The US government is attempting to force Apple to backdoor its Iphone security, congress is considering mandatory backdoors for all secure technology, and FBI director James Comey insists that this will work, because there's no way that America's enemies might just switch over to using technology produced in other countries without such mandates.
Afaaq Electronic Foundation, ISIS's leading tech-operations and advice channel, has proved him wrong. All last month, jihadi media has has been promoting crypto tools from "Finland, Romania, America, France, the Czech Republic, Canada, Panama, Germany, Switzerland, Saint Kitts and Nevis." Only one of those countries (America) is considering mandatory backdoors (though Canada's terrible Bill C-51, passed with the backing of now-PM Justin Trudeau, comes pretty damned close). The AEF's Telegram channel recommended tools from Switzerland and Germany.
In the Tuesday hearing before the House Judiciary Committee, Apple's top lawyer, Bruce Sewell, argued that free, open-source, foreign encryption solutions are popular and would benefit from any law weakening American encryption—an argument often repeated by technologists and other opponents of anti-encryption legislation.
“Couldn't foreign companies and bad actors generally do that, whatever we said?” Rep. Jerrold Nadler (D-N.Y.) asked Comey.
Comey was skeptical that many people would ditch American devices and adopt foreign products due to encryption and privacy issues.
ISIS turns to foreign encryption products as Apple–FBI fight rages in U.S.
[Patrick Howell O'Neill/Daily Dot]
Investigative tech journalist Joseph Menn's (previously) next book is a history of the Cult of the Dead Cow (previously) the legendary hacker/prankster group that is considered to be "America's oldest hacking group."
Using software-defined radios, researchers from Trend Micro were able to reverse-engineer the commands used to control massive industrial machines, including cranes, excavators and scrapers; most of these commands were unencrypted, but even the encrypted systems were vulnerable to "replay attacks" that allowed the researchers to bypass the encryption.
"Letterlocking" is a term coined by MIT Libraries conservator Jana Dambrogio after she discovered a trove of letters while spelunking in the conservation lab of the Vatican Secret Archives; the letters had been ingeniously folded and sealed so that they couldn't be opened and re-closed without revealing that they had been read. Some even contained […]
Big companies want automation on a big scale. Doing that means diving into the tricky world of machine learning and data science. And no matter what platform you’ll be implementing it on, you can learn how with the Machine Learning & Data Science Certification Training Bundle. In 48 hours and through eight courses, this bundle […]
Big systems need tight security – and the experts who can implement it. Cisco Networking Systems are the go-to providers for network infrastructure, but maintaining it takes a lot of up-to-date knowledge. If you want that knowledge right from the source, there’s an online course that can get you certified painlessly: The Foundational Cisco CCNA […]
Computer slowing down? There are a ton of reasons why that might be, especially if your unit has a few years on it. Junk files and programs can accumulate over time, some even left over from otherwise uninstalled software. This virtual debris can slow your PC down dramatically, but there’s a surprisingly quick fix. Lauded […]