That article doesn't open in my browser. I have a slightly aggressive adblocking & cookie blocking setup. hence sharing the Outline link for similar folks
Same here - what concerns me, is that upon clicking on a TC article link, my browser opens (and fails because it is blocked w/ Pi-Hole) the URL https://guce.advertising.com/collectIdentifiers?sessionId=3_... - seems pretty shady to me :( (or, well, at least not something i'd expect...)
I've seen this server, and contrary to popular belief, this appears to have been, indeed, a demo server with dummy random data. Still, you should password-protect your demo servers too. Just saying.
> While most governments lean toward privacy-focused apps that use Bluetooth signals to create an anonymous profile of a person’s whereabouts, others, like Israel, use location and cell phone data to track the spread of the virus.
Doesn't look like that's what was found being attempted here.
> Security researcher Bob Diachenko discovered one of NSO’s contact-tracing systems on the internet, unprotected and without a password, for anyone to access. After he contacted the company, NSO pulled the unprotected database offline. Diachenko said he believes the database contains dummy data.
Doesn’t say which database and can’t find a first-hand account from the researcher, but let me guess: MongoDB at it again?
And while you’re at it, please correct “group” to “Group” so we know it’s not about a group of NSOs (are those like NGOs or something?) but rather a company called “NSO Group”.
That article doesn't open in my browser. I have a slightly aggressive adblocking & cookie blocking setup. hence sharing the Outline link for similar folks