A newly released document from the Snowden trove is a five-year "cyber-threat" forecast that stresses the importance of strong civilian use of cyrptography as crucial to protecting private data, especially the industrial secrets sought by foreign spies.
The publication of this comes as both the US and UK governments have attacked the civilian use of strong crypto, with David Cameron calling for an end to the use of effective crypto in the UK and asking the USG to assist him in this project, while the Attorney General of New York and the head of the FBI have made similar calls.
The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded.
Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
Secret US cybersecurity report: encryption vital to protect private data [James Ball/The Guardian]
On the one hand, if you let an untrusted stranger install hardware in your electronic device, you’re opening yourself up to all kinds of potential mischief; on the other hand, an estimated one in five smartphones has a cracked screen and the easiest, most efficient and cheapest way to get that fixed is to go […]
Sen. John Cornyn [R-TX, @JohnCornyn, +1 202-224-2934] introduced the Building America’s Trust Act as a “long-term border security and interior enforcement strategy” but refused to release the bill’s text, which has now leaked.
A group of researchers from Oxford and TU Berlin will present their paper, White-Stingray: Evaluating IMSI Catchers Detection Applications at the Usenix Workshop on Offensive Technologies, demonstrating countermeasures that Stingray vendors could use to beat Stingrays and other “cell-site simulators” (AKA IMSI catchers).
Toaster ovens are the perfect appliance for small things like toasted sandwiches and roasted garlic (try it!), but anything more involved usually requires a full-sized conventional oven.However, despite its small size, the Wolfgang Puck Pressure Oven can handle anything from baked pastries to broiled meats. This kitchen appliance has a minimal countertop footprint, and cooks […]
The Pry.Me Bottle Opener holds tens of thousands of times its own weight, and you can pick one up now from the Boing Boing Store.This remarkable keychain is considerably smaller than any of your keys, but don’t let that fool you: it can easily open any bottle, and could even tow a trailer full of […]
Guaranteeing your privacy online goes way beyond checking the “Do Not Track” option in your browser’s settings. To ensure that your internet activity is totally hidden from Internet Service Providers, advertisers, and other prying eyes, take a look at Windscribe’s VPN protection. It usually costs $7.50 per month, but you can get a 3-year subscription […]