Skip to main content

Privacy

The Sun warns thousands of readers exposed by data breach

posted onAugust 2, 2011
by l33tdawg

Britain's best-selling newspaper, The Sun, has warned that thousands of people who participated in competitions on its website might have had their personal information stolen.

Names, postal addresses, telephone numbers, dates of birth and email addresses are believed to be amongst the stolen information.

An Analysis of Anonymity in the Bitcoin System

posted onJuly 25, 2011
by l33tdawg

Anonymity is not a prominent design goal of Bitcoin. However, Bitcoin is often referred to as being anonymous. We have performed a passive analysis of anonymity in the Bitcoin system using publicly available data and tools from network analysis. The results show that the actions of many users are far from anonymous. We note that several centralized services, e.g. exchanges, mixers and wallet services, have access to even more information should they wish to piece together users' activity.

Who's Tracking Your Cell Phone?

posted onJuly 25, 2011
by l33tdawg

Is your cell phone being tracked? The odds are quite good there's a spy in your pocket. The only real question is, who's doing it?

Earlier this week Wired's Spencer Ackerman profiled what he calls the "Keyzer Soze" of geo-location tracking, a company called TruePosition. TP uses cell tower triangulation to locate the geo position of any cell phone within 50 meters.

Personal cloud solutions--own your data

posted onJuly 24, 2011
by l33tdawg

In the past I’ve written about the cloud space; the benefits, and the dangers. Recently I went to a family reunion, and recognized a great desire for everyone to stay in touch, and share family information. Photos, documents, old home movies. I ended up configuring a website for the family, containing a wiki, blogs, forums, galleries, event calendars and mailing lists.

All of this is contained within an environment called TikiWiki, and excellent, configurable all-purpose wiki-based website that can be as simple or as complex as you need it to be.

Lawyers Find Cheaper Way To Identify BitTorrent Users

posted onJuly 24, 2011
by l33tdawg

Since 2010 close to 200,000 people in the U.S. have been sued for sharing movies via BitTorrent. For the copyright holders and lawyers these cases are already highly profitable. However, some are testing a new and potentially more effective tactic to pursue alleged copyright infringers which could signal the beginning of a new avalanche of settlements.

Every first year law student knows that copyright related court cases are exclusively a matter of federal law. You can’t bring a copyright suit in state court, period.

New French eID card to tackle identity theft

posted onJuly 22, 2011
by l33tdawg

Identity theft is a growing issue in many countries with 80,000 cases per year in France alone, according to the French Interior Ministry. For this reason the French National Assembly has decided to vote on the new law on identity protection.

The new French smart ID card is supposed to protect against identity theft and offers a new way to interact with administration services. However, to open a digital world for French citizens, the Government has to focus on smart card readers’ deployment.

Eyeball-Scanning iPhone Used by Cops to ID Suspects

posted onJuly 21, 2011
by l33tdawg

An iPhone-based device will soon let police forces identify within seconds a suspect based on facial features, fingerprints, or now the unique features of the human eye.

The blocky device, dubbed MORIS, attaches to the back of an Apple iPhone. To use the iris scan, a police officer holds the phone's camera about 6 inches from the suspect's face and snaps a close-up of the eye. The software analyzes over 200 unique features and, if the suspect's scan is already in a database, an algorithm matches them, and identifies the suspect.