-
http://gus.distopico.net/blog/2014/05...es-sabem-sobre-os-nossos-dispositivos
Voting 0
-
https://www.privacyinternational.org/...q-know-about-our-devices-that-we-dont
Voting 0
The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google's Android mobile operating system.
http://www.spiegel.de/international/w...spy-on-smart-phone-data-a-920971.html
Voting 0
-
http://www.newyorker.com/online/blogs...013/09/the-nsa-versus-encryption.html
Voting 0
'One must possess a Panglossian view on things to assume that Edward Snowden was the first person out of the many thousands in his position to make away with such material. He brought it to the public, and without that move there’s a good chance you wouldn’t have even known he took it. So who else has it? Bet you have no idea. So well done; you’ve probably put your own citizens at risk.'
http://www.businessweek.com/articles/...nsa-thanks-for-making-us-all-insecure
Voting 0
'The second analogy, while admittedly science fiction, seems to us to offer a clearer parallel. Suppose for a moment that the U.S. government had secretly developed and deployed an ability to read individuals’ minds. Such a capability would present the greatest possible invasion of personal privacy. And just as surely, it would be an enormously valuable weapon in the fight against terrorism.
Continuing with this analogy, some might say that because of its value as an intelligence tool, the existence of the mind-reading program should never be revealed. We do not agree. In our view, such a capability in the hands of the government would pose an overwhelming threat to civil liberties. The capability would not necessarily have to be banned in all circumstances. But we believe it would need to be discussed, and safeguards developed for its use. For that to happen, it would have to be known.'
https://www.propublica.org/article/why-we-published-the-decryption-story
Voting 0
'Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.
... »
"Project Bullrun deals with NSA's abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive." The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.'
http://www.theguardian.com/world/2013...05/nsa-gchq-encryption-codes-security
Voting 0