welcome

This website uses cookies to ensure you get the best experience on our website.
Please scroll to the bottom of page to read the notice if you are coming from the European Union...

Wednesday, February 24, 2016

Just Some Stuff

 Bill Gates has now publicly stated that Apple should cooperate with the FBI in the San Bernadino terrorist's phone unlocking case.

 He states that it is for this specific case, but seems to miss the point that there are other law enforcement officials waiting on the wings with their requests should this precedent be set. 

The war against privacy escalates. Setting aside the actual practicality of unlocking the San Bernadino phone, the teams that are emerging on this issue include some pretty strange bedfellows:

John McAfee and Bill Gates on the pro-unlocking side, and Woz, Edward Snowden and even some of the victim's families on the con.

 Bill Gates ‘Disappointed’ by Reports He Backs FBI Over Apple

Public protest

If you're counting on Apple to keep your digital information safe, you may want to think again ... at least if you live in Australia. 

Yesterday the country's two major political parties — Labor and the Coalition — voted down a motion in Federal Parliament calling for strong encryption to be supported in the wake of the FBI's demands that Apple unlock iOS. 

It appears that implementing comprehensive telephone and email retention in Australia may not have been the end of demands by law enforcement in the country.

https://placesjournal.org/article/inside-mexico-citys-c4i4-surveillance-center/ 

 Apple engineers have already begun developing new security measures that would make it impossible for the government to break into a locked iPhone using methods similar to those now at the center of a court fight in California, according to people close to the company and security experts. 

If Apple succeeds in upgrading its security — and experts say it almost surely will — the company would create a significant technical challenge for law enforcement agencies, even if the Obama administration wins its fight over access to data stored on an iPhone used by one of the killers in last year's San Bernardino, Calif., rampage. 

The F.B.I. would then have to find another way to defeat Apple security, setting up a new cycle of court fights and, yet again, more technical fixes by Apple.

***

The Wall Street Journal (paywalled) is reporting that the Department of Justice is seeking Apple's help in decrypting 12 other iPhones that may contain crime-related evidence. 

The cases are not identified, though a list of the 12 phones in question has come out, but it is not known what level of Apple assistance is required (i.e., how many of those cases are waiting on the FBI request for special firmware to be developed and to be used on "one more phone").

 It appears Tim Cook's assertion that hundreds of requests are waiting on this software may not be a fabrication, and the goal is not about just one phone, but to set a precedent to unlock more phones.

 As TechDirt (which also lists those 12 cases, a list which certainly does not encompass all the phones the Feds would like to peer into) puts it, "[O]nce again, Director Comey was flat out lying when he claimed the FBI has no interest in setting a precedent."

***
 TIL a mason in 1700's Jerusalem left his wooden ladder behind after doing some work on a church and now it can't be moved without the agreement and permission of six different Christian leaders.

_)(***

Security Ledger has a piece that looks at the efforts of a string of startups to secure ATM transactions from skimmers and malware-based attacks

Step 1: get rid of the ATM card. The article profiles a couple different companies.

 One, Trusona, has technology that can uniquely identify standard issue ATM cards by analyzing the unique distribution of Barium Ferrite particles on their magnetic strips and using it to connect the card to the customer. 

The company combines that with card swipe biometrics to thwart malware-based replay attacks.

 The article also mentions upgrades that will allow banking customers in the U.S. to use a mobile application to withdraw cash from ATMs without a card or PIN, and a prototype from Diebold that combines proximity based sensing (via NFC) with iris scans to authenticate customers and authorize transactions.

 Cool as it sounds, its worth remembering that most ATM attacks are decidedly "low tech."

 A survey by the ATM Industry Association in 2015 listed "physical attacks" and those using "explosives" as the second and third most common type of ATM attack after card skimming.

***

Always remember, ya got to land on the white stuff!

No comments:

Post a Comment