Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $22,534
25%  
Woo hoo!! And the first 25% is in!! Thank you all very much!! God bless.

Keyword: privacy

Brevity: Headers | « Text »
  • A HAcker just proved that Apple may have been right about the FBI (Link Only per copyright)

    01/14/2017 3:16:10 AM PST · by Swordmaker · 41 replies
    Vanity Fair (Link Only due to copyright issues) | JANUARY 13, 2017 9:26 AM | BY MAYA KOSOFF
    Cellebrite, the third-party which the FBI contracted with to unlock the San Bernardino terrorists' iPhone 5, has itself been hacked and the data and techniques it used to hack that iPhone 5 among others of its proprietary technology were stolen, just as I predicted would happen if Apple were forced to provide a back-door as the FBI wanted! Vanity Fair has an article on the Cellebrite crime but I cannot post it due to copyright issues. Here is the link only. — Swordmaker http://www.vanityfair.com/news/2017/01/a-hacker-just-proved-that-apple-may-have-been-right-about-the-fbi
  • It's not just your browser: Your machine can be fingerprinted easily

    01/12/2017 7:17:47 PM PST · by markomalley · 19 replies
    The Register ^ | 1/13/16 | Richard Chirgwin
    It just got a lot harder to evade browser fingerprinting: a bunch of boffins have worked out how to fingerprint the machine behind the browser, using only information provided by browser features.Like so many ideas, it's obvious once someone's thought of it: activities that aren't processed in the browser are treated the same whether the page is rendered in (say) Chrome, Firefox, IE or Edge. The group – Yinzhi Cao and Song Li of from Lehigh University in Pennsylvania, and Erik Wijmans Washington University in St. Louis – have worked out how to access various operating system and hardware-level features...
  • N.S.A. Gets More Latitude to Share Intercepted Communications

    01/12/2017 2:07:58 PM PST · by mrsmith · 9 replies
    NYTimes ^ | JAN. 12, 2017 | CHARLIE SAVAGE
    ...The new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations, which are largely unregulated by American wiretapping laws. These include collecting satellite transmissions, phone calls and emails that cross network switches abroad, and messages between people abroad that cross domestic network switches. The change means that far more officials will be searching through raw data. Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will...
  • Windows 10's privacy settings will be simpler but more limited with Creators' Update

    01/10/2017 6:42:02 PM PST · by dayglored · 8 replies
    PC World ^ | Jan 10, 2017 | Mark Hachman
    It's not quite the clear-cut win for consumers that Microsoft is portraying, but at least it's transparent with its decision. Microsoft said Tuesday that it plans to simplify the privacy options in the upcoming Creators’ Update, though some may see one component as limiting user choice as well. Microsoft plans to revamp how privacy is managed in the upcoming Creators Update to Windows 10, both as part of the initial setup as well as the amount of data it collects in day-to-day diagnostics. That amount will actually decrease, if a user so chooses. But Microsoft has also eliminated an intermediary...
  • Chrysler Unveils Selfie-Taking Concept Car

    01/04/2017 3:24:59 PM PST · by JOAT · 23 replies
    CBS Philadelphia ^ | 1/3/2017 | Peter Valdes-Dapena
    <p>LAS VEGAS (CNN) — What do Millennials want from a car? Selfies, naturally.</p> <p>Chrysler unveiled its Portal concept car at the Consumer Electronics Show Tuesday, and it has a long list of features based on 20 years of research into exactly what Millennials want from a car, according to Fiat Chrysler.</p>
  • That Amazon Echo You Got for Xmas? Here’s Why the Cops May Want to Listen in on Your Recordings

    01/04/2017 7:53:34 AM PST · by C19fan · 58 replies
    Heatstreet ^ | January 3, 2016 | Emily Zanotti
    Devices like Amazon’s Echo and Google Home were big sellers over the holidays, with people all over the country turning their houses over to digital assistants. But while a virtual butler seems like a great idea, consumers are slowly coming to grips with the implications of the “smart home.” Devices that can answer questions are also taking notes. And while that may help digital assistants like Alexa become better and faster, it also helps law enforcement listen in on private conversations.
  • U.S. House Judiciary Committee determines encryption backdoors against national interests

    12/21/2016 8:08:49 PM PST · by Swordmaker · 56 replies
    Apple Insider ^ | Wednesday, December 21, 2016, 02:18 pm PT (05:18 pm ET) | By Daniel Eran Dilger
    In a rebuke to the anti-encryption campaign waged by the U.S. Federal Bureau of Investigation--with Apple as a target--the U.S. House Judiciary Committee's Encryption Working Group issued a report today stating "any measure that weakens encryption works against the national interest." In a bipartisan report, the group observed that "any measure that weakens encryption works against the national interest," citing representatives of the national security community who noted that "strong encryption is vital to the national defense and to securing vital assets, such as critical infrastructure." A second finding of the report was that "encryption technology is a global technology...
  • FBI's New Hacking Powers Take Effect This Week

    11/30/2016 11:52:50 AM PST · by LouieFisk · 11 replies
    Fortune ^ | November 30, 2016 | Jeff John Roberts
    A single search warrant, multiple computers. The FBI and other law enforcement agencies will be able to search multiple computers across the country with a single warrant thanks to a controversial rule change that takes effect on Thursday.
  • Germany planning to 'massively' limit privacy rights

    11/25/2016 11:03:25 PM PST · by Olog-hai · 26 replies
    Deutsche Welle ^ | 11.25.2016 | Ben Knight
    Interior Minister Thomas de Maizičre is planning a major limitation of privacy rights in Germany, say data protection groups. Germans will no longer have the right to know what data about them is being collected. A draft law released by the German union for data protection (DVD) this week revealed that the interior ministry was proposing to drastically limit the powers of Germany’s data protection authorities, banning them from investigating suspected breaches of people’s medical and legal records. As well as expanding video surveillance with facial recognition software, the bill would limit the government’s own data protection commissioners to checking...
  • France to collect personal data of 60 million with controversial database

    11/05/2016 9:20:26 AM PDT · by Tilted Irish Kilt · 4 replies
    France24 ^ | 11/5/16 | Sébastian SEIBT
    France’s government last week announced the creation of a highly controversial new database that will collect and store personal information on nearly everyone living in the country who holds a French identity card or passport. The massive database, known as Secure Electronic Documents (Titres électroniques sécurisés or TES), was decreed by the government on October 30 in an effort to crack down on identity theft. The move sparked immediate outrage in the French media, with weekly magazine L’Observateur describing it as “terrifying”, and daily newspaper Libération calling it a “mega database that will do no good”. The TES will affect...
  • EU data protection watchdogs warn WhatsApp, Yahoo on privacy

    10/30/2016 1:33:05 PM PDT · by Tilted Irish Kilt · 1 replies
    news.trust.org / reuters ^ | 10/29/16 | Julia Fioretti
    European privacy watchdogs warned WhatsApp on Friday over sharing user information with parent company Facebook, and cautioned Yahoo over a 2014 data breach and scanning of customer emails for U.S. intelligence purposes. The popular messaging service's recent change in privacy policy to start sharing users' phone numbers with Facebook - the first policy change since WhatsApp was acquired by Facebook in 2014 - has attracted regulatory scrutiny in Europe. The Italian antitrust watchdog on Friday also announced a separate probe into whether WhatsApp obliged users to agree to sharing personal data with Facebook. (emphasis mine) The European Union's 28 data...
  • Feds Walk Into A Building, Demand Everyone's Fingerprints To Open Phones

    10/26/2016 7:00:10 PM PDT · by nickcarraway · 19 replies
    Forbes ^ | 10/26 | Thomas Fox-Brewster
    In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices. FORBES found a court filing, dated May 9 2016, in which the Department of Justice sought to search a Lancaster, California, property. But there was a more remarkable aspect of the search, as pointed out in the memorandum: “authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES...
  • AT&T Is Spying on Americans for Profit, New Documents Reveal

    10/25/2016 9:29:25 AM PDT · by Tilted Irish Kilt · 16 replies
    dailybeast ^ | October 24, 2016 | Kenneth Lipp
    The telecom giant is doing NSA-style work for law enforcement—without a warrant—and earning millions of dollars a year from taxpayers. Hemisphere is a secretive program run by AT&T that searches trillions of call records and analyzes cellular data to determine where a target is located, with whom he speaks, and potentially why. In 2013, Hemisphere was revealed by The New York Times and described only within a Powerpoint presentation made by the Drug Enforcement Administration. The Times described it as a “partnership” between AT&T and the U.S. government; the Justice Department said it was an essential, and prudently deployed, counter-narcotics...
  • Connected devices create millions of cyber security weak spots

    10/23/2016 4:42:29 PM PDT · by Tilted Irish Kilt · 21 replies
    financial times ^ | 10/23/16 | Hannah Kuchler
    Default passwords on devices from the digital video recorder in your living room to the security camera in your office threaten the stability of the internet, as hackers build vast networks of “Internet of Things” devices to bombard websites with traffic. The attack on Dyn, a domain name service provider, that disrupted access to high-profile sites such as Twitter, Spotify and the New York Times on Friday, highlighted the risks posed by the billions of devices connected to the internet with little or no cyber security protections. Unidentified hackers took over tens of millions of devices using malicious software called...
  • NSA Can Access More Phone Data Than Ever

    10/20/2016 11:32:36 AM PDT · by Tilted Irish Kilt · 18 replies
    abcnews ^ | Oct 20, 2016 | Lee Ferran
    Before the signing of the USA Freedom Act in June 2015, one of the NSA's most controversial programs was the mass collection of telephonic metadata from millions of Americans — the information about calls, including the telephone numbers involved, the time and the duration but not the calls' content — under a broad interpretation of the Patriot Act's Section 215. From this large "haystack," as officials have called it, NSA analysts could get approval to run queries on specific numbers purportedly linked to international terrorism investigations. The problem for the NSA was that the haystack was only about 30 percent...
  • (1997) Potentially Illegal Gingrich Tape Turned Over To Criminal Investigators

    10/20/2016 4:17:30 AM PDT · by PghBaldy · 19 replies
    CNN ^ | January 13, 1997 | Staff
    WASHINGTON (AllPolitics, Jan. 13) -- A potentially illegal recording of a cell phone conversation involving House Speaker Newt Gingrich was handed over to federal criminal investigators tonight, the House ethics committee's chief counsel said. First the tape was sent to the committee by Rep. Jim McDermott of Washington state, the committee's ranking Democrat. A Florida couple who taped the call told a news conference in Gainesville, Florida today they gave the recording to McDermott last week.
  • Feds Walk Into A Building, Demand Everyone's Fingerprints To Open Phones (video)

    10/19/2016 12:29:32 AM PDT · by Swordmaker · 18 replies
    Forbes ^ | October 16, 2016 | By Thomas Fox-Brewster
    In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices. FORBES found a court filing, dated May 9 2016, in which the Department of Justice sought to search a Lancaster, California, property. But there was a more remarkable aspect of the search, as pointed out in the memorandum: “authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES...
  • Study: 1 in 2 American Adults Already In Facial Recognition Network

    10/18/2016 9:38:42 AM PDT · by Tilted Irish Kilt · 35 replies
    vocativ ^ | 10/18/16 | Kevin Collier
    DMV records, plus a cavalier approach to mugshot databases, puts half of the US in the system Half of all American adults are already in some sort of facial recognition network accessible to law enforcement, according to a comprehensive new study. Conducted over a year and relying in part on Freedom of Information and public record requests to 106 law enforcement agencies, the study, conducted by Georgetown Law’s Center on Privacy and Technology, found American police use of facial recognition technology is a scattered, hodgepodge network of laws and regulations.
  • Exclusive: Yahoo secretly scanned customer emails for US intelligence - sources

    10/04/2016 10:22:05 AM PDT · by Beave Meister · 34 replies
    Yahoo.com ^ | 10/4/2016 | Joseph Menn
    SAN FRANCISCO (Reuters) - Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events. Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency's demand by searching...
  • Gun-Show Customers’ License Plates Come Under Scrutiny

    10/03/2016 5:57:25 AM PDT · by Brilliant · 18 replies
    WSJ ^ | October 2, 2016 | Devlin Barrett
    Federal agents have persuaded police officers to scan license plates to gather information about gun-show customers, government emails show, raising questions about how officials monitor constitutionally protected activity. Emails reviewed by The Wall Street Journal show agents with the Immigration and Customs Enforcement agency crafted a plan in 2010 to use license-plate readers—devices that record the plate numbers of all passing cars—at gun shows in Southern California, including one in Del Mar, not far from the Mexican border. Agents then compared that information to cars that crossed the border, hoping to find gun smugglers, according to the documents and interviews...
  • Judge to NY Times: No Trump divorce records for you

    09/24/2016 1:53:03 PM PDT · by Kaslin · 54 replies
    Hot Air.com ^ | September 23, 2016 | JOHN SEXTON
    The New York Times and Gannett news have been trying to gain access to Donald Trump’s sealed divorce records on the grounds that they are of public interest now that he is running for President. Politico reports that New York judge Frank Nervo has rejected that argument: “Were the court to make the confidential records available for journalistic, and thus public, scrutiny, it would impermissibly inject itself into the political process by making the value judgment of what information is useful in determining the present candidate’s, or any other candidate’s, fitness for office,” Nervo wrote. “The court’s role in the...
  • Hardware hack defeats iPhone (5C) passcode security (Video at Link)

    09/20/2016 1:22:23 AM PDT · by Swordmaker · 6 replies
    BBC ^ | 19 September 2016
    IPhone (5C) passcodes can be bypassed using just Ł75 ($100) of electronic components, research suggests. A Cambridge computer scientist cloned iPhone memory chips, allowing him an unlimited number of attempts to guess a passcode. The work contradicts a claim made by the FBI earlier this year that this approach would not work. The FBI made the claim as it sought access to San Bernardino gunman Syed Rizwan Farook's iPhone. CHEAP TRICK Farouk and his wife killed 14 people in the California city last December before police fatally shot them. The FBI believed his iPhone 5C contained information about collaborators, but...
  • U.S. Court Rules that EPA Violated Personal Privacy of Farmers, Ranchers

    09/14/2016 7:12:01 AM PDT · by Twotone · 11 replies
    NorthernAg.net ^ | September 13, 2016 | Unknown
    The Environmental Protection Agency has violated the personal privacy of tens of thousands of farmers and ranchers, according to a unanimous ruling issued by the United States Court of Appeals for the Eighth Circuit. The ruling in American Farm Bureau Federation and National Pork Producers Council vs. EPA concerned the federal agency's 2013 release to three environmental groups of a vast compilation of spreadsheets containing personal information about farmers and ranchers who raise livestock and poultry in 29 states. The case also related to similar personal information from farmers and ranchers in seven additional states that had yet to be...
  • When ‘Liberty’ Forces 18 Girls Into a Single-Stall Shower Room

    09/10/2016 9:37:14 AM PDT · by Altura Ct. · 29 replies
    Daily Signal ^ | 9/9/2016
    n recent years, a common refrain accompanying nearly every demand for newly invented “rights” has been: “It doesn’t affect you, so you can’t be against it.” This claim—whether false or true, subjective or objective—has been played as the ultimate trump card. If you could not point to a direct, immediate, and significant intrusion on your life, then your concerns—no matter how thoughtful and legitimate—were sacrificed at the altar of the New Regime. Times change. On Wednesday, Alliance Defending Freedom filed a federal lawsuit on behalf of high school students and parents, asking the court to strike down a Minnesota school...
  • Apple, Google Back Microsoft Over ‘Sneak-and-Peek’ Searches (link Only due to copyright issues)

    09/06/2016 10:55:35 PM PDT · by Swordmaker · 19 replies
    Bloomberg | September 6, 2016 | By Kartikay Mehrotra and Diana Bass
    Apple, Amazon, Google, Energy companies, and Airlines, and others back Microsoft in battle with government overreach. Link only due to copy right issues: Apple, Google Back Microsoft Over ‘Sneak-and-Peek’
  • Rental Cars Can Steal Phone Data Like Contacts and Text Messages (privacy infosec threat)

    09/02/2016 9:26:00 AM PDT · by MarchonDC09122009 · 28 replies
    Fortune ^ | 09/01/2016 | Jeff John Roberts
    Rental Cars Can Steal Phone Data Like Contacts and Text Messages http://fortune.com/2016/09/01/rental-cars-data-theft/ Tech Internet of Things Watch Out That Your Rental Car Doesn't Steal Your Phone Data By: Jeff John Roberts September 1, 2016, 10:51 AM  Watch out how you connect to cars. Here’s something to think about the next time you plug your phone into a rental car: The vehicle may be slurping up and recording all sorts of data, including your location, personal contacts, and even your text messages and web browsing. That warning comes via a Federal Trade Commission blog post this week, which highlights a downside...
  • Virginia Woman Blasts Drone 'to Smithereens' with Shotgun

    09/01/2016 9:57:26 AM PDT · by Impala64ssa · 142 replies
    Popular Mechanics ^ | 8/30/16 | Eric Limer
    "It came over my airspace, 25 or 30 feet above my trees, and hovered for a second. I blasted it to smithereens."​ A woman in Virginia shot down a drone flying near her property in June of this year. It's at least the third time this has happened in the U.S., with previous incidents in Kentucky and Tennessee. Originally reported in the local Fauquier Times and subsequently covered by Ars Technica, the shooter was Jennifer Youngman, a neighbor to actor and director Robert Duvall. She had been cleaning her shotguns on the porch when two men stopped on a nearby...
  • Facebook Just Got a Whole Lot Creepier

    08/30/2016 4:28:10 PM PDT · by Fractal Trader · 70 replies
    Facebook Just Got a Whole Lot Creepier ^ | 30 August 2016 | Michael Krieger
    I’ve been creeped out by Facebook for a long time now. The following story takes it to another level. From Fusion: While some of these incredibly accurate friend suggestions are amusing, others are alarming, such as this story from Lisa*, a psychiatrist who is an infrequent Facebook user, mostly signing in to RSVP for events. Last summer, she noticed that the social network had started recommending her patients as friends—and she had no idea why. “I haven’t shared my email or phone contacts with Facebook,” she told me over the phone. The next week, things got weirder. Most of her...
  • Apple needs to get better at dying

    08/29/2016 6:15:01 PM PDT · by Swordmaker · 61 replies
    Computerworld ^ | Aug 29, 2016 5:53 AM PT | By Jonny Evans
    Credit: AppleMust Just because the subject is challenging doesn't mean it can be ignored. Apple and the rest of the technology industry must face up to death, it’s too important to ignore. The lost son To illustrate my point, Apple has refused to unlock a Mac belonging to a man’s murdered son. The victim was a painter and musician with a trove of precious creative work stashed on his machine, and his dad wants to be able to see the data there. You can see his point. Apple has declined to open up the Mac because: "It is impossible to...
  • Privacy Law Finally Gets An Upgrade

    08/27/2016 7:02:07 AM PDT · by Kaslin · 2 replies
    Townhall.com ^ | August 27, 2016 | Steve Sherman
    Most of the privacy laws being used currently were written when flip phones were all the rage. If you haven’t noticed, times have changed. Entire computers sit comfortably in our hand or back pocket if you’re a millennial. Data storage, email, and cloud based tech have changed our entire world. With that change legal challenges have evolved and it is time to update our severely outdated legal framework for dealing with privacy issues. I’ve written about it before, and I am glad to say that a viable option is here. It is called the International Communications Privacy Act (ICPA). We...
  • Living Under The Patriot Act: Educating a Society

    08/25/2016 8:54:36 AM PDT · by 1pitech · 2 replies
    http://amzn.to/2blwi29 | 03-09-2007 | Paul Ibbetson
    I wanted to share my comprehensive, reader friendly book on the Patriot Act. It is on sale for the first ever for .99 cents for Kindle at Amazon. Portions of the book are taught in five law school across the country. The books covers the different sections of the law in detail. The history of enemy combatants and Guantanamo Bay are discussed. Sources and comments of groups in support and in opposition are provided starting at the beginning of the law's creations. The book covers the first renewals and a whole lot more. I hope my many friends here enjoy...
  • Hulk Hogan's Smackdown Hurts Press Freedom

    08/24/2016 12:54:54 PM PDT · by Kaslin · 25 replies
    Townhall.com ^ | August 24, 2016 | Jacob Sullum
    Nine years ago, Gawker ran a blog post headlined "Peter Thiel Is Totally Gay, People." The item rankled Thiel, a billionaire who had co-founded Paypal and invested early in Facebook but had not yet gotten around to publicly acknowledging his sexual orientation, although he had told people close to him. This week, Thiel finally got his revenge, as Gawker ceased operations, driven out of business by an invasion-of-privacy lawsuit he financed. Whether or not you mourn the loss of Gawker, a website known for its snarky blend of gossip and journalism, its death does not bode well for freedom of...
  • FACEBOOK SNOOPING ADMISSION Here are the alarming 98 facts and secrets Facebook knows about YOU

    08/24/2016 10:28:43 AM PDT · by 867V309 · 24 replies
    thesun.co.uk ^ | 24th August 2016 | JASPER HAMILL
    WHO knows the most about you?You might say it’s your partner or perhaps your mum, assuming you’ve had the sort of tame life a parent would find acceptable.But you’d be wrong, because tech companies now have more information about you than almost anyone else.
  • What Facebook REALLY knows about you: Firm reveals the 98 pieces of data it uses to target ads...

    08/23/2016 7:40:27 AM PDT · by snarkpup · 47 replies
    UK Daily Mail ^ | Updated: 16:50 EST, 22 August 2016 | Stacy Liberatore
    Facebook users are constantly being bombarded with ads, but sometimes one shows up on the screen that is so well-suited, it's as if the site has tapped into your thoughts. ... 'The majority of promoted topics that I see in my Facebook feed are relevant to my interests, and they're worth clicking on more often.' However, others are not sold that Facebook's methods are completely innocent. Peter Eckersley, the chief computer scientist at the Electronic Frontier Foundation, calls them 'the most invasive in the world.' 'Facebook's business model is to amass as much first-party and third-party data on you as...
  • Browse free or die? New Hampshire library is at privacy fore[Tor]

    08/21/2016 7:58:03 PM PDT · by Theoria · 11 replies
    AP ^ | 26 June 2016 | Lynne Tuohy
    A small library in New Hampshire sits at the forefront of global efforts to promote privacy and fight government surveillance — to the consternation of law enforcement. The Kilton Public Library in Lebanon, a city of 13,000, last year became the nation's first library to use Tor, software that masks the location and identity of internet users, in a pilot project initiated by the Cambridge, Massachusetts-based Library Freedom Project. Users the world over can — and do — have their searches randomly routed through the library. Computers that have Tor loaded on them bounce internet searches through a random pathway,...
  • CNN Launches Drone Operations To Film Americans

    08/18/2016 10:23:02 AM PDT · by Enlightened1 · 25 replies
    Daily Caller ^ | 08/18/16 | Steve Guest
    According to a press release provided to The Daily Caller, Terence Burke, senior vice president of national news, said that “CNN’s cutting-edge development of technology to enhance the way we tell stories is a part of our DNA. We are proud to continue the tradition with CNN AIR, and to establish a unit that will expand our technological capabilities for newsgathering.” CNN has formed the “first media-related research partnership with the Georgia Tech Research Institute” and will be in a direct research agreement with the Federal Aviation Administration. According to the press release, in 2015, “CNN was selected by the...
  • (Apple's) Tim Cook: Privacy Is Worth Protecting

    08/15/2016 9:11:07 PM PDT · by Swordmaker · 27 replies
    Information Week Government ^ | August 15, 2016 | By Eric Zeman
    Tim Cook: Privacy Is Worth Protecting Apple CEO Tim Cook leans on the Founding Fathers to suggest the company did the right thing when asked by the FBI to unlock a terrorist's iPhone. It's an issue that affects IT professionals who need to protect company data, as well as consumers and their personal information. iPhone Encryption: 5 Ways It's Changed Over Time(Click image for larger view and slideshow.) Apple caused quite a stir earlier this year when it refused a request from the US Department of Justice to unlock a suspected terrorist's iPhone. At the time, Apple argued that the...
  • Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea

    08/10/2016 11:44:58 AM PDT · by Swordmaker · 13 replies
    The Register UK ^ | 10 Aug 2016 at 06:56, | By Chris Williams
    Redmond races to revoke Secure Boot debug policy Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder. These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android. What's more, it is believed it will be impossible...
  • FBI chief calls for national talk over encryption vs. safety

    08/08/2016 2:17:42 PM PDT · by Swordmaker · 43 replies
    AP Big Story ^ | Aug. 5, 2016 9:53 PM EDT | By PAUL ELIAS
    FBI Director James Comey gestures during an address to the American Bar Association annual meeting SAN FRANCISCO (AP) — The FBI's director said Friday the agency is collecting data to present next year in hopes of sparking a national conversation about law enforcement's increasing inability to access encrypted electronic devices. Speaking Friday at the American Bar Association annual conference in San Francisco, James Comey said the agency was unable to access 650 of 5,000 electronic devices investigators attempted to search over the last 10 months. He said the problem is only going to get worse without a discussion about the...
  • More than 60 percent of Windows users would switch to Mac for more privacy

    08/04/2016 5:03:21 PM PDT · by Swordmaker · 69 replies
    BetaNews ^ | August 2, 2016 | By Ian Barker
    Windows 10 and the amount of data it collects via the Windows Store could prompt users to switch to Mac according to a new survey.The study conducted by OnePoll on behalf of security and privacy advice and comparison website Comparitech.com finds that 61 percent of the US public who regularly use Windows would at least consider switching to Mac. In the UK the figure is even higher at 67 percent, with 15 percent saying they would definitely consider swapping. Only 33 percent in the UK and 39 percent in the US say that they would not contemplate switching operating...
  • Arab Americans Join With Tech, Privacy Groups to Fight Surveillance - Morning Consult

    07/27/2016 12:06:39 PM PDT · by MarchonDC09122009 · 8 replies
    Morning Consult ^ | 07/26/2016 | Amir Nasr
    Arab Americans Join With Tech, Privacy Groups to Fight Surveillance - Morning Consult https://morningconsult.com/2016/07/26/arab-american-groups-join-partner-tech-privacy-fight-surveillance/?mkt_tok=eyJpIjoiTlRNeE16TmpNR0ZpT0daaSIsInQiOiJ1QXBqd28wWmlEbnpjWUVWRDNOaDZCU2tFMmJ6NXJ2MVJyRHZpcjhGWWxPcGJ1U1VyQXFCXC9PcUN6RmJ3emRKdkJJTWJSUmtBRGRTV09XNlI4QUZHU0xybWYxQ1I5QTRqQkJrZDAxbUEwVzg9In0%3D Arab Americans Join With Tech, Privacy Groups to Fight Surveillance Amir Nasr   |   July 26, 2016 Privacy advocates in the technology space have a new ally in Arab American groups to help with their fight to keep U.S. surveillance at bay. They are spurred on by anti-Muslim rhetoric from Republicans. In December, Donald Trump called for a “total and complete shutdown” of U.S. borders to Muslim immigrants. In March, Sen. Ted Cruz (R-Texas) said the country needed to “empower law enforcement to patrol and secure Muslim...
  • Police Create 3D Print of Murdered Man’s Fingers to Hack His iPhone

    07/22/2016 6:51:45 PM PDT · by Swordmaker · 10 replies
    News.SoftPedia.com ^ | July 22, 2016 -- 08:07 GMT | By Bogdan Popa
    Authorities might find a way to access a dead man’s phone If you believe that securing your phone with a fingerprint makes it impossible to hack, think again. Michigan police have recently asked the Michigan State University to produce a 3D replica of a dead man’s fingers in order to access his iPhone and collect data that is believed to contain evidence linked to an ongoing murder case.Professor Anil Jain has been tasked with creating the 3D molds, and according to a report by Fusion, the project is advancing well so far, although in-lab testing is still being performed, and it’s...
  • WSJ Reporter: Homeland Security Tried to Take My Phones at the Border

    07/21/2016 12:36:59 PM PDT · by Swordmaker · 38 replies
    MotherBoard ^ | July 21, 2016 | by JOSEPH COX
    On Thursday, a Wall Street Journal (WSJ) reporter claimed that the Department of Homeland Security demanded access to her mobile phones when she was crossing the border at the Los Angeles airport.The case highlights the powers that border agents purport to have, and how vulnerable sensitive information can be when taken through airports in particular.“I wanted to share a troubling experience I had with the Department of Homeland Security (DHS), in the hopes it may help you protect your private information,” Maria Abi-Habib, a WSJ journalist focused on ISIS and Al Qaeda wrote in a post on Facebook. (Abi-Habib...
  • Opera sells open-source Chromium browser for $600m to Chinese bods

    07/19/2016 8:24:53 AM PDT · by snarkpup · 30 replies
    The Register ^ | 18 Jul 2016 at 20:07 | Shaun Nichols
    Opera will sell its web browser technology to Chinese investors for $600m after a larger sale worth $1.2bn fell apart.
  • Maxthon Browser Sends Sensitive Data to China (!)

    07/14/2016 9:33:55 PM PDT · by Utilizer · 9 replies
    SecurityWeek ^ | July 14, 2016 | Eduard Kovacs
    ... Developed by China-based Maxthon International, the browser is available for all major platforms in more than 50 languages. In 2013, after the NSA surveillance scandal broke, the company boasted about its focus on privacy and security, and the use of strong encryption. Researchers at Fidelis Cybersecurity and Poland-based Exatel recently found that Maxthon regularly sends a file named ueipdata.zip to a server in Beijing, China, via HTTP. Further analysis revealed that ueipdata.zip contains an encrypted file named dat.txt. This file stores information on the operating system, CPU, ad blocker status, homepage URL, websites visited by the user (including online...
  • Feinstein encryption bill, opposed by Silicon Valley, likely dead

    07/14/2016 7:18:20 PM PDT · by Swordmaker · 9 replies
    Sacramento Bee ^ | July 13, 2016 | BY SEAN COCKERHAM
    Seven months after 14 people died in the San Bernardino terror attack, the push by California Sen. Dianne Feinstein to give law enforcement access to encrypted cellphone data has fizzled. A draft bill by Feinstein and Sen. Richard Burr, R-North Carolina, was panned by technology companies and never introduced, while a new report from the House Homeland Security Committee declares that the proposal and others floated in Congress “provide little guarantee of successfully addressing the issue.” Susan Hennessey, a former National Security Agency lawyer and now a cybersecurity expert at the Brookings Institution think tank in Washington, said Feinstein’s proposal...
  • McCain Pushes Apple, Google On Encryption Standards in Cyber Hearing

    07/14/2016 1:51:21 PM PDT · by Swordmaker · 41 replies
    USNI.ORG ^ | July 14, 2016 3:13 PM | By: John Grady
    Sen. John McCain warned Google and Apple executives Thursday that the Senate Armed Services Committee “has subpoena power” that could compel them to testify on why their encryption systems on newer smartphones are not accessible to law enforcement operating under court orders.The Arizona Republican, who chairs the panel, said, “There’s an urgency” to finding a solution to the matter of protecting privacy while also not closing out police, prosecutors and intelligence agencies from lawfully pursuing criminals and terrorists.At the start of the hearing, McCain noted that Tim Cook, president of Apple, declined to attend the session. “This is unacceptable,” he...
  • COURT: US GOVERNMENT CAN'T MAKE MICROSOFT REVEAL CLOUD DATA

    07/14/2016 1:41:33 PM PDT · by Swordmaker · 7 replies
    Associated Press ^ | July 14, 2016 | BY LARRY NEUMEISTER
    NEW YORK (AP) -- A federal appeals court delivered a victory to U.S. companies housing customer data overseas, ruling Thursday that prosecutors cannot force Microsoft to reveal content from a customer's email account stored in Ireland. The 2nd U.S. Circuit Court of Appeals in Manhattan overturned a lower court order finding the company in civil contempt for not handing over the data. Microsoft offers storage through its "public cloud," which places data from over 1 billion customers and over 20 million businesses on servers in over 40 countries, the court noted.
  • In Sports Authority bankruptcy, customer e-mail data commands hefty sum

    07/03/2016 7:04:21 AM PDT · by BenLurkin · 6 replies
    latimes.com ^ | 06/30/2016
    As more companies come to understand the value of data, customer information has gone to the auction block during bankruptcy proceedings. Yet as consumers work to safeguard their data in the aftermath of high-profile breaches at companies such as Target and health insurer Anthem Inc., such sales mark another way customers can lose control of their personal information. “Customer emails are stolen every day [but] they lack awareness that this is a possibility,” Nigam said. “The auction is raising awareness of another way customer data can be sold without even thinking about it.” Businesses have the legal right to sell...
  • Judge says the FBI can hack your computer without a warrant

    06/25/2016 9:30:05 AM PDT · by Swordmaker · 58 replies
    Endgadget ^ | June 24, 2016 | By Jessica Conditt
    'Computers accessing the internet can -- and eventually will -- be hacked,' says Judge Henry Coke Morgan, Jr. The FBI did not need a warrant to hack a US citizen's computer, according to a ruling handed down on Tuesday by Senior US District Court Judge Henry Coke Morgan, Jr. If the decision is upheld, it may have ripple effects that essentially allow government agencies to remotely search and seize information from any computer in the US without a warrant, probable cause or suspicion, the EFF argues.The ruling relates to a worldwide FBI sting dubbed Operation Pacifier that targeted child pornography...