Ronald Deibert from the University of Toronto's Citizenlab (previously) sez, "The Citizen Lab at the Munk School of Global Affairs, University of Toronto has a job posting for a security researcher/malware analyst.
• One of the largest spy-for-hire operations ever exposed
“Researchers conclude that Zoom uses non-industry-standard cryptographic techniques with identifiable weaknesses and is not suitable for sensitive communications.”
The NSO Group (previously) is an Israeli spyware company that sells tools to autocratic states that are used to spy on democratic opposition movements, journalists, and so on (the company's tools were used by the Saudi government to spy on Jamal Khashoggi in the runup to his kidnap and grisly murder).
This week, Facebook filed suit against the NSO Group, a cyber-arms dealer that supplies some of the world's most oppressive regimes with spying tools used to attack dissidents, journalists, human rights activists, and democratic opposition figures; Facebook alleges that NSO Group was behind more than 1,400 attacks on Whatsapp users.
[Addendum 2/20/2020: Following a legal complaint, the Guardian removed its article of 14 June 2019 and apologised to Mrs Peel. We are happy to clarify that Yana Peel is not, and was not, personally involved in the operation or decisions of the regulated Novalpina Capital investment fund, which is managed by her husband Stephen Peel, and others. — Read the rest
Citizen Lab (previously) is one of the world's top research institutions documenting cyber-attacks against citizen groups, human rights activists, journalists and others; ten years ago, they made their reputation by breaking a giant story about "Ghostnet," malicious software that the Chinese state used to convert the computers of the world's Tibetan embassies into spying devices.
Citizen Lab has expanded its analysis of how censorship and filtering work on Chinese social media (previously). In (Can't) Picture This 2 An Analysis of WeChat's Realtime Image Filtering in Chats , researchers probe and document how Wechat complies with Chinese state censorship policies in private chats.
Stalkerware — spyware sold to people as a means of keeping tabs on their romantic partners, kids, employees, etc — is a dumpster fire of terrible security (compounded by absentee management), sleazy business practices, and gross marketing targeted at abusive men who want to spy on women.
The NSO Group is an Israeli firm that has long marketed itself as a "cyber warfare" company, selling mobile surveillance technology to governments that include notoriously corrupt human rights abusers. One of these is Mexico, where NSO spyware played a key role in targeting teachers and journalists, and missing students. — Read the rest
Citizen Lab (previously) is a world-renowned research group that specializes in deep, careful investigations into the nexus of state and private surveillance, outing everything from the Chinese spies who took over computers in Tibetan embassies around the world to the bizarre deployments of state-level cyberweapons against Mexicans who campaigned for limits on sugary sodas.
In All You Need is "Love": Evading Hate Speech Detection, a Finnish-Italian computer science research team describe their research on evading hate-speech detection algorithms; their work will be presented next month in Toronto at the ACM Workshop on Artificial Intelligence and Security.
Researchers from the University of Toronto's outstanding Citizen Lab (previously) have published their latest research on the notorious and prolific Israeli cyber-arms-dealer The NSO Group (previously), one of the world's go-to suppliers for tools used by despots to spy on dissidents and opposition figures, often as a prelude to their imprisonment, torture and murder.
As the European Parliament prepares for tomorrow's vote on the new Copyright Directive with its provisions requiring mass-scale filtering of all public communications to check for copyright infringement (Article 13) and its provisions requiring paid permission to link to the news if you include as little as two words from the headline in your link text (Article 11), a dismaying number of "creators groups" are supporting it, telling their members that this will be good for them and their flagging financial fortunes.
Researchers from the University of Toronto's Citizen Lab (previously) have published an extensive report on the image filtering systems used by Chinese messaging giant Wechat to prevent the posting of banned political messages and other "sensitive" topics that are censored in China.
Canada's two leading digital rights groups, CIPPIC (previously) and Citizen Lab (previously) have issued a joint report called Shining a Light on the Encryption Debate: A Canadian Field Guide , and every Canadian should read it.
Back in 2015, Canada's failing, doomed Conservative government introduced Bill C-51, a far-reaching mass surveillance bill that read like PATRIOT Act fanfic; Justin Trudeau, leader of what was then a minority opposition party, whipped his MPs to vote for it, allowing it to pass, and cynically admitting that he was only turning this into law because he didn't want to give the Conservatives a rhetorical stick to beat him with in the next election — he promised that once he was Prime Minister, he'd fix it.
The University of Toronto's Citizen Lab (previously) is one of the most effective, most trustworthy expert groups when it comes to investigating the abuse of computers to effect surveillance and sabotage, so the launch of Security Planner, the Lab's peer-reviewed tool that guides you through the creation of a personal security plan, is a game-changing event.
Researchers from the University of Toronto's amazing Citizen Lab (previously) have published a new report detailing the latest tactics from the autocratic government of Ethiopia, "the world's first turnkey surveillance state" whose human rights abuses have been entirely enabled with software and expertise purchased on the open market, largely from companies in western countries like Finfisher and Hacking Team.
In July 2016, Andrew "bunnie" Huang and Edward Snowden presented their research on journalist-friendly mobile surveillance resistance at the first MIT Media Lab Forbidden Research conference; a little over a year later, they have published an extensive scholarly paper laying out the problems of detecting and interdicting malware in a mobile device, and presenting a gorgeously engineered hardware overlay that can be installed in an Iphone to physically monitor the networking components and report on their activity via a screen on a slim external case.