Skip navigation

Category Archives: privacy

http://www.tomshardware.com/news/e2ee-yahoo-mail-hack-spying,32857.html#xtor=RSS-181

via Tech News ( http://goo.gl/W4D7n )

Advertisements

http://feeds.gawker.com/~r/gizmodo/full/~3/Y6OxZp3BqX0/apple-tracks-your-imessage-contacts-may-share-them-wit-1787200091

Germany’s Interior Minister wants to introduce facial recognition software at train stations and airports to help identify terror suspectsfollowing two Islamist attacks in the country last month… “Then, if a suspect appears and is recognised, it will show up in the system,” he told the paper. He said a similar system was already being tested for unattended luggage, which the camera reports after a certain number of minutes.

http://rss.slashdot.org/~r/Slashdot/slashdot/~3/MdzYQf3it-E/german-minister-wants-facial-recognition-software-at-airports-and-train-stations

We’ve known for a while that the NSA has spied on German Chancellor Angela Merkel and other international leaders, but it now looks like that surveillance was just the tip of the iceberg. Der Spiegel and The Intercepthave published an Edward Snowdenleak revealing that the NSA snooped on as many as 122 foreign heads of state in 2009, ranging from Merkel to Ukranian Prime Minister Yulia Tymoshenko. A custom search system, Nymrod, helped the US agency both locate transcripts of those leaders’ communications as well as secret reports. The National Security Council tells The Intercept that President Obama’s administration hasn’t tracked Merkel and doesn’t plan to start, but it also didn’t deny that the German leader had once been under close watch.

New documents from Snowden indicate that the NSA hacked into and stole documents, including source code, from the Chinese networking firm Huawei. Ironically, this is the same firm that the U.S. government has argued in the past was a threat due to China’s possible use of the same sort of attacks.

Just days after NSA leaker Edward Snowden sat for a rare remote interview broadcast at SXSW, new information linked to his original trove of data indicates that the NSA implemented some of its surveillance activities by masquerading as Facebook servers.

The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.That’s one of the surprising details to emerge from the latest Edward Snowden leaks.

If the president tried to dismantle the NSA or CIA, Assange is convinced that he would be impeached and the agencies would destroy him because they “have dirt on him.” In fact, he said the NSA “has dirt on all of us,” suggesting that the Government has spent the last several years harvesting information with which to black mail the American public.

On Friday, Glenn Greenwald’s new website The Intercept published a number of internal NSA documents that didn’t necessarily reveal any great state secrets, but instead cast some light on the NSA’s office culture. Those documents, leaked by former security contractor Edward Snowden, were actually from an advice column series, written by a 20-year veteran of NSA management under the pen name “Zelda.”

The Tor Foundation is moving forward with a plan to provide its own instant messaging service. Called the Tor Instant Messaging Bundle, the tool will allow people to communicate in real time while preserving anonymity by using chat servers concealed within Tor’s hidden network.In planning since last July—as news of the National Security Agency’s broad surveillance of instant messaging traffic emerged—the Tor Instant Messaging Bundle (TIMB) should be available in experimental builds by the end of March, based on a roadmap published in conjunction with the Tor Project’s Winter Dev meeting in Iceland.