big tech

Últi­mes entra­des

logo de facebook
«A dife­ren­cia del resto de nues­tra comu­ni­dad, estas perso­nas pueden violar nues­tros están­da­res sin ninguna conse­cu­en­cia…
person in computer with eyes all around
Privacy-first compa­nies call on lawma­kers to ban survei­llance-based adver­ti­sing and protect people’s privacy Recently, the Norwe­gian Consu­mer Coun­cil publis­hed a report calling for a ban on…
pantalla con icono whatsapp

What­sApp deberá pagar 225 millo­nes de euros por violar la priva­ci­dad de los usua­rios y romper el Regla­mento de Protec­ción de Datos euro­…

iphone-8-plus photo

In the recent past, there have been contro­ver­sies surroun­ding the perfor­mance of iPho­nes, espe­ci­ally old iPho…

zoom logo
Regu­la­tor claims city offi­ci­als are using a «legally highly proble­ma­tic system»

A German data protec­tion commis­si­o­ner has offi­ci…

“Withdrawal” option biggest obstacle for compliance graphic
The acti­vist that won Face­book in a EU trial will sue Tele­fó­nica and Renfe by bad use of the ‘coo­ki­es’ among other 422 Euro­pean web sites in 10 EU coun­tries…
music notes different colors
Whet­her you’re liste­ning to workout music or a «cooking dinner» play­list, the app can show you ads based on your mood and what you’re doing right now.

Face…

Black trans face
Expe­ri­ence how «arti­fi­cial inte­lli­gence» judges your face Start the show ›…
A teenage girl looking at her smartphone
Rese­ar­chers find mini­mal inter­ac­ti­ons by teen users can trig­ger a deluge of thin-body and dieting images

Insta­gram’s algo­…

devices and pegasus project text

NSO Group’s spyware has been used to faci­li­tate human rights viola­ti­ons around the world on a massive scale, accor­ding to a major inves­ti­ga­tion into…

Rosalia lanzando dinero y la frase: Google amb les teves dades

Me produce una mezcla de sorpresa y de tedio seguir encon­trando direc­ci­o­nes de gmail en listas de correo de proyec­tos alter­na­ti­vos que dicen luchar contra…

keeboard
The mana­gers are accu­sed of selling tech to Libya and Egypt that was used to iden­tify acti­vists, read private messa­ges, and kidnap, torture, or kill them.