Posts Tagged privacy

Italy Gives Google Privacy Ultimatum

From The Guardian:

Google has been given 18 months by the Italian data regulator to change how it handles and stores user data.

Users will now have to grant permission before the firm creates a profile on them, and Google has to honour requests to delete data within two months (although it will have an additional six months to remove the content from backups). Google will also have to explicitly inform users that the profiles it creates on them are for commercial purposes.

, , , , ,

No Comments

Phone Wiping Fails on Android Phones

From CNET.com:

Avast — known for its security software on Windows, Mac, and Android — purchased 20 Android smartphones from eBay, which has around 80,000 used smartphones for sale at any given time. Among the data that Avast employees recovered from the phones were more than 40,000 photos — including 250 nude male selfies — along with 750 emails and text messages, 250 contacts, the identities of four phones’ previous owners, and one completed loan application.

, , , ,

No Comments

Silent Circle Moves To Switerland

From the Silent Circle Blog:

Switzerland – the land of Privacy, Neutrality and now Silent Circle (not to mention great cheese, chocolate and watches). We are very much an international firm. We have employees scattered among 9 countries, data centers in Canada and Switzerland, and we count customers from over 130 countries with a heavy concentration of Global 1000 enterprise customers outside of North America. We decided to move our Headquarters from the Caribbean island of Nevis to Switzerland and move a lot of our customer service, finance, sales and operations into this new large office.

It was very important for us to remain a “Global Neutral Privacy Provider”, as well as a political and religious agnostic company. Switzerland has the world’s most robust privacy laws, fantastic business and financial resources and an incredible business-friendly atmosphere. In addition to being the world’s center for Human Rights, Global freedom of speech and an innovative technology hub, Switzerland is our perfect home. This move was a logical an easy decision for us. With over 75% of our customer base outside of North America and our Joint Venture company Blackphone also headquartered in our joint new office space in Switzerland – it was a natural move.

We will continue to grow our North America office in Washington, DC as well as our London office, but most of our new growth will take place in our new headquarters. So, if you find yourself in Europe or close to Switzerland, we are only a short hop or train ride away – so please do stop into our new Headquarters office to say hi.

, , ,

No Comments

EFF Calls On Companies To Enhance Security

From the Electronic Frontier Foundation:

How to Protect Your Users from NSA Backdoors: An Open Letter to Technology Companies

As security researchers, technologists, and digital rights advocates, we are deeply concerned about collaboration between government agencies and technology companies in undermining users’ security. Among other examples, we are alarmed by recent allegations that RSA, Inc. accepted $10 million from NSA to keep a compromised algorithm in the default setting of a security product long after its faults were revealed. We believe that covert collusion with spy agencies poses a grave threat to users and must be mitigated with commitment to the following best practices to protect users from illegal surveillance: Read the rest of this entry »

, , , , ,

No Comments

You Can Have Privacy on the Net

Two members of the Electronic Frontier Foundation talk about how it is possible over at Slate:

Despite all of the awareness-raising around surveillance that has taken place over the last year, many individuals feel disempowered, helpless to fight back. Efforts such as the February 11 initiative the Day We Fight Back aim to empower individuals to lobby their representatives for better regulation of mass surveillance. But legislation and policy are only part of the solution. In order to successfully protect our privacy, we must take an approach that looks at the whole picture: our behavior, the potential risks we face in disclosing data, and the person or entity posing those risks, whether a government or company. And in order to successfully fight off the feeling of futility, we must understand the threats we face.

, , , ,

No Comments

Privacy at the Olympics

From Silent Circle:

Russian authorities have openly acknowledged that widespread monitoring of phone, Internet and other communications systems is in place during the games and have framed these measures as part of overall security preparedness. Safety and security aside, this degree of persistent surveillance creates severe risks for visitors worried about sensitive personal and business communications being compromised when they keep in touch with colleagues and others from Sochi. There have been a number of stories over the past week warning that visitors and athletes can expect to be hacked, noting “it isn’t a mater of ‘if,” but a matter of ‘when.’”

, , , , , ,

No Comments

Secure Mobile Phone: Blackphone

The company Silent Circle which makes encrypted communication apps for mobile phones will soon release its own hardware called the Blackphone on Feb. 24. It is designed from the ground up to be a secure and encrypted method of communication. They are designing the hardware and creating their own secure version of the Andriod OS.

Press release:

Blackphone, powered by a security-oriented Androidâ„¢ build named PrivatOS, is a carrier- and vendor-independent smartphone giving individuals and organizations the ability to make and receive secure phone calls, exchange secure texts, transfer and store files, and video chat without compromising user privacy on the device.

It is the culmination of several careers’ worth of effort from leading figures in the industry, including Phil Zimmermann, creator of PGP; Javier Aguera, co-founder of Geeksphone; Jon Callas, co-founder of PGP Inc. and CTO of Silent Circle; Rodrigo Silva-Ramos, co-founder of Geeksphone; and Mike Janke, CEO of Silent Circle and former US Navy SEAL.

, , , , , , , , , , ,

No Comments

Spy Apps For the Individual

Silent Circle – Secure Communications

Photo Trap – Tamper Detection

Life360 – Safety and Tracking

1Password – Secure Password Management

iDiscreet – Data Encryption

Norton Mobile Security – Firewall for Phones

, , , , , , ,

No Comments

Press Release: Dark Mail Alliance

Today at the Inbox Love conference in Mountain View, CA, Silent Circle along with Ladar Levision, Founder of Lavabit officially announced the creation of the Dark Mail Alliance.

Silent Circle and Lavabit, as privacy innovators have partnered to lead the charge to replace email as we know it today – fundamentally broken from a privacy perspective – we have collaborated in developing a private, next-generation, end-to-end encrypted alternative. Read the rest of this entry »

, , , , , , , ,

No Comments

Obama Administration Sued By ACLU Over NSA Spying

From New York Times:

The lawsuit could set up an eventual Supreme Court test. It could also focus attention on this disclosure amid the larger heap of top secret surveillance matters revealed by Edward J. Snowden, the former N.S.A. contractor who came forward Sunday to say he was their source.

, , , , , , , , , , ,

No Comments

Keeping The NSA Out of Your Life

The Washington Post has a list of some things you can do to increase your security and make it harder for the government to keep tabs on you.

If recentreports are to be believed, the National Security Agency has broad powers to capture private information about Americans. They know who we’re calling, they have access to our Gmail messages and AOL Instant Messenger chats, and it’s a safe bet that they have other interception capabilities that haven’t been publicly disclosed. Indeed, most mainstream communications technologies are vulnerable to government eavesdropping.

Here is an explanation of TOR, software that allows anonymous browsing on the internet:

, , , , , , , ,

No Comments

Why ‘I Have Nothing to Hide’ Is the Wrong Way to Think About Surveillance

The problem is that “good” people almost never see how fascist government actions will ever effect them. They just don’t think that way. They believe as long as they are law abiding, the government will never do them harm. But ask someone who lived with the Stazi (Ministry for State Security) in East Germany or the KGB (Committee for State Security) in the Soviet Union, watching their every move. They can tell you why you should be afraid, and there are plenty of them still around to talk to. If we don’t stop this now we will probably never again have the chance.

From: Wired

If the federal government can’t even count how many laws there are, what chance does an individual have of being certain that they are not acting in violation of one of them?

more

, , , , ,

No Comments

Anonymity Impossible?

MIT asks the question in an article about how much information individuals create about themselves.

Much of this data is invisible to people and seems impersonal. But it’s not. What modern data science is finding is that nearly any type of data can be used, much like a fingerprint, to identify the person who created it: your choice of movies on Netflix, the location signals emitted by your cell phone, even your pattern of walking as recorded by a surveillance camera. In effect, the more data there is, the less any of it can be said to be private, since the richness of that data makes pinpointing people “algorithmically possible,” says Princeton University computer scientist Arvind Narayanan.

, , , , , , , , , , ,

No Comments

Congress Renews Warrantless Spying

From the EFF:

The common-sense amendments the Senate hastily rejected were modest in scope and written with the utmost deference to national security concerns. The Senate had months to consider them, but waited until four days before the law was to expire to bring them to the floor, and then used the contrived time crunch to stifle any chances of them passing.

, , , , , ,

No Comments

FBI Briefs Congress on New ID Tech and How It Affects Citizen’s Privacy

CJIS Executive Briefs Congress on Next Generation Identification Initiative

July 18, 2012

Jerome Pender, deputy assistant director of our Criminal Justice Information Services Division, updated members of the Senate Judiciary Committee’s Subcommittee on Privacy, Technology, and the Law on the status of the Bureau’s Next Generation Identification (NGI) program.

 

What Facial Recognition Technology Means for Privacy and Civil Liberties

Jerome M. Pender , Deputy Assistant Director, Criminal Justice Information Services Division , Federal Bureau of Investigation , Statement Before the Senate Judiciary Committee, Subcommittee on Privacy, Technology, and the Law

– Washington, D.C.

, , , , , ,

No Comments