The Luxembourgish prime minister reiterated that the government was against contact tracing apps unless a common solution is found on a European level.

The entire coalition government takes privacy laws extremely seriously, the prime minister underlined. "We have to know the side effects before we approve a similar measure," Bettel emphasised.

Did you know that no company with a telecom operator license in Europe is allowed to provide end to end encryption on a telephony service. They all have to be able to activate lawful interception for law enforcement agencies without the knowledge of the customer at any time.

nytimes.com/2020/01/21/world/a

"Prosecutors also say that Mr. Greenwald was communicating with the hackers while they were actively monitoring private chats on Telegram, a messaging app. "

Seems like they most likely hacked Greenwald's mobile phone, since private keys for telegram secret chats are stored only on the mobile device.

Digital Privacy Salons are skill & knowledge sharing sessions which aim to teach people the basic ways of protecting themselves and their data from intrusive surveillance and unwanted/unwitting information gathering.

Tuesday 11/02/20, 19:00@Level2

privacysalon.lu/next-digital-p

DigiCert Inc. is requiring to create a new business listing on Google Business, Kompass or other specific B2B listing websites in order to verify an Extended Validation Certificate. Official company registration is not enough.

All these companies are re-selling provided data further. Seems lie extra revenue stream.

Any tips for less greedy, more privacy EV certs provider?

Conclusion is that I haven't seen one product which you could buy anonymously and use without any public cloud or without sharing your location/address.

Not a single company, including few based in EU, offer option to host own private cloud for communication with smart lock or completely offline solution.

Get lose

Show thread

I was looking into smart locks this week. What I find out really scared me. One company was gathering following info:

Type of intercom, intercom bell signal, intercom buzzer signal, every entrance attempt (successful and unsuccessful) and who tried to enter if available.

First name, last name, e-mail address, address and password, telephone number, credit card information, IMEI code of the mobile phone, mobile phone version and version of operating system of the mobile phone.