Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

The Best Reason Yet to Buy an iPhone

Apple has updated its privacy policy as part of the latest version of its operating system: iOS 8. Newly-updated iPhones, iPads and iPod Touch mobile devices can no longer be accessed by anyone, not even by Apple itself. Previously, if law enforcement came to Apple with a seized device and a valid warrant, that agency was able to access a substantial portion of the data already on an iPad or iPhone. […]

Continue Reading →

UK Spy Chief Throws Privacy in the Fire, Says It’s not an ‘Absolute Right’

In a piece for London’s Financial Times, Britain’s new spy chief Robert Hannigan said U.S. technology companies should offer “greater co-operation” in the fight against terrorism, by working with governments rather than working against their intelligence agencies in the wake of the Edward Snowden disclosures. Hannigan suggested that as the world celebrates the 25th anniversary of the Web, there should be a “new deal” between governments and the technology companies […]

Continue Reading →

Verizon is Injecting Perma-Cookies to Track Cell Phone Customers, Bypassing Privacy Controls

Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users’ web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device. It allows third-party advertisers and websites to assemble a deep, permanent profile […]

Continue Reading →

A Simple and Free Method of Encrypting Files and Folders on a Macintosh

Apple provides free encryption software with every Macintosh. The functionality is built into Disk Utility, a multi-purpose program that can be found on every Mac. Disk Utility has many uses but for the moment I will only describe the encryption of files or folders. Disk Utility will encrypt any kind of file: text, images, videos, databases, anything at all. To encrypt a file or folder, first create the item(s) to […]

Continue Reading →

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

An interesting article in Wired describes how the NSA, researchers in Israel, and possibly others steal data from computers not connected to the Internet. The method allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer by using radio signals generated and transmitted by the computer and received by a mobile phone. You can read the article about “AirHopper” at http://www.wired.com/2014/11/airhopper-hack.

Continue Reading →