Google: Gmail Users Have No Reason to Expect Privacy

Google: Gmail Users Have No Reason to Expect Privacy

Here’s some more bad news to add to the pile of concern over email vulnerability, a brief filed by Google’s attorneys has just surfaced and revealed that Gmail users should have "no legitimate expectation of privacy"—ever.

Read more…


    



Smartphone tracking recycling bins nixed by London

If you were worried that the universe presented in the smart city-toting Watch Dogs video game, you’ll be glad to know that the garbage bins wont be seeing you any time soon. That is to say: won’t be tracking you from now on. According to a report released by the group responsible for the bins […]

City of London says no to public recycling bins that track smartphones in pedestrian pockets

City of London says no to public recycling bins that track smartphones in pedestrian pockets

Many have grown comfortable with the targeted ads that populate the modern web and expect companies to keep track of their online activity, but UK firm Renew took things one step further earlier this summer. It began tracking real world traffic on the streets of London by recording the MAC addresses of the phones that passed by some of the many public recycling bins it operates in the city.” Today, however, the City of London Corporation demanded that the tracking stop while a determination is made by the Information Commissioner’s Office whether the technology complies with the UK’s Data Protection Act.

The bins themselves are equipped with WiFi and screens that display a rotating series of ads, and this summer, a dozen of those bins began to record the MAC address of any nearby phones with WiFi turned on. Doing so allows Renew to determine repeat passers-by, how quickly pedestrians are moving so that ads displayed on the bins can be better targeted to the surrounds foot traffic. However, owners of those phones were not notified that their handset’s MAC addresses were recorded. For its part, Renew explained in a blog post that the tracking was done on a trial basis and MAC addresses were anonymized and aggregated so that personal information was not recorded. Quartz reports that during the first month of tracking, over one million unique devices were recorded, however, and that over 100,000 phones were identified during the trial’s busiest day. What say you, dear readers: want trash cans tracking the surrounding foot traffic in the name of serving you ads targeted to your tastes?

Filed under: ,

Comments

Via: The Telegraph

Source: Quartz

The NSA Turned Spying into a Video Game for Analysts

The NSA Turned Spying into a Video Game for Analysts

Spying must get boring sometimes. Identifying targets. Wiretapping unsuspecting citizens. Sifting through all that private data. It must get old. Maybe that’s why the NSA introduced gamification elements into its software to encourage a little bit of healthy competition between analysts.

Read more…


    

Kim Dotcom Is Creating a ‘Cutting Edge’ Encrypted Email Service

Kim Dotcom Is Creating a 'Cutting Edge' Encrypted Email Service

When the government came knocking becayse Edward Snowden used Lavabit’s encrypted email service, it did the sensible thing and, uh, shut itself down. Other similar services have followed suit—and now Kim Doctcom plans to capture the market that’s being left wide open.

Read more…


    

Powerful Spying Tool Based on Raspberry Pi: Personal Security Agency

As we store and transport more and more information online, we’ve gradually come to realize how easy it is for others to access that information without our permission. From Facebook’s privacy policies to the ongoing NSA leaks, it seems like the ordinary online user has enough reason to log out. Well, I’ve got more bad news for you: anyone can build a powerful spying tool using off the shelf parts, and for under $60 (USD).

f bomb creepydol by brendan oconnor

Brendan O’Connor is the founder of security and software consultancy company Malice Afterthought. Last week he made headlines when he shared how he built F-BOMB, a small device that runs a software that he calls CreepyDOL . The DOL stands for Distributed Object Locator and “Creepy” with a capital ‘C’ is the perfect word to describe it. O’Connor built the F-BOMB using the popular Raspberry Pi microcomputer and added a Wi-Fi sensor to the device. The cost? $57 (USD). He built 10 F-BOMBs and hooked them up to Reticle, a “command & control system” that he made. Finally he hooked it up to a “data visualization system,” which you can see in the image above and in O’Connor’s video below:

In case the video wasn’t clear enough, the F-BOMB can gather a disturbing amount of wireless data. As New York Times reported – and as the video above proves – with the F-BOMB you can find out not only information on a wireless device but what the user is currently using or accessing through the device: geolocation, websites, email addresses, programs and more.

In my brief chat with O’Connor, he revealed that the device can snoop on wireless devices within about 160ft. He can add other sensors to the F-BOMB as well as adapt it to snoop on wired connections. Further, O’Connor said the F-BOMB is a passive device, so you have no way of knowing if it’s snooping on you. Finally, I asked O’Connor if the situation really is as hopeless for consumers as the New York Times article seemed to indicate. Here’s what he said:

Yes, it really is that hopeless. There are vulnerabilities in all the relevant layers of the stack. The application developers need to stop leaking so much data outside encryption envelopes (e.g., why does iMessage send hardware make and model, and iOS version, unencrypted?). iOS (I’m picking on it here because I use it, but the same problem is larger) should have OS-level support for blocking all non-VPN traffic until a VPN connection is established (once it’s up, the connection is opaque, but while it’s going up, I’ve usually got all the data I need). And the low-level protocol needs to stop encouraging devices to *beacon out all their known networks constantly*. So since there needs to be culture-level shifts at all the layers of the stack, yes, for end-users, the situation is hopeless at the moment.”

In other words, not only is it possible to make a surveillance tool that is small and cheap, the devices that we use are practically inviting prying eyes to take a look at our data. It falls upon us as end users to nag Apple, Microsoft, Google and other companies who create the hardware and software that we use to step their security game up. It would be foolish to believe that they know nothing about the disaster that they’re courting (with our privacy and security at stake). But for some reason they’re not doing anything about it, nor are they telling us how much danger we’re in.

O’Connor intends to sell F-BOMBs soon. Fellow black hats and tinkerers can sign up at Malice Afterthought’s website to find out more about the F-BOMB and when it will go on sale. Ars Technica also has a thorough technical report on the F-BOMB. As for the rest of us? I guess we’d better start learning how to communicate telepathically.

[via Brendan O’Connor & The New York Times via Infoneer Pulse]

The NSA Monitors 1.6% of the World’s Internet Traffic

The NSA Monitors 1.6% of the World's Internet Traffic

To be slightly more transparent and/or spew numbers to confuse the common citizen, the Obama administration released two documents to show the scope of the NSA’s data collection program. Those documents reveal that the NSA monitors 1.6% of the world’s Internet traffic and reviews .00004% of all traffic.

Read more…


    

Obama Will Reform Spy Programs But Won’t Call Snowden a Patriot

Obama Will Reform Spy Programs But Won't Call Snowden a Patriot

President Obama announced a series of reforms to the country’s surveillance practices on Friday at his first full press conference in nearly three months. The actions the administration is taking are many, and there’s still a lot that’s up in the air. One thing’s for sure, though. Obama does not think Edward Snowden deserves any credit.

Read more…


    

Lavabit and Silent Circle are dead: encrypted email alternatives still active

Thursday of this week there was a bit of a one-two punch in effect as NSA leakster Edward Snowden announced first that encrypted email service Lavabit would shut down, followed closely by a similar announcement by Silent Circle. While Lavabit shut down in what very much appeared to be a government-pressured incident, Silent Circle made […]

Das Keyboard HackShield Bag & Wallet Keeps Thieves & Hackers at Bay

Das Keyboard may be known for making noisy mechanical keyboards, but it also values privacy and security. The company’s new HackShield bags and wallets provide protection from both digital and physical theft.

das keyboard hackshield bags and wallet

Similar to the OFF Pocket, the HackShield backpack, messenger bag and wallet are lined with a material that blocks radio frequencies. They’re also made from waterproof polyurethane and weather-resistant ballistic nylon. Both bags can fit a 15″ laptop and have smaller pockets inside so you can stuff in more gadgets and tinfoil hats.

das keyboard hackshield bags and wallet 2 300x250
das keyboard hackshield bags and wallet 3 300x250
das keyboard hackshield bags and wallet 4 300x250
das keyboard hackshield bags and wallet 5 300x250
das keyboard hackshield bags and wallet 6 300x250
das keyboard hackshield bags and wallet 7 300x250
das keyboard hackshield bags and wallet 8 300x250
das keyboard hackshield bags and wallet 9 300x250

In addition to blocking wireless signals, the messenger bag and the backpack also protect your belongings from thieves. The bags have no external pockets, and their main compartments are protected by Fidlock fasteners, which are easy to close but lock in place.

You can order the HackShield gear from Das Keyboard’s online shop. Both bags cost $179 (USD) while the wallet costs $49.

[via Fancy]