welcome

This website uses cookies to ensure you get the best experience on our website.
Please scroll to the bottom of page to read the notice if you are coming from the European Union...

Saturday, December 14, 2013

S

" Snooping on the Internet is tricky. The network is diffuse, global, and packed with potential targets. There's no central system for identifying or locating individuals, so it's hard to keep track of who is online and what they're up to. What's a spy agency to do?' In a Slate op-ed, Ed Felten explains how consumer tracking makes the NSA's job much easier. Felten was the first-ever Chief Technologist at the Federal Trade Commission, serving as the agency's lead technical expert on privacy issues. Now back in academia, he argues that the NSA gets a 'free ride on the private sector,' from distinguishing users, to pinpointing geolocation, to slurping up network traffic."

 "The most widely used cellphone encryption cipher A5/1 can be easily defeated by the National Security Agency, an internal document shows. This gives the agency the means to intercept most of the billions of calls and texts that travel over radiowaves every day, even when the agency would not have the encryption key. Encryption experts have long known the cipher to be weak and have urged providers to upgrade to newer systems. Consequently it is also suggested that other nations likely have the same cracking capability through their own intelligence services. The vulnerability outlined in the NSA document concerns encryption developed in the 1980s but still used widely by cellphones that rely on 2G GSM. It is unclear if the agency may also be able to decode newer forms of encryption, such as those covered under CDMA."

 "NSA Director Keith Alexander, testifying before the Senate this week, got weirdly petulant, asking his critics how he was supposed to do his job without collecting metadata on American communications. 'If we can come up with a better way, we ought to put it on the table and argue our way through it,' he said. 'There is no other way that we know of to connect the dots.' He also implied that major U.S. tech companies might have greater capacities than his organizations, and that they should help him out with new ideas."

 "Peter Eckersley at the EFF reports that the 'App Ops' privacy feature added to Android in 4.3 has been removed as of 4.4.2. The feature allowed users to easily manage the permission settings for installed apps. Thus, users could enjoy the features of whatever app they liked, while preventing the app from, for example, reporting location data. Eckersley writes, 'When asked for comment, Google told us that the feature had only ever been released by accident — that it was experimental, and that it could break some of the apps policed by it. We are suspicious of this explanation, and do not think that it in any way justifies removing the feature rather than improving it.1 The disappearance of App Ops is alarming news for Android users. The fact that they cannot turn off app permissions is a Stygian hole in the Android security model, and a billion people's data is being sucked through. Embarrassingly, it is also one that Apple managed to fix in iOS years ago.'"

 "The North Korean state propaganda machine has edited and deleted hundreds of news articles that mention Jang Song Thaek, the former top government and party official and uncle to leader Kim Jong Un, who was executed Thursday. Earlier this week, Jang was arrested in front of hundreds of senior members of the ruling Worker's Party of Korea and denounced for numerous alleged acts against the state and Kim Jong Un. From arrest to trial to death took only four days and the unprecedented fall from grace is widely being interpreted as an attempt by Kim Jong Un to keep officials loyal and scared." 

No comments:

Post a Comment