Gatekeeper, WannaCry, and BlueKeep- Paul’s Security Weekly #606

    In the security news, giving you the latest on thousands of infected servers from a cryptojacking campaign, an open letter to the GCHQ calling out spy agencies, and a new vulnerability that makes you WannaCry! Paul’s Stories Redditor can stay… Continue reading Gatekeeper, WannaCry, and BlueKeep- Paul’s Security Weekly #606

Tech giants say UK spy agency’s encryption proposal as threat to security and human rights

A proposal from a British spy agency to allow law enforcement access to encrypted communications in certain cases “poses serious threats to cybersecurity and fundamental human rights including privacy and free expression,” a group of security researchers, civil liberties groups, and tech giants like Apple, Google, and Microsoft, have warned. In an open letter to GCHQ, the United Kingdom’s signals intelligence agency, the coalition of tech organizations rejected the agency’s suggestion that adding a law enforcement official to a group chat or call would not threaten civil liberties or the security of encrypted messaging services. If implemented, the GCHQ proposal would “undermine the authentication process that enables users to verify that they are communicating with the right people, introduce potential unintentional vulnerabilities, and increase risks that communications systems could be abused or misused,” states the letter, which was made public this week. Other signatories include Human Rights Watch, Reporters Without […]

The post Tech giants say UK spy agency’s encryption proposal as threat to security and human rights appeared first on CyberScoop.

Continue reading Tech giants say UK spy agency’s encryption proposal as threat to security and human rights

Edward Snowden: Without Russian Asylum, ‘I Would Be in Guantanamo or Dead’

In this week’s CYBER podcast, we sat down with Edward Snowden to talk about his life in Russia, Julian Assange, and press freedom. Continue reading Edward Snowden: Without Russian Asylum, ‘I Would Be in Guantanamo or Dead’

Hacking the GCHQ Backdoor

Last week, I evaluated the security of a recent GCHQ backdoor proposal for communications systems. Furthering the debate, Nate Cardozo and Seth Schoen of EFF explain how this sort of backdoor can be detected: In fact, we think when the ghost feature is… Continue reading Hacking the GCHQ Backdoor

Hacking the GCHQ Backdoor

Last week, I evaluated the security of a recent GCHQ backdoor proposal for communications systems. Furthering the debate, Nate Cardozo and Seth Schoen of EFF explain how this sort of backdoor can be detected: In fact, we think when the ghost feature is active­ — silently inserting a secret eavesdropping member into an otherwise end-to-end encrypted conversation in the manner… Continue reading Hacking the GCHQ Backdoor

Evaluating the GCHQ Exceptional Access Proposal

The so-called Crypto Wars have been going on for 25 years now. Basically, the FBI — and some of their peer agencies in the UK, Australia, and elsewhere — argue that the pervasive use of civilian encryption is hampering their ability to solve crimes and that they need the tech companies to make their systems susceptible to government eavesdropping. Sometimes… Continue reading Evaluating the GCHQ Exceptional Access Proposal

Department of Homeland Security and GCHQ back Apple and Amazon’s denials they were hacked by China

The US Department of Homeland Security and UK’s GCHQ have rallied behind the vigorous denials issued by Amazon and Apple, after Bloomberg BusinessWeek reported China had planted malicious computer chips on systems used by the tech giants.
Continue reading Department of Homeland Security and GCHQ back Apple and Amazon’s denials they were hacked by China

GCHQ on Quantum Key Distribution

The UK’s GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. Ubiquitous on-demand modern services (such as verifying identities and data integrity, establishing network sessions, providing access control, and automatic software updates) rely more on authentication and integrity mechanisms — such as digital signatures — than on… Continue reading GCHQ on Quantum Key Distribution