Surveillance, privacy and misuse


by Kenny Wolf

Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Surveillance, privacy and misuse

This week’s issue takes a closer look at how technology meant to improve safety can also threaten privacy. From Kazakhstan’s growing surveillance system powered by Western tech firms to the ongoing debates around digital rights in Europe and the UK, questions of control and transparency are more relevant than ever. As facial recognition and AI advance, understanding who uses our data, and why, has never been more important.

Facial Recognition and Surveillance Technology in Kazakhstan

This documentary from ARTE explores how Kazakhstan is building a vast facial recognition and surveillance system to monitor and repress its citizens.

Technologies supplied by Western companies, such as Canon, Motorola, and IBM are being used to identify and arrest political opponents under the guise of crime prevention. This investigation highlights the growing threat of state control through digital surveillance and the ethical implications of foreign corporate involvement.


What caught my eye this week

Fight Chatcontrol

Caught my eye months ago, and now again. It's important to further talk about this topic.

UK plans to ban VPNs

The UK had already tough months in terms of privacy. Now they plan to ban VPNs overall.

WireGuard

I'm not living in the UK, but it's still good practice if you can setup your own VPN. With WireGuard you can setup a fast, modern and secure VPN tunnel.


Tip of the Week

Your face belongs to you.

It defines who you are and identifies you. Sadly, your face becomes more and more a commodity for companies. With TikTok as an example, you can sell your likeness for a few hundred dollars. Then they use AI to create ads with your face where you promote products you never used.

As soon as you publish a picture of yourself online, it's not anymore in your control what happens with that. But you can do some actions to minimize risks of misuse.

You can limit the settings on social media platforms to not use your photos for AI and ads (check Instagram, LinkedIn). Also you can remove your photos from image databases like PimEyes, so it's harder to find you.

To read more on this topic, check the blog post from Proton.


Forward this to a friend who cares about online security.

Read more stories on the Clear Byte blog

Clear Byte

by Kenny Wolf

113 Cherry St #92768, Seattle, WA 98104-2205
Unsubscribe · Preferences

Clear Byte

Clear Byte decodes the hidden layers of hacking, forensics, and digital systems—delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Read more from Clear Byte

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. All About Encryption Photo by Markus Spiske on Unsplash This week we're diving into the backbone of modern private communication: the Messaging Layer Security (MLS) protocol. As E2EE becomes a necessity rather than a luxury, MLS aims to bring scalable, efficient, and standardized security to group messaging. Here's...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Inside Apple Photo by Laurenz Heymann on Unsplash This week, Clear Byte takes a deep dive into the Apple ecosystem. From running Linux on M-series Macs to understanding the cryptographic heart of Apple’s systems. Apple has quietly expanded its security documentation, opened up its bug bounty program, and revealed...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Running AI Locally Photo by Igor Omilaev on Unsplash Curious about running your own AI, without sharing data or paying monthly fees? In this issue, we explore how to set up a local LLM (like ChatGPT) right on your own machine. Whether you’re privacy-conscious, budget-minded, or just love tinkering with tech, you’ll...