The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

CAT | International

DutchNews.nl reports that ISPs in the Netherlands will no longer be required to retain data for law enforcement. Since 2009, national laws have required keeping records on the activities of all users for a period of one year. In 2014 the EU determined that such mass storage was a violation of fundamental privacy rights. This court […]

·

There are many considerations for which privacy services to choose. Location is one of the most important. What matters in location?

· · · ·

If this amendment passes, it will significantly reduce the perceived advantages of using servers outside the US. No only would the server still be subject to whatever legal process exists in the hosting country, but they would also be open to legal hacking by the USG. Newly Proposed Amendment Will Allow FBI to Hack TOR […]

· ·

A Brazilian court is enforcing a constitutional ban on anonymity by requiring Apple and Google to remove Secret, an anonymous social network chatting app from their app stores. Microsoft is being required to remove Cryptic, a similar windows phone app. In addition to that, they have been ordered to remove the app from the phones […]

· · · ·

Vodafone Lays Bare Scale of Phone Tapping – WSJ Vodafone recently released a “Law Enforcement Disclosure Report”. Because Vodafone provides services in so many countries, this provides a unique  insight into the range of surveillance capabilities and requirements across a spectrum of nations. In six countries they are required to provide direct connections to their […]

·

Attorney General’s new war on encrypted web services – Security – Technology – News – iTnews.com.au Australia’s Attorney-General’s department is proposing that all providers of Internet services ensure that they can decrypt user communications when so ordered. Any services where the provider has the keys will obviously be able to do this. Australians may want […]

· ·

US Tech Sanctions In Sudan Are Empowering The Regime, Tamping Down Opposition | Techdirt This article makes an interesting argument that sanctions against repressive regimes, particularly sanctions that block providing communications and security technologies to end users, harm dissidents more than they do the repressive regimes they are designed to target. In particular, companies are […]

·

Turkey passed legislation to allow the government to censor access to websites within four hours of receiving an allegation of privacy violations. WSJ Article behind paywall.  CNET Article The law also requires web hosts to store all traffic information for two years. While the putative purpose of the legislation is privacy protection, it is widely […]

· ·

Sochi visitors entering hacking ‘minefield’ by firing up electronics | Security & Privacy – CNET News UPDATE: According to Errata security the NBC story about the hacking in Sochi total BS. Evidently: They were in Moscow, not Sochi. The hack was from sites they visited, not based on their location. They intentionally downloaded malware to their […]

· · · · ·

Welcome to episode 13 of our podcast for September, 2013. In this episode I will talk about: A major security breach at Adobe How airplane mode can make your iPhone vulnerable to theft Russian plans to spy on visitors and athletes at the winter Olympics Whether you should move your cloud storage to the EU […]

· · · · · · ·

Older posts >>