Uncategorized

Pattern passwords on your phone

Posted on

Facial recognition, fingerprints and iris scanning have all joined PINs, passcodes and swipe patterns. But which should you be using? Along with passcodes, passwords and patterns, smartphone manufacturers are now implementing biometric security processes such as Face ID and iris scanning onto Android and iOS devices to give users a quicker, more convenient way of […]

mobiles

Foreign Spy Agencies Want Your Texts

Posted on

A new amendment has been introduced in parliament looking to allow for the easier sharing of communications data between Australia’s law enforcement and spy agencies and foreign governments. It comes in response to calls that spy agencies are being left behind without timely access to messaging apps with cloud servers in foreign jurisdictions. It would […]

privacy

Australia’s National Digital ID

Posted on

The Australian government’s Digital Transformation Agency (DTA) has spent more than A$200 million over the past five years developing a National Digital ID platform. If successful, the project could streamline commerce, resolve bureaucratic quagmires, and improve national security. The emerging results of the project may give the Australian public cause for concern.

mobiles

Mobile phone extraction

Posted on

In this piece we examine mobile phone extraction, relying on publicly available information and Privacy International’s experience from conducting mobile phone extraction using a Cellebrite UFED Touch 2. Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, […]

mobiles

5G risk assessment

Posted on

5G is on the way, but there’s no reason to start running around with your pants on your head just yet. While there will be a lot of hoopla about 5G in the CBD area of major cities there is a very large infrastructure network that will have to be put in place. Think at […]

Uncategorized

Ploy to Break Encryption

Posted on

This is part one of a four-part series where security expert Jon Callas breaks down the fatal flaws of a recent proposal to add a secret user — the government — to our encrypted conversations. Twenty-five years ago, the FBI decided it needed a surveillance system built into the nation’s telephone network to enable it to listen […]

Technology

AI-generated faces

Posted on

Katie Jones sure seemed plugged into Washington’s political scene. The 30-something redhead boasted a job at a top think tank and a who’s-who network of pundits and experts, from the centrist Brookings Institution to the right-wing Heritage Foundation. She was connected to a deputy assistant secretary of state, a senior aide to a senator and […]

privacy

Video analytics

Posted on

We are surrounded by surveillance cameras that record us at every turn. But for the most part, while those cameras are watching us, no one is watching what those cameras observe or record because no one will pay for the armies of security guards that would be required for such a time-consuming and monotonous task. […]

anonymity

The Spycraft Revolution

Posted on

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The biggest disruptive force is technological. Traditional spycraft has always relied on deception based on identity. Spotting, developing, recruiting, running, and servicing intelligence sources involves concealing what you are doing.  Not anymore. A cover identity that would have been almost bulletproof […]

privacy

Tor browser for Android

Posted on

After several months of testing, the first stable, public build of a Tor browser for Android is finally available on the Google Play Store. The Tor Project team says it made special considerations for the Android version, since mobile browsing tends to incur even more surveillance than desktop browsing and because users have less control over the mobile browsing […]