Google revises internal privacy practices, appoints director of privacy

Google’s run into quite a number of privacy concerns in the past, and things hit something of a tipping point earlier this year when it was revealed that the company was snooping on WiFi data while it was collecting Street View images. Now Google has finally come back with some answers to some privacy questions it says it’s been studying for the past several months. First and foremost is the appointment of Alma Whitten as the company’s new directory of privacy, who will manage Google’s privacy efforts across both engineering and product management, and ensure that the company builds “effective privacy controls” into its products and internal practices. Backing that up is some expanded privacy training, including a new program that all employees will be required to take beginning in December, and some new internal compliance procedures, which includes a requirement that every engineering project leader maintain a privacy design document for each project they’re working on. Hit up the source link below for the company’s complete statement on the matter.

Google revises internal privacy practices, appoints director of privacy originally appeared on Engadget on Sun, 24 Oct 2010 22:16:00 EDT. Please see our terms for use of feeds.

Permalink Yahoo! News  |  sourceOfficial Google Blog  | Email this | Comments

Apple fixes FaceTime for Mac security flaw, not your Wolverine complex

That was quick. The FaceTime for Mac beta security flaw has been shutdown by Apple on the backend — a flaw that allowed anyone with physical access to your machine to reset and grab your iTunes Store account password and security answers. So now, if some nefarious type were to click “View Account” within your FaceTime desktop app while you were chillin’ in the Starbucks toilet or chatting away the day by the office water cooler, the would-be identify thief would simply be redirected back to the FaceTime Account Preferences pane. At which point he’d probably just slip your laptop into his backpack earning two thumbs up from that guy.

Apple fixes FaceTime for Mac security flaw, not your Wolverine complex originally appeared on Engadget on Fri, 22 Oct 2010 04:58:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCocoa Touch Apps  | Email this | Comments

PSA: FaceTime beta endangers your Apple ID password and security questions

Worried about local hackers? Like leaving your laptop behind in the coffee shop while you take long, leisurely trips to the bathroom? We wouldn’t be so self-assured. Turns out there’s a gaping security hole in the FaceTime beta, which allows anyone with access to your computer to change your password without knowing it to begin with, as well as peep and edit your security questions and answers. It would be nice if signing out of FaceTime would protect you, but unfortunately the app seems to have a lock-tight memory on your password, so it’s easy for anyone to open the app and sign-in again. Hopefully Apple will fix these holes quickly, and until then we recommend uninstalling FaceTime or choosing your friends very wisely.

PSA: FaceTime beta endangers your Apple ID password and security questions originally appeared on Engadget on Thu, 21 Oct 2010 12:18:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMacNotes.de  | Email this | Comments

Google’s wardriving days are over, says Canadian privacy commissioner

When Google’s Street View cars glide through your neighborhood next, you can leave the WPA2 encryption off — Canada says that the company has “discontinued” the practice of snooping on unsecured WiFi networks with its mapping vehicles, and “has no plans to resume it.” That’s one of several findings in a report by Canada’s privacy commissioner today, which also claims that the controversial data collection feature was the work of a single Google engineer, and that Google intends to use smartphones to pinpoint WiFi networks from now on. Naturally, the latter caused the commissioner concern that Android phones might capture the same data as the cars. Perhaps you’d best keep those shields up after all.

Google’s wardriving days are over, says Canadian privacy commissioner originally appeared on Engadget on Wed, 20 Oct 2010 00:42:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourcePrivacy Commissioner of Canada  | Email this | Comments

Kensington’s ClickSafe security lock: ‘so easy, your employees actually use it’

Nice going, Kensington — you just admitted to the world something we already knew. No one actually uses the lock slot / cable that’s issued to them on their first day on the job. It’s painful to envision the cash this company has made from mindless corporations who somehow think that employees are going to tie their laptops up each and every day, but now it has an alternative that it swears “your employees will actually use.” The new ClickSafe system essentially works as such: you insert a small locking nub into the lock slot that ships on (almost) every new laptop today, and then you clip the new locking cable on by hand. Once you’ve completed the first step, the cable connection is a simple motion each morning — in theory, at least. Peek the installation vid after the break if you’re still having your doubts, and feel free to blow $49.99 / $69.99 (depending on model) if you just know that this time it’ll be different.

Continue reading Kensington’s ClickSafe security lock: ‘so easy, your employees actually use it’

Kensington’s ClickSafe security lock: ‘so easy, your employees actually use it’ originally appeared on Engadget on Tue, 12 Oct 2010 04:39:00 EDT. Please see our terms for use of feeds.

Permalink Reg Hardware  |  sourceKensington (1), (2)  | Email this | Comments

UAE says BlackBerry is now compliant with regulations, free to rock on

The latest thrilling installment in BlackBerry’s Middle East saga has turned out not to be so thrilling after all. Having set an October 11 deadline for RIM to comply with its “telecommunications regulatory framework,” the United Arab Emirates is today reporting that the BlackBerry maker has managed to make the necessary changes with plenty of time to spare. Consequently, there’ll be no state-ordained curtailing of email, web, or BBM services within the UAE, which mirrors similar agreements that BlackBerry has managed to finagle with India and Saudi Arabia. Of course, the grand purpose of the UAE’s ultimatum was for RIM to allow the state access to encrypted messaging communications, and while the current announcement is pointedly missing details on what’s been done to appease the Abu Dhabi decision makers, we can’t imagine them giving up the fight without RIM making some type of concession. And the shady, undisclosed concessions happen to be our least favorite kind.

UAE says BlackBerry is now compliant with regulations, free to rock on originally appeared on Engadget on Fri, 08 Oct 2010 03:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceYahoo! News  | Email this | Comments

AT&T goes live with Encrypted Mobile Voice, kills your dreams of breaking into Pelosi’s social circle

AT&T told us back in July that it was fixing to launch the first carrier-provided two factor encryption service, and it seems that today’s the day. The day it goes live, we mean. At any rate, the company’s Encrypted Mobile Voice service is reportedly active, and it’s already providing “high-level security features for calls on the AT&T wireless network.” Of course, none of this fancy security is meant for simpletons like us — instead, it’s targeting government agencies, law enforcement organizations, financial services institutions and international businesses. We’re told that the tech combines KoolSpan’s TrustChip and SRA International’s One Vault Voice, with the former being a microSD card and the latter being a software layer. Currently, it only plays nice with BlackBerry and Windows Phones, but until we see Biden bust out a Bravo, we’ll assume the lack of Android support isn’t “a big flipping deal.”

Continue reading AT&T goes live with Encrypted Mobile Voice, kills your dreams of breaking into Pelosi’s social circle

AT&T goes live with Encrypted Mobile Voice, kills your dreams of breaking into Pelosi’s social circle originally appeared on Engadget on Thu, 07 Oct 2010 09:58:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAT&T  | Email this | Comments

Photos: Tiny Smart Car Secured with Giant Bike-Lock

The Smart is a great little car, perfect for the city. It’s tiny, has one of those clever gearboxes that can be either manual or auto, it fits into almost any parking space and – despite popular ignorance – is very safe. But how do you stop somebody from just picking it up and carrying it off in their pocket?

With a big-ass bike-lock, that’s how. Just take a giant Kryptonite Evolution Mini (maxi?), pass it through the open windows and lock it to a lamppost. Easy, unless you left anything valuable on the seat.

Of course this is an ad, but when ads are this good we don’t care. The spot was created by the BBDO agency of Toronto, Canada, and is supposed to show that the Smart is as versatile in the city as a bike. I spot one big mistake, though. That giant shackle uses the old-style Kryptonite lock-mechanism that could be opened with the barrel of a Bic pen. All you need is a giant biro and you have yourself a new car.

Smart Bike Lock [Ads of the World]

See Also:

Follow us for real-time tech news: Charlie Sorrel and Gadget Lab on Twitter.


Study: select Android apps sharing data without user notification

Come one, come all — let’s gather and act shocked, shall we? It’s no secret that Google’s Android Market is far easier to penetrate than Apple’s App Store, which is most definitely a double-edged sword. On one hand, you aren’t stuck waiting a lifetime for Apple to approve a perfectly sound app; on the other, you may end up accidentally downloading some Nazi themes that scar you for life. A curious team of scientists from Intel Labs, Penn State and Duke University recently utilized a so-called TaintDroid extension in order to log and monitor the actions of 30 Android apps — 30 that were picked from the 358 most popular. Their findings? That half of their sample (15, if you’re rusty in the math department) shared location information and / or other unique identifiers (IMEI numbers, phone numbers, SIM numbers, etc.) with advertisers. Making matters worse, those 15 didn’t actually inform end-users that data was being shared, and some of ’em beamed out information while applications were dormant. Unfortunately for us all, the researchers didn’t bother to rat out the 15 evil apps mentioned here, so good luck resting easy knowing that your library of popular apps could be spying on you right now.

Update: A Google spokesperson pinged up with an official response to the study, and you can peek it after the break.

Update 2: Looks as if the full study (PDF) has been outed, with the 30 total apps named. Here they are: The Weather Channel, Cestos, Solitaire, Movies, Babble, Manga Browser, Bump, Wertago, Antivirus, ABC – Animals, Traffic Jam, Hearts, Blackjack, Horoscope, 3001 Wisdom Quotes Lite, Yellow Pages, Dastelefonbuch, Astrid, BBC News Live Stream, Ringtones, Layer, Knocking, Barcode Scanner, Coupons, Trapster, Spongebob Slide, ProBasketBall, MySpace, ixMAT, and Evernote. Thanks, Jordan!

Continue reading Study: select Android apps sharing data without user notification

Study: select Android apps sharing data without user notification originally appeared on Engadget on Thu, 30 Sep 2010 16:06:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBBC, App Analysis (PDF)  | Email this | Comments

Report: Biometrics are Inherintly Flawed, Name Tags Still Work

hello-my-name-is-sticker.jpg

A new joint-commissioned report from DARPA, the CIA, and Homeland Security has concluded that the current state of biometrics–the technology that can identify individuals based on unique characteristics such as fingerprints, retinal and voice patters, or facial features–is “inherently fallible.”

The report argues that the technology may be used for certain small-scale tasks, however it will cause major problems if utilized in a wide-scale framework.

There are two main problems, the report argues, with the current state of biometrics. One, the systems rely on probabilistic results, they inherently rely on a certain degree of uncertainty. And also the technology assumes that the parameters it uses are static. Humans are mushy bags of tissue and organic material–our bodies change over time due to injury, disease, age, or any number of variables. This can lead to false-negatives or the inability to create an ID at all.

Security-minded folks have invested much time and effort into biometrics
over the past decade. This has largely been in reaction to a post 9-11 world, but more accurately, it is a reaction to increased access to affordable international travel. Advances in transportation have transformed
humans into a truly borderless species. There are many advantages to
breaking down barriers, both physical and otherwise. Unfortunately, it hasn’t all been kumbaya. As technology has evolved us physically, we haven’t
completely evolved sociologically to accommodate our new powers of
distance-bridging–we are still prone to tribal instincts and conflict
and we’re still, as a species, inherently prone to corruption. That’s
why those who seek to maintain order would love to harness the power to
identify an individual beyond the shadow of a doubt. Biometrics are
already being utilized by coalition and local security forces in Iraq
and Afghanistan and, more recently, have been implemented by the Indian government
in a nation-wide bid to ID its citizenry.

Privacy advocates will be disheartened to hear that this probably doesn’t mark the end of biometric technology. It does mean that the human power behind the technology will have to be trained to deal with the inconsistencies and the technology will be forced to innovate beyond where it is now.

via POPSCI