This popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via SMS.
Read moreGoogle Responds to Warrants for “About” Searches
October 13 2020One of the things we learned from the Snowden documents is that the NSA conducts “about” searches. That is, searches based on activities and not identifiers. A normal search...
Read more8 tips to tighten up your work‑from‑home network
October 8 2020You don't have to be an IT guru to beef up your cybersecurity at home. Sometimes it's enough to ask yourself, "Which bits can I turn off?"
Read moreOn Executive Order 12333
September 28 2020
Mark Jaycox has written a long article on the US Executive Order 12333: “No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333“:
Abstract:...
Read more
Former NSA Director Keith Alexander Joins Amazon’s Board of Directors
September 21 2020This sounds like a bad idea.
Read morePrivacy Analysis of Ambient Light Sensors
September 15 2020Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section.
Read moreCory Doctorow on The Age of Surveillance Capitalism
August 27 2020Cory Doctorow has writtten an extended rebuttal of The Age of Surveillance Capitalism by Shoshana Zuboff. He summarized the argument on Twitter. Shorter summary: it's not the surveillance part,...
Read moreIdentifying People by Their Browsing Histories
August 25 2020Interesting paper: "Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories": We examine the threat to individuals' privacy based on the...
Read moreTor and anonymous browsing – just how safe is it?
August 13 2020How to stay safe when you're using Tor, even if the network is littered with rogues.
Read more
Recent Comments