Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

EFF- Why the Web Needs Perfect Forward Secrecy More Than Ever

“EFF has long advocated for websites to support HTTPS instead of plain HTTP to encrypt and authenticate data transmitted on the Internet. However, we learned yesterday of a catastrophic bug, nicknamed “Heartbleed,” that has critically threatened the security of some HTTPS sites since 2011. By some estimates, Heartbleed affects 2 out of 3 web servers on the Internet. Heartbleed isn’t aContinue Reading

EFF – Websites Must Use HSTS in Order to Be Secure

EFF: “You would think that by now the Internet would have grown up enough that things like online banking, email, or government websites would rely on thoroughly engineered security to make sure your data isn’t intercepted by attackers. Unfortunately when it comes to the vast majority of websites on the Internet, that assumption would beContinue Reading

Fourth Annual Benchmark Study on Patient Privacy and Data Security

Ponemon Institute: “…we are releasing our Fourth Annual Benchmark Study on Patient Privacy and Data Security. We hope you will read the report sponsored by ID Experts that reveals some fascinating trends. Specifically, criminal attacks on healthcare systems have risen a startling 100 percent since we first conducted the study in 2010. This year, we found theContinue Reading

New on LLRX – $38 Datawind UbiSlate 7Ci tablet as an e-reader

Via LLRX.com - $38 Datawind UbiSlate 7Ci tablet as an e-reader: Avoid this adware trap despite its many positives! David Rothman is spearheading chronicling the progress of expanding low cost access to e-readers as libraries engage in mission critical outreach efforts to reach underserved communities. In this article, Rothman asks: Suppose you could buy an iPad for $38, readContinue Reading

Report – Encryption Would Have Stopped Snowden From Using Secrets

Chris Strohm, Bloomberg: “Edward Snowden could have been thwarted from leaking classified U.S. documents if the National Security Agency encrypted the information to make it unreadable, two former senior cybersecurity officials said. Snowden would have needed a digital key to decipher the secrets after gaining access to them if the data was scrambled, Ira “Gus” Hunt, formerContinue Reading

Leaked Documents Reveal Government Cyber Attacks on Hactivists

NBC News – MARK SCHONE, RICHARD ESPOSITO, MATTHEW COLE AND GLENN GREENWALD: “Secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unitContinue Reading

New Report Focuses on Disaster Unpreparedness

Meritalk report [snipped]: •”Federal IT professionals give themselves high DR2 grades: •One in four give their agency an “A” in DR2 preparedness and nearly all give a passing grade •Despite the high marks, many agencies fail to test their data recovery capabilities: •In the last 12 months, only 54% of agencies have tested their abilityContinue Reading

The Cost of Surveillance

Via Ashkan Soltani: “The Yale Law Journal Online (YLJO) just published an article that Ashkan Soltani co-authored with Kevin Bankston (first workshopped at the Privacy Law Scholars Conference last year) entitled Tiny Constables and the Cost of Surveillance: Making Cents Out of United States v. Jones. In it, we discuss the drastic reduction in the cost of tracking an individual’s location and show how technology has greatlyContinue Reading

Review Group on Intelligence and Communications Technologies Presents Report to President Obama

Transmittal Letter from Richard A. Clarke; Michael J. Morell; Geoffrey R. Stone; Cass R. Sunstein; Peter Swire - “Dear Mr. President: We are honored to present you with the Final Report of the Review Group on Intelligence and Communications Technologies – Liberty and Security in a Changing World. Consistent with your memorandum of August 27, 2013, our recommendationsContinue Reading

American Library Association gathering support to protect user metadata and privacy

The Hill, Kate Tummarello: “…You need to have some freedom to learn about what you think is important without worrying about whether it ends up in some FBI file,” said Alan Inouye, director of the Office for Information Technology Policy at the American Library Association (ALA). Government snooping of libraries has a long history. Under the PatriotContinue Reading

What the Government Does with Americans’ Data

What the Government Does with Americans’ Data, by Rachel Levinson-Waldman, October 8, 2013. “After the attacks of September 11, 2001, the government’s authority to collect, keep, and share information about Americans with little or no basis to suspect wrongdoing dramatically expanded. While the risks and benefits of this approach are the subject of intense debate,Continue Reading

Guardian – NSA, GCHQ target Tor network that protects anonymity of web users

One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers by James Ball, Bruce Schneier and Glenn Greenwald “The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite theContinue Reading