Be very careful about buying used Nest security cams [Update]

By

Nest-camera
Who’s watching you through your Nest?
Photo: Nest

UPDATE: See the statement received from Google at the bottom of this story.

You might want to think twice about buying used Nest security cameras.

A new report reveals that secondhand models can allow previous owners to spy on new users — even if they correctly follow Nest’s instructions on resetting the device. There’s currently no fix for the security flaw.

NSA stops spying on everyone’s phone. Maybe

By

nsa-hijacked-google-play-to-install-spyware-image-cultofandroidcomwp-contentuploads201505130606191546-nsa-logo-story-top-jpg
The U.S. government has reportedly ceased tracking all our phone calls and text messages.
Photo: NSA

A controversial system tracking the calls and texts of all Americans has supposedly stopped being used by the National Security Agency (NSA). 

This agency reportedly quit employing it months ago, and might not ask that it be reauthorized later this year.

‘Highly plausible’ Apple servers could be infected with spy chips, says former Apple hardware engineer

By

Instrumental founder and CEO Anna Katrina Shedletsky
Instrumental founder and CEO Anna Katrina Shedletsky, who is using her experience as an Apple product design engineer to bring AI to manufacturing.
Photo: Leander Kahney/Cult of Mac

Despite Apple’s denials, it’s “highly plausible” that secret spy chips could have been planted on the company’s servers, said a former Apple hardware engineer.

Anna-Katrina Shedletsky, who spent nearly six years at Apple helping build several generations of iPod, iPhone and Apple Watch, said spy chips could have been slipped into the design of servers used for Apple’s iCloud services, as alleged in a Bloomberg Businessweek story.

“With my knowledge of hardware design, it’s entirely plausible to me,” she said. “It’s very highly plausible to me, and that’s scary if you think about it.”

Apple denies its server hardware was infected by Chinese spy chips [Updated]

By

This isn't actually Apple's data center, but it's close.
Did the chips really make it into Apple's data centers?
Photo: Pexels

Update: Apple and Amazon both issued lengthy statements Thursday concerning the Chinese spy chip allegations. We updated this post to include those statements.

Apple denies that Chinese spy chips infiltrated its iCloud server hardware after claims that motherboards used by Apple, Amazon and dozens of other tech companies contained microchips used for surveillance purposes.

Cupertino insists the story is “wrong and misinformed.” Apple also says Chinese spying had nothing to do with the company’s decision to cut ties with a supplier.

Scientists answer the question, are iPhone apps spying on us?

By

James Bond
James Bond is a spy, but what about your iPhone? People want to know.
Photo: Eon Pictures

Ever been discussing some product to your friends and then had an ad for it appear on your iPhone the next day? It’s happened enough that people want to know “Is my phone listening to me all the time?”

A group of computer scientists decided to test this phobia, which they dubbed panoptispy: the fear that everyone is being spied on.

Coders grapple with good and evil at WWDC’s indie spinoff

By

Bill Atkinson, left and Andrew Stone chat each other up at AltConf in San Francisco June 3, 2014. Photo: Jim Merithew/Cult of Mac
Apple legend Bill Atkinson, left, and Andrew Stone talk Steve Jobs, drugs and the Internet at AltConf 2014 in San Francisco. Photo: Jim Merithew/Cult of Mac

SAN FRANCISCO — At Apple’s WWDC developer conference, there are talks about interface design, writing code and fixing bugs.

Across the street at indie spinoff AltConf, the talks are concerned with spying on users and making choices between good and evil.

“We have had a hand in creating one of the most dystopian and undesirable societies imaginable,” said Andrew Stone, a veteran programmer who once worked with Steve Jobs, during a talk entitled “What Have We Built Here?”

It’s not the kind of stuff you’d expect to hear at a developer’s conference, but in an age of widespread government spying and cynicism about corporate slogans like “Don’t be evil,” AltConf highlights that programmers are often presented with moral choices. There’s a growing awareness in the coding community that although the activity of programming is benign, what’s created can be used for evil. Take Maciej Cegłowski’s talk last month in Germany, which has been widely discussed on the Web. Cegłowski argues — convincingly — that the utopian ideals of the early internet have been thoroughly corrupted, and the entire industry is “rotten.”

Apple will now alert you when the NSA wants your data

By

iOS 8 is Apple's most privacy-conscious mobile OS yet.
iOS 8 is Apple's most privacy-conscious mobile OS yet.

The data-hungry tentacles of the NSA have managed to choke America’s top tech firms into silent submission on data requests, but after months of demanding more transparency, Apple is ready to defy authorities and let you know when the NSA wants your data.

Prosecutors warn that such a move will undermine investigations by tipping off criminals and allowing them to destroy sensitive data, but according to the Washington Post, Apple and others have already changed their policies.

Everything You Need To Know About The NSA’s Leaky Apps

By

Photo: Rovio
Photo: Rovio

While accusations about NSA backdoors to Apple devices have been doing the rounds for a while now, yesterday’s revelations about spying agencies using so-called “leaky apps” to capture user data has reignited the debate. Below is a Q&A covering everything we’ve learned so far:

Q) What is a leaky app?

A) An app that transmits private user information across the Internet. While apps have come under fire for collecting private user information before, the current outcry follows revelations leaked by Edward Snowden, suggesting that leaky apps have been the focus of spying organizations such as the NSA and its UK counterpart, GCHQ (Government Communications HQ). The NSA has cumulatively spent more than $1 billion in its phone targeting efforts. A 2010 NSA presentation cites poor secured apps as a “golden nugget” for gathering user information — including, but not limited to, address books and friend lists.

Meet The Android-Powered ‘Blackphone’ Designed To Stop The Spies

By

post-262473-image-92e9c23b3b595cfaaaa7599782bd1fb0-jpg

Having your phone calls listened to and your text messages read remotely is a genuine concern for many smartphone owners now that we’ve gotten an insight into the activities of the NSA spies. We’ve quickly learned that our seemingly secure devices are like an open book for those who have the knowledge and the power to get into them.

But the Blackphone, an Android-powered smartphone from Silent Circle and Geeksphone, is designed to ensure that your private data remains private, and cannot be obtained by even the snoopiest of snoopers. 

NSA Spyware Allegedly Gives Backdoor Access to iPhones

By

woman-talking-on-iphone-reuters-635

The U.S. National Security Agency has spyware designed to grant backdoor access to the iPhone specifically, according to leaked documents shared by high-profile security researcher Jacob Appelbaum and German publication Der Spiegel.

While speaking at the Chaos Communication Congress in Germany, Appelbaum shared his knowledge of “DROPOUTJEEP,” a top-secret NSA program that can intercept an iPhone’s SMS messages, contacts, location, camera, and microphone.