US Deputy Attorney General Just Called for ‘Responsible Encryption.’ Don’t Fall for It.

From an article by Zack Whittaker in the ZDNet web site:

“You only need to look at the past year of data breaches, leaks, and exposures to see that some of the most precious national security and technological secrets in the US aren’t safe.

“During a speech at the US Naval Academy on Tuesday, deputy US attorney general Rod Rosenstein, one of the most senior government lawyers, called on tech giants to embrace ‘responsible encryption.'”

Perhaps the most important statement of the article is:

Continue reading

Security, Privacy Focused Librem 5 Linux Smartphone Successfully Crowdfunded

Purism’s Librem 5 security and privacy-focused smartphone was successfully crowdfunded recently when it reached and even passed its goal of $1.5 million, with 13 days left. Librem 5 wants to be an open source and truly free mobile phone designed with security and privacy in mind, powered by a GNU/Linux operating system based on Debian GNU/Linux and running only Open Source software apps on top of a popular desktop environment like KDE Plasma Mobile or GNOME Shell. Featuring a 5-inch screen, Librem 5 is compatible with 2G, 3G, 4G, GSM, UMTS, and LTE mobile networks. Under the hood, it uses an i.MX 6 or i.MX 8 processor with separate baseband modem to offer you the protection you need in today’s communication challenges, where you’re being monitored by lots of government agencies.

Continue reading

Every Single Yahoo Account Was Hacked – 3 Billion In All

Really? Yahoo has (or had) 3 BILLION customers? That seems strange. But in any case…

An epic and historic data breach at Yahoo in August 2013 affected every single customer account that existed at the time, Yahoo parent company Verizon said on Tuesday. Yes, that’s a delay iof 4 years before telling customers that their accounts and passwords had been hacked.

That’s three billion accounts, including email, Tumblr, Fantasy and Flickr — or three times as many as the company initially reported in 2016.

Continue reading

Google Chrome Most Resilient Against Attacks, Researchers Find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks.

The researchers assessed these barriers, and concluded that:

  • Chrome is the most resilient against attacks due to a tight lockdown of components, separation of duties, and greater identifiable vendor efforts for automated vulnerability discovery.
  • The security level of Internet Explorer is decreased due to a weakened sandbox (Protected Mode).
    Microsoft Edge is more hardened against exploitation than Internet Explorer due to the stronger sandboxing and the absence of dangerous legacy technologies.
  • Chrome supports more modern web technologies that might increase attack surface such as WebAssembly and HTML5 features.
  • Reaching dangerous legacy functionality from Microsoft Edge is easier than in Chrome. For example a fallback to Internet Explorer is suggested by the Edge UI on certain websites by default.

Continue reading

New Google Dashboard Simplifies Privacy Settings

A new Google Dashboard — which the company says has been redesigned from the ground up — is launching everywhere next week, but a blog post gives an idea of what to expect. One of the main aims of the update is to make the Dashboard easier to use on mobile devices — and this in turn should mean that more people at least take a look at it.

There isn’t much new in the Google Dashboard other than it should be easier to use. Details may be found in the Google Blog at https://www.blog.google/topics/safety-security/improving-our-privacy-controls-new-google-dashboard/.

What is the TOR Browser and How does it Work?

If you are not yet familiar with Tor Networking and the Tor Browser, I suggest you watch a YouTube video tutorial at https://youtu.be/gcEq9JDMs94 or in the video player below. The Tor Browser protects your privacy and the information you send and receive over the Internet. It makes you anonymous online.

After you have watched the video, you might want to visit https://www.torproject.org to learn more and to download the and install the Tor Browser.

Continue reading