers targeted emails of Trump and Biden campaign staffers – The Verge

Posted: at 6:10 pm

Foreign hackers targeted the personal email accounts of staffers on the presidential campaigns of Democratic primary candidate Joe Biden and President Donald Trump, Reuters reported. It appears that state-backed hackers from China tried to target staffers on the Biden campaign, while Iranian hackers targeted the email accounts of Trump campaign staff.

Shane Huntley, the head of Googles Threat Analysis Group, tweeted that the hackers had made phishing attempts on campaign staffers emails, but there had been no sign of compromise.

A Google spokesperson told The Verge the company had not seen evidence that any of the attempted attacks had been successful and that it had sent the information to federal law enforcement officials. We encourage campaign staff to use extra protection for their work and personal emails, and we offer security resources such as our Advanced Protection Program and free security keys for qualifying campaigns, the spokesperson said.

Matt Hill, deputy national press secretary for the Biden campaign, says the campaign was aware of the phishing attempt and had been braced for something like this to happen. We have known from the beginning of our campaign that we would be subject to such attacks and we are prepared for them, Hill told The Verge in an email, adding that the campaign takes cybersecurity seriously and will remain vigilant against these threats.

A spokesperson for the Trump campaign said it had been been briefed that foreign actors unsuccessfully attempted to breach the technology of our staff. We are vigilant about cybersecurity and do not discuss any of our precautions.

This apparently wasnt the first instance of Iranian hackers trying to access Trump campaign emails. Last year, Microsoft said an Iranian group known alternately as Phosphorous, APT 35, or Charming Kitten unsuccessfully tried to get into a presidential campaigns emails. Reuters later identified the campaign in question as Trumps.

Email hacking is a particularly fraught issue for US political campaigns after Russian hackers successfully phished the Democratic National Committee in 2016, exposing thousands of emails.

UPDATED June 4th 5:35PM ET: Added comment from Trump campaign spokesperson.

Follow this link:

Google says foreign hackers targeted emails of Trump and Biden campaign staffers - The Verge

Posted in Google | Comments Off on Google says foreign hackers targeted emails of Trump and Biden campaign staffers – The Verge

After a spate of device hacks, Google beefs up Nest security protections – TechCrunch

Posted: at 6:10 pm

Google has added its line of Nest smart home devices to its Advanced Protection Program, a security offering that adds stronger account protections for high-risk users like politicians and journalists.

The program, launched in 2017, allows anyone who signs up access to a range of additional account security features, like limiting third-party access to account data, anti-malware protections and allowing the use of physical security keys to help thwart some of the most advanced cyberattacks.

Google said that adding Nest to the program was a top request from users.

Smart home devices are increasingly a target for hackers largely because many internet-connected devices lack basic security protections and are easy to hack, prompting an effort by states and governments to help device makers improve their security. A successful hack can allow hackers to snoop in on smart home cameras, or ensnare the device into a massive collection of vulnerable devices a botnet that can be used to knock websites offline with large amounts of junk traffic.

Although Nest devices are more secure than most, its users are not immune from hackers.

After a spate of reported automated attacks targeting Nest cameras earlier this year, Google began requiring that Nest users must enable two-factor authentication. Google said its systems had not been breached, but warned that hackers were using passwords stolen in other breaches to target Nest users.

Other device makers, like Amazon-owned Ring, were also targeted by hackers using reused passwords.

While two-factor authentication virtually eliminates these kinds of so-called credential stuffing attacks, Google said its new security improvements will add yet another layer of protection to users Nest devices.

Continued here:

After a spate of device hacks, Google beefs up Nest security protections - TechCrunch

Posted in Google | Comments Off on After a spate of device hacks, Google beefs up Nest security protections – TechCrunch