PINDROP BLOG

Category: Privacy

February 1, 2016
On the Wire Podcast: Bruce Schneier
Bruce Schneier, the well-known cryptographer, author, and security expert, is today’s guest on the On the Wire podcast. Dennis Fisher talks with Schneier about the pervasiveness of commercial and government surveillance and tracking, the emerging problem of IoT security, and what can be done to address the technical and policy issues all of this entails.…
Read More →
February 1, 2016
Harvard Study Questions ‘Going Dark’ Crypto Problem
The FBI and other law enforcement and intelligence agencies have warned for years that the increased use of encryption by consumers is making surveillance and lawful interception much more difficult, impeding investigations. But a new study by a group of experts at Harvard’s Berkman Center says those claims are largely overblown and that the IoT…
Read More →
January 28, 2016
GCHQ Says Voice Crypto Protocol Not Backdoored
A week after a researcher published a detailed analysis of the MIKEY-SAKKE voice encryption standard that broke down how it could enable key escrow and mass surveillance, the U.K.’s GCHQ, which designed the standard, has come out in defense of its security and integrity. CESG, the information security group at GCHQ, developed the MIKEY-SAKKE standard several…
Read More →
January 27, 2016
Online Ad Blockers Blocked by Online Advertisers
The problems of malicious ads and ad fraud have become widespread and are major annoyances and threats to users. Those issues have led to the huge popularity of ad blocking extensions for browsers, but a backlash from the online ad industry has now reached a fever pitch as industry groups work to frame the issue as…
Read More →
January 25, 2016
UVA Hit With Another Data Breach
A mistake by an employee who clicked on a link in a phishing email and unwittingly granted access to an attacker has resulted in a data breach at the University of Virginia that dates back to late 2014 and exposed personal information of about 1,400 people. The breach includes allowed attackers to get access to some…
Read More →
January 25, 2016
Google Comes Down on Ad Fraud
There are a lot of terrible, terrible things on the Internet and much of that garbage is related to or contained in ads. Malware, phishing links, scams, and other forms of badness all have strong connections to the online ad world, and new data from Google shows just how tight those ties are. In 2015, the…
Read More →
January 22, 2016
On the Wire Podcast: Steven Murdoch
Steven Murdoch is a researcher at University College London and this week published a detailed technical analysis of the MIKEY-SAKKE protocol that is implemented in the U.K.’s Secure Chorus standard for voice encryption. Secure Chorus is set up for key escrow by design, a fact that Murdoch explains in his analysis. In this podcast, Dennis…
Read More →
January 21, 2016
California Bill Seeks Phone Crypto Backdoor
A week after a New York legislator introduced a bill that would require smartphone vendors to be able to decrypt users’ phones on demand from law enforcement, a California bill with the same intent has been introduced in that state’s assembly. On Wednesday, California Assemblyman Jim Cooper submitted a bill that has remarkably similar language…
Read More →
January 19, 2016
UK Government Voice Encryption Standard Built for Key Escrow, Surveillance
The U.K. government’s standard for encrypted voice communications, which already is in use in intelligence and other sectors and could be mandated for use in critical infrastructure applications, is set up to enable easy key escrow, according to new research. The standard is known as Secure Chorus, which implements an encryption protocol called MIKEY-SAKKE. The protocol was…
Read More →
January 13, 2016
New York Wants to Force Vendors to Decrypt Users’ Phones
A bill that is making its way through the New York state assembly would require that smartphone manufacturers build mechanisms into the devices that would allow the companies to decrypt or unlock them on demand from law enforcement. The New York bill is the latest entry in a long-running debate between privacy advocates and security experts on one…
Read More →