mersenneforum.org

mersenneforum.org (https://www.mersenneforum.org/index.php)
-   Soap Box (https://www.mersenneforum.org/forumdisplay.php?f=20)
-   -   Government snooping, backdoors and #necessaryhashtags (https://www.mersenneforum.org/showthread.php?t=18271)

ewmayer 2014-10-09 21:56

o [url=http://www.emptywheel.net/2014/10/07/a-good-reason-to-encrypt-your-iphone-to-prevent-dea-from-creating-a-fake-facebook-account/]A Good Reason to Encrypt Your iPhone: To Prevent DEA from Creating a Fake Facebook Account[/url] | Marcy Wheeler
[quote]We learned about shadow profiles last year when security researchers at a company called Packetstorm discovered Facebook was maintaining its own files on users’ contacts. For example, if Facebook found two users were connected to a non-member—say, [email]bob@wired.com[/email]—it would pool other information—different phone numbers, for example—into one master dossier.
...
Meanwhile, we have an appalling new look at what law enforcement does once it gets inside your smart phone. A woman in Albany is suing DEA because — after she permitted DEA to conduct a consensual search of her phone — DEA then took photos obtained during the search, including one of her wearing only underwear, and made a fake Facebook page for her with them. They even sent a friend request to a fugitive and accepted other friend requests. They also posted pictures of her son and niece, on a site intended to lure those involved in the drug trade.[/quote]
And the best part of all is supplied by a reader who comments: [i]The border exception runs 100 miles inland. It covers around 2/3s of the US population.[/i]

o [url=http://the-digital-reader.com/2014/10/06/adobe-spying-users-collecting-data-ebook-libraries]Adobe is Spying on Users, Collecting Data on Their eBook Libraries[/url] | The Digital Reader

[quote]This is a privacy and security breach so big that I am still trying to wrap my head around the technical aspects, much less the legal aspects.

On a technical level, this kind of mistake is not new. Numerous apps have been caught sending data in clear text, and others have been caught scraping data without permission (email address books, for example). What’s more, LG was caught in a very similar privacy violation last November when one of their Smart TVs was shown to be uploading metadata from a user’s private files to LG’s servers – and like Adobe, that data was sent in clear text.[/quote]
Sorry, I'm not buying the 'mistake' blanket excuse for such stuff anymore. Software that not only phones home with your Adobe download info but snarfs up other stuff on your system simply does not come into being by 'mistake'.

o [url=http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html]Microsoft’s Windows 10 has permission to spy on you[/url] | TechWorm
Reader comment:
[i]
What about Windows 8, which I have? Back in June MSFT sent me an email updating their policies, stating:

“As part of our ongoing commitment to respecting your privacy, we won’t use your documents, photos or other personal files or what you say in email, chat, video calls or voice mail to target advertising to you.”

I read that as saying “we monitor your every keystroke, but rest assured we won’t sell it to advertisers”. That sure is comforting.[/i]

ewmayer 2014-10-29 22:01

o [url=yahoonewsdigest-us.tumblr.com/post/101113246484/feds-identify-suspected-second-leaker-for-snowden]Feds identify suspected ‘second leaker’ for Snowden reporters[/url] | Yahoo News

o [url=www.nytimes.com/2014/10/28/us/us-secretly-monitoring-mail-of-thousands.html]Report Reveals Wider Tracking of Mail in U.S.[/url] | NYTimes

only_human 2014-10-30 07:16

[URL="http://www.techtimes.com/articles/18979/20141029/sneaky-verizon-is-tracking-activity-of-mobile-customers-with-invisible-cookie.htm"]Sneaky Verizon is tracking activity of mobile customers with invisible cookie[/URL]
[QUOTE]Verizon Wireless is under fire from privacy and security advocates for tampering with user web activity and injecting user identification codes.

These identifiers allow advertisers, hackers and virtually anyone with access to the code to track users connected to the Internet via Verizon's network.

These codes, which act like permanent cookies that cannot be deleted, were first pointed out by Jacob Hoffman-Andrews, a researcher at the Electronic Frontier Foundation (EFF).[/QUOTE]
[QUOTE]Hoffman-Andrews, however, argues that even if Verizon does not track users' activities online, advertisers still can. The identifying headers, as Lewis confirms, cannot be deleted. [B]This means other privacy protection tools and methods, such as deleting cookies, clearing cache, enabling Do Not Track and AdBlock extensions, are rendered useless because of Verizon's identifiers.[/B]

For now, the only way for users to block Verizon from using identifying headers is to visit websites encrypted with SSL or to access the Internet through their own Wi-Fi network or Virtual Private Network.[/QUOTE]
Emphasis added

ewmayer 2014-11-05 23:01

[url=http://www.brennancenter.org/analysis/im-terrified-my-new-tv-why-im-scared-turn-thing]I’m Terrified of My New TV: Why I’m Scared to Turn This Thing On — And You’d Be, Too[/url]
[quote]The amount of data this thing collects is staggering. It logs where, when, how, and for how long you use the TV. It sets tracking cookies and beacons designed to detect “when you have viewed particular content or a particular email message.” It records “the apps you use, the websites you visit, and how you interact with content.” It ignores “do-not-track” requests as a considered matter of policy.
....
The TV boasts a “voice recognition” feature that allows viewers to control the screen with voice commands. But the service comes with a rather ominous warning: [b]“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”[/b] Got that? Don’t say personal or sensitive stuff in front of the TV.[/quote]
As a fellow neo-Luddite said, "I can see the next 30 years of my future -- spending time and money on eBay to buy 'obsolete dumb devices'."

retina 2014-11-05 23:23

[QUOTE=ewmayer;386965][url=http://www.brennancenter.org/analysis/im-terrified-my-new-tv-why-im-scared-turn-thing]I’m Terrified of My New TV: Why I’m Scared to Turn This Thing On — And You’d Be, Too[/url]

As a fellow neo-Luddite said, "I can see the next 30 years of my future -- spending time and money on eBay to buy 'obsolete dumb devices'."[/QUOTE]I'd guess it is not much different from JS sending unknown information to unknown places at unknown times for unknown reasons. I am glad that I don't have any type of television device except for my computers which I can keep tight control over.

LaurV 2014-11-06 03:41

[QUOTE=retina;386967]except for my computers which I can keep tight control over.[/QUOTE]
Dream on! :razz:

retina 2014-11-06 09:47

[QUOTE=LaurV;386984]Dream on! :razz:[/QUOTE]Well I did say "can", not "do".

xilman 2014-11-06 18:05

For a little light relief, this is how we handle things on this side of the pond.

[url]http://www.bbc.co.uk/news/uk-29939192[/url]

kladner 2014-11-08 05:00

Facebook Conducted ‘Psychological Experiment’ On Users.....
 
.....To Manipulate US Election Turnout
[url]http://www.addictinginfo.org/2014/11/06/facebook-manipulated-users-for-psychological-experiment/[/url]

I wonder if Google has played any such games.

I put this here because the technology is basically the same as that used in surveillance. Subliminal manipulation by filtering the data stream users receive is just another head on the hydra of social control.

ewmayer 2014-11-12 23:03

[url=www.nakedcapitalism.com/2014/11/isps-removing-customers-e-mail-encryption.html]“ISPs Removing Their Customers’ E-mail Encryption”[/url]
[quote]Bob sent me a [url=http://it.slashdot.org/story/14/11/11/2349244/isps-removing-their-customers-email-encryption]post from Slashdot[/url] which should serve as a wake-up call as to how difficult it is to protect yourself on the Internet if you are a mere mortal. They quote an [url=https://www.eff.org/deeplinks/2014/11/starttls-downgrade-attacks]Electronic Frontier Foundation report on how encryption is being subverted[/url]:
[i]
Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks. In recent months, researchers have reported ISPs in the US and Thailand intercepting their customers’ data to strip a security flag—called STARTTLS—from email traffic. The [url=http://www.nakedcapitalism.com/deeplinks/2014/06/new-gmail-data-shows-rise-backbone-email-encryption]STARTTLS flag[/url] is an essential security and privacy protection used by an email server to request encryption when talking to another server or client.[/i][/quote]

"The TOR mess" gets a mention at the end.

ewmayer 2014-11-15 22:40

[url=www.electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html]DRTBOX and the DRT surveillance systems[/url]
[quote]"DRT has developed a device that emulates a cellular base station to attract cell phones for a registration process even when they are not in use. During this registration process calls are not disrupted. All calls, including 911 calls, are released, including those made from the contraband cell phones. The DRT device identifies cell phones as “not of interest” or “of interest” (i.e., the contraband cell phones).

Cell phones not of interest, such as those belonging to prison personnel or commercial users in the area, are returned to their local network. Cell phones of interest are forced to transmit so that the DRT device can locate them by calculating a line of bearing.

In one mode of operation, the DRT device then returns the cell phone to its network, permitting it to send and receive calls. In another mode of operation designed for use by federal law enforcement entities, the cell phone can be locked onto the DRT device, preventing its contraband use."[/quote]


All times are UTC. The time now is 22:54.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.