• News Categories
    ▼
    • Surveillance & Technology
    • U.S. News & Reports
    • International News
    • Finance
    • Defense & Security
    • Politics
    • Videos
  • Blog
  • Directory
  • Support Us
  • About
  • Contact

T-Room

The Best in Alternative News

  • News Categories
    • Surveillance & Technology
    • U.S. News & Reports
    • International News
    • Finance
    • Defense & Security
    • Politics
    • Videos
  • Blog
  • Directory
  • Support Us
  • About
  • Contact
Apple_iPhone

Fury At Apple’s Plan to Scan iPhones for Child Abuse Images and Reporting ‘Flagged’ Owners to Police…

August 6, 2021 at 6:30 pm

Apple said on Thursday it will scan US-based iPhones for images of child abuse…The move has drawn widespread criticism for rolling back on individual privacy…Messages app and iCloud photos will use on-device machine learning with a tool known as ‘neuralHash’ to look for sensitive content which can be reviewed…

User_Location_Apps

BEWARE: The Inevitable Weaponization of App Data Is Here…

July 23, 2021 at 2:24 pm

A Substack publication used location data from Grindr to out a priest without their consent…

brave_search

Brendan Eich Fires the Kill Shot to Google with Brave Search…

June 25, 2021 at 5:25 pm

Starting today, online users have a new independent option for search which gives them unmatched privacy. Whether they are already Brave browser users, looking to expand their online privacy protection with the all-in-one, integrated Brave Search in the Brave browser, or users of other browsers looking for the best-in-breed privacy-preserving search engine, they can all use the newly released Brave Search beta that puts users first, and fully in control of their online experience…

Hackers_Technology_Pixabay

Hackers Expose 8.4 Billion Passwords Post Them Online in Possibly Largest Dump of Passwords Ever…

June 9, 2021 at 7:41 pm

Hackers released data on 8.4 billion passwords this week and posted the information online. This might be the largest dump of passwords online ever…

Tim_Cook_Apple_CEO_GettyImages

Diabolical: Apple’s Tim Cook Agreed to Hand Over Data of ALL Chinese Apple Users to Communist Regime…

May 18, 2021 at 5:58 pm

The state employees are said to manage servers at its data center in Guiyang and another in the Inner Mongolia region, The New York Times reports…That means the government is able to access personal data of Chinese residents…Encryption technology used by Apple has also been banned, the report says…

All_Seeing_Eye_Surveillance

China’s ‘Sharp Eyes’ Program Aims to Surveil 100% of Public Space…

March 5, 2021 at 5:31 pm

The program turns neighbors into agents of the surveillance state…

street_surveillance_pexels_photo_700

How the Police Use Artificial Intelligence to Track and Identify You…

October 6, 2020 at 7:24 pm

…state and local police all over the US use a range of automated tools, including facial recognition, license plate readers, StingRays (cell-site simulators), predictive policing, video analysis tools and more, to create advanced systems of surveillance with little oversight, all built largely out of the public’s view despite their reach into the lives of ordinary Americans…

Ransomware_Attack_Hits_Universal_Health_Services

Biggest Ransomware Attack Yet Crippled U.S. Hospitals Last Weekend…

October 1, 2020 at 7:17 pm

One of the nurses, who works in a facility in North Dakota, said that computers slowed and then eventually simply would not turn on in the early hours of Sunday morning. “As of this a.m., all the computers are down completely,” the nurse said.”…

nsa

Court Rules NSA Phone Snooping Illegal–After 7-Year Delay…

September 3, 2020 at 1:28 pm

But the controversial phone metadata program played little role in the terror-fundraising case at issue, the long-awaited ruling says…

PinePhone

This Smartphone Has Physical Kill Switches for Its Cameras, Microphone, Data, Bluetooth and Wi-Fi…

August 19, 2020 at 7:36 pm

A common complaint with modern smartphones is that they are black boxes. Android and iOS are complicated pieces of software, each with hundreds (if not thousands) of independent functions running in the background…

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 18
  • Next Page »

Your Ad Here

Any publication posted at The T-Room and/or opinions expressed therein do not necessarily reflect the views of The T-Room. Such publications and all information within the publications (e.g. titles, dates, statistics, conclusions, sources, opinions, etc) are solely the responsibility of the author of the article, not The T-Room.

Twitter Icon

View Old Archives

Copyright © 2025 T-Room

Site by Creative Visual Design