選單
中文 (繁體)

Facebook, DuckDuckGo, WhatsApp’s new privacy tools, Signal’s misfortune and more. AdGuard’s digest

In this edition of AdGuard's digest: DuckDuckGo rights the wrong, laptops spy on children, health apps — on women, WhatsApp unveils new privacy features, Messenger expands end-to-end encryption, as Signal suffers in an attack.

DuckDuckGo will block Microsoft trackers, but not everywhere

DuckDuckGo, which came under fire earlier this year for allowing Microsoft trackers to run in its browser, is trying to regain the trust of the privacy-minded crowd. The company has announced that it wouldn't cut Microsoft trackers any slack any longer, and would start blocking tracking scripts from Bing and LinkedIn domains from loading in DuckDuckGo's mobile browser and extensions.

While DDG says that it has been working "on an architecture for private ad conversions", for the time being it still needs the Microsoft's helping hand delivering ads in its privacy-focused search engine. Thus, following a click on a Microsoft-provided ad in the search, DuckDuckGo will allow a tracking script to load on the advertiser's website. However, the user can disable ads in the search settings.

DuckDuckGo came clean about its tracking deal with Microsoft only after it was uncovered by a security researcher. Thus, it may have no other choice but to expand its third-party tracker protection to Microsoft to save face (what has remained of it). However, it's a welcome step: less tracking is still less tracking.

School-issued laptops spy on students after class

Laptops issued to students during the pandemic have been keeping tabs on them in and after class, and will continue doing so come the next school year. According to a new survey, 89 percent of teachers in the US say that their schools monitor students online, and that 80 percent of this monitoring "occurs on school-issued devices".

In most cases the monitoring is used to flag students for disciplinary violations and not self-harm or threats of violence. Students cannot quite wind down at home as well — about half of students and teachers report that activity monitoring continues outside school hours. Moreover, during that time, alerts from school-issued laptops can be forwarded directly to "a third-party focused on public safety" such as police. 44 percent of teachers say such round-the-clock surveillance indeed resulted in students being contacted by some type of law enforcement.

And while students, at least, may suspect that everything they search for on their free, school-issued Chromebooks is hardly a secret, it turns out that the spying software can also pull in the data from their private phones. When the student plugs in their phone into the laptop, the monitoring software can slurp up photos from the phone and scan them, The Wired reports.

Spying software has become ubiquitous in schools

Sadly, the pandemic has normalized intrusive surveillance, and, as it happens so often nowadays, the noble goal of protecting children is used to justify blanket spying. While the spying tools' contribution to the students' safety is up for debate, they trample on children's privacy, instill fear into them and invite excessive policing.

Popular period and pregnancy apps leak data

A new Mozilla research has found that the vast majority of popular reproductive health apps fall short of protecting users' privacy. The researchers have studied 10 period tracking apps, 10 pregnancy tracking apps and 5 wearable devices. 18 apps failed to clear Mozilla's threshold to be considered safe enough to be used, while smart devices (Garmin, Apple Watch, Fitbit, Oura Ring, Whoop Strap 4) received the greenlight.

Massively popular Flo period tracker was chastised for having a "spotty" track record and potentially buying data from third-party sources. Germany-based Clue period tracker was faulted for sharing personal data with advertisers by default, using date of birth as an ad identifier and not requiring a strong password. Some apps were flagged for misleading or vague privacy policies, others for collecting huge amounts of data and sharing it with third parties, including law enforcement and Facebook.

The findings are a stark reminder that most apps that handle sensitive health data are neither private nor secure. We urge users to give their apps only the most necessary permissions, as well as study their privacy policies.

WhatsApp's new privacy feature to allow users put on invisibility cloak

As part of its latest privacy-focused update, WhatsApp is giving users the ability to leave a group without a bang. From now on, only group admins will be notified if you decide to take a French leave. Users will also be able to choose who can see that they're online: no more fielding questions from pesky conctacts who saw you being online and not responding to their messages.

In another update aimed at boosting privacy, WhatsApp said it would be blocking screenshot-taking for 'View Once' messages. It was previously possible to take a screenshot of a message shared through the privacy-oriented feature, but now this loophole would be closed. Indeed, what is the point of 'View Once' messages if they can be viewed multiple times?

WhatsApp is becoming a little bit more private

The host of new features promise to make the WhatsApp experience a bit more private for users. However, it might not be enough to redeem it in the eyes of those who remember its more questionable practices, such as employing an army of content moderators to act on user reports. After all, WhatsApp still shares data with Meta, which is notorious for its lackluster privacy protections.

Speaking of the devil…

Meta tests default end-to-end encryption in Facebook Messenger

Meta might be dragging its feet on the promise to introduce end-to-end encryption across all its chat apps, but it is not abandoning the idea. The company has announced that it would be turning on end-to-end encryption for some individual chats on Messenger by default as part of a new test. The most frequent chats of those in the test group would be automatically encrypted.

Unlike WhatsApp, which has default end-to-end encryption, Messenger still lacks that additional layer of security. Thus, the burden falls on users to enable end-to-end encryption by entering into a 'secret conversation' mode for each individual chat. Earlier this year, Messenger also rolled out an op-in end-to-end encryption feature for group chats and calls.

Additionally, Meta said that it would allow users to store their end-to-end encrypted conversations not on the device, but in the "secure storage" on Meta servers. Meta said that it won't have access to the messages, unless the message is reported by the user. In order to restore the chat history on a new device, users will need to either set a PIN or generate a code. They also might use a third-party cloud service, such as iCloud, to store a secret acceess key to the backup.

An unencrypted messenger sounds like an anachronism in 2022, so we can only hope that Facebook makes good on its earlier pledge to encrypt private messages in Messenger and Instagram 'sometime in 2023'.

Police uses Facebook messages as evidence in abortion case

The timing of the abovementioned Messenger update is curious, as it comes right on the heels of Facebook's admission that it had turned over a teen and her mother's DMs to police. That resulted into both women being hit with abortion-related charges.

According to the court documents obtained by the Motherboard, Facebook turned over the chats in response to a search warrant from Nebraska police. The messages showed the teen and her mom allegedly discussing how to take an abortion-inducing drug and dispose of the fetus.

Facebook can turn over sensetive data to police

The alleged abortion was performed later in the pregnancy than allowed by the state law. Meta confirmed that it handed over the sensitive data to police, but claimed that "nothing" in the warrant mentioned abortion. The case unfolded in early June before the US Supreme Court ended federal abortion protections. The latter ruling renewed concerns about how apps and social media handle sensitive medical data.

Meta denied that its encryption update has anything to do with the abortion controversy. Moreover, end-to-end encryption by itself does not offer bulletproof protection in cases like this. If a secret encryption key is stored on the company's servers, the data can still be easily unscrambled by anyone who has it. Messenger's new 'secure storage' feature is apparently aimed at preventing this from happening.

Nobody's perfect: Signal users' phone numbers exposed in third-party breach

Your app may be as secure and private as it gets, but as long as it relies on third parties to operate, it can never be immune from breaches like the one that hit Signal, a king among the most secure messaging apps.

End-to-end encrypted messenger Signal has become collateral damage in an attack on telecommunication giant Twilio, which was breached in early August. The data of 125 Twilio's customers (Signal among them) was compromised as a result of the attack. Twilio does phone number verification for Signal.

Signal said that attackers might have obtained access to phone numbers or SMS verification codes of 1,900 users. The attackers looked for three numbers specifically, and one user reported that someone had re-registered their account. Signal is responding to the breach by notifying and unregistering all affected users on all devices so that they can sign up again. Users are also advised to turn on the feature that requires them to enter a security PIN before an account can be activated.

While the breach is not a good look for Signal, it also underscores the importance of end-to-end encryption and other security measures taken by the platform. Owing to them, bad actors won't not be able to access message history, profile information or contact lists of those affected. It must be noted that end-to-end encryption is not a panacea, and will only serve its purpose if implemented properly, so that the data is not compromised due to weak algorithms or a leak of encryption keys.

喜歡這篇文章嗎?
19,180 19180 使用者評論
極好的!

AdGuard for Windows

Windows 版 AdGuard 不只是廣告封鎖程式,它是集成所有讓您享受最佳網路體驗的主要功能的多用途工具。其可封鎖廣告和危險網站,加速網頁載入速度,並且保護兒童的線上安全。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Mac

Mac 版 AdGuard 是一款獨一無二的專為 MacOS 設計的廣告封鎖程式。除了保護使用者免受瀏覽器和應用程式裡惱人廣告的侵擾外,應用程式還能保護使用者免受追蹤、網路釣魚和詐騙。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Android

Android 版的 AdGuard 是一個用於安卓裝置的完美解決方案。與其他大多數廣告封鎖器不同,AdGuard 不需要 Root 權限,提供廣泛的應用程式管理選項。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for iOS

用於 iPhone 和 iPad 的最佳 iOS 廣告封鎖程式。AdGuard 可以清除 Safari 中的各種廣告,保護個人隱私,並加快頁面載入速度。iOS 版 AdGuard 廣告封鎖技術確保最高質量的過濾,並讓使用者同時使用多個過濾器。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 內容阻擋器

AdGuard 內容阻擋器將消除在支援內容阻擋器技術之行動瀏覽器中的各種各類廣告 — 即 Samsung 網際網路和 Yandex.Browser。雖然比 AdGuard for Android 更受限制,但它是免費的,易於安裝並仍提供高廣告封鎖品質。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 瀏覽器擴充功能

AdGuard 是有效地封鎖於全部網頁上的所有類型廣告之最快的和最輕量的廣告封鎖擴充功能!為您使用的瀏覽器選擇 AdGuard,然後取得無廣告的、快速的和安全的瀏覽。
19,180 19180 使用者評論
極好的!

AdGuard 助理

AdGuard 桌面應用程式的配套瀏覽器擴充功能。它為瀏覽器提供了自訂的元件阻止的功能,將網站列入允許清單或傳送報告等功能。
19,180 19180 使用者評論
極好的!

AdGuard DNS

AdGuard DNS 是一種不需要安裝任何的應用程式而封鎖網際網路廣告之極簡單的方式。它易於使用,完全地免費,被輕易地於任何的裝置上設置,並向您提供封鎖廣告、計數器、惡意網站和成人內容之最少必要的功能。
19,180 19180 使用者評論
極好的!

AdGuard Home

AdGuard Home 是一款用於封鎖廣告 & 追蹤之全網路範圍的軟體。在您設置它之後,它將涵蓋所有您的家用裝置,且為那您不需要任何的用戶端軟體。由於物聯網和連網裝置的興起,能夠控制您的整個網路變得越來越重要。
19,180 19180 使用者評論
極好的!

AdGuard Pro iOS 版

除了在 Safari 中之優秀的 iOS 廣告封鎖對普通版的用戶為已知的外,AdGuard Pro 提供很多功能。透過提供對自訂的 DNS 設定之存取,該應用程式允許您封鎖廣告、保護您的孩子免於線上成人內容並保護您個人的資料免於盜竊。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Safari

自 Apple 開始強迫每位人使用該新的軟體開發套件(SDK)以來,用於 Safari 的廣告封鎖延伸功能處境艱難。AdGuard 延伸功能可以將高優質的廣告封鎖帶回 Safari。
19,180 19180 使用者評論
極好的!

AdGuard Temp Mail

免費的臨時電子郵件地址產生器,保持匿名性並保護個人隱私。您的主收件匣中沒有垃圾郵件!
19,180 19180 使用者評論
極好的!

AdGuard Android TV 版

Android TV 版 AdGuard 是唯一一款能封鎖廣告、保護隱私並充當智慧電視防火墻的應用程式。取得網路威脅警告,使用安全 DNS,並受益於加密流量。有了安全性和零廣告的使用體驗,使用者就可以盡情享受最喜愛的節目了!
已開始下載 AdGuard 點擊箭頭所指示的檔案開始安裝 AdGuard。 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,拖曳 AdGuard 圖像到"應用程式"檔案夾中。感謝您選擇 AdGuard! 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,點擊"安裝"。感謝您選擇 AdGuard!
在行動裝置上安裝 AdGuard