Security

1

Dear Lifehacker, I have just tried to unsubscribe from a marketing email from a business who I'd previously bought some items from in-store. However, when I clicked the unsubscribe link it automatically subscribed me to another email marketing service. Since then I have been receiving at least one spam email every 20 minutes from the new list. Is there any recourse against this business for providing a dodgy unsubscribe link?

1

The inauguration of President "Grab 'Em By The P*ssy" Trump is about to kick off. Yep. America actually voted for this guy and this is really happening. If you're keen to witness the sideshow unfold in real time - and there are sure to be plenty of protesters - click on the above headline to watch the live stream. (Late to the party? You can still check out Trump's entire inauguration speech here.)

7

A long-running case on whether you're allowed access to view your own mobile phone metadata — retained by Australia's telecommunications companies for government snooping, including comprehensive call logs and location data — and whether that data is classified as "personal information" has come to an unceremonious end.

1

Dear Lifehacker, I've got my tinfoil hat on and am trying to track down and delete any old accounts on services I've signed up to but which are no longer being used. Problem is I can't remember what I've signed up to in the past. Do you know of any service where you can put in your email and it will show what sites/services it's registered to?

52

At the end of last year, the Federal Court ordered ISPs to block five popular torrent websites including The Pirate Bay, TorrentHound and IsoHunt within 15 business days. Foxtel and Village Roadshow initiated the court case in a bid to curb piracy.

Torrenting itself is completely legal and it's not all that difficult to circumvent ISP blocking of torrent websites. For instance, you can do it through a VPN, which often requires a monthly subscription fee. Here are some ways to gain access to blocked torrent sites for free.

0

Most people know about good online security practices: make secure passwords, have a different one for each login and change them often. Far fewer people actually follow them — but why? With the risk of hacking now greater than ever, it's important to have good password security practices, but most people still neglect them.

8

Hi Lifehacker, a lot of people are trying sell RFID blockers to protect your card against getting skimmed via paywave while you are out and about. I was wondering if this was a thing that can actually happen or if they are just scaremongering to sell a product?

1

With modern cars becoming more connected, with smarter features, hacking is a real danger. It's rare, but it's already happening. We're not in the "stop your engine" world yet, but it's easy to break into a car with keyless entry and steal everything inside without the owner ever knowing the car was unlocked.

0

Web/Android/iOS: Human trafficking is a massive, global problem — one that an app alone won't solve, but one that this app may be able to help with, just a little bit. TraffickCam asks you to snap pictures of your hotel room, creating a database that can be matched to rooms in photos with trafficking victims.

8

In the digital age of smartphones and instant messaging, it has never been easier to record and send videos and conversations involving other people. App features such as Instastory and Snapchat’s instantaneous video messaging abilities allow users to share real-time events and conversations to their friends and the public.

In many cases these secret videos spark significant public interest by providing a fly-on-the-wall perspective to an unusual event or crime. But is any of this legal? Let's find out.