NSA Taps Directly Into Undersea Fiber-optic Data Cables

"Of course, by tapping directly into the beams of light transferring this data around the globe — apparently with the cooperation of the world’s chief technology companies — the federal government bypasses all legal and constitutional restraints on its already immense power. Remarkably, there does not seem to be a corresponding flight by Americans from the devices or services being monitored by the federal government. As one brick after another is stacked on the ever-growing walls of the 21st-century Panopticon, it appears that nothing will dissuade Americans from growing increasingly reliant on the very tools being used in the construction." Continue reading

Continue ReadingNSA Taps Directly Into Undersea Fiber-optic Data Cables

2013 Bitcoin Mid-Year Review and Outlook

"The past six months may one day prove to be among the most important in bitcoin’s history. As global events sparked increasing need for frictionless wealth transfers, bitcoin’s popularity ballooned and ignited a conversation that will likely continue to flourish in the years to come. Growth in bitcoin’s value was outpaced only by the incredible interest from entrepreneurs, investors and the press. In this 27-page report we cover the major events from the first half of 2013 and what to look out for in the months ahead." Continue reading

Continue Reading2013 Bitcoin Mid-Year Review and Outlook

Bitcoin gets big bets from Silicon Valley

"Dot-com pioneers and fresh-faced 20-somethings alike are founding companies to help transact the virtual currency. Are those chasing Bitcoin headed for a gold rush, or fool's gold? Nick Holland, a Javelin Strategy analyst in Boston, is among those who believe math-based currencies like Bitcoin, which enable transactions from one user to another without official oversight or high fees, could upset the centuries-old tradition of paper money -- much as user-generated Wikipedia all but replaced the venerable Encyclopaedia Britannica." Continue reading

Continue ReadingBitcoin gets big bets from Silicon Valley

CryptoParty: Party like it’s December 31st, 1983

"Attend a CryptoParty to learn and teach how to use basic cryptography tools. A CryptoParty is free, public and fun. People bring their computers, mobile devices, and a willingness to learn! CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the Tor anonymity network, public key encryption (PGP/GPG), and OTR (Off The Record messaging). CryptoParties are free to attend, public, and commercially and politically non-aligned." Continue reading

Continue ReadingCryptoParty: Party like it’s December 31st, 1983

Cypherpunk (Wikipedia)

"A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since the late 1980s. A very basic cypherpunk issue is privacy in communications and data retention. Such guarantees require strong cryptography, so cypherpunks are fundamentally opposed to government policies attempting to control the usage or export of cryptography, which remained an issue throughout the late 90s." Continue reading

Continue ReadingCypherpunk (Wikipedia)

Data, meet spies: The unfinished state of Web crypto

"Most Internet companies do not use an privacy-protective encryption technique that has existed for over 20 years -- it's called forward secrecy -- that cleverly encodes Web browsing and Web e-mail in a way that frustrates fiber taps by national governments. Lack of adoption by Apple, Twitter, Microsoft, Yahoo, AOL and others is probably due to 'performance concerns and not valuing forward secrecy enough,' says Ivan Ristic, director of engineering at the cloud security firm Qualys. Google, by contrast, adopted it two years ago." Continue reading

Continue ReadingData, meet spies: The unfinished state of Web crypto

Google offers to fund wireless hotspots in San Francisco

"Google Inc is offering $600,000 to set up free wireless Internet hotspots in 31 public spaces in San Francisco, but city officials said they need to review annual maintenance costs before it could be approved. Google has previously funded public wireless projects in its home city of Mountain View, California, in New York Chelsea’s neighborhood and around Boston’s South Station. San Francisco officials say public Internet service is long overdue for a city that has eclipsed Silicon Valley as the epicenter of the startup ecosystem in recent years, attracting a dramatic influx of venture capital investment and young tech workers." Continue reading

Continue ReadingGoogle offers to fund wireless hotspots in San Francisco

Google strengthens Android security with NSA’s SELinux; TPM also coming

"Originally developed by programmers from the National Security Agency, SELinux enforces a much finer-grained series of mandatory access control policies. the other big security enhancement introduced in Android 4.3 is a more robust way to store cryptographic credentials used to access sensitive information and resources. 'With the keychain enhancements, the system-wide keys are bound to a hardware-based root of trust process devices that support this,' said Pau Oliva Fora, senior mobile security engineer at viaForensics. 'The phone needs to have a secure element such as a Trusted Platform Module so that private keys can't be stolen.'" Continue reading

Continue ReadingGoogle strengthens Android security with NSA’s SELinux; TPM also coming

Feds put heat on Web firms for master encryption keys

"These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users. If the government obtains a company's master encryption key, agents could decrypt the contents of communications intercepted through a wiretap or by invoking the potent surveillance authorities of the Foreign Intelligence Surveillance Act. Web encryption -- which often appears in a browser with a HTTPS lock icon when enabled -- uses a technique called SSL, or Secure Sockets Layer." Continue reading

Continue ReadingFeds put heat on Web firms for master encryption keys