asterisk2a + apple + fbi   12

The tone between Apple and the FBI is now openly hostile | The Verge
Apple attorney: "I can only conclude that the DoJ is so desperate at this point that it has thrown all decorum to the winds... Everyone should beware, because it seems like disagreeing with the Department of Justice means you must be evil and anti-American. Nothing could be further from the truth." //&! Apple has accused the US government of trying to "smear" it with "desperate" and "unsubstantiated" claims. - bbc.in/24UbxT5
War  on  Terror  Patriot  Act  Apple  FBI  encryption 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Here Are the Most Interesting Things Apple and the FBI Said About Encryption | Re/code
on.recode.net/1QsrklN - FBI Director James Comey shifted from his shopworn phrase about “going dark” and instead talked about Apple and other technology companies using encryption to create “warrant-proof spaces in our lives.” Naturally, this is a technological development that law enforcement sees as a giant roadblock to gathering evidence in criminal investigations. He also admitted the bureau screwed up when it changed the Apple ID password on the shooter’s phone.
Apple  FBI  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy 
march 2016 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring
bit.ly/1uvDa0P "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + bit.ly/1q86n2z - "I’m talking about the fact that people won’t feel the same way about their phones after this." + anon-ib.com down as of recently + bit.ly/1vKzfks "Apple is now attempting to distance its service from any fault in the hacks." + bit.ly/1rhC9Ky + bit.ly/W7V3H2
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - bbc.in/1nSuXzy +++ FBI probes celebrity photo leaks - bbc.in/1A1UtIo +++ bit.ly/1w34y7C +++ bit.ly/1sWQKJE +++ on.wsj.com/1A0YJrA >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - youtu.be/2AuRvgOpoYQ +++ bbc.in/1nw4iJ9 - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ bbc.in/1qXX1m2 "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
CCC-TV - Kryptographie nach Snowden
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.
encryption  Cryptography  RC4  MD5  SHA4  NSA  AES  MD4  SHA-2  stuxnet  RSA  Security  LLC  Skype  backdoor  Microsoft  FBI  cybersecurity  cyberespionage  cyberwar  cyberattack  Windows  8  corporate  governance  corporatism  conglomerate  Linux  Apple  transparency  oversight  Privacy  Lvabit  Edward  Snowden  Wikileaks  SSL  digital  natives  digitalnatives 
december 2013 by asterisk2a

related tags

4chan  Act  AES  affairs  Amazon  AnonIB  anonymity  Apple  Assange  attack  authentication  AWS  backdoor  backdoors  barackobama  big  brute  bulk  cablegate  Celeb  Celebgate  Celebrity  Charter  CIA  cloud  Cloudstorage  collection  communism  Complex  conglomerate  consent  corporate  corporatism  Court  Courts  crime  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  data  Dataretention  DAU  digital  digitalnatives  DOJ  domestic  Dropbox  Drugs  Edward  encryption  engineering  Facebook  factor  FBI  FISA  FISAAA  force  foreign  G  GCHQ  Glenn  Google  gossip  governance  GPS  Greenwald  Hacking  homescreen  human  iCloud  imgur  integrity  internet  jail  Julian  leak  Linux  LLC  Lvabit  MD4  MD5  Meta  Microsoft  mobile  n00d  natives  NSA  objectification  of  on  online  organised  Orwellian  oversight  password  passwords  Patriot  phishing  Political  presidency  Privacy  profiling  public  RC4  Reddit  rights  Ring  rippers  RSA  S3  scam  Secret  security  sentiment  Sexual  SHA-2  SHA4  Skype  Smartphone  Snoopers  Snowden  Social  SSL  Stasi  state  stuxnet  surveillance  Surveillance-Industrial  Terror  TheFappening  to  too  Trading  transparency  Twitter  two  UK  Unrechtsstaat  USA  verification  Vorratsdatenspeicherung  War  Wikileaks  Windows  Yahoo!  You  Zero 

Copy this bookmark:



description:


tags: