Civil Rights Groups Support End Of Net Neutrality

Andrew Orr In the News

In a report by The Intercept, certain civil rights groups, funded by telecoms, support Donald Trump’s plan to kill net neutrality. Established by the Obama administration, these neutrality rules stop ISPs from controlling network bandwidth to prioritize certain content over others. Will this be the end of Net Neutrality? Under Obama, the FCC created rules to establish net neutrality by reclassifying high-speed Internet as a regulated telecommunications service, instead of an information service. This ensured that ISPs couldn’t interfere with network speeds, like in T-Mobile’s Binge On! program. But the …

One Man in the Middle Compromises 76 Popular iPhone Apps

Andrew Orr In the News

An iOS app analysis service has found that 76 popular iPhone apps are confirmed to be vulnerable to the silent interception of TLS-protected data. Beware of these popular iPhone apps During testing, developers of verify.ly a mobile app analysis service found issues with many popular iPhone apps. Here are the details we have so far: 76 popular iPhone apps let a secret man-in-the-middle attack to be performed on connections that should otherwise be protected by TLS (HTTPS). This MitM vulnerability lets data be intercepted and manipulated. According to Apptopia, there has been …

How Secure Is Your Android VPN App?

Andrew Orr In the News

A research paper [PDF] from the University of California and Commonwealth Scientific and Industrial Research Organisation (CSIRO) analyzed a group of Android VPN apps. They found that these particular apps had privacy and security issues. Further Reading VPN On Chromebook: How To Set It Up Why Switzerland is a great place for a VPN More people are starting to realize the benefits of using a virtual private network. But without a lot of tech knowledge, it’s easy to assume that all VPNs are created equal. They are not, and this …

SSHowDowN Flaw Found In Internet of Things Devices

Andrew Orr In the News

Content delivery network Akamai found a security flaw, SSHowDowN, affecting over two million devices. The company says multiple clients have become targets. Further Reading New Router Hack Discovered That Targets Port 7547 Don’t Look, But Your Wi-Fi Router Is Spying On You SSHowDowN Flaw Akamai found a way [PDF] in which hackers can exploit a particular weakness in OpenSSH (CVE-2004-1653). Millions of internet-connected devices use crypto. An attacker can use these flaws to take over these devices. Then combine their power into a single attack, like a botnet. This particular hack has a …

Five Million LinkedIn Users Blocked by Russia Censorship Czars

Andrew Orr In the News

The same Russian federal organization that blocked Pornhub—Roskomnadzor—now prevents users from accessing the social network LinkedIn, but is there a way to unblock LinkedIn? Further Reading Watch Out: Your Headphones Can Spy On You PornHub Blocked In Russia Here’s How To Watch It LinkedIn? Gets LinkedOut by Russia Just a month or two ago, Russian regulator Roskomnadzor made headlines when it blocked Pornhub in the country. People fought back and tried to keep visiting the site. However, the regulator remained firm in its stance. Now social network LinkedIn is next on the chopping …

All I Wanted For Christmas Is Camera Encryption

Andrew Orr In the News

The Freedom of Press Foundation, along with 150 documentary filmmakers, ask manufacturers to add camera encryption to their models. Further Reading Judge Wants ISPs To Block Torrenting Websites Canada Is Trying to Demonize Encryption Background Wired provides some background to this story. In 2013, as filmmaker Laura Poitras worked with Edward Snowden for her movie, she made sure to secure everything. Every so often, she transferred footage to encrypted hard drives, and even destroyed the SD cards after using them. But she realized that at any moment, security agents could …

Linux Is Being Hit With Zero Day Exploits

Andrew Orr In the News

A security researcher found zero-day exploits in Linux distributions like Fedora and Ubuntu. All you have to do is play a particular music file, and you’re vulnerable. Further Reading The NSA’s Guide To Securing Your Mac Microsoft Accidentally Leaks Backdoor In Secure Boot Canada Is Trying to Demonize Encryption Linux Exploits Researcher Chris Evans can hijack your Linux computer with a music file. And if you’re using Chrome on Fedora 25, the latest release, he can target you with a code-execution attack. Mr. Evans published the results on Tuesday, with details …

Watch Out: Your Headphones Can Spy On You

Andrew Orr In the News

New research has determined that it’s possible to spy on computer users via their headphones. This hack turns them into a temporary microphone and records your conversations. Further Reading Top 10 Adblockers For The Desktop Former NSA Hacker Releases Tools To Thwart Webcam Spies SPEAK(a)R Researchers from Ben-Gurion University in Israel have created a frightening program called Speake(a)r. It demonstrates how hackers can take over a computer and record audio. This is possible even when a person has removed or disabled the computer’s microphone. In a paper titled: SPEAKE(a)R: Turn Speakers …

Judge Wants ISPs To Block Torrenting Websites

Andrew Orr In the News

In a bold move, Australian Justice John Nicholas ordered on Thursday that ISPs must take reasonable steps to disable access to torrenting websites within 15 working days. Further Reading Top 10 BitTorrent Clients For All of Your Torrenting Needs Torrent Site Torrentz.eu Shut Down Mysteriously Torrenting Block Torrenting sites such as The Pirate Bay have tried for years to stay one step ahead of the law. Several months ago, the FBI arrested the founder of KickassTorrents, Artem Vaulin. Then, another site—Torrentz.eu—mysteriously disappeared. Even though Torrentz.eu didn’t host torrents itself, it …

Canada Is Trying to Demonize Encryption

Andrew Orr In the News

The Royal Canadian Mounted Police, have been using media in Canada to demonize encryption in the public eye, while trying to sway the public towards surveillance. Further Reading 5 Best Security Tools to Secure Your Data Blackberry Is Making User Data Too Easy To Access Encryption In Canada Canadian police have been pushing for more surveillance powers for some time now. Specifically, police want to be able to force people to unlock their phones, or to force ISPs to give the government real-time access to subscriber information. Right now Canada …