m Quec.lim's republished posts.http://quec.li/~m /EFF, ACLU Join Idaho Mom?s Legal Challenge to NSA Surveillancehttps://www.eff.org/press/releases/eff-aclu-join-idaho-moms-legal-challenge-nsa-surveillance81404 at https://www.eff.orgWed, 16 Jul 2014 11:58:00 -0400http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.eff.org%2Frss%2Fupdates.xml&entry=81404+at+https%3A%2F%2Fwww.eff.orgGovernment: Unemployed person = helpless victim or lazy criminal, as situation demandshttp://blogs.law.harvard.edu/philg/2014/07/15/government-unemployed-person-helpless-victim-or-lazy-criminal-as-situation-demands/http://blogs.law.harvard.edu/philg/?p=6195Tue, 15 Jul 2014 21:20:00 -0400http://quec.li/EntryComments?feed=http%3A%2F%2Fblogs.law.harvard.edu%2Fphilg%2Ffeed%2F&entry=http%3A%2F%2Fblogs.law.harvard.edu%2Fphilg%2F%3Fp%3D6195Risks of Keyloggers on Public Computershttps://www.schneier.com/blog/archives/2014/07/risks_of_keylog.htmltag:www.schneier.com,2014:/blog//2.5891Tue, 15 Jul 2014 15:30:00 -0400<p>Brian Krebs is <a href="https://krebsonsecurity.com/2014/07/beware-keyloggers-at-hotel-business-centers/">reporting</a> that:</p> <blockquote><p>The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.</p></blockquote> <p>It's actually a very hard problem to solve. The adversary can have unrestricted access to the computer, especially hotel business center computers that are often tucked away where no one else is looking. I assume that if someone has physical access to my computer, he can own it. This is doubly true if he has hardware access.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5891Legal Attacks Against Torhttps://www.schneier.com/blog/archives/2014/07/the_war_against.htmltag:www.schneier.com,2014:/blog//2.5888Tue, 15 Jul 2014 07:13:00 -0400<p>Last week, we <a href="https://www.schneier.com/blog/archives/2014/07/nsa_targets_pri.html">learned</a> that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been <a href="https://www.techdirt.com/articles/20140701/18013327753/tor-nodes-declared-illegal-austria.shtml">found guilty</a> as an accomplice, because someone used his computer to transmit child porn. Even more recently, Tor has been <a href="https://www.scribd.com/fullscreen/233081133?access_key=key-WFujAqEI3BioFxNO43R3">named</a> as a defendant in a revenge-porn suit in Texas because it provides web-porn operators with privacy.</p> <p>Here's the EFF: "<a href="https://www.eff.org/deeplinks/2014/07/7-things-you-should-know-about-tor">Seven Things You Should Know About Tor</a>."</p> <p><br /> </p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5888GCHQ Catalog of Exploit Toolshttps://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.htmltag:www.schneier.com,2014:/blog//2.5890Mon, 14 Jul 2014 13:35:00 -0400<p>The latest <a href="https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/">Snowden story</a> is a <a href="https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/">catalog</a> of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance and propaganda. It's a list of code names and short descriptions, such as these:</p> <blockquote><p>GLASSBACK: Technique of getting a targets IP address by pretending to be a spammer and ringing them. Target does not need to answer. <p>MINIATURE HERO: Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.</p> <p>MOUTH: Tool for collection for downloading a user's files from Archive.org.</p> <p>PHOTON TORPEDO: A technique to actively grab the IP address of MSN messenger user.</p> <p>SILVER SPECTOR: Allows batch Nmap scanning over Tor.</p> <p>SPRING BISHOP: Find private photographs of targets on Facebook.</p> <p>ANGRY PIRATE: is a tool that will permanently disable a target's account on their computer.</p> <p>BUMPERCAR+: is an automated system developed by JTRIG CITD to support JTRIG BUMPERCAR operations. BUMPERCAR operations are used to disrupt and deny Internet-based terror videos or other materials. The techniques employs the services provided by upload providers to report offensive materials.</p> <p>BOMB BAY: is the capacity to increase website hits/rankings.</p> <p>BURLESQUE: is the capacity to send spoofed SMS messages.</p> <p>CLEAN SWEEP: Masquerade Facebook Wall Posts for individuals or entire countries.</p> <p>CONCRETE DONKEY: is the capacity to scatter an audio message to a large number of telephones, or repeatedely bomb a target number with the same message.</p> <p>GATEWAY: Ability to artificially increase traffic to a website.</p> <p>GESTATOR: amplification of a given message, normally video, on popular multimedia websites (Youtube).</p> <p>SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets.</p> <p>SUNBLOCK: Ability to deny functionality to send/receive email or view material online.</p> <p>SWAMP DONKEY: is a tool that will silently locate all predefined types of file and encrypt them on a targets machine</p> <p>UNDERPASS: Change outcome of online polls (previously known as NUBILO).</p> <p>WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.</p> <p>HAVLOCK: Real-time website cloning techniques allowing on-the-fly alterations.</p> <p>HUSK: Secure one-on-one web based dead-drop messaging platform.</p></blockquote> <p>There's lots more. Go <a href="https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/">read the rest</a>. This is a big deal, as big as the <a href="https://www.schneier.com/blog/archives/2013/12/more_about_the.html">TAO catalog</a> from December.</p> <p>I would like to post the entire list. If someone has a clever way of extracting the text, or wants to retype it all, please send it to me.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5890Killing oneself for career, English-stylehttp://blogs.law.harvard.edu/philg/2014/07/12/killing-oneself-for-career-english-style/http://blogs.law.harvard.edu/philg/?p=6188Sat, 12 Jul 2014 23:47:00 -0400<p>I&#8217;m reading <a href="http://www.amazon.com/gp/product/B00IJJUIOM/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=390957&amp;creativeASIN=B00IJJUIOM&amp;linkCode=as2&amp;tag=pgreenspun-20&amp;linkId=6WLXZTNINIAE7GJ4">The Silkworm</a><img style="border: none !important;margin: 0px !important" src="http://ir-na.amazon-adsystem.com/e/ir?t=pgreenspun-20&amp;l=as2&amp;o=1&amp;a=B00IJJUIOM" alt="" width="1" height="1" border="0" /> by J.K. Rowling under the pen name of &#8220;Robert Galbraith&#8221; (I was not a fan of the Harry Potter books and thought that I should give the world&#8217;s most successful writer a second try). The plot concerns a private detective who takes a break from his usual work of helping women turn their marriages into cash by searching for a missing writer: &#8220;Strike had recently helped several wealthy young women rid themselves of City husbands who had become much less attractive to them since the financial crash. There was something appealing about restoring a husband to a wife, for a change.&#8221; The prose style can be peculiar: &#8220;And by the same power of will that in the army had enabled him to fall instantly asleep on bare concrete, on rocky ground, on lumpy camp beds that squeaked rusty complaints about his bulk whenever he moved, he slid smoothly into sleep like a warship sliding out on dark water.&#8221;</p> <p>So far the paragraph that has struck me the most is this one, about what it would mean to have a demanding job in England: &#8220;Robin was twisting her engagement ring on her finger, torn between her desire to follow Matt and persuade him she had done nothing wrong and anger that any such persuasion should be required. The demands of his job came first, always; she had never known him to apologize for late hours, for jobs that took him to the far side of London and <strong>brought him home at eight o?clock at night.</strong>&#8221; [emphasis added]</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fblogs.law.harvard.edu%2Fphilg%2Ffeed%2F&entry=http%3A%2F%2Fblogs.law.harvard.edu%2Fphilg%2F%3Fp%3D6188Timeghosthttp://xkcd.com/1393/http://xkcd.com/1393/Fri, 11 Jul 2014 00:00:00 -0400<img src="http://imgs.xkcd.com/comics/timeghost.png" title="'Hello, Ghostbusters?' 'ooOOoooo people born years after that movie came out are having a second chiiiild right now ooOoooOoo'" alt="'Hello, Ghostbusters?' 'ooOOoooo people born years after that movie came out are having a second chiiiild right now ooOoooOoo'" />http://quec.li/EntryComments?feed=http%3A%2F%2Fxkcd.com%2Frss.xml&entry=http%3A%2F%2Fxkcd.com%2F1393%2FHow Google Glass Snoops Steal Your Passcodehttps://www.schneier.com/blog/archives/2014/07/how_google_glas.htmltag:www.schneier.com,2014:/blog//2.5886Thu, 10 Jul 2014 15:25:00 -0400<p>Researchers are <a href="http://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-glance/">refining</a> the techniques of surreptitiously videoing people as they type in their passwords.</p> <blockquote><p>Other hackers have shown it's possible to perform <a href="http://www.forbes.com/sites/andygreenberg/2011/07/13/hackers-app-automates-over-the-shoulder-ipad-spying/">automated over-the-shoulder password stealing</a>. But Fu notes that older video tools had to actually see the display, which often is impossible from a distance or from indirect angles. (See UMass's PIN-capturing footage taken by Glass in the GIF below.) His team's video recognition software can spot passcodes even when the screen is unreadable, based on its understanding of an iPad's geometry and the position of the user's fingers. It maps its image of the angled iPad onto a "reference" image of the device, then looks for the abrupt down and up movements of the dark crescents that represent the fingers' shadows.</p></blockquote> <p>Slashdot <a href="http://tech.slashdot.org/story/14/07/07/2023235/researchers-develop-new-way-to-steal-passwords-using-google-glass">thread</a>.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5886Larry Lessig?s super PAC to end super PACs raised $2.5 million in just 2 days. Here?s what comes next.http://feeds.washingtonpost.com/c/34656/f/636544/s/3c404499/sc/38/l/0L0Swashingtonpost0N0Clarry0Elessigs0Esuper0Epac0Eto0Eend0Esuper0Epacs0Eraised0E250Emillion0Ein0Ejust0E20Edays0Eheres0Ewhat0Ecomes0Enext0C20A140C0A70C0A70C32d9c8a40E55430E46e0A0E99340E456896a2efdb0Istory0Bhtml0Dwprss0Frss0Itechnology/story01.htmhttp://www.washingtonpost.com/larry-lessigs-super-pac-to-end-super-pacs-raised-25-million-in-just-2-days-heres-what-comes-next/2014/07/07/32d9c8a4-5543-46e0-9934-456896a2efdb_story.html?wprss=rss_technologyMon, 07 Jul 2014 10:39:00 -0400<p/> <p>Last week, with just a couple of days until a hard July 4 deadline, Mayday PAC still had to raise a whopping $2.5 million. It was an ambitious target. When I spoke to Harvard law scholar Lawrence Lessig about his chances then, he seemed grimly optimistic in the way a battlefield commander might be about taking a particularly well-defended hill: They'd get there.</p> <a href="http://www.washingtonpost.com/larry-lessigs-super-pac-to-end-super-pacs-raised-25-million-in-just-2-days-heres-what-comes-next/2014/07/07/32d9c8a4-5543-46e0-9934-456896a2efdb_story.html?wprss=rss_technology">Read full article &#62;&#62;</a><img width="1" height="1" src="http://feeds.washingtonpost.com/c/34656/f/636544/s/3c404499/sc/38/mf.gif" border="0" /><br clear='all'/><br/><br/><a href="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/1/rc.img" border="0" /></a><br/><a href="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/2/rc.img" border="0" /></a><br/><a href="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/rc/3/rc.img" border="0" /></a><br/><br/><a href="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/a2.htm"><img src="http://da.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/a2.img" border="0" /></a><img width="1" height="1" src="http://pi.feedsportal.com/r/199120199816/u/197/f/636544/c/34656/s/3c404499/sc/38/a2t.img" border="0" />http://quec.li/EntryComments?feed=http%3A%2F%2Ffeeds.washingtonpost.com%2Frss%2Fbusiness%2Ftechnology&entry=http%3A%2F%2Fwww.washingtonpost.com%2Flarry-lessigs-super-pac-to-end-super-pacs-raised-25-million-in-just-2-days-heres-what-comes-next%2F2014%2F07%2F07%2F32d9c8a4-5543-46e0-9934-456896a2efdb_story.html%3Fwprss%3Drss_technologyHigh court?s college birth-control ruling may further outrage Democrats, mobilize themhttp://feeds.washingtonpost.com/c/34656/f/636655/s/3c3038d9/sc/1/l/0L0Swashingtonpost0N0Cpolitics0Chigh0Ecourts0Ewheaton0Ecollege0Ebirth0Econtrol0Eruling0Ecould0Efurther0Eoutrage0Edemocrats0C20A140C0A70C0A40C74bca7c0A0E0A3a0A0E11e40E85720E4b1b969b63220Istory0Bhtml0Dwprss0Frss0Ipolitics/story01.htmhttp://www.washingtonpost.com/politics/high-courts-wheaton-college-birth-control-ruling-could-further-outrage-democrats/2014/07/04/74bca7c0-03a0-11e4-8572-4b1b969b6322_story.html?wprss=rss_politicsFri, 04 Jul 2014 19:50:00 -0400<p>With much of Washington already gone for the holiday, the Supreme Court issued <a data-xslt="_http" href="http://www.washingtonpost.com/politics/courts_law/2014/07/03/622f7b12-02f8-11e4-8572-4b1b969b6322_story.html">a short legal ruling</a> Thursday with the potential to deepen the political backlash among Democrats that was sparked by the court?s <a data-xslt="_http" href="http://www.washingtonpost.com/national/supreme-court-sides-with-employers-over-birth-control-mandate/2014/06/30/852e5c84-fc61-11e3-b1f4-8e77c632c07b_story.html">earlier Hobby Lobby decision</a>.</p> <a href="http://www.washingtonpost.com/politics/high-courts-wheaton-college-birth-control-ruling-could-further-outrage-democrats/2014/07/04/74bca7c0-03a0-11e4-8572-4b1b969b6322_story.html?wprss=rss_politics">Read full article &#62;&#62;</a><img width="1" height="1" src="http://feeds.washingtonpost.com/c/34656/f/636655/s/3c3038d9/sc/1/mf.gif" border="0" /><br clear='all'/><br/><br/><a href="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/1/rc.img" border="0" /></a><br/><a href="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/2/rc.img" border="0" /></a><br/><a href="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/rc/3/rc.img" border="0" /></a><br/><br/><a href="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/a2.htm"><img src="http://da.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/a2.img" border="0" /></a><img width="1" height="1" src="http://pi.feedsportal.com/r/199120128107/u/197/f/636655/c/34656/s/3c3038d9/sc/1/a2t.img" border="0" />http://quec.li/EntryComments?feed=http%3A%2F%2Ffeeds.washingtonpost.com%2Frss%2Fpolitics&entry=http%3A%2F%2Fwww.washingtonpost.com%2Fpolitics%2Fhigh-courts-wheaton-college-birth-control-ruling-could-further-outrage-democrats%2F2014%2F07%2F04%2F74bca7c0-03a0-11e4-8572-4b1b969b6322_story.html%3Fwprss%3Drss_politicsNSA Targets Privacy Conscious for Surveillancehttps://www.schneier.com/blog/archives/2014/07/nsa_targets_pri.htmltag:www.schneier.com,2014:/blog//2.5877Thu, 03 Jul 2014 12:01:00 -0400<p>Jake Appelbaum et. al, are <a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">reporting</a> on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites. This isn't just metadata; this is "full take" content that's stored forever.</p> <blockquote><p>This code demonstrates the ease with which an XKeyscore rule can analyze the full content of intercepted connections. The fingerprint first checks every message using the "email_address" function to see if the message is to or from "bridges@torproject.org". Next, if the address matched, it uses the "email_body" function to search the full content of the email for a particular piece of text - in this case, "https://bridges.torproject.org/". If the "email_body" function finds what it is looking for, it passes the full email text to a C++ program which extracts the bridge addresses and stores them in a database. <p>[...]</p> <p>It is interesting to note that this rule specifically avoids fingerprinting users believed to be located in Five Eyes countries, while other rules make no such distinction. For instance, the following fingerprint targets users visiting the Tails and Linux Journal websites, or performing certain web searches related to Tails, and makes no distinction about the country of the user. </p> <p>[...]</p> <p>There are also rules that target users of numerous other privacy-focused internet services, including HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion as well as its predecessor MixMaster. The appid rule for MixMinion is extremely broad as it matches all traffic to or from the IP address 128.31.0.34, a server located on the MIT campus.</p></blockquote> <p>It's hard to tell how extensive this is. It's possible that anyone who clicked on this link -- with the embedded torproject.org URL above -- is currently being monitored by the NSA. It's possible that this only will happen to people who receive the link in e-mail, which will mean every Crypto-Gram subscriber in a couple of weeks. And I don't know what else the NSA harvests about people who it selects in this manner.</p> <p>Whatever the case, this is <i>very</i> disturbing.</p> <p>EDITED TO ADD (7/3): The BoingBoing <a href="http://boingboing.net/2014/07/03/if-you-read-boing-boing-the-n.html">story</a> says that this was first published on <a href="http://www.tagesschau.de/inland/nsa-xkeyscore-100.html"><i>Tagesschau</i></a>. Can someone who can read German please figure out where this originated.</p> <p>And, since Cory said it, I do not believe that this came from the Snowden documents. I also don't believe the <a href="http://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/">TAO catalog</a> came from the Snowden documents. I think there's a second leaker out there.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5877Goldman Sachs Demanding E-Mail be Deletedhttps://www.schneier.com/blog/archives/2014/07/goldman_sacks_d.htmltag:www.schneier.com,2014:/blog//2.5876Thu, 03 Jul 2014 06:46:00 -0400<p>Goldman Sachs is going to <a href="http://www.reuters.com/article/2014/07/02/us-google-goldman-leak-idUSKBN0F729I20140702">court</a> to demand that Google retroactively delete an e-mail it accidentally sent.</p> <blockquote><p>The breach occurred on June 23 and included "highly confidential brokerage account information," Goldman said in a complaint filed last Friday in a New York state court in Manhattan. <p>[...]</p> <p>Goldman said the contractor meant to email her report, which contained the client data, to a "gs.com" account, but instead sent it to a similarly named, unrelated "gmail.com" account.</p> <p>The bank said it has been unable to retrieve the report or get a response from the Gmail account owner. It said a member of Google's "incident response team" reported on June 26 that the email cannot be deleted without a court order.</p> <p>"Emergency relief is necessary to avoid the risk of inflicting a needless and massive privacy violation upon Goldman Sachs' clients, and to avoid the risk of unnecessary reputational damage to Goldman Sachs," the bank said.</p> <p>"By contrast, Google faces little more than the minor inconvenience of intercepting a single email - an email that was indisputably sent in error," it added.</p></blockquote>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5876Match Fixing in Soccerhttps://www.schneier.com/blog/archives/2014/07/match_fixing_in.htmltag:www.schneier.com,2014:/blog//2.5874Wed, 02 Jul 2014 06:55:00 -0400<p>Useful <a href="http://grantland.com/the-triangle/a-primer-on-match-fixing-in-the-wake-of-the-cameroon-world-cup-allegations/">primer</a>.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.5874Surface Areahttp://xkcd.com/1389/http://xkcd.com/1389/Wed, 02 Jul 2014 00:00:00 -0400<img src="http://imgs.xkcd.com/comics/surface_area.png" title="This isn't an informational illustration; this is a thing I think we should do. First, we'll need a gigantic spool of thread. Next, we'll need some kind of ... hmm, time to head to Seattle." alt="This isn't an informational illustration; this is a thing I think we should do. First, we'll need a gigantic spool of thread. Next, we'll need some kind of ... hmm, time to head to Seattle." />http://quec.li/EntryComments?feed=http%3A%2F%2Fxkcd.com%2Frss.xml&entry=http%3A%2F%2Fxkcd.com%2F1389%2FBlackphonehttps://www.schneier.com/blog/archives/2014/06/blackphone.htmltag:www.schneier.com,2014:/blog//2.5872Mon, 30 Jun 2014 09:57:00 -0400<strong>m</strong>: <em>Reading the review, this sounds like a Nexus 4-ish design and features with a pre-CM.com version of CyanogenMod and some additional programs installed. It's neat that it's by-default focus and guides are privacy focused, which is good for users that wouldn't think about these things even if they would have been interested in them.<br /> </em><p>First <a href="http://arstechnica.com/security/2014/06/exclusive-a-review-of-the-blackphone-the-android-for-the-paranoid/">review</a> of the secure <a href="https://www.blackphone.ch/">Blackphone</a>.</p>http://quec.li/EntryComments?feed=http%3A%2F%2Fwww.schneier.com%2Fblog%2Fatom.xml&entry=tag%3Awww.schneier.com%2C2014%3A%2Fblog%2F%2F2.58724.5 Degreeshttp://xkcd.com/1379/http://xkcd.com/1379/Mon, 09 Jun 2014 00:00:00 -0400http://quec.li/EntryComments?feed=http%3A%2F%2Fxkcd.com%2Frss.xml&entry=http%3A%2F%2Fxkcd.com%2F1379%2F