Even a Golden Key Can Be Stolen: Inside Apple’s Encryption Decision
Since Apple first announced three weeks ago that it was expanding the scope of what types of data would be encrypted on devices running iOS 8, law enforcement has been ablaze with indignation. When Google followed suit and announced that Android L would also come with encryption on by default, it only added fuel to…
You Are Not Who Your Browser History Says You Are
I’m a 26 year-old from Montreal, a 27 year-old in Vegas, and a retiree with a penchant for photography. Mostly I’m unemployed. I’m a gamer, a fashionista, an occasional beer drinker, and a dog owner. I graduated from a community college, I like to travel, and I wear glasses. Also, I might be Jewish. Last…
U.S. Police Are Giving Away Keylogging Software as a ‘Safety’ Measure
For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the “first step” in protecting their children online. Police chiefs, sheriffs, and district attorneys have handed out hundreds of thousands of copies of the disc to families for free at schools, libraries, and community events, usually as a…
A Beginner’s Guide to Cyberwarfare
Simply put, cyberwarfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage. That’s neat—but also full of buzzwords. Let’s break it down even further. THE BASICS Strategic or Tactical Resources This is a bit of military mumbo-jumbo that basically means “things that…