Archive for Privacy

Australia to Push for Greater Powers on Encrypted Messaging at “Five Eyes” Meeting

Posted in Commentary with tags on June 26, 2017 by itnerd

There’s a group of five nations that collaborate on collecting and sharing intelligence. Known as the “Five Eyes” they are the U.S., the U.K, Canada, Australia, and New Zealand. Australia at a meeting this week of the “Five Eyes” will push for greater international powers to thwart the use of encrypted messaging services by terrorists and criminals. Here’s what Reuters had to say on this:

Australia has made it clear it wants tech companies to do much more to give intelligence and law enforcement agencies access to encrypted communications.

“I will raise the need to address ongoing challenges posed by terrorists and criminals using encryption,” Australian Attorney General Senator Brandis said in a joint statement.

“These discussions will focus on the need to cooperate with service providers to ensure reasonable assistance is provided to law enforcement and security agencies.”

While I fully support any and all reasonable methods for law enforcement to stop “evil doers” from doing “evil things,” this isn’t going to accomplish that goal. Simply put, those who want to inflict chaos and destruction on the world will move to unregulated open source solutions with end to end encryption which will put them out of the reach of law enforcement. Thus the only thing that will be accomplished is the weakening of security consumer devices and software that “evil doers” will move away from to stay out of the reach of the good guys. Do I have a better idea? Short of putting some sort of “backdoor” into every device and software that has encryption, no. But I do know a bad idea when I see it. And this qualifies as a bad idea.

Advertisements

Does Your Printer Spy On You? The EFF Can Help You Find Out….

Posted in Commentary with tags on June 12, 2017 by itnerd

Recently we’ve had the case of a woman named Reality Winner…. Yes, that is apparently her name…. being arrested for leaking sensitive info to The Intercept that the NSA had in its possession. She was apparently busted because the printers that she printed this sensitive info out from had microdots which were used to hunt her down. Now, you’re likely wondering what these microdots are and if the printer in your home or business does this or something similar. Well, the Electronic Frontier Foundation can help you find out. They’ve not only posted a document that lists printers known to do this, they’ve also got a document that explains this tracking tech. But the first document that I linked to does have this warning:

Some of the documents that we previously received through FOIA suggested that all major manufacturers of color laser printers entered a secret agreement with governments to ensure that the output of those printers is forensically traceable. Although we still don’t know if this is correct, or how subsequent generations of forensic tracking technologies might work, it is probably safest to assume that all modern color laser printers do include some form of tracking information that associates documents with the printer’s serial number.

Thus consider this to be a starting point. It will be interesting to see if any printer company fesses up to doing this now that it’s got a rather bright spotlight.

Canadian Connected Sex Toy Company Fingered For Data Mining Users Without Consent

Posted in Commentary with tags on March 14, 2017 by itnerd

Ottawa based connected sex toy company Standard Innovation who makes an apparently popular sex toy called WeVibe apparently did more than make the sex toy and the app for your phone that goes with it. It also apparently data mined users by collecting real-time data of their connected sex toys usage without the users knowledge. Clearly that’s more invasive than it should be. So it’s no surprise that when users found out about it they went to court and got a $3.75 million (CDN) settlement. The Financial Post has the intimate details:

Under the terms of the settlement, Standard Innovation Corp. has agreed to destroy the personal information it has collected from users of the vibrator and stop collecting such information from now on. The vibrator, known as the We-Vibe Rave, could be paired with a smartphone app to allow a partner to control it remotely.

About 300,000 customers purchased the vibrators, with about one-third of them using them with the app, according to the settlement agreement. App users are entitled to a share of a fund up to US$10,000 after expenses and fees, with anyone who purchased vibrator without using the app entitled to up to US$199.

The company won’t have to admit that they did anything wrong as part of this settlement.

My take on this is that in the era of the Internet of Things, you can fully expect that your data will be used in some way that you don’t expect it to. That includes what you do in your bedroom. Now the company is wrong for not telling users that they were collecting real time stats of their intimate activities. But part of me isn’t shocked by this at all as data is very valuable these days. Thus if this is the sort of thing that you’re into, because if it is there’s nothing wrong with that, you might want to keep the fact that you may not fully control the data that your activities generate in mind.

WikiLeaks Does Massive Data Dump On CIA Hacking Tools And Ops

Posted in Commentary with tags , on March 7, 2017 by itnerd

WikiLeaks today released documents that shed light on the CIA’s hacking tools and internal operations. What’s key about this is that absolutely no platform is safe from the CIA as documented by BetaNews:

WikiLeaks has unleashed a treasure trove of data to the internet, exposing information about the CIA’s arsenal of hacking tools. Code-named Vault 7, the first data is due to be released in serialized form, starting off with “Year Zero” as part one. A cache of over 8,500 documents and files has been made available via BitTorrent in an encrypted archive. The plan had been to release the password at 9:00am ET today, but when a scheduled online press conference and stream came “under attack” prior to this, the password was released early. Included in the “extraordinary” release are details of the zero day weapons used by the CIA to exploit iPhones, Android phones, Windows, and even Samsung TVs to listen in on people. Routers, Linux, macOS — nothing is safe. WikiLeaks explains how the “CIA’s hacking division” — or the Center for Cyber Intelligence (CCI) as it is officially known — has produced thousands of weaponized pieces of malware, Trojans, viruses and other tools. It’s a leak that’s essentially Snowden 2.0.

I take two things out of this data dump. First, nothing is secure. Absolutely nothing. That should scare you. Second, some of these tools that are now in the public domain, really bad people are going to get their hands on them. That should scare you even more.

It should be interesting to see how this is explained by the US Government.

Spammers Have Internal Database Leak Onto The Web

Posted in Commentary with tags , on March 7, 2017 by itnerd

In an #EpicFail moment, notorious spammers River City Media (RCM) has exposed 1.37 billion email addresses after failing to password-protect a remote backup. This was discovered by Chris Vickery who is a security researcher at MacKeeper:

A cooperative team of investigators from the MacKeeper Security Research Center, CSOOnline, and Spamhaus came together in January after I stumbled upon a suspicious, yet publicly exposed, collection of files. Someone had forgotten to put a password on this repository and, as a result, one of the biggest spam empires is now falling.

Additional coverage can be seen over at CSOOnline.

The leaky files, it turns out, represent the backbone operations of a group calling themselves River City Media (RCM). Led by known spammers Alvin Slocombe and Matt Ferris, RCM masquerades as a legitimate marketing firm while, per their own documentation, being responsible for up to a billion daily email sends.

Think about that for a second. How can a group of about a dozen people be responsible for one billion emails sent in one day? The answer is a lot of automation, years of research, and fair bit of illegal hacking techniques. 

I say illegal hacking due to the presence of scripts and logs enumerating the groups’ many missions to probe and exploit vulnerable mail servers.

The game that these spammers were playing goes something like this. RCM gathered its mammoth database from people requesting credit checks, entering prize giveaways and sweepstakes and applying for education opportunities, along with techniques like co-registration in which a person’s info is shared with unnamed affiliates after clicking “submit” or “I agree” on a website. Thus, there’s a very good chance that your e-mail address is likely in this leak.

The good news is that RCM’s spamming days are over. Spamhaus has blacklisted their entire operation. The bad news is that this database has a ton of personally identifiable info. Who knows what hands that is going to end up in.

Viral Chinese Selfie App Meitu Phones Home

Posted in Commentary with tags , on January 20, 2017 by itnerd

The Meitu selfie app that is the app to have on your phone at the moment aggressively your personal data researchers say. Said researchers have discovered that the app harvests information about the devices on which it runs, includes invasive advertising tracking features and is just badly coded overall:

Meitu, a Chinese production, includes in its code up to three checks to determine if an iPhone handset is jailbroken, according to respected forensics man Jonathan Zdziarski, a function to grab mobile provider information, and various analytics capabilities. Zdziarski says the app also appears to build a unique device profile based in part on a handset’s MAC address. “Meitu is a throw-together of multiple analytics and marketing/ad tracking packages, with something cute to get people to use it,” Zdziarski says. Unique phone IMEI numbers are shipped to dozens of Chinese servers, malware researcher FourOctets found.

Well, that’s pretty bad. My advice is to pull it from your phone. Like right now. Clearly this is an app that cannot be trusted. Oh by the way, this is a perfect example as to why you should never jailbreak your phone because the fact that the app checks for that is really really bad.

 

“The Man” Is Looking At Your Social Media Posts

Posted in Commentary with tags , on January 19, 2017 by itnerd

I want to bring you two stories from the CBC to highlight the fact that when you post to social media, nothing that you post is private. Ever.

Let’s start with this story where the Canada Revenue Agency is apparently monitoring social media to figure out if Canadian Taxpayers are cheating on their taxes. Presumably by people tweeting out pictures of their new car or boat that was bought with money that they owe to the taxman. Here’s what the Canada Revenue Agency has to say on this:

“The CRA does practice risk-based compliance, so for taxpayers identified as high risk, any relevant, publicly available information relating to the specific risk-based factors for the taxpayer may be consulted as part of our fact-gathering processes,” said spokesperson David Walters.

Among those considered high risk are wealthy Canadians with offshore bank accounts, said Jean-François Ruel, director of CRA’s Strategy and Integration Branch.

“If we go with high-risk, high-wealth individuals that do offshore [banking], then we would look at all information that is public for compliance action.”

But here’s the problem according to someone who spends all day every day looking at this stuff:

However, David Christopher, of the advocacy group Open Media, said his organization opposes government agencies monitoring what Canadians are saying on social media.

“When Canadians post something on Facebook, they believe that they are sharing that with their friends and with their family. They don’t believe that they are sharing that with some government bureaucrat in Ottawa,” he said.

“Unfortunately, Facebook’s privacy settings are notoriously complex and many people might think that they are posting something to their friends and it ends up getting shared with the whole world.”

My thoughts on this are that while this is problematic, it doesn’t cross the line into a place where it is offensive for reasons I will get to in a minute. But having said that, let’s take this discussion to the next level. This CBC story details a London Ontario based company who created software that violated Twitters terms of service to mine data on behalf of law enforcement:

A London, Ont., data mining company has been banned from Twitter and is being reviewed by Facebook for selling surveillance software to North American police services to monitor people at Black Lives Matter events and other public protests.

Media Sonar lost its Twitter privileges in October after it was revealed that the firm was in violation of the social media giant’s privacy policies.

“If Media Sonar creates other API keys [to connect with Twitter], we will terminate those as well and take further action as appropriate,” wrote Twitter spokesperson Nu Wexler. 

Public documents obtained through access to information requests show the company billed itself to police forces as the “only vendor that allows public safety agencies to view social accounts covertly.”

It also provided at least one police force in California with a list of keywords and hashtags, including #blacklivesmatter and #Weorganize, to help with “proactive policing.” 

Now this clearly crosses the line and is clearly offensive. Unlike the Canada Revenue Agency who walked up to the line because they were going after people that they would be investigating anyway through other means, Media Sonar went after anyone and turned that info over to the cops if they said the wrong thing on Twitter. Thus anyone could get roped up in this company’s dragnet. That’s a #EpicFail because while you shouldn’t expect to have privacy in a public forum like social media, you shouldn’t expect to be spied on either if you’ve done nothing wrong. Hopefully this award winning company loses some of those awards and gets the message that this is a far from acceptable as you can get.

It should also send a clear message to users of Facebook, Twitter, and other social media platforms. You are being watched. It may not be right, but it is the case. Govern yourself accordingly.