The Calyx Institute

@calyxinstitute
3.7K Followers
164 Following
645 Posts
Our mission is to educate the public about privacy in digital communications and to develop tools that anyone can use. By embracing "privacy by design," we help make digital security and privacy more accessible to everyone. Help support our nonprofit mission-- become a member and get a hotspot with unlimited wifi or a phone with CalyxOS! https://members.calyxinstitute.org/enroll/membership
Next month, SCOTUS will hear oral arguments in Chatrie v. United States on the government’s use of geofencing warrants to obtain a person’s cell phone data. Their ruling could have major implications for how and when law enforcement and the state can access Americans’ sensitive personal information in the digital age. https://newrepublic.com/article/207706/geofencing-supreme-court-fourth-amendment-test-chatrie
How a Bank Robbery Case Became SCOTUS’s Next Big Fourth Amendment Test

Police in Virginia located a suspect by demanding location-specific cell phone data from Google. Did that violate his constitutional rights?

The New Republic
A Tennessee grandmother spent nearly six months behind bars after artificial intelligence facial recognition software wrongly identified her as a suspect in a bank fraud case – in North Dakota – a state she says she had never even visited. https://www.the-independent.com/news/world/americas/crime/tennessee-grandmother-ai-arrest-error-north-dakota-b2938261.html
Grandmother jailed for 6 months after AI error linked her to a crime in a state she had never even visited, lawyers say

The charges were later dismissed after bank records showed she was in Tennessee at the time

The Independent
TODAY: Join CryptoHarlem at 6pm EST for an in-depth conversation on cybersecurity with Gabrielle B, a multi-award-winning cybersecurity expert and former cyber defense specialist. Watch online:
https://talkstudio.streamlabs.com/Mgvhwl4m3IbJ More about CryotoHarlem: https://cryptoharlem.com
Lookout Threat Labs has discovered DarkSword, a full iOS exploit chain and payload for iPhones running iOS versions between iOS 18.4 and 18.6.2. This threat was deployed by the same unknown, likely Russian, threat actor who also deployed the Coruna exploit chain reported earlier this year. https://www.lookout.com/threat-intelligence/article/darksword
Attackers Wielding DarkSword Threaten iOS Users | Threat Intel

A threat actor has leaked the entire source code of Sweden's E-Government platform, claiming it was obtained through a heavily compromised CGI Sverige AB infrastructure. CGI Sverige is the Swedish subsidiary of global IT services giant CGI Group and manages critical government digital services.The source code is being released for free with multiple backup download links, while citizen databases are sold separately.
https://darkwebinformer.com/full-source-code-of-swedens-e-government-platform-leaked-from-compromised-cgi-sverige-infrastructure/
Full Source Code of Sweden's E-Government Platform Leaked From Compromised CGI Sverige Infrastructure

Full Source Code of Sweden's E-Government Platform Leaked From Compromised CGI Sverige Infrastructure

Dark Web Informer
How to film federal agents in the field — advice for independent journalists https://freedom.press/digisec/blog/how-to-film-federal-agents-in-the-field-advice-for-independent-journalists/
Clients of a long-running email marketing platform are getting targeted with a phishing campaign telling them that their emails would begin inserting a “‘Support ICE’ donation button” into every email they send. Scammers are trying to capitalize on people’s revulsion to ICE by coming up with strategies that would trick users into trying to log into their accounts to disable the setting. In reality, clients are revealing their username and password to hackers. https://www.404media.co/ice-phishing-scammers-are-sending-support-ice-emails-to-steal-credentials/
ICE Phishing: Scammers Are Sending 'Support ICE' Emails to Steal Credentials

"As part of our commitment to supporting ICE, we will be adding a ‘Support ICE’ donation button to the footer of every email sent through our platform."

404 Media
A mass hacking campaign targeting iPhone users in Ukraine and China used tools that were likely designed by U.S. military contractor L3Harris, TechCrunch has learned. The tools, which were intended for Western spies, wound up in the hands of various hacking groups, including Russian government spies and Chinese cybercriminals. https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/
The mystery of a globetrotting iPhone-hacking toolkit

Tools used in a series of hacking campaigns by hackers in Russia, Ukraine, and China may have originated inside U.S. government contractor L3Harris, TechCrunch has learned.

TechCrunch
We've signed an open letter to Google to advocate against their mandatory Android developer registration program. Make your voice heard to keep Android open: https://keepandroidopen.org/
Quittr, an app that promises to help men stop watching porn, leaked intimate data about thousands of users, including their masturbation habits, and lied to users about security issues. https://www.404media.co/viral-quittr-porn-addiction-app-exposed-the-masturbation-habits-of-hundreds-of-thousands-of-users/
Viral 'Quittr' Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

A couple of 20-year-old developers make $500,000 a month promising to help men to stop watching porn, but exposed their private porn watching habits.

404 Media