Posts tagged with: encryption
  • by |

    The highest-profile battle over privacy and technology has not ended. In fact, it may have only just begun with a lawsuit filed by three news organizations against the FBI. You may recall that the agency wanted Apple to decrypt an iPhone 5c in the possession of Syed Rizwan Farook, one of the perpetrators of a mass shooting in San Bernardino, California, that killed 14 people and wounded 24 others. Farook and co-perpetrator, wife Tashfeen Malik, were killed shortly after their attack. The FBI claimed it wanted to obtain sensitive documents from the phone that might have helped Farook plan ...

    Share
    Read On
  • by |

    Based on Chinese shores, relatively big in India, and virtually unknown as far as Western audiences are concerned, Gionee is a smartphone manufacturer accustomed to making headlines with records and firsts. For quite a while, the largely budget-focused OEM was busy setting the bar and upping the ante for the world’s thinnest handhelds, whereas the Marathon series accommodated some of the biggest batteries on devices ranging from 5 to 6 inches. Now, the Gionee M6 and M6 Plus drop the Marathon moniker, but still promise mind-blowing running times between charges, thanks to 5,000 and 6,020 ...

    Share
    Read On
  • by |

    BlackBerry CEO John Chen took the time at his company's Security Summit this week to once again rip Apple, "the other fruit company" to shreds for defending its encryption against the FBI regarding an iPhone used by a suspect in a mass shooting. "I found that disturbing as a citizen. I think BlackBerry, like any company, should have a basic civil responsibility," Chen said. "If the world is in danger, we should be able to help out." Apple refused to assist the Department of Justice in unlocking Syed Farook's iPhone 5c. He and his wife were the alleged perpetrators of an attack on a San ...

    Share
    Read On
  • by |

    US law enforcement may have inadvertently done the tech industry a favor by fighting Apple so hard on iOS data protection, arousing the consumers’ interest in encryption at previously unprecedented levels. This offered companies like Google and Facebook, in addition to the iPhone makers, great leeway in their efforts to enhance mobile security, and Mark Zuckerberg’s social media giant in particular deserves praise, first for bringing WhatsApp up to Signal standards, and today initiating Messenger’s own “Secret Conversations” rollout. For now, only a tiny fraction of the IM ...

    Share
    Read On
  • by |

    A judge has lifted a press embargo has on court records that tell how the Royal Canadian Mounted Police cracked into encrypted BlackBerry communications. The methods were used in the investigation of a member of a New York mafia who was fatally shot in the outskirts of Montreal in 2011. The RCMP used "stingrays" — fake cell towers — to pick up on IMSI numbers, identifying the mobile subscribers that connected with it. Other information, like location, text and voice conversations, can also be extracted. Police claim they were only used to sort out suspects' phones, but not locate or ...

    Share
    Read On
  • by |

    If you're an Android user in a orchard of Apple trees, you may be tired or indifferent to being "the green bubble" of the lot. There's a developer effort firmly in progress called "Pie Message" that hopes to bring the iMessage client over to Android, but it could get overshadowed by a rumored reveal next week at WWDC. According to a source to MacDailyNews, it seems that the company will bring iMessage and its end-to-end communications encryption over to Android. The details of the announcement are still murky as are the keynote preparations, but it is said that the iMessage for Android ...

    Share
    Read On
  • by |

    The world’s most popular social network (by a landslide) has long stopped being about liking online content and sharing cool stuff with friends. Instant text and voice communication is in fact such an integral part of Facebook’s DNA nowadays that the cross-platform Messenger service is rapidly nearing a billion monthly active users. While these can currently always choose to IM their e-buddies via the Android, iOS and Windows Phone app or the actual FB mobile website, it looks like Mark Zuckerberg & co. intend to soon remove the alternative altogether. Even for basic message ...

    Share
    Read On
  • by |

    You'll soon be able to buy a OnePlus 3 without an invite! Is this the flagship killer you've been waiting for? We finally have confirmation on USA pricing for the Xperia X. Will Sony start supporting North America more consistently? Qualcomm delivers an official statement regarding the TrustZone exploit, but will consumers be able to protect their information if manufacturers have to send updates? These stories and we'll be tackling your questions and comments. Make sure you're charged and ready for episode 203 of the Pocketnow Weekly! Watch the video broadcast from 2:00pm Eastern on June ...

    Share
    Read On
  • by |

    A story slowing gaining a bit more exposure on social media, it seems that an intrepid coder has managed to extract the keys from Qualcomm's TrustZone, the system used to lock bootloaders and encrypt devices powered by Qualcomm chipsets. @laginimaineb, the author of the Bits Please blog, recently announced on twitter extracting the Keymaster Keys from TrustZone. This author recently detailed a vulnerability in Qualcomm's Secure Execution Environment in a previous blog posts. Just managed to extract the Qualcomm KeyMaster keys directly from TrustZone! Writeup coming soon :) (1/2) ...

    Share
    Read On
  • by |

    Encryption is a very thorny, controversial issue these days, mostly due to Apple’s lengthy clash with the FBI, but Google couldn’t just sit on the sidelines and leave the newest iteration of Android (dessert name pending) vulnerable to intruders. Instead, Android N picks up file-based rather than block-level encryption, as well as seamless updates downloaded in the background no longer needing approval and bothering you with pesky prompt messages. Essentially, Big G thinks it knows what’s best for your (Nexus) devices, and will work on pushing security patches faster and smoother ...

    Share
    Read On
  • by |

    Eric Kay, Director of Engineering, announced a new messaging app called Allo. It focuses on letting you express yourself in a messaging situation while making it secure and smart with the Google Assistant. You connect with your phone contacts and talk with your friends through texts, lots of custom-made stickers and a little something called "WhisperShout". It's a slider feature that can shrink or grow how your message will appear in the conversation — sorta like how you can hold the Like button to blow up a thumbs up in a Facebook Messenger convo. Google Inbox's Smart Reply feature has ...

    Share
    Read On
  • by |

    Who knows more than the FBI when it comes to breaking into iPhones? Police from Los Angeles. Maybe even India. Communications Minister Ravi Shankar Prasad responded to a question about encryption by saying that "a tool for mobile forensics has been developed, which handles smart phones including Apple phones." It is not known to what degree the tool works or if it works at all. The official said that his ministry is actively pursuing and updating its forensics tools for new hardware and software. The case of the San Bernardino iPhone splashed global waves, prompting governments to respond ...

    Share
    Read On
  • by |

    Chalk another loss up for Apple. And the FBI. Around the same time that the agency ordered the iPhone manufacturer to assist in decrypting an iPhone 5c that belonged to a gunman in the San Bernardino shootings, Los Angeles police were able to source a "forensic cellphone expert" to crack into an iPhone 5s that belonged to the wife of actor Michael Jace. He's accused of murdering her back in May of 2014. In a search warrant obtained and reviewed by The Los Angeles Times, investigators wanted to support their claim that both husband and wife, April, were arguing "about their relationship". ...

    Share
    Read On
  • by |

    All of us are born with certain "natural rights" - rights which are are not dependent on the laws, customs, or beliefs of any particular culture or government, and are therefore universal and inalienable. Among those are the right to privacy, of which I'm an advocate. Since the world's governments aren't doing a very good job respecting privacy (let alone protecting it like they should be), the responsibility falls to us, individually. Thankfully, technology gives us the tools we need to build solutions that will help deter all but the most determined parties from invading our ...

    Share
    Read On
  • by |

    The story of the FBI's efforts to access the iPhone 5c in its San Bernardino terrorism investigation may seem like it's over – and has been over for weeks, following the agency dropping its efforts to force Apple to help break into the phone – but the story keeps going strong. And why wouldn't it? This one has it all: technology, civil liberties, national security – we could go on. And even with the meat of the story wrapped up, we're continuing to learn more and more about how this all went down. Last week we got our first sense of just how much the FBI paid for access to whatever ...

    Share
    Read On
  • by |

    The iPhone belonging to a confessed drug dealer in Brooklyn has been cracked into. But it wasn't opened with the zero-day exploit that the FBI purchased supposedly from a gray hat hacker. Someone else just knew the passcode for the iPhone. Prosecutors in the case said that an unidentified person turned in the code. The Justice Department had been requesting for Apple's assistance in opening up the iPhone, running iOS 7, for months. This case pre-dates the San Bernadino debacle that brought the nation face-first into a public debate about privacy, security and encryption. The drug dealer ...

    Share
    Read On
  • by |

    Apple may soon find a Great Wall coming in the way of further business growth in China. While growing its market share in mobile phones in recent years and being the only US-based content and services ecosystem to comply to the communist regime's rigorous censorship demands to do business in the country, it may have grown too far, too fast. Two anonymous sources close to the State Administration of Press, Publication, Radio, Film and Television say the authority demanded Apple close down its iBooks Store and iTunes Movies and that the company complied. Apple, through a spokesperson, stated ...

    Share
    Read On
  • by |

    Update: The podcast is up now and will be sent out at 3pm Eastern on Friday. The HTC 10 makes us wonder if any phone can really be perfect. Galaxy Note 6 rumors are building steam. What might we see on Samsung's next phablet? With the flagship phone market maturing, we'll take a look at why people are waiting longer to upgrade their phones? We've been hard at work covering news stories and producing the next generation of phone reviews. We recently started a new series of videos delving deeper into camera performance and phone comparisons, and of course we'll be tackling your questions and ...

    Share
    Read On
  • by |

    If you're in Canada and you don't want the Royal Canadian Mounted Police peeping through your BlackBerry's content, get rid of it. Chances are, if that phone's not for business, the agency has a way to get into it — likely thanks to BlackBerry. An investigation lead by Motherboard and Vice tells of "over one million" BBM messages obtained and then read by breaking BlackBerry's standard end-to-end encryption. The messages were used to pin down suspects of a mafia-related murder in Montreal. The company uses a "global encryption key" on all of its devices while corporate phones pass ...

    Share
    Read On
  • by |

    From what we've been told, it seems that Apple had a fairly unsatisfying talk about how highly it puts security in front of its customers. Sure, there may have been some interesting new methods to show off here, but if we're to go by the conclusions one commentator who was at the technical briefing on Friday made, we may have something to chew over. Tech.pinions's Ben Bajarin made some observations from his attendance at the technical briefing. First off, a couple of carrots for us factoid chasers: iPhone users typically unlock their devices 80 times a day with heavier users unlocking ...

    Share
    Read On
  • by |

    Back in February, when Apple and the FBI were still gearing up to face off in a court battle over the extent to which Apple could be compelled to assist the agency in its efforts to break into a secured smartphone, Apple scored a separate victory on a similar case in a New York court. There, the judge ruled that the government's attempt to force Apple's assistance relied on an overly broad interpretation of the All Writs Act. The feds didn't like the sound of that, and have since appealed the ruling to a higher court. Today Apple filed its response to that action, and the language the ...

    Share
    Read On
  • by |

    Update: The podcast will be on your podcatchers starting at 3am Eastern on April 16. Enjoy! The HTC 10 is taking the Android world by storm. Can this one phone turn the tides for HTC? Our LG G5 coverage is in full swing, and everything you want to know about this phone will be answered. Lastly, another "backdoor" encryption bill is headed to congress, what might this mean for consumer tech? We've been hard at work covering news stories and producing the next generation of phone reviews. We recently started a new series of videos delving deeper into camera performance and phone comparisons, ...

    Share
    Read On
  • by |

    In addition to setting a dangerous precedent, compromising decades of diligent work in the service of user privacy protection, and possibly building a master key for all of the world’s iPhones that could always fall into the wrong hands, Apple’s supporters in its FBI deadlock also argued there was probably nothing relevant on Syed Farook’s handheld. Nothing about a supposed third San Bernardino assailant, nothing about other planned attacks or living terrorists affiliated with the two killed on December 2, 2015. And now, CBS News claims to have heard from a “law enforcement ...

    Share
    Read On
  • by |

    In addition to being the most popular smartphone vendor around the globe by a landslide, and producing the two devices consumers and experts appear to agree are the best of the best, Samsung today adds another important gold medal to its increasingly crowded trophy room. This one’s a little unexpected, which probably makes the win that much sweeter, as we all tend to associate BlackBerry or Apple’s names first and foremost with top-drawer mobile security, impenetrable encryption, and data protection. But surprise, surprise, market research firm Gartner ranked Samsung Knox number one in ...

    Share
    Read On
  • by |

    Apple might never get to find out exactly how law enforcement managed to elude its “impenetrable” iOS encryption on an iPhone 5c owned by a San Bernardino shooter at the time of the heinous 2015 attack, but another important piece of the unlocking puzzle may have just been uncovered. Forget everything you thought you knew about the nature and authors of the cyber-intrusion, as “people familiar with the matter” tell The Washington Post it was actually “professional hackers who discovered and brought to the bureau at least one previously unknown software flaw.” No Israeli ...

    Share
    Read On
Mobile Version