David wants to be able to copy TV programs from his DVR satellite, but he can't do it. Leo says that DirecTV and Dish all have proprietary copy protection to prevent it, due to piracy. But Linux boxes will see the hard drives on the DVRs. It's worth a try.
Doctor Mom heard about Amazon Alexa recording conversations and sending them to contacts by mistake. How can she make sure that doesn't happen, since she is a doctor and has HIPPA concerns? Leo says Business Insider has a piece on how to prevent it, here.
(Disclaimer: 23andMe is a sponsor)
News broke this week that law enforcement has been using a service called Securus, to keep track of people through their GPS data on their cellphone. Securus is a company that data-mines information from cellphone towers, metadata on email and text messages, and phone calls. And it's completely legal.
Jim called in to talk about how the Department of Homeland Security is monitoring not only the free press, but also bloggers, podcasters, and vloggers. Jim wonders if he should use a VPN as a hedge against that. Leo says that while anonymizing his content is a natural reaction, and while a VPN could be a useful tool, but it's not a privacy tool. In fact, encrypting his traffic shines a light on him more than just being a part of the "background noise." Also, a VPN only encrypts the traffic along the way.
Ellen is concerned that with a camera, microphone and GPS, that her phone could be spying on her. Rich says that one company, ZTE, was banned in the US because its phone was collecting user information and phoning home with it. But Rich says that was probably a software issue. Phones aren't really spying on people, per se. But when she signs up for free services like Facebook, they are aggregating a lot of user behavior that is used to push ads to her. It seems like spying, but it's more that it provides information for her based on her interests and online behavior.
Adam bought an iMac from a private seller. It still had Apple Care and he had it transferred to his name. He's worried that there was a keylogger on it and his credit card was compromised. Leo says that unless he wiped the computer himself, he won't know if it's compromised or not. Leo says that it's probably not the Mac, but just in case, Adam should wipe the drive himself. It's really easy to wipe an iMac drive and reinstall the OS. It could be that Adam's iCloud account has been compromised.
Rick's wife is trying to get around her job's internet restrictions with a VPN. Is there any way to do that? Leo says probably not. They will likely have it locked down to the point where she can't get around it. Leo recommends using her mobile phone in hotspot mode. She should turn off Wi-Fi though because she'll still be under their policies even when she's on her phone using the Wi-Fi. The company has the right to not only prevent her from using her own devices on their network, but also to spy on her. So she should be careful.
Mark wants to know if Amazon Echo is going to be used in cars. Leo says it will. In fact, Leo just installed one in his. And we'll soon see Google's Assistant there, too. It's the next big thing in computing. Mark is also concerned that Echo could be used to spy on him. Leo says that's possible. But Leo doesn't think Amazon wants to manage all that information and the risk to its business if it was discovered that Amazon was snooping on customers would be devastating. But then again, law enforcement could always subpoena to have access to it.
Brian is wondering if he can prevent third-party apps from seeing his contacts list on his phone. Leo says it's very common for apps like Snapchat, Twitter, Facebook, Instagram and more to suggest inviting friends from your contacts list. They have to ask permission to get to this list, though. These apps upload the contacts list to their servers so it can alert you that someone new has joined that app. Leo says that absolutely is a privacy breach.