Citizen Lab has analyzed how censorship works in the Chinese chat app WeChat: Key Findings: Keyword filtering on WeChat is only enabled for users with accounts registered to mainland China phone numbers, and persists even if these users later link the account to an International number. Keyword censorship is no longer transparent. In the past, … Read More “Analyzing WeChat” »
Author: infossl
Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity. Powered by WPeMatico
You can rent a 400,000-computer Murai botnet and DDoS anyone you like. BoingBoing post. Slashdot thread. Powered by WPeMatico
It’s really bad. The ticket machines were hacked. Over the next couple of years, I believe we are going to see the downside of our headlong rush to put everything on the Internet. Slashdot thread. Powered by WPeMatico
Here’s a nice picture of one of the few known poisonous squids. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Was the 2016 presidential election hacked? It’s hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting machines were tampered with in three states that Donald Trump won this month: Wisconsin, Michigan and Pennsylvania. The researchers behind these reports include voting rights lawyer John … Read More “Hacking and the 2016 Presidential Election” »
Susan Landau has an excellent essay on why it’s more important than ever to have backdoor-free encryption on our computer and communications systems. Protecting the privacy of speech is crucial for preserving our democracy. We live at a time when tracking an individual — a journalist, a member of the political opposition, a citizen engaged … Read More “Securing Communications in a Trump Administration” »
Surprising no one who has been following this sort of thing, headphones can be used as microphones. Powered by WPeMatico
Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting this. Powered by WPeMatico
Interesting paper. John Scott-Railton on securing the high-risk user. Powered by WPeMatico