1
0
Fork 0

Upload files to 'content/posts/infosec'

This commit is contained in:
Olivier 2023-01-01 21:31:53 +01:00
parent a1cd65109e
commit 74e82a1cfd
2 changed files with 60 additions and 0 deletions

View File

@ -0,0 +1,28 @@
---
title: "'Surveillance apathy' is the problem"
date: 2017-11-09T04:41:49+06:00
draft: false
tags: ["data privacy","surveillance"]
author: "9x0rg"
hidemeta: false
ShowReadingTime: true
ShowPostNavLinks: true
showtoc: false
---
Knowing it and getting used to it: surveillance apathy turns out to be more worrisome than the proper lack of understanding online surveillanc.
> You may be sick of worrying about online privacy, but surveillance apathy is also a problem. We all seem worried about privacy. Though its not only privacy itself we should be concerned about: its also our attitudes towards privacy that are important.
>
> When we stop caring about our digital privacy, we witness surveillance apathy. And its something that may be particularly significant for marginalised communities, who feel they hold no power to navigate or negotiate fair use of digital technologies.
>
> In the wake of the [NSA leaks in 2013](https://www.theguardian.com/us-news/the-nsa-files) led by Edward Snowden, we are more aware of the machinations of online companies such as Facebook and Google. Yet research shows[^1] some of us are apathetic when it comes to online surveillance.
>
> So while were aware of the issues with surveillance, we arent necessarily doing anything about it, or were prepared to make compromises when we perceive our safety is at stake.
>
> -- [Siobhan Lyons](https://theconversation.com/profiles/siobhan-lyons-133454) in [The Conversation](https://theconversation.com/you-may-be-sick-of-worrying-about-online-privacy-but-surveillance-apathy-is-also-a-problem-86474), 08 Nov. 2017
[^1]: [Americans Privacy Strategies Post-Snowden](https://www.pewresearch.org/internet/2015/03/16/americans-privacy-strategies-post-snowden/) by Lee Rainie and Mary Madden - Pew Research Center

View File

@ -0,0 +1,32 @@
---
title: "The CIA didn't break Signal App"
date: 2017-03-08T10:06:00+06:00
draft: false
tags: ["encryption","infosec","signal app","whatsapp","data privacy","cia"]
author: "9x0rg"
hidemeta: false
ShowReadingTime: true
ShowPostNavLinks: true
showtoc: false
cover:
image: "<image path/url>"
alt: "<alt text>"
caption: "<text>"
relative: false # To use relative path for cover image, used in hugo Page-bundles
---
**The CIA didn't break Signal or WhatsApp... despite what you've heard.**
The agency might be able to break into your phone, but files released today show no ability to intercept encrypted chats before they arrive there.
> There's been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: that the agencys in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp.
>
> It doesnt. Instead, it has the ability, in some cases, to take control of entire phones; accessing encrypted chats is simply one of many security implications of this.
>
> Its also true that the CIA can bypass PGP email encryption on your computer. And the CIA can bypass your VPN. And the CIA can see everything youre doing in Tor Browser. All of these things can be inferred by the documents, but that doesnt mean using PGP, VPNs, or Tor Browser isnt safe.
>
> Basically, if the CIA can hack a device and gain full control of it — whether its a smartphone, a laptop, or a TV with a microphone — it can spy on everything that happens on that device.
>
> It of course remains possible (as it always has and always will) that the CIA has cracked the encryption of Signal, WhatsApp, or any other piece of software. But WikiLeaks hasnt provided any evidence of that here today.
>
> -- Sam Biddle & Micah Lee in [The Intercept](https://theintercept.com/2017/03/07/the-cia-didnt-break-signal-or-whatsapp-despite-what-youve-heard/)