The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

CAT | Anonymity

Lizard Squad did a bad job of attacking Tor, it could have been much worse.

· · · · · ·

It looks like people who care about Internet anonymity need to look outside Canada for their providers. It is not just a concern that the Canadian government would be able to subpoena the information, but it is also vulnerable to insider and external attack. If the data exists, it will eventually leak. Starting today Canadian […]

· · · ·

I have long said that privacy services are all about trust. I this article demonstrating how to use a simple web proxy to compromise the users of that proxy. Of course, the operator of the proxy is being untrustworthy, but that is the whole point. If you don’t have a reason to specifically trust the […]

· · · ·

Two new attacks on Tor have recently been published. One inserts malware into software updates, the other compromises bitcoin transactions.

· · · · ·

There are many considerations for which privacy services to choose. Location is one of the most important. What matters in location?

· · · ·

In episode 23 of our podcast for August 2014, I talk about: The absurd alarmism over the new Facebook Messenger App’s privacy settings Brazil’s move to ban anonymity How the secrecy of the secret app has been compromised and finally how Tor users were put at risk by a fake website

· ·

Sep/14

2

Cosplay for Privacy!

All The Best Dragon Con Cosplayers Fighting For Online Privacy In a brilliant campaign, IO9 and the EFF is having cosplayers pose with pro-anonymity, pro-privacy, and pro-pseudonymity signs. See the whole set here. The most popular seems to be “I have a right to a Secret Identity!”. Lance Cottrell is the Founder and Chief Scientist […]

·

Attacks On Anonymity Conflate Anonymous Speech With Trollish Behavior | Techdirt It turns out that people say nasty things under their real names, and people also say valuable things anonymously. Shocking! It is amazing how often I see respected academics and other thinkers get incredibly sloppy in their reasoning when it comes to anonymity. They […]

·

Your Anonymous Posts to Secret Aren’t Anonymous After All | Threat Level | WIRED This article describes a clever attack against Secret, the “anonymous” secret sharing app. Their technique allows the attacker to isolate just a single target, so any posts seen are known to be from them. The company is working on detecting and […]

· · · · ·

A Brazilian court is enforcing a constitutional ban on anonymity by requiring Apple and Google to remove Secret, an anonymous social network chatting app from their app stores. Microsoft is being required to remove Cryptic, a similar windows phone app. In addition to that, they have been ordered to remove the app from the phones […]

· · · ·

Older posts >>