Tuesday, March 25, 2025

Polaris of Enlightenment

Ad:

Hacked robotic vacuums chase pets and shout obscenities

Published 5 November 2024
– By Editorial Staff
In Los Angeles, a robotic vacuum suddenly started chasing the family's dog around the house.

Several robotic vacuum cleaners have been hacked in a number of US cities over the course of just a few days. The hacker took control of the devices and shouted obscenities through the built-in speakers.

Daniel Swenson, a Minnesota lawyer, discovered through the Ecovacs app that an outsider had control of his family’s robot vacuum cleaner. Swenson initially brushed it off as a technical issue, resetting his password and rebooting the device. Shortly after, though, the robot began operating on its own, spewing racist slurs in front of the family’s 13-year-old son.

– I got the impression it was a kid, maybe a teenager [speaking], Swenson told ABC. Maybe they were just jumping from device to device messing with families.

In Los Angeles, a robotic vacuum was hacked and began chasing a family’s dog around the house while shouting abusive remarks. Similarly, in El Paso, another unit started spewing racial slurs at the household.

Unclear scope

The robot vacuums also have cameras attached, and Swenson says he’s glad the hacker actually made himself known and didn’t silently observe the family.

– It was a shock, he says, and then it was like almost fear, disgust.

The affected devices are the Chinese-made Ecovacs Deebot X2s model, but it is unclear how many devices were affected. Swenson called the company’s support and was told that there was a “high possibility” that his account was affected by a cyberattack.

According to the company, “no evidence” has been found that the accounts were hacked through “any breach of Ecovac’s systems”.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

What I wish I knew about privacy sooner

The hard truths no one warned me about.

Published 22 March 2025
– By Naomi Brockwell

I’ve been deep in the privacy world for years, but I wasn’t always this way. If I could go back, I’d grab my younger self by the shoulders and say: “Wake up. The internet is a battlefield of people fighting for your attention, and many of them definitely don’t have your best interests at heart”.

I used to think I was making my own decisions—choosing what platforms to try, what videos to watch, what to believe. I didn’t realize I was part of a system designed to shape my behavior. Some just wanted to sell me things I didn’t need—or even things that actively harm me. But more importantly, some were paying to influence my thoughts, my votes, and even who I saw as the enemy.

There is a lot at stake when we lose the ability to make choices free from manipulation. When our digital exhaust—every click, every pause, every hesitation—is mined and fed into psychological experiments designed to drive behavior, our ability to think independently is undermined.

No one warned me about this. But it’s not too late—not for you. Here are the lessons I wish I had learned sooner—and the steps you can take now, before you wish you had.

1. Privacy mistakes compound over time—like a credit score, but worse

Your digital history doesn’t reset—once data is out there, it’s nearly impossible to erase.

The hard truth:

  • Companies connect everything—your new email, phone number, or payment method can be linked back to your old identity through data brokers, loyalty programs, and behavioral analysis.
  • Switching to a new device or platform doesn’t give you a blank slate—it just gives companies another data point to connect.

What to do:

  • Break the chain before it forms. Use burner emails, aliases, and virtual phone numbers.
  • Change multiple things at once. A new email won’t help if you keep the same phone number and credit card.
  • Be proactive, not reactive. Once a profile is built, you can’t undo it—so prevent unnecessary links before they happen.

2. You’re being tracked—even when you’re not using the internet

Most people assume tracking only happens when they’re browsing, posting, or shopping—but some of the most invasive tracking happens when you’re idle. Even when you think you’re being careful, your devices continue leaking data, and websites have ways to track you that go beyond cookies.

The hard truth:

  • Your phone constantly pings cell towers, creating a movement map of your location—even if you’re not using any apps.
  • Smart devices send data home at all hours, quietly updating manufacturers without your consent.
  • Websites fingerprint you the moment you visit, using unique device characteristics to track you, even if you clear cookies or use a VPN.
  • Your laptop and phone make hidden network requests, syncing background data you never approved.
  • Even privacy tools like incognito mode or VPNs don’t fully protect you. Websites use behavioral tracking to identify you based on how you type, scroll, or even the tilt of your phone.
  • Battery percentage, Bluetooth connections, and light sensor data can be used to re-identify you after switching networks.

What to do:

  • Use a privacy-focused browser like Mullvad Browser or Brave Browser.
  • Check how unique your device fingerprint is at coveryourtracks.eff.org.
  • Monitor hidden data leaks with a reverse firewall like Little Snitch (for Mac)—you’ll be shocked at how much data leaves your devices when you’re not using them.
  • Use a VPN like Mullvad to prevent network-level tracking, but don’t rely on it alone.
  • Break behavioral tracking patterns by changing your scrolling, typing, and browsing habits.

3. Your deleted data isn’t deleted—it’s just hidden from you

Deleting a file, message, or account doesn’t mean it’s gone.

The hard truth:

  • Most services just remove your access to data, not the data itself.
  • Even if you delete an email from Gmail, Google has already analyzed its contents and added what it learned to your profile.
  • Companies don’t just store data—they train AI models on it. Even if deletion were possible, what they’ve learned can’t be undone.

What to do:

  • Use services that don’t collect your data in the first place. Try ProtonMail instead of Gmail, or Brave instead of Google Search.
  • Assume that if a company has your data, it may never be deleted—so don’t hand it over in the first place.

4. The biggest privacy mistake: Thinking privacy isn’t important because “I have nothing to hide”

Privacy isn’t about hiding—it’s about control over your own data, your own life, and your own future.

The hard truth:

  • Data collectors don’t care who you are—they collect everything. If laws change, or you become notable, your past is already logged and available to be used against you.
  • “I have nothing to hide” becomes “I wish I had hidden that.” Your past purchases, social media comments, or medical data could one day be used against you.
  • Just because you don’t feel the urgency of privacy now doesn’t mean you shouldn’t be choosing privacy-focused products. Every choice you make funds a future—you’re either supporting companies that protect people or ones that normalize surveillance. Which future are you contributing to?
  • Anonymity only works if there’s a crowd. The more people use privacy tools, the safer we all become. Even if your own safety doesn’t feel like a concern right now, your choices help protect the most vulnerable members of society by strengthening the privacy ecosystem.

What to do:

  • Support privacy-friendly companies.
  • Normalize privacy tools in your circles. The more people use them, the less suspicious they seem.
  • Act now, not when it’s too late. Privacy matters before you need it.

5. You’re never just a customer—you’re a product

Free services don’t serve you—they serve the people who pay for your data.

The hard truth:

  • When I first signed up for Gmail, I thought I was getting a free email account. In reality, I was handing over my private conversations for them to scan, profile, and sell.
  • Even paid services can sell your data. Many “premium” apps still track and monetize your activity.
  • AI assistants and smart devices extract data from you. Be intentional about the data you give them, knowing they are mining your information.

What to do:

  • Ask: “Who profits from my data?”
  • Use privacy-respecting alternatives.
  • Think twice before using free AI assistants that explicitly collect your data, or speaking near smart devices.

Final thoughts: The future isn’t written yet

Knowing what I know now, I’d tell my younger self this: you are not powerless. The tools you use, the services you fund, and the choices you make shape the world we all live in.

Take your first step toward reclaiming your privacy today. Because every action counts, and the future isn’t written yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Swedish e-identification Freja goes global

Published 20 March 2025
– By Editorial Staff
Last year, Freja passed one million users.

Swedish e-ID Freja expands – offers international e-ID without the need for a Swedish personal identity number (personnummer).

Freja is a state-approved, mobile e-identification used for identification and developed in Sweden. The service offers both identification for private individuals, but also provides the opportunity for companies to obtain an organizational ID for their employees. Sweden is one of the countries where e-identification is most developed and Freja in particular has received a lot of requests.

– We clearly notice that many countries have now matured and are preparing to introduce e-identification according to the Nordic model, said Johan Henrikson, CEO of Freja eID Group, according to Dagens Infrastruktur last year.

Freja has now developed an international ID that is approved for users outside Sweden and for those without a Swedish personal identity number, they write in a blog post.

With the international e-ID, users get a Unique Personal Identifier (UPI) instead of a social security number and in total it is available in 167 countries.

Freja’s international eID is the only trust level 3 (LoA3) eID approved for users without a Swedish personal identity number.

Businesses and individuals face dilemma as Windows 10 retirement looms

Published 18 March 2025
– By Editorial Staff
Microsoft's discontinuation of support for Windows 10 is causing headaches for many associations and organizations.

When Microsoft ends support for Windows 10 on October 14, 2025, charities, businesses, and individuals, among others, will be faced with a difficult choice: continue using the operating system without security updates, switch to the controversial Windows 11 or the increasingly popular Linux, or discard fully functional computers.

For a long time, non-profit associations and organizations around the world have been collecting and refurbishing older computers that would otherwise have been discarded. The devices often come from companies replacing their IT equipment, but also from private individuals.

After refurbishment, the computers are donated to those in need, but as many of these are not Windows 11 ready, the impending death of Windows 10 poses a major problem, Sweclockers reports.

Running an operating system without security updates can leave computers extremely vulnerable to cyberattacks and phishing. Something that particularly affects people with limited technical knowledge.

Microsoft has fixed a large number of security flaws in Windows 10 and 11 in 2025 alone. IT security companies such as Sophos warn of the security risks that arise when operating systems no longer receive updates.

An alternative to Windows is the Linux operating system. Recycling is also a possibility, but this means that fully functional computers are lost.

Several associations and organizations state that they continue to install Windows 10 on refurbished computers despite this and for the time being, as they do not want to oblige customers to learn a new operating system.

Datorer
Photo: CanStockPhoto

Hundreds of attacks

Casey Sorensen, CEO of PCs for People – a non-profit organization that promotes digital inclusion by providing computers and the internet to low-income people and non-profit organizations in the United States – confirms that it is phasing out Windows 10 entirely and installing Windows 11 or Linux instead, depending on the capacity of the computer, Tom’s Hardware reports.

–What we decided to do is one year ahead of the cutoff, we discontinued Windows 10. We will distribute Linux laptops that are 6th or 7th gen. If we distribute a Windows laptop, it will be 8th gen or newer.

–To put this in perspective… There were 57 vulnerabilities, 6 of which have already been abused by criminals before the fixes were available. There were also 57 in February and 159 in January. Windows 10 and Windows 11 largely have a shared codebase, meaning most, if not all, vulnerabilities each month are exploitable on both OSs. These will be actively turned into digital weapons by criminals and nation-states alike and Windows 10 users will be somewhat defenseless against them, said Casey Sorensen.

Extended support for a fee

Microsoft does offer an extended security update program called ESU, where users will continue to receive support and updates after October 2025, provided they pay $30 annually.

However, it is unclear how many organizations are willing to pay for the service. In addition, ESU is mainly available to businesses and not to individuals.

Although Microsoft will soon retire Windows 10, the operating system still has over 50 percent of the market. Many users are expected to continue using it after October, which could pose a significant security risk to millions of people.

UK vs Apple: Your privacy is under attack

How UK users can protect their data after Apple’s big encryption change.

Published 15 March 2025
– By Naomi Brockwell

The UK government just decided no one deserves privacy—not just UK citizens, but everyone worldwide. They demanded Apple hand over access to everyone’s private iCloud data.

Why this matters

In 2022, Apple launched Advanced Data Protection (ADP), an opt-in security feature adding end-to-end encryption to iCloud backups, photos, notes, and more. This ensured only you—not even Apple—could access your data.

But recently, the UK government secretly ordered Apple to build a backdoor into iCloud, citing the Investigatory Powers Act of 2016. Revealing such an order is illegal under UK law, yet someone bravely leaked it anyway, at great personal risk.

Whoever you are: thank you.

If Apple had secretly complied, billions of users would have been dangerously vulnerable—unknowingly relying on security that wasn’t actually secure. Worse, Apple would have been legally barred from telling users that their encryption had been compromised.

Instead, Apple chose transparency. They publicly disabled Advanced Data Protection entirely for UK users. That’s still terrible for privacy—but less harmful, because at least now users are informed and can make safer choices.

What this means for UK Apple users

  • New UK users can’t enable Advanced Data Protection, losing encryption for backups, photos, and notes.
  • Existing users will soon have to disable ADP or lose iCloud access.

Six ways for UK users to reclaim privacy right now

1. Move Your Files to a Private Cloud

Apple’s removal of Advanced Data Protection in the UK means your iCloud backups, documents, notes, and other files are no longer end-to-end encrypted. Apple—and thus the UK government—can now access your data.

Encrypted cloud storage services:

  • Proton Drive
  • CryptDrive
  • MEGA

Self-hosted storage solutions:

  • Nextcloud
  • Synology

Encrypt files locally before uploading to non-private drives:

  • Cryptomator
  • VeraCrypt

2. Switch to a private browser

Safari bookmarks were previously encrypted under ADP, but now they’re accessible to Apple and, by extension, the UK government.

Private browser alternatives:

  • Brave Browser (built-in tracking protection)
  • Mullvad Browser

Additional privacy steps:

  • Disable Safari’s iCloud bookmark sync

3. Secure your photos

Without ADP, your iCloud Photos lose end-to-end encryption, allowing Apple and the UK government access to your personal photos.

Encrypted cloud storage specifically for photos:

  • Ente
  • Proton Drive

Additional recommended action:

  • Disable iCloud Photos syncing.

4. Replace Apple Notes & Reminders

With Advanced Data Protection disabled, Apple Notes and Reminders stored in iCloud are now openly accessible to Apple and the UK government.

Encrypted Notes alternatives:

  • Standard Notes
  • Joplin
  • Proton Drive Docs

Encrypted reminders/task management alternatives:

  • CryptPad Kanban
  • Tasks.org

Additional recommended action:

  • Disable iCloud sync for Notes and Reminders.

5. Choose a privacy-focused email provider

Apple’s iCloud Mail was never encrypted, meaning your emails have always been accessible to Apple and government authorities.

Encrypted email services:

  • Proton Mail
  • Tutanota

Additional security step:

  • Enable two-factor authentication (2FA) on your new account.

6. Secure Your Calendar & Contacts

Calendars and contacts stored on iCloud have never been encrypted, meaning they have open access to your schedule and personal contacts.

Encrypted calendar alternatives:

  • Proton Calendar
  • Tuta Calendar

Encrypted contacts alternatives:

  • Proton Contacts
  • Tuta Contacts

Local device storage (maximum privacy):

  • Store contacts locally on privacy-focused phones (e.g., GrapheneOS)

Additional recommended action:

  • Export data from iCloud immediately and switch to secure, encrypted, or local solutions.

Takeaways

Apple deserves credit for refusing to secretly build a backdoor and for openly pushing back against the UK government. They continue to fight, now instigating a lawsuit against the UK government over these egregious demands. But the outcome still leaves UK users vulnerable. If privacy matters to you, it’s time to move beyond Apple—and perhaps reconsider any mainstream tech company likely facing similar secret demands. Thankfully, great privacy-focused alternatives exist.

Privacy isn’t about hiding; it’s about owning your digital life. Whether you’re an activist, journalist, or simply someone who believes governments shouldn’t rifle through your private data, you have the tools to take back control.

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.
Share via

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.

Send this to a friend