Sunday, September 8, 2013

More NSA Fuckery: You Might Want to Go Back to an Old-Fashioned Address Book

Whatever you have on your smartphone: Documents, lists of contacts, semi-porno selfies, the NSA has access to it. For they have cracked into all of them: iPhones, Androids, Blackberries, pretty much everything. (H/T)

It may be that the Brits persuaded Blackberry, Ltd., a Canadian company, to engineer in a back-door. Blackberry denies it.

So as far as keeping your data safe, forget any company located within the "Five Eyes".

Oh by the way, the Obama Administration apparently has a plan to salt the Federal judiciary with new judges who love the National Surveillance State, based on the nomination of Valerie Caproni to be a Federal judge. She was a top FBI lawyer who loved the idea of illegal surveillance and who allegedly lied about the scope of it.

2 comments:

  1. imple solution.. use a dead sim in the now not a telephone. Turn of networking and its air gaped. Sure when you enable those things your back on the grid but more time off than on requires a lot more effort to connect the dots.

    In the end encryption is widely used often without choice (4G, HTTPS, VPN, trusted certificates) and the cost to check them even is low (in cpu cycles) is still overwhelmed by shear quantity, then the occasional use of more secure encryption is in the noise and requires more cycles to look. At some point the users overwhelm the lookers with too many fragmented things to see.

    There are two groups to hide things from crooks that will use every trick to get it so its economic value is exposed (that is to rob me) and the NSA.

    I'd really like to believe the NSA is using all that hovered data to catch crooks that are trying to rob me. However I am skeptical that they can or even care to.

    So I use encryption to keep the crooks at bay as they are the greater threat, currently.

    Eck!

    ReplyDelete
  2. The NSA thus far has used the hoovered data only to solve crimes after they've occurred. For example the Boston marathon bombers, they checked all the phone calls from the vicinity of the explosions and found a couple of suspicious ones at just the right time, and zeroed in quickly. In the end unless they have reason to pay attention to you, you're under the radar so to speak, because there's just too much data to really trawl it for "terrorists" given current technology.

    Regarding address books, if I were involved in political activities I'd definitely air-gap my address book (whether by putting it on paper or simply treating a smartphone as if it were an old-fashioned PDA w/no connectivity). Otherwise it's just not worth the trouble.

    ReplyDelete

House Rules #1, #2 and #6 apply to all comments. Rule #3 also applies to political comments.

In short, don't be a jackass. THIS MEANS YOU!
If you never see your comments posted, see Rule #7.

All comments must be on point and address either the points raised in the blog post or points raised by commenters in response.
Any comments that drift off onto other topics are subject to deletion.

(Please don't feed the trolls.)

中國詞不評論,冒抹除的風險。僅英語。

COMMENT MODERATION IS IN EFFECT UFN. This means that if you are an insulting dick, nobody will ever see it.