CyberTechTips

681 bookmarks
Custom sorting
Cybersecurity Is an Equity Issue in K-12 Education - EdTech Digest
Cybersecurity Is an Equity Issue in K-12 Education - EdTech Digest
Rising digital threats are exposing stark disparities among school systems, where limited resources hinder recovery efforts and leave the most vulnerable learners facing the greatest consequences. GUEST COLUMN | by Björn Hall When Baltimore County Public Schools got breached in November 2020, the district stayed offline for three days. And while it might not seem […]
·edtechdigest.com·
Cybersecurity Is an Equity Issue in K-12 Education - EdTech Digest
Kill Yr Substack | Jason Cosper
Kill Yr Substack | Jason Cosper
I’ve been tired of Substack platforming white supremacists, Nazis, neo-confederates, and so many of the worst people on the internet for a long time now.
·jasoncosper.com·
Kill Yr Substack | Jason Cosper
NIST Overhauls DNS Security Guidance After 12 Years, Reflecting a Transformed Threat Landscape
NIST Overhauls DNS Security Guidance After 12 Years, Reflecting a Transformed Threat Landscape
In a significant update to federal cybersecurity policy, the National Institute of Standards and Technology (NIST) has released a new version of its long-standing Domain Name System (DNS) security guidance—marking the first major revision in over a decade. The newly published SP 800-81 Revision 3, t
·linkedin.com·
NIST Overhauls DNS Security Guidance After 12 Years, Reflecting a Transformed Threat Landscape
Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester
Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester
Privacy-focused email provider Proton Mail provided Swiss authorities with payment data that the FBI then used to determine who was allegedly behind an anonymous account affiliated with the Stop Cop City movement in Atlanta, according to a court record reviewed by 404 Media.
·flip.it·
Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester
Is Flock Mass Surveillance? Here's What 30 Courts Decided
Is Flock Mass Surveillance? Here's What 30 Courts Decided
Flock ALPRs do not and cannot track vehicles, much less individual people. ALPRs take a point-in-time image of the rear of vehicles on public roadways. They are incapable of tracking the whole of anyone’s movements, a determination that has been consistently made by Courts across the country.
·flocksafety.com·
Is Flock Mass Surveillance? Here's What 30 Courts Decided
TikTok is tracking you, even if you don't use the app. Here's how to stop it
TikTok is tracking you, even if you don't use the app. Here's how to stop it
TikTok is growing its data harvesting empire, and avoiding the app won’t protect you – but some easy steps can keep you safe.TikTok keeps track of everything you do on its app – no surprises there. What's less obvious is how the company follows you around other parts of the internet that have nothing
·flip.it·
TikTok is tracking you, even if you don't use the app. Here's how to stop it
ICE Is Going on a Surveillance Shopping Spree | Electronic Frontier Foundation
ICE Is Going on a Surveillance Shopping Spree | Electronic Frontier Foundation
We need to have a hard look at the surveillance industry. It is a key enabler of vast and untold violations of human rights and civil liberties, and it continues to be used by aspiring autocrats to threaten our very democracy. As long as it exists, the surveillance industry, and the data it generates, will be an irresistible tool for anti-democratic forces.
·eff.org·
ICE Is Going on a Surveillance Shopping Spree | Electronic Frontier Foundation
Court Rules That Ripping YouTube Clips Can Violate the DMCA
Court Rules That Ripping YouTube Clips Can Violate the DMCA
A federal court in California has ruled that YouTube creators who use stream-ripping tools to download clips for reaction and commentary videos may face liability under the DMCA's anti-circumvention provisions -- a decision that could reshape how one of the platform's most popular content genres ope...
·news.slashdot.org·
Court Rules That Ripping YouTube Clips Can Violate the DMCA
Encrypt It Already
Encrypt It Already
End-to-end encryption protects the privacy of your data.
·encryptitalready.org·
Encrypt It Already
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream… | Clara Hawking | 164 comments
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream… | Clara Hawking | 164 comments
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream consumer platform. It explicitly acknowledges the collection and processing of sensitive personal information under US state privacy laws. Named directly: • Racial or ethnic origin. • Religious or philosophical beliefs. • Mental and physical health data. • Sexual orientation. • Transgender or nonbinary status. • Citizenship or immigration status. • Precise location data. The policy goes further. TikTok is collecting far more than what users consciously share. Under the updated policy, it gathers what you provide, what it observes automatically, and what it receives from third parties. That includes account details and identity verification documents, private messages, drafts and unpublished content, AI prompts and interactions, clipboard content, purchase and payment data, contact lists and social graphs, and an extensive set of technical signals such as device identifiers, keystroke patterns, battery state, audio configurations, and activity tracked across devices. This is not incidental data leakage. It is formalized, permitted, and documented. Images and video are treated as analyzable environments. TikTok states that it "identifies objects and scenery, detects faces and other body parts, extracts spoken words, and collects metadata describing how, when, where, and by whom content was created." Post a photo near the Golden Gate Bridge and you are not just sharing a moment. You are generating structured data about place, time, environment, and your body, or body parts. Photos and videos are not just content. They are raw material for computer vision, biometric analysis, and location inference. Tik Tok will use all of the collected data, and maintains the right to sell all of it to interested third parties, from vendors to the federal government. Leaders must act on this immdiately. Privacy policies are not background reading. They are power documents. When they change, accountability shifts with them. If you are a user, a parent, a school, a youth facing organization, nonprofits, and public institutions that use TikTok as a communications channel, the update changes the governance calculus. Engagement is not a neutral act. It carries serious legal and ethical obligations tied to data protection, duty of care, and institutional risk. The new policy deserves close reading. At this stage of platform power, and scale of data collection, policy literacy is a governance responsibility, not a personal preference. Read the policy here: https://lnkd.in/ejbm8THx | 164 comments on LinkedIn
·linkedin.com·
The TikTok privacy debate did not end with the US agreement. It has escalated. TikTok has updated its US Privacy Policy. It is now one of the most aggressive data collection regimes of any mainstream… | Clara Hawking | 164 comments
How Hackers Are Fighting Back Against ICE
How Hackers Are Fighting Back Against ICE
A few enterprising hackers have started projects to do counter surveillance against ICE, and hopefully protect their communities through clever use of technology.
·eff.org·
How Hackers Are Fighting Back Against ICE
ClearURLs
ClearURLs
ClearURLs Documentation
·docs.clearurls.xyz·
ClearURLs
'Everyone Hates OneDrive, Microsoft's Cloud App That Steals Then Deletes All Your Files' - Slashdot
'Everyone Hates OneDrive, Microsoft's Cloud App That Steals Then Deletes All Your Files' - Slashdot
Microsoft's OneDrive cloud storage service has drawn renewed criticism for a particularly frustrating behavior pattern that can leave users without access to their local files after the service automatically activates during Windows updates. Author Jason Pargin recently outlined the problem: Windo...
·it.slashdot.org·
'Everyone Hates OneDrive, Microsoft's Cloud App That Steals Then Deletes All Your Files' - Slashdot
Winaero Tweaker
Winaero Tweaker
The ultimate all-in-one tweaker for Windows 11, Windows 10, Windows 8, and Windows 7.
·winaerotweaker.com·
Winaero Tweaker
Breaking Up With Edtech Is Hard to Do
Breaking Up With Edtech Is Hard to Do
Shedding old edtech is a real pain, district experts say. Worse, student privacy may be at risk.
·edsurge.com·
Breaking Up With Edtech Is Hard to Do
TCEA Knowledge Booster - Technology Plan Implementation Guide
TCEA Knowledge Booster - Technology Plan Implementation Guide

TCEA Knowledge Booster - Technology Plan Implementation Guide Price: 29.00 USD TCEA Knowledge Booster: Technology Plan Implementation Guide

The Technology Plan Implementation Guide is a practical, five-year companion for directors charged with turning a district technology plan into day-to-day progress. Built for real-world constraints, it provides frameworks, timelines, and checklists you can adapt, not one-size-fits-all mandates. Whether you’re starting from scratch or inheriting a plan midstream, you’ll get clear first-30-days actions, year-by-year priorities, and guidance that keeps momentum without burnout.

·membership.tcea.org·
TCEA Knowledge Booster - Technology Plan Implementation Guide