Linux Privacy - Page 19
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
When ex-government contractor Edward Snowden exposed the NSA
Yesterday afternoon, Ars Technica published a story reporting two possible logs of Heartbleed attacks occurring in the wild, months before Monday's public disclosure of the vulnerability. It would be very bad news if these stories were true, indicating that blackhats and/or intelligence agencies may have had a long period when they knew about the attack and could use it at their leisure.
The U.S. National Security Agency has hacked into Huawei Technologies servers, spied on communications of company executives and collected information to plant so-called backdoors on equipment from the Chinese networking manufacturer, according to reports published over the weekend.
Spying by the NSA, its British counterpart, the GCHQ, and other organizations pushed Google to expand encryption, but protecting searches still falls short of encrypting other important and widely used services like Gmail. However, Google's decision to encrypt searches is a good start, said Charles King, principal analyst with Pund-It.
The secret Foreign Intelligence Surveillance Court has ruled against a U.S. government request that it be allowed to hold telephone metadata beyond the current five-year limit as it may be required as evidence in civil lawsuits that question the data collection.
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites? It
While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire e-mail database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of e-mail in unrelated investigations.
A report Thursday by the Privacy and Civil Liberties Oversight Board (PCLOB) calling the National Security Agency's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
When mass political protests erupted throughout Brazil in June, Miguel Freitas did what countless others did: He followed the news on Twitter. Tweets revealed information he couldn
U.S. Senator Bernie Sanders sent a letter to the NSA on Friday asking, "Has the NSA spied, or is the NSA currently spying, on members of Congress or other American elected officials?" The only acceptable answer ought to be, "No, of course not."
More security researchers are boycotting next month's US edition of the RSA Conference in protest against an alleged "secret deal" the company is said to have struck with the National Security Agency.
Nearly seven months after journalist and privacy activist Glenn Greenwald publicized Edward Snowden
"Talking to Vula" is the story of a 1980s secret communications channel between black South African leaders and others living in exile in the UK. The system used encrypted text encoded into DTMF "touch tones" and transmitted from pay phones.
Edward Snowden has written an extensive open letter to the people of Brazil to discuss his findings and ultimately seek asylum.
NSA whistleblower Edward Snowden is getting coal for Christmas. That
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.
Critics of the U.S. National Security Agency's bulk collection of U.S. residents' telephone records should offer a better way to track terrorists and protect the country against attacks, the agency's director said Wednesday.