Archive for the 'Security' Category

The Socrates of the NSA

Tuesday, August 11th, 2015

This is a disturbing look into the mind of an NSA employee. One wonders if it’s representative. “I found myself wishing that my life would be constantly and completely monitored,” he continued. “It might seem odd that a self-professed libertarian would wish an Orwellian dystopia on himself, but here was my rationale: If people knew […]

This is what it’s really for

Sunday, March 15th, 2015

New Zealand Used NSA System to Target Officials, Anti-Corruption Campaigner – The Intercept: Analysts from Government Communications Security Bureau, or GCSB, programmed the Internet spy system XKEYSCORE to intercept documents authored by the closest aides and confidants of the prime minister on the tiny Solomon Islands. The agency also entered keywords into the system so […]

The CIA Campaign to Steal Apple’s Secrets

Wednesday, March 11th, 2015

The CIA Campaign to Steal Apple’s Secrets: A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers […]

You have to love Spaf

Saturday, February 7th, 2015

My Angry Posts | Spaf’s Thoughts: “What angers me is that people are willing to endanger others — including her and the rest of my family — because of paranoia and willful stupidity.  If it was only them, natural selection would help take care of the problem, but they pose a danger to me and […]

Another nail in the privacy coffin

Friday, January 23rd, 2015

This is another thing the EU is cooking up. This document wasn’t intended for the public, of course. Basically, the EU wants providers (web sites) to provide them with the secret encryption keys for SSL. Since the Snowden revelations, internet and telecommunications companies have started to use often de-centralized encryption which increasingly makes lawful interception […]

How even key escrow won’t work for Cameron

Thursday, January 22nd, 2015

How is Cameron going to ensure that law enforcement can read all communications? One way would be to provide systems with ”back doors”; introducing intentional vulnerabilities. We all know that won’t work. Or rather will work much better than intended, if you get my drift. Some, including Steve Gibson, maintain that it can in fact […]

You cannot trust

Sunday, January 4th, 2015

Caspar Bowden spoke at the 31c3 conference. Snippets: I told my technology officers at MicroSoft that if you sell cloud computing services to your own governments, this means that the NSA can do unlimited surveillance on that data. […] two months later they did fire me. “Technology officers” represent MicroSoft in their respective countries. On […]

Possible upcoming attempts to disable the Tor network

Saturday, December 20th, 2014

Possible upcoming attempts to disable the Tor network | The Tor Blog: “The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities.” This is bad.

SRX100 Junos dynamic VPN, Win7, OSX, VPNTracker

Monday, March 3rd, 2014

(Update March 6, 2014: The Junos “standard” proposal actually includes 3DES in both phase 1 and phase 2, still making it hard for VPNTracker to connect. What we need to do is create a custom proposal for each phase with only AES in it. I updated the text to reflect that.) (Update November 11, 2014: […]

Southend Enterprises scam

Tuesday, September 3rd, 2013

Just this afternoon I got a call from “iAssist” who wanted to fix my computer, since it had malware, or was out of support or something. It was the regular fare with them taking over my computer to “fix” it for me. So I let him do just that. While I “doddered” around and “tried” […]