![]() |
[QUOTE=only_human;395870][CENTER][URL="https://firstlook.org/theintercept/2015/02/19/great-sim-heist/"]"THE GREAT SIM HEIST[/URL]
HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE"[/CENTER][/QUOTE] Since I think a snip from the article for the benefit of workaday-inundated readers is warranted, here ya go: [quote]American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.” With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.[/quote] Another encryption-bypassing hack. I'm sensing a theme here... |
That streaming camera that you put in your home to keep an eye on a pet, etcetera. Well, that camera may not be your friend:
"THE SPIES OF LIFE [URL="http://fusion.net/story/50925/police-have-asked-dropcam-for-video-from-peoples-home-cameras/"]Police have asked Dropcam for video from people’s home cameras[/URL]" [QUOTE]Dropcam, which makes popular $199 cameras that capture audio and video for live streams to smartphones or for storage in the cloud, tells Fusion that it has received a “limited number of law enforcement requests”—search warrants—for video from its customers’ cameras. The six-year-old company, which was purchased by Google-owned Nest Labs last year for more than $500 million, says it has only received these requests “in individual cases” and has not received “any broad-based government requests.” In other words, when law enforcement has come to Dropcam, it has been for eyes into a single home at a time, not a whole neighborhood. “When we’ve received search warrants for Dropcam footage, we’ve provided notice to the email address associated with the account, unless compelled by a court not to do so,” said Thai. She says the requests so far have only been for stored footage not for access to a live video stream.[/QUOTE] |
[QUOTE=only_human;395964]That streaming camera that you put in your home to keep an eye on a pet, etcetera. Well, that camera may not be your friend:[/QUOTE]
Et tu, [url=http://www.zerohedge.com/news/2015-02-20/we-messed-badly-lenovo-admits-putting-tracking-software-your-pc]Lenovo[/url]? |
[url]http://spritesmods.com/?art=hddhack[/url]
One need not use any of the actual disc to store hacked firmware. |
[QUOTE=ewmayer;395968]Et tu, [URL="http://www.zerohedge.com/news/2015-02-20/we-messed-badly-lenovo-admits-putting-tracking-software-your-pc"]Lenovo[/URL]?[/QUOTE]
[QUOTE][U][B]Because if Lenovo is doing this, are we supposed to be so naïve to presume that Google, Apple, AT&T, etc. are not?[/B][/U][/QUOTE]How is the company going to put things right with the customers? [I]We wonders, yes we wonders, my Precious.[/I] I also wonder if there are enough injured parties to launch a Class Action suit against Lenovo. I foresee many attorneys scarfing down a feast of fees, as there are bound to be suits already in progress, and many more to come. From [URL="http://www.bloomberg.com/news/articles/2015-02-19/lenovo-says-it-messed-up-by-preloading-web-tracking-software"]Blooomberg[/URL]: [QUOTE]Superfish uses image-recognition algorithms that watch where users point on their screens and suggest ads based on the images they’re looking at. The software was included on some models of consumer laptops sold worldwide between September and December and was turned off in January after user complaints, Lenovo said. [/QUOTE]"Turned off," eh? That is not exactly comforting. Actually, it seems that- [QUOTE]Lenovo Group Ltd. apologized to customers as it works with users to enable laptop computer owners to remove pre-installed software that potentially exposed them to hacking attacks and unauthorized activity monitoring. The biggest maker of personal computers said it was a mistake to have the software, made by a company called Superfish, included on Lenovo machines. Lenovo posted links on Twitter to its website with information about the software and removal instructions. [/QUOTE]"And TRUST Us, this really, truly, pinky-swear, this [I]Really[/I] removes the malware, and doesn't just cover it up somehow." :ermm: EDIT: It also really chaps my ass that the situation is being cast, at least sardonically, as "a very poor security-versus-user-experience trade-off.” Is it supposed to [I]IMPROVE[/I] my bleeding "User Experience" to have sneaky malware bombard me with targeted ads? :furious: [/LEWIS_BLACK] |
[QUOTE=kladner;395971]EDIT: It also really chaps my ass that the situation is being cast, at least sardonically, as "a very poor security-versus-user-experience trade-off.” Is it supposed to [I]IMPROVE[/I] my bleeding "User Experience" to have sneaky malware bombard me with targeted ads? :furious:[/QUOTE]It probably did improve user experience, just that that user was not intended to be the person that bought the laptop.
ETA: Advertisers and marketeers won't be satisfied until every square millimetre of every surface your eyes and ears can see and hear is presenting their ads 24/7 for your viewing pleasure. I'm sure they would have Mars lit up also if they could so that people with telescopes can enjoy the ads also. |
Ben Edelman's latest report is also relevant:
[QUOTE]In public statements, IronSource promises "empower software" through "faster" downloads, "smoother" installations, and increased "user trust." It sounds like a reasonable business -- free software for users in exchange for advertising. Yet a closer look at IronSource installations reveals ample cause for concern. Far from facilitating "user trust," IronSource installations are often strikingly deceptive: they promise to provide software IronSource and its partners have no legal right to redistribute (indeed, specifically contrary to applicable license agreements); they bundle all manner of adware that users have no reason to expect with genuine software; they bombard users with popup ads, injected banner ads, extra toolbars, and other intrusions. It's the very opposite of mainstream legitimate advertising. We are surprised to see such deceptive tactics from a large firm that is, by all indications, backed by distinguished investors and top-tier bankers. [/QUOTE]Full details: [URL]http://www.benedelman.org/news/021815-1.html[/URL] |
More man-in-the-middle experience [I]improvements[/I] are popping up:
[QUOTE][URL="http://arstechnica.com/security/2015/02/security-software-found-using-superfish-style-code-as-attacks-get-simpler/"]Security software found using Superfish-style code, as attacks get simpler[/URL] Titles from security firms Lavasoft and Comodo leave users open to easier attacks.[/QUOTE] [QUOTE]Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third of the Internet's Transport Layer Security certificates, making it the world's biggest certificate authority.[/QUOTE] [QUOTE]Readers with either Lavasoft Ad-aware Web Companion or the stand-alone version of PrivDog should err on the side of caution and uninstall both the app and the underlying root certificate as soon as possible.[/QUOTE] |
Asymmetric encryption
[URL="http://justsecurity.org/20304/transcript-nsa-director-mike-rogers-vs-yahoo-encryption-doors/"]Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors[/URL]
|
[QUOTE=xilman;396223][URL="http://justsecurity.org/20304/transcript-nsa-director-mike-rogers-vs-yahoo-encryption-doors/"]Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors[/URL][/QUOTE]Very unsatisfying. No answers at all, just waffle.
|
[QUOTE=retina;396224]Very unsatisfying. No answers at all, just waffle.[/QUOTE]Did you seriously expect anything else?
|
| All times are UTC. The time now is 22:48. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.