A newly released document from the Snowden trove is a five-year "cyber-threat" forecast that stresses the importance of strong civilian use of cyrptography as crucial to protecting private data, especially the industrial secrets sought by foreign spies.
The publication of this comes as both the US and UK governments have attacked the civilian use of strong crypto, with David Cameron calling for an end to the use of effective crypto in the UK and asking the USG to assist him in this project, while the Attorney General of New York and the head of the FBI have made similar calls.
The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded.
Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
Secret US cybersecurity report: encryption vital to protect private data [James Ball/The Guardian]
In 2018, Steve Bannon teamed up with a group called Catholicvote to acquire mobile phone location-tracking data to identify people in Iowa who'd visited a Catholic church and target them with political ads.
For years, libraries across America have paid to subscribe to lynda.com for online learning content; four years ago, lynda.com became a division of Linkedin, and this year, the company has informed libraries that they're migrating all lynda.com users to Linkedin Learning, which would be fine, except Linkedin only allows you to access Linkedin Learning if […]
The next version of Chrome will patch a bug that lets websites detect users who are in incognito mode by by probing the Filesystem API; they've also pledged to seek out and block any other vulnerabilities that will let servers detect users in incognito mode.
If you suffer from sleep disorders, there are a number of methods out there to mitigate them: Ambient noisemakers, relaxation tapes, sleep masks, you name it. One thing that doesn’t get tried is headphones, for good reason. Even the smallest earbuds are liable to wake you up if you roll over the wrong way. Now […]
Looking to upgrade that old laptop or tablet? Holiday sales may be way on the horizon, but there’s an even better way to get like-new tech for a steal. Here are 10 of our favorite deals on personal computers and gaming gear – refurbished, renewed or brand new. Acer Touchscreen 11′ Chromebook 16GB (Certified Refurbished) […]
Vape technology has been around long enough that vapers are starting to get picky about their gear. Luckily, so are we. From disposable models to cutting-edge touchscreen atomizers, there’s a vaporizer in this roundup to suit every taste. Hera 2 – World’s Most Advanced Dual-Use Vaporizer Choose between dry herb or oil extraction modes – […]