Security News

Chinese laws, DOJ vs CA, and more – Weekly privacy news, August 14, 2020

Posted on August 14th, 2020 by

Privacy News Online’s weekly video recap includes the top privacy stories, hosted by tech news commentator Brian Tong.

Each episode includes a cybersecurity news segment hosted by Intego’s Chief Security Analyst, Josh Long. This week’s video features a security story that we covered here on The Mac Security Blog, about how a single unidentified threat actor is operating a significant portion of Tor network relays.

Malicious party hijacks 24% of Tor network

Privacy news stories

Two of this week’s privacy stories have to do with Chinese laws regarding Internet use. First, Chinese gamers will need to verify their real names for all online games by September. Second, China has expanded its Great Firewall to block HTTPS traffic that uses Transport Layer Security (TLS) 1.3 or Encrypted Server Name Indication (ESNI)—two relatively recent technologies that improve security and privacy.

Meanwhile, the U.S. Department of Justice (DOJ) has filed an injunction in an attempt to stop California from having its own net neutrality laws. When net neutrality was repealed on a federal level, the U.S. Federal Communications Commission (FCC) attempted to prevent individual states from enacting their own such laws. California’s Attorney General says he looks forward to defending the state’s net neutrality protections.

For the rest of this week’s privacy news, watch this seven-minute video and read the related articles.

You can subscribe to the Private Internet Access YouTube channel and click the 🔔 to get notified when new videos are uploaded each Friday.

More security news, plus Apple news

For more weekly news and commentary, particularly about Apple and security topics, subscribe to the Intego Mac Podcast. Veteran Mac journalist Kirk McElhearn and Intego’s Josh Long host our weekly audio discussion show.

Sign up for Intego’s e-mail newsletter and follow The Mac Security Blog for more Apple and security news. And don’t forget to follow Intego on your favorite social and media channels: Facebook, Instagram, Twitter, and YouTube (click the 🔔 to get notified about new videos on Intego’s own YouTube channel).

About Joshua Long

Joshua Long (@theJoshMeister), Intego's Chief Security Analyst, is a renowned security researcher, writer, and public speaker. Josh has a master's degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple ID authentication vulnerability. Josh has conducted cybersecurity research for more than 20 years, which has often been featured by major news outlets worldwide. Look for more of Josh's articles at security.thejoshmeister.com and follow him on Twitter. View all posts by Joshua Long →