WhatsApp Is Encrypted But It’s No iMessage WhatsApp just announced end-to-end encryption for their 1 billion + users. Their massive user base overshadow Apple’s own iMessage network on Apple’s own devices alone. It would also seem that they are taking a page out of Apple’s own playbook by offering end-to-end encryption. WhatsApp’s parent company, Facebook, is also… Read More »
Apple’s iPhone Encryption Security Battle is Canary in IoT Coal Mine
Are we doomed to repeat the mistakes of the past? With a little luck, we are. I know that sounds rather pessimistic but in light of the current FBI and Apple battle over encryption security, we are standing at a familiar crossroads. Last time, the U.S. avoided widespread security failure was the ill-proposed Clipper Chip… Read More »
Feds Want Front and Backdoors To Encryption In Every iPhone
When FBI director was first asked if he had any intentions to force Apple to unlock more than the single iPhone 5C in question, he answered “unlikely to be a trailblazer” for setting a precedent for other cases. But a week later when asked before a congressional panel under oath, he said the judgement on this single iPhone would… Read More »
FBI Bobbing for Apple Customer Privacy
The other night, I was asked to give my brief comments on NBC regarding this security encryption legal fiasco that has pitted Apple against the FBI. I was only given a few seconds to comment so I wanted to elaborate more on some details here. Since this story is about technical security and privacy as much as… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
Low-Cost Cell Phone Detector Interesting Side Effect
Low-Cost Cell Phone Detectors Have Interesting Side Effect: They Help Protect Your Privacy Monitoring a suspect’s phone calls is an essential part of many criminal investigations, but tapping a wireless or landline phone requires a court order. Now law enforcement agencies have another option for keeping tabs on wireless phones that may not necessitate going… Read More »
Global Governments Attempt to Peel The Onion Router
Tor has been embraced by lawful and unlawful users alike. It helps those who value their online privacy and dissidents who live in countries with oppressive governments, but it also provides ways for cyber criminals, terrorists and other bad guys to avoid identification. This has made breaking Tor’s anonymity a top priority for government agencies… Read More »
The Hidden Privacy Upside of Net Neutrality
On February 26th the Federal Communications Commission voted in favor of stronger net neutrality rules. The vote reclassifies both wired and wireless broadband internet service providers (ISPs) as utilities under Title II of the Communications Act of 1934. Most of the media attention has focused on the ruling barring ISPs from blocking or prioritizing… Read More »