Long before quantum computing becomes “main stream”, state actors will have access to it. In part, because they command large budgets; in part because it is important to them. Why do they care? Because, it will allow them to decrypt both communications that they intercept going forward and communications that they have intercepted in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Law enforcement agencies around the world have been whining about the “going dark” problem at least since the early 1990s when they tried really hard to put Phil Zimmerman in jail for creating encryption that mere mortals could use. There is no question that bad folks use encryption to hide stuff, but good folks also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft’s LinkedIn Sued for Abusing Clipboard Access Apple’s Universal Clipboard allows you to share data between devices. According to the lawsuit, LinkedIn reads the data without notifying the user. However, LinkedIn is not alone. More than 50 apps, apparently, do that. Now that they have been sued, they are changing their app. Credit: Reuters When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since the early 1990s, there has been a battle going on between the federal government and privacy advocates. Privacy advocates want strong encryption. The government wants weak encryption that it can break. Except of course for the encryption that they use. They claim they need it is to hunt down terrorists, but that didn’t get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Anonymous Gonna Rise Again. Question Mark? A hacker or hackers claiming to be affiliated the non-group Anonymous has posted a million documents coming from over 200 police departments and other law enforcement agencies. While the documents do no purport to show illegal activities, they are likely both embarrassing and also confidential. The fact that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Retailer LightInTheBox Exposes 1.6 Billion Customer Records The challenge with today’s big data world is that the breaches are enormous. LightInTheBox left customer transaction data exposed due to, apparently, a server misconfiguration. They effectively breached themselves. The data was a web server log with dates from Aug 9 to Oct 11 of this year. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]