The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

CAT | Podcast

India recently announced that all ISPs in the country will be required to block a list of over 800 websites. They claim all of these were for pornography or child pornography, but it turns out that was not the case for all of them. In the face of a massive backlash, the telecom ministry first […]

· ·

What Hand Sanitizer Can Teach Us About Cybersecurity – Lessons learned while trying to stay healthy while walking around the RSA security conference.

· · · · · ·

Feb/15

13

Snipers at the Watering Hole

New targeted web based attacks are like a poacher with a sniper rifle at a watering hole. Anonymity is the key to security against this.

· · · · · · ·

Lizard Squad did a bad job of attacking Tor, it could have been much worse.

· · · · · ·

As a result of the “Great Firewall of Britain” the Chaos Computer Club discovered it is being blocked by Verifone. It turns out that ThePrivacyBlog is too!

· · · · ·

In two separate cases recently Uber has, or has talked about, abusing its information about their customer’s movements. First a Buzzed reporter Johana Bhuiyan was told that she was tracked on the way to a meeting by Josh Mohrer, general manager of Uber New York. Next Emil Michael, SVP of business for Uber, talked at […]

· · · · · ·

Engineers at Golden Frog recently discovered that Cricket wireless was automatically disabling their email encryption. It is not at all clear why they were doing this, but we do know how. When an email client attempts to make a secure connection to a server, it sends a STARTTLS command. If the server never sees the […]

· · · · · ·

A new APT called DarkHotel conducts very targeted attacks against executives in Asian hotels. There are several things you can do to protect yourself.

· · · · ·

How to protect yourself against the recent Rootpipe vulnerability in the Mac OS X version of sudo, which would allow an attacker total control of your computer.

· ·

Two new attacks on Tor have recently been published. One inserts malware into software updates, the other compromises bitcoin transactions.

· · · · ·

Older posts >>