metadata
Spying through Push Notifications
When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy on them—either for their own ...
Cyclops Unveils Cybersecurity Search Engine Based on Generative AI
Cyclops today emerged from stealth to launch a search engine platform for cybersecurity teams that makes use of metadata and generative artificial intelligence (AI) to make it simpler to successfully defend organizations ...
Metadata and Your Privacy
The importance of metadata to user privacy is simply under emphasized. Metadata can tell the whole story without ever reading the message contents; with files, Metadata can reveal additional and potentially sensitive ...
Interview with Signal’s New President
Long and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp uses the Signal encryption protocol to provide encryption for its messages. That was absolutely a visionary choice that Brian and his ...
Bunnie Huang’s Plausibly Deniable Database
Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size ...
Metadata Left in Security Agency PDFs
Really interesting research: “Exploitation and Sanitization of Hidden Data in PDF Files” Abstract: Organizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these ...
Facebook Announces Messenger Security Features that Don’t Compromise Privacy
Note that this is "announced," so we don't know when it's actually going to be implemented. Facebook today announced new features for Messenger that will alert you when messages appear to come ...
Newly Declassified Study Demonstrates Uselessness of NSA’s Phone Metadata Program
The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of Americans' domestic phone calls ...
Evaluating the NSA’s Telephony Metadata Program
Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin. Abstract: The telephony metadata program which was authorized under ...
Cell Networks Hacked by (Probable) Nation-State Attackers
A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more than 10 cell networks around the world to date over ...