This is the number one factor that determines the security of your lifestyle.
Encryption refers to any process used to make sensitive data more secure and less likely to be intercepted by those unauthorized to view it. That includes Password Managers [KeePass], encrypting your files or partitions [VeraCrypt] and your sms messages [Signal]. Encryption is also used everytime you execute an online financial transaction [Paypal or ANZ] and for a multitude of other reasons.
When using encryption, the sender and recipient must use the same mathematical technique (known as an algorithm) to perform the encryption and decryption. That means that if you use your rubbish WhatsApp to send me a message it is not secure because I use Signal.
Encryption can cast a wide net, but without it, you'd all be fucked. Many of you take it for granted. Now that the desktop computer is considered an antique, most people carry their lives with them on their mobile. Yet how many encrypt their phone [to protect their financial details] or back it up [to protect their sanity]. I think I'm being very generous in guessing that no more than 5% would bother. Why - because it's to big a hassle. Time is better spent on bookface or some other meaningless social media than the few seconds [sometimes minutes] it takes to secure your life.
If you lost your phone how much would you pay to get it back?
Do you know how much it costs to protect the information in your phone?
Nothing. ZERO. $0!
Do yourself a favour and take a few minutes out of your boring meaningless life and just do it.
Helping to keep you safe
You don’t have to be careless to lose your laptop, but that doesn’t mean you should just accept the fact that your machine is gone forever. Prey helps recover your stolen devices by enabling you to track and control them remotely, and make them unusable to anyone who’s got them. Prey helps you keep an Read more about Track and recover devices with Prey[…]
Police in Wales managed to arrest and convict a drug dealer by identifying his fingerprint from a photo posted on WhatsApp. The South Wales Police department got its hands on the photo, which depicted the hand of a man holding ecstasy tablets in his palm, after searching the phone of a person arrested in the town Read more about Fingerprints[…]
What are the odds. Well, in fact, they were 50,000 to 1. But, he fought the law and the law won. As I continually stress, this is the one [and only 1] piece of technology where the TLA’s have the advantage. At the moment there is no practical defence, but it’s early days. The [PDF] Read more about Handbook of Face Recognition[…]
Being one of the largest darknet marketplaces at the time of takedown, Hansa enjoyed a fair share of market vendors and customers. What the investigators were after was not just a takedown but more of a takeover to humiliate darknet users. In their understanding, if they took full control of the market before the takedown, the Read more about Darknet now a TLA hunting ground[…]
Introduction AV-Comparatives’ 2017 test of Android antivirus products was inspired by the discovery of an Android app called Virus Shield, which claimed to scan mobile devices for malware, but in fact did nothing of the sort. In reality, running the app simply showed a progress bar, supposed to represent scan progress, followed by an announcement Read more about Android antivirus test[…]
Cloudflare has announced a new DNS service, in partnership with APNIC, that promises faster performance and improved privacy. The new service offers a faster address resolution and a promise to wipe all logs of DNS queries within 24 hours. Cloudflare has published two articles introducing their service. Announcing 126.96.36.199: the fastest, privacy-first consumer DNS service Read more about Cloudflare’s new 188.8.131.52 DNS service[…]
A group of Chinese computer scientists from academia and industry have published a paper [PDF] documenting a tool for fooling facial recognition software by shining hat-brim-mounted infrared LEDs on the user’s face, projecting CCTV-visible, human-eye-invisible shapes designed to fool the face recognition software. The tactic lets the attacker specify which face the categorizer should “see” Read more about Fooling Face Recognition[…]
Internet engineers meeting in London, England, approved the updated TLS 1.3 protocol despite a wave of last-minute concerns that it could cause networking nightmares. The new protocol aims to comprehensively thwart any attempts by the NSA and other eavesdroppers to decrypt intercepted HTTPS connections and other encrypted network packets. TLS 1.3 should also speed up Read more about TLS 1.3 internet crypto approved[…]
Purism has announced the successful implementation of Trammel Hudson’s Heads security firmware into their Librem laptops running coreboot and TPM (Trusted Platform Module). Purism sells security-oriented Librem 13 and Librem 15 laptops running PureOS, a Linux-based operating system designed with security in mind and based on Debian GNU/Linux. Earlier this month, the company announced that Read more about Secure Linux Laptops[…]
GrayKey is a gray box, four inches wide by four inches deep by two inches tall, with two lightning cables sticking out of the front. Two iPhones can be connected at one time, and are connected for about two minutes. After that, they are disconnected from the device, but are not yet cracked. Some time Read more about GrayKey iPhone unlocker[…]
This article, although 3 years old, is still very relevant today. Basic tradecraft doesn’t change, and it’s the little things that you take for granted that will mess you up. Merely swapping SIM cards or moving a SIM card from one device to another offers minimal protection, because the mobile network observes both the SIM Read more about The Problem with Mobile Phones[…]
The Tails Project announced today the release and immediate availability of the Tails 3.6 amnesic incognito live system, also known as the Anonymous OS used by ex-CIA employee Edward Snowden to stay hidden online. Powered by the latest Linux 4.15 kernel with patches for the Meltdown and Spectre security vulnerabilities, and featuring the latest TOR Browser and Read more about Tails 3.6 Anonymous OS Released[…]
Phantom Secure is one of the most infamous companies in the secure phone industry. Sources and court documents detail that its owner has been arrested for allegedly helping criminal organizations. They targeted Phantom Secure for deliberately selling drug cartels phones designed for criminal activity. According to the report, the FBI says that the company and Read more about FBI Busts Phantom Secure[…]
Internet-connected, data-collecting smart devices such as fitness trackers, digital home assistants, thermostats, TVs and even pill bottles are beginning to transform criminal justice. The ubiquitous devices can serve as a legion of witnesses, capturing our every move, biometrics and what we have ingested. They sometimes listen in or watch us in the privacy of our Read more about Smart devices that snitch on you[…]
Network Investigative Technique, or NIT, is a form of malware (or hacking) employed by the FBI since at least 2002. It is a drive-by download computer program designed to provide access to a computer. Now, we’ve got some extra details, thanks to this case. Court documents show the spyware – likely a piece of Flash Read more about Network Investigative Technique[…]