Summary

Total Articles Found: 6

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • G7 Comes Out in Favor of Encryption Backdoors
  • Apple Adds a Backdoor to iMesssage and iCloud Storage
  • Another SolarWinds Orion Hack
  • New Revelations from the Snowden Documents
  • Supply Chain Attack against Courtroom Software
  • Website for storing digital currencies hosted code with a sneaky backdoor

New Revelations from the Snowden Documents

Published: 2023-09-21 11:03:43

Popularity: 10

Author: Bruce Schneier

Keywords:

  • Uncategorized
  • academic papers
  • backdoors
  • cryptography
  • Edward Snowden
  • NSA
  • privacy
  • Schneier news
  • surveillance
  • Jake Appelbaum’s PhD thesis contains several new revelations from the classified NSA documents provided to journalists by Edward Snowden. Nothing major, but a few more tidbits. Kind of amazing that that all happened ten years ago. At this point, those documents are more historical than anything else. And it’s unclear who has those archives anymore. According to Appelbaum, The Intercept destroyed their copy. I recently published an essay about my experiences ten years ago.

    ...more

    Apple Adds a Backdoor to iMesssage and iCloud Storage

    Published: 2021-08-10 11:37:30

    Popularity: 56

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • Apple
  • backdoors
  • cloud computing
  • Edward Snowden
  • privacy
  • surveillance
  • LLM Says: ""Surveillance mode activated""

    Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I have been following the details, and discussing it in several different email lists. I don’t have time right now to delve into the details, but wanted to post something. EFF writes: There are two main features that the company is planning to install in every Apple device. One is a scanning feature that will scan all photos as they get uploaded into iCloud Photos to see if they match a photo in the database of known child sexual abuse material (CSAM) maintained by the National Center for Missing & Exploited Children (NCMEC). The other feature scans all iMessage images sent or received by child accounts — that is, accounts designated as owned by a minor — for sexually explicit material, and if the child is young enough, notifies the parent when these images are sent or received. This feature can be turned on or off by parents...

    ...more

    Another SolarWinds Orion Hack

    Published: 2021-02-04 12:11:53

    Popularity: 48

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • backdoors
  • China
  • cyberespionage
  • FBI
  • hacking
  • Russia
  • supply chain
  • LLM Says: ""Network Nightmare""

    At the same time the Russians were using a backdoored SolarWinds update to attack networks worldwide, another threat actor — believed to be Chinese in origin — was using an already existing vulnerability in Orion to penetrate networks: Two people briefed on the case said FBI investigators recently found that the National Finance Center, a federal payroll agency inside the U.S. Department of Agriculture, was among the affected organizations, raising fears that data on thousands of government employees may have been compromised. […] Reuters was not able to establish how many organizations were compromised by the suspected Chinese operation. The sources, who spoke on condition of anonymity to discuss ongoing investigations, said the attackers used computer infrastructure and hacking tools previously deployed by state-backed Chinese cyberspies...

    ...more

    Website for storing digital currencies hosted code with a sneaky backdoor

    Published: 2019-05-25 12:45:57

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • backdoors
  • cryptocurrency wallets
  • public key cryptography
  • WalletGenerator.net and the mystery of the backdoored random number generator.

    ...more

    G7 Comes Out in Favor of Encryption Backdoors

    Published: 2019-04-23 14:14:10

    Popularity: 495

    Author: Bruce Schneier

    Keywords:

  • backdoors
  • encryption
  • G7
  • hacking
  • key escrow
  • keys
  • law enforcement
  • terrorism
  • LLM Says: "Backdoor detected"

    From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their products and services, including data that is encrypted, for law enforcement and competent authorities to access digital evidence, when it is removed or hosted on IT servers located abroad or encrypted, without imposing any particular technology...

    ...more

    Supply Chain Attack against Courtroom Software

    Published: 2024-05-30 11:04:43

    Popularity: 3

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • backdoors
  • courts
  • supply chain
  • LLM Says: "Hacked courtroom"

    No word on how this backdoor was installed: A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack. The software, known as the JAVS Viewer 8, is a component of the JAVS Suite 8, an application package courtrooms use to record, play back, and manage audio and video from proceedings. Its maker, Louisville, Kentucky-based Justice AV Solutions, says its products are used in more than 10,000 courtrooms throughout the US and 11 other countries. The company has been in business for 35 years...

    ...more

    end