Massive Government Data Leak in Sweden
Seems to be incompetence rather than malice, but a good example of the dangers of blindly trusting the cloud…. Continue reading Massive Government Data Leak in Sweden
Collaborate Disseminate
Seems to be incompetence rather than malice, but a good example of the dangers of blindly trusting the cloud…. Continue reading Massive Government Data Leak in Sweden
Turkish hackers are threatening to erase millions of iCloud user accounts unless Apple pays a ransom. This is a weird story, and I’m skeptical of some of the details. Presumably Apple has decided that it’s smarter to spend the money on secure backups and other security measures than to pay the ransom. But we’ll see how this unfolds…. Continue reading Hackers Threaten to Erase Apple Customer Data
Ever since Ian Krstić, Apple’s Head of Security Engineering and Architecture, presented the company’s key backup technology at Black Hat 2016, people have been pointing to it as evidence that the company can create a secure backdoor for law enforcement. It’s not. Matthew Green and Steve Bellovin have both explained why not. And the same group of us that wrote… Continue reading Apple’s Cloud Key Vault
Shortened URLs, produced by services like bit.ly and goo.gl, can be brute-forced. And searching random shortened URLs yields all sorts of secret documents. Plus, many of them can be edited, and can be infected with malware. Academic paper. Blog post with lots of detail…. Continue reading Security Risks of Shortened URLs