Tag: Privacy
Map buried inside your phone reveals where you’ve been and photos you snapped there
Using Find My to locate missing Apple devices – Apple Support
Cell-Site Simulators/IMSI Catchers | Electronic Frontier Foundation
Source: Cell-Site Simulators/IMSI Catchers | Electronic Frontier Foundation
ACLU’s recommendations on cell-site simulators: https://www.aclu.org/sites/default/files/field_document/aclu_recommendations_on_the_use_of_cell_phone_simulators.pdf
Search cell-site simulators and their usage.
(Chinese) Researchers claim method to break encryption using existing quantum computer
Consider this on the heels of the Chinese Surveillance Balloon incident.
Source: Researchers claim method to break encryption using existing quantum computer | Washington Examiner
Chinese Balloon Surveillance Question
I have not seen this addressed in any of the media coverage.
Network Security has 2 elements, Confidentiality (prevent eavesdropping) and Integrity (prevent alteration). These are accomplished through encryption. Cracking encryption optimally requires a long, uninterrupted, error-free bit stream (you will not crack encryption with a short snippet, or a stream with errors and discontiguous streams do not reveal patterns necessary for cracking the encryption).
Planes are not on site long enough and generate too much noise to achieve the necessary long capture. Satellites are not on station long enough, and are too high experiencing other electromagnetic/atmospheric issues inhibiting data collection sensitivity. A quiet nearly stationary balloon with no/little mechanical movement, high in the atmosphere is perfect for this application.
Considering where the balloon parked (over ballistic missile sites and their partnered Air Force communications centers), the recent evolution/breakthroughs of cracking encryption, and the polynomial increase in Computation/AI/ML abilities… what is your assessment?
Now consider this published days after the Balloon incident: https://www.washingtonexaminer.com/policy/technology/cyber-researchers-claim-method-to-break-encryption-quantum-computer-china?fbclid=IwAR19OHu7D0Eo72KizxqDhQ3Y7HmEQz6tutX_ZIDbcAxCCaR0R8OwkUlpO6w
Scientists Use WiFi to See Through People’s Walls
New calls for Madison Square Garden to halt its use of facial recognition – ABC7 New York
Precise Satellite Image – Surveillance Concern
http://pf.bigpixel.cn/en-US/pano/772196334345129984.html
Posting this so that everyone is aware of the present state of this technology.
TikTok is a ‘massive surveillance’ tool for China, senators warn | Fortune
Source: TikTok is a ‘massive surveillance’ tool for China, senators warn | Fortune
An excerpt: “It’s not just the content you upload to TikTok but all the data on your phone, other apps, all your personal information, even facial imagery, even where your eyes are looking on your phone,” Arkansas Republican Tom Cotton said on “Fox News Sunday.” TikTok is “one of the most massive surveillance programs ever, especially on America’s young people,” he said.