Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Cell Phones

New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls

The attack doesn’t exploit any flaw in the Voice over LTE (VoLTE) protocol; instead, it leverages weak implementation of the LTE mobile network by most telecommunication providers in practice, allowing an attacker to eavesdrop on the encrypted phone calls made by targeted victims. Details may be found in an article by Swati Khandelwal in The Hacker News web site at: https://thehackernews.com/2020/08/a-team-of-academic-researcherswho.html. The fix? Turn your cell phone off until your […]

Continue Reading →

Over a Billion Android Devices Are at Risk of Data Theft

A billion or more Android devices are vulnerable to hacks that can turn them into spying tools by exploiting more than 400 vulnerabilities in Qualcomm’s Snapdragon chip, researchers reported this week. The vulnerabilities can be exploited when a target downloads a video or other content that’s rendered by the chip. Targets can also be attacked by installing malicious apps that require no permissions at all. From there, attackers can monitor […]

Continue Reading →

How to Get the Most Out of Signal and Encrypted Chat

Of all the popular text messaging, voice conversation, and 2-way video services available today, Signal is probably the one that offers the best privacy, using end-to-end encryption on all information sent and received. Assuming you are interested in such privacy concerns, you will want to read Brian Barrett’s article, How to Get the Most Out of Signal and Encrypted Chat, in the Wired web site at: https://www.wired.com/story/signal-tips-private-messaging-encryption/.

Continue Reading →

Status Wants to Be the World’s Most Private Instant Messaging App

I haven’t had a chance to try Status just yet. However, if the product lives up to its specifications, this could become the only text messaging app you would ever want to use: Fully encrypted end-to-end No central server; all text messages travel directly from the originanting cell phone to the receiving cell phone with no temporary stops on any server in between No telephone numbers! Spies, hackers, credit card […]

Continue Reading →

FCC Confirms Wireless Carriers Broke Federal Law by Selling Location Data

At the center of the investigation are all four major U.S. carriers: AT&T, Verizon, Sprint, and T-Mobile. It is unclear at this time which groups will be penalized, and what that penalty will look like. Further documentation on the specifics of the violation is forthcoming. Details may be found in an article by Alison Foreman on the Mashable web site at: https://mashable.com/article/fcc-concludes-location-data-investigation/.

Continue Reading →

A Russian Company Says it can Extract Email Addresses and Passwords from Locked iPhones

Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode. The tool takes advantage of a vulnerability, known as the Checkm8 exploit, in certain iPhone and iPad models. The Elcomsoft iOS Forensic Toolkit sells for $1,495. Details may be found at https://mashable.com/article/iphone-data-extraction-locked-bfu-mode/.

Continue Reading →

3 Reasons To Use a Digital Wallet

“Paying with just a wave of your phone can be more secure than a physical card.” Key takeaways: Mobile payments are safe—and they are faster and easier than paying cash or using a card. You can connect a debit card or a credit card to the digital wallet app in your phone to make mobile payments. If you have a smartphone, you can use that to pay for things with […]

Continue Reading →

Volla Phone – a Linux-Based Smartphone to Keep You Completely Anonymous

A new Linux-based smartphone dubbed Volla Phone is listed on Kickstarter. The phone reportedly rethinks the entire approach to how we use our smartphones and all the features of the Volla Phone are based around protecting user anonymity. Here is a quote from the Volla Phone information on KickStarter: “Today’s smart phones know what we do and when. The deep integration of cloud services with Google Play in mobile operating […]

Continue Reading →