The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

CAT | Mobile

The Internet is on fire with outrage right now about the security warnings in the Facebook Messenger app. The furor is based on the viral spread of a post on the Huffington Post back in December of last year. The issue has come to the fore because Facebook is taking the messaging capability out of […]

· ·

In episode 21 of our podcast for July, I talk about: A decision giving Canadians more rights to Anonymity Iraq’s recent blocking of social media and more Iran’s outright criminalization of social media A court decision requiring warrants to access cell tower location data Another court stating that irrelevant seized data needs to be deleted after searches […]

· · · · · ·

In episode 16 of the Privacy Blog Podcast for January, Twenty Fourteen I talk about: Biological Advanced Persistent Threats The Apps on your mobile devices that may be enabling surveillance Why you may soon know more about how much information your service providers are revealing to the government The total compromise of the TorMail anonymous email […]

· · ·

This is episode 14 of the Privacy Blog Podcast for November,2013. In this episode I talk about: How your phone might be tracked, even if it is off The hidden second operating system in your phone Advertising privacy settings in Android KitKat How Google is using your profile in caller ID and the lengths to […]

· · · ·

OS News has an interesting article: The second operating system hiding in every mobile phone It discusses the security implications of the fact that all cell phones run two operating systems. One is the OS that you see and interact with: Android, iOS, Windows Phone, BlackBerry, etc. The other is the OS running on the baseband […]

· · ·

The Chaos Computer Club (CCC) in Germany recently announced its successful bypassing of the new iPhone 5S fingerprint scanner. Despite many media claims that the new scanner worked on deep layers in the skin, and was not vulnerable to simple fingerprint duplication, that is exactly what succeeded.  The CCC used a high resolution photo of […]

· · ·

ZDNet has published a nice article on 4 key privacy settings under iOS 7 that have defaults you might want to change. Mostly related to location information.

· · · ·

Infosec Institute published an article showing in detail how application signing on Android devices can be defeated. This trick allows the attacker to modify a signed application without causing the application to fail its signature check. The attack works by exploiting a flaw in the way signed files in the .apk zip file are installed […]

· · · ·