• Nov 13, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

Welcome to the brave new world of workplace surveillance

Here on Privacy News Online, we write a lot about government surveillance and its impact on privacy. Sadly, constant spying has been normalized to such an extent that workplace surveillance is a thriving new business sector that startups and established companies are rushing to serve. For example, InterGuard promises “complete end-user auditing and control”, and … Continue reading “Welcome to the brave new world of workplace surveillance”

0

  • Oct 20, 2017
  • Glyn Moody
  • Governments, News, Privacy, Programming, Security,

Good news on the privacy front: no more EU demands for crypto backdoors

Governments all around the world hate encryption. Unless they are being incredibly cunning by pretending they can’t break strong encryption when they can, this seems to be because crypto really does keep messages and data safe from prying governmental eyes. Banning strong encryption is clearly a non-starter – even the most clueless politician knows by … Continue reading “Good news on the privacy front: no more EU demands for crypto backdoors”

0

  • Oct 18, 2017
  • Glyn Moody
  • News, Privacy, Programming,

Powerful and pervasive artificial intelligence is coming: now is the time to talk about its impact on privacy

Artificial intelligence (AI) is rather like the GNU/Linux desktop: every year is the one when it will finally take off. Indeed, this has been true for AI far longer than for the GNU/Linux desktop, since it is generally held that AI as a discipline was born back in 1956, whereas the GNU project only started … Continue reading “Powerful and pervasive artificial intelligence is coming: now is the time to talk about its impact on privacy”

0

  • Sep 25, 2017
  • Glyn Moody
  • Governments, Privacy, Programming, Security,

The race to save online privacy: what happens when quantum computers can break all our crypto?

Although many people are well aware of the many threats to their privacy, there is an underlying assumption that the use of strong encryption will always be available to mitigate those problems. Governments will doubtless continue to push for backdoors in encrypted Internet services like WhatsApp. But even if they do get their way by … Continue reading “The race to save online privacy: what happens when quantum computers can break all our crypto?”

1

  • Sep 21, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

Opening the black boxes: algorithmic bias and the need for accountability

Here on Privacy News Online we’ve written a number of stories about the privacy implications of DNA. There’s an important case going through the Californian courts at the moment that involves DNA and privacy, but whose ramifications go far beyond those issues: “In this case, a defendant was linked to a series of rapes by … Continue reading “Opening the black boxes: algorithmic bias and the need for accountability”

1

  • Aug 31, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

Even encrypted data streams from the Internet of Things are leaking sensitive information; here’s what we can do

As the Internet of Things (IoT) begins to enter the mainstream, concerns about the impact such “smart” devices will have on users’ privacy are growing. Many of the problems are obvious, but so far largely anecdotal. That makes a new paper from four researchers at Princeton University particularly valuable, because they analyze in detail how … Continue reading “Even encrypted data streams from the Internet of Things are leaking sensitive information; here’s what we can do”

2

  • Aug 29, 2017
  • Glyn Moody
  • BitTorrent, Privacy, Programming, Security,

Is this the key to foiling phishing attacks? Spoiler alert: probably

As readers of this blog know, VPNs are a great way to protect your privacy and security. But they address only some of the online threats we all face every day. Another important class of problems are caused by attacks that lead to accounts being taken over, identities being appropriated, data theft and financial losses. … Continue reading “Is this the key to foiling phishing attacks? Spoiler alert: probably”

2

  • Jul 9, 2017
  • Glyn Moody
  • Copyright, News, Programming, Security,

Encrypted Media Extensions: Copyright, DRM and the end of the open Web

The World Wide Web Consortium (W3C), which sets standards for the Web, has released what it calls a “disposition of comments“, designed to address objections to the controversial Encrypted Media Extensions (EME). EME is officially “a common API that may be used to discover, select and interact with content encryption systems”. In practice, for the … Continue reading “Encrypted Media Extensions: Copyright, DRM and the end of the open Web”

3

  • May 11, 2017
  • Caleb Chen
  • Networking, Privacy, Programming, Security,

OpenVPN 2.4 Evaluation Summary and Report

Contents 1 Executive Summary 2 Introduction 2.1 Scope 2.2 Approach 2.3 Classification and Severity Rating 3 Findings 3.1 Summary of Findings 3.2 Static Analysis Results 3.3 Dynamic Analysis Results 3.4 Detailed Findings 3.4.1 OVPN-01: Sensitive authentication token not wiped on certain TLS auth errors 3.4.2 OVPN-02: Potentially flawed TLS control channel encryption 3.4.3 OVPN-03: Insecure … Continue reading “OpenVPN 2.4 Evaluation Summary and Report”

0