A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.
Jonathan Zdziarski, a researcher who often trains federal and state law enforcement agencies in forensic techniques, revealed the existence of the mostly hidden features. The data-stealing avenues have evolved over the last few years and may have been used by the U.S. National Security Agency to collect data on potential targets, Zdziarski said.
Have you ever been curious as to what information the government has stored about you and your travel records? A Passenger Name Record (PNR) is a computerized travel record created by airlines or travel agencies for both domestic and international flights, as well as hotel bookings, car rentals, cruises, and train trips. Your PNR, which is given to U.S. Customs and Border Protection (CBP) if you travel internationally, can include details like your unredacted credit card number or IP addresses.
Just as civil liberties groups challenge the legality of the UK intelligence agency’s mass surveillance programs, a catalog of exploit tools for monitoring and manipulation is leaked online.
IF there’s a symbol for the idea that privacy is on people’s minds, it’s the Blackphone.
The Blackphone, which went on sale this week for $629, is billed as the first smartphone built solely with privacy and security in mind. It is definitely more secure than your average phone, but comes with trade-offs that most consumers might not need or enjoy. It’s probably best for reporters, dissidents and companies concerned with corporate security.
British intelligence agency, the Government Communications Headquarters (GCHQ), appears to be able to intercept most functions of Microsoft's Skype voice and messaging application, according to documents leaked by Edward Snowden.
Published by The Intercept, the documents state that the GHCQ's Joint Threat Research Intelligence Group (JTRIG) has made it possible for government agencies to surveil Skype communications in real-time without users of the application being aware of it taking place.