GEMALTO: How Spies stole the keys to the Encryption Castle. AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security …
Category: Privacy
Feb 23
Stingray: No such thing as a private phone conversation
For some reason, police don’t want you to know. The case against Tadrae McKenzie looked like an easy win for prosecutors. He and two buddies robbed a small-time pot dealer of $130 worth of weed using BB guns. Under Florida law, that was robbery with a deadly weapon, with a sentence of at least four …
Jan 02
Apple & Iphone: Victim, collaborator, or liar?
Recently, I posted an article that detailed how – via an implant called Dropout Jeep – the omnipresent NSA is able to remotely hack into your Iphone. Apple, for their part, has responded that it simply ain’t so. Or it ain’t so at least as far as they know: In the latest instance of a …
Dec 31
Don’t even think about committing a crime.
Sheesh! Ohio police arrested a driver because his car contained a compartment that could theoretically store illegal drugs, though no drugs were found at that time. The driver, 30-year-old Norman Gurley of Michigan, was pulled over for speeding. A highway patrolman noticed wires running to a secret compartment in the car and arrested Gurley, even …
Dec 31
More from the most transparent adminstration . . .
Just in case you need something else to worry about. NSA can hack WiFi devices from eight miles away. The NSA may have the ability to intercept data from around the world, but we now know that it has some impressive (and intimidating) equipment for snooping on nearby targets. Security guru Jacob Appelbaum told those …
Dec 31
How the NSA remotely hacks your Iphone.
Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques“, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, …
Aug 26
Toldya so. Part III
Oops! Google’s not-so-secret-dirty-little-secret, not a secret at all anymore. The Justice Department recently won a court battle to keep an Internet company from talking about federal demands for user data, arguing that even disclosing the company’s name would damage national security.’ But then, after months of arguments, the department appears to have been foiled by …
Aug 17
Why Privacy matters.
Here’s a good summary of why it matters. While I despise the governmental violation of the constitution, especially in the area of unreasonable searches and seizures, the voluntary (and perhaps) indirect surrender of privacy via Facebook and other media is, I fear, without remedy. Peggy Noonan sums it up: What is privacy? Why should we …
Aug 15
Toldya so, Part II
I hate Facebook. I hate it for so many reasons and on so many levels. It plays to the worst of our fallen natures: narcissism, vanity, self-centered, juvenile, and petty. It has changed the word “friend” from a noun that meant something into a verb that means nothing. You don’t have 927 real friends . …
Aug 15
Toldya so, Part I
Google is smart. Wicked smart. Emphasis on wicked. I realize that just saying this in print might cause the “g” word to relegate me to page six million, two hundred fifty three thousand and sixteen, but here it is: GOOGLE: If You Send To Gmail, You Have ‘No Legitimate Expectation Of Privacy’ If you happen …
- 1
- 2