Pages Navigation Menu

SHOWFUN - Show & Fun & More!

FBI’s iPhone hack limited to the iPhone 5c, earlier devices

Posted on 10/30 23:02 in Shows | 0

While the FBI may have found a workaround in this case, the solution is an imperfect one, according to FBI Director James Comey.” The fact that the technique doesn’t work on devices later than the iPhone 5c suggests Apple’s implementation of ARM’s TrustZone technology (Apple calls its specific flavor Secure Enclave) is blocking the FBI’s hacking attempts on more modern devices.

Read More

Supreme Court grants FBI decentralized warrants, power to hack suspects anywhere

Posted on 12/09 12:15 in Shows | 0

On Thursday, the US Supreme Court passed a proposed change to Rule 41 of the Federal Rules for Criminal Procedure, one of the main bodies of law that governs the powers and behavior of the FBI.The new version of Rule 41, approved on Thursday, removes the requirement in cases where the suspect’s location cannot be realistically obtained.

Read More

NIST report says we urgently need more work in post-quantum cryptography

Posted on 05/10 16:46 in Shows | 0

The study of how to keep encrypting messages even in the face of exponentially increased computing power is called “post-quantum cryptography,” or “quantum-resistant cryptography,” and the reality is that nobody knows quite how urgent it really is.NIST is planning a post-quantum competition to try to stimulate more work in the area.

Read More

Warrantless spying on Americans more than doubled since 2013: oversight report

Posted on 05/10 18:18 in Shows | 0

The problem is the so-called “incidental” collection of Americans’ communications, which puts them in the NSA’s vast “702 database.” Once a US person’s personal information is in the database, it’s as searchable as anything else that was collected legitimately.

Read More

Apple opens iPhone kernel to improve performance without reducing security

Posted on 06/24 16:15 in Shows | 0

For the last few years, Apple has made security and privacy cornerstones of its iOS development process.While that case ended without resolving the core question at hand, the FBI dropped the case because it claimed it now had access to the data it wanted from the iPhone — even without Apple’s help.

Read More

Computer coughs up passwords, encryption keys through its cooling fans

Posted on 06/29 21:16 in Shows | 0

(The term pre-dates wireless internet, and a Wi-Fi-connected computer is not air-gapped, despite the literal gap of air around it.) So how do you hack your way into an air-gapped computer?

Read More

Microsoft leaks Secure Boot credentials, demonstrates why backdoor ‘golden keys’ can’t work

Posted on 08/11 14:28 in Shows | 0

The basic Secure Boot system can also be modified through the use of Secure Boot policies — special sets of rules that load during the boot process and modify it in some fashion.Now, what happens if you tell everyone to make a “secure golden key” system?

Read More

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security

Posted on 09/13 16:55 in Shows | 0

Nearly four years ago, the Electronic Privacy Information Center released FBI documents discussing a controversial surveillance technique.Both federal and local authorities often have access to cell phone surveillance hardware, dubbed Stingrays (Harris Corp.

Read More

Here come the appeals: White House report attacks modern forensic science

Posted on 09/22 16:41 in Shows | 0

The FBI said that it “disagrees with many” of the report’s claims that it “makes broad, unsupported assertions regarding science and forensic science practice.” This will be an uphill battle for those who agree with this White House report.

Read More

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA

Posted on 10/04 20:55 in Shows | 0

One of the more interesting things we learned in 2013 was that certain companies had fought the NSA tooth and nail — and Yahoo had led the charge.When its challenge failed, it appealed the case to the Foreign Intelligence Surveillance Court of Review.

Read More

Feds demand fingerprints from all home residents to unlock their phones

Posted on 10/17 20:23 in Shows | 0

But it offers absolutely no protection against the government, and can be compelled from suspects without raising any Fifth Amendment concerns.This was driven home with a vengeance over the weekend, when a May 2016 warrant application surfaced.

Read More

Ransomware shuts down San Fran transit, but the hacker just got hacked

Posted on 11/30 19:13 in Shows | 0

This week, the San Fransisco transit system experienced the latest in a growing trend of “ransomware” attacks against important pieces of infrastructure.There is some good news, though: as reported by Forbes, it seems that the hacker has had his or her own email address infiltrated in retaliation.

Read More

Dark patterns and the dark web: FBI joins Rule 41 in setting troubling precedent

Posted on 12/02 15:47 in Shows | 0

The FBI seized the physical server hardware under a previous warrant, but that wasn’t enough to get the people involved.Rule 41 is the latest in a long series of state surveillance encroachments, although onto what is a topic of some debate.

Read More