Spying through Push Notifications

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy on them—either for their own ...
Cyclops Oxeye toxic workplace ask chloé

Cyclops Unveils Cybersecurity Search Engine Based on Generative AI

Cyclops today emerged from stealth to launch a search engine platform for cybersecurity teams that makes use of metadata and generative artificial intelligence (AI) to make it simpler to successfully defend organizations ...
Security Boulevard
Metadata and Your Privacy

Metadata and Your Privacy

| |
The importance of metadata to user privacy is simply under emphasized. Metadata can tell the whole story without ever reading the message contents; with files, Metadata can reveal additional and potentially sensitive ...

Interview with Signal’s New President

Long and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp uses the Signal encryption protocol to provide encryption for its messages. That was absolutely a visionary choice that Brian and his ...

Bunnie Huang’s Plausibly Deniable Database

Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size ...

Metadata Left in Security Agency PDFs

Really interesting research: “Exploitation and Sanitization of Hidden Data in PDF Files” Abstract: Organizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these ...

Facebook Announces Messenger Security Features that Don’t Compromise Privacy

Note that this is "announced," so we don't know when it's actually going to be implemented. Facebook today announced new features for Messenger that will alert you when messages appear to come ...

Newly Declassified Study Demonstrates Uselessness of NSA’s Phone Metadata Program

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of Americans' domestic phone calls ...

Evaluating the NSA’s Telephony Metadata Program

Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin. Abstract: The telephony metadata program which was authorized under ...

Cell Networks Hacked by (Probable) Nation-State Attackers

A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more than 10 cell networks around the world to date over ...