Surveillance: Google collects meta data (phone calls, SMS) from Android phones

No surprise here. The truth is, even if you are meticulous with your privacy, all it takes is somebody else in the majority of the population to have your details on their device and it’s there permanently. Not to be confused with equally noxious companies like Truecaller, who offer caller ID services by vacuuming up everybody’s address books. However, the author is incorrect, you CAN actually … Continue reading Surveillance: Google collects meta data (phone calls, SMS) from Android phones

Extracting Qualcomm’s KeyMaster Keys – Breaking Android Full Disk Encryption

Even with full-disk encryption, Qualcomm-based Android devices can be broken by OEMs who can self-sign TrustZone images to extract master keys which can then be brute-forced. Thus, set a sufficiently strong MASTER encryption password (the one that only needs to be entered on boot), preferably at least 16-20 characters with good entropy. To my knowledge, non-rooted devices CANNOT set a separate boot and unlock password, … Continue reading Extracting Qualcomm’s KeyMaster Keys – Breaking Android Full Disk Encryption

Intel x86s hide another CPU that can take over your machine

In short, Intel AMT, an OS-independent subsystem, is unauditable and exploitable, it should be disabled on your system if you do not 100% trust the vendor. “So in conclusion, Intel has so far stopped anyone from tinkering with ME firmware in practice, and there is no way to trust the code running on your ME because it’s proprietary. So we are back to the days … Continue reading Intel x86s hide another CPU that can take over your machine

Epic’s Tim Sweeney: Here’s how to keep Windows an open platform

At least for gaming, our greatest hope for a solution to a DRM-ridden locked down ecosystem (UWP), is marginally less DRM-ridden locked down, but cross-platform ecosystem (Steam). I’ll take it. There’s also another good read on why UWP is a bad idea at PC Gamer. “The past decade of Microsoft’s churn in strategies and executives has seen the release of a major platform that prevented apps … Continue reading Epic’s Tim Sweeney: Here’s how to keep Windows an open platform

You Are Your Phone

So it has begun – loans are being approved/declined based on user smartphone habits – calls/SMS, travel, social media usage, etc, can be used to fairly accurately profile a person economically and demographically. Expect this to be widely used in auto and health insurance, not to mention online shopping. I don’t believe there is actually any way to circumvent this, as you can’t spoof your … Continue reading You Are Your Phone

How Apple Is Giving Design A Bad Name

Let’s put to rest the belief that Apple still has fantastic software design. They make great hardware, but the software universally across OS X and iOS is increasingly terrible. Senseless design decisions have left even hardcore fans scratching their heads. Apple lost their laser-focus a number of years ago and usability has suffered greatly. Though even with all the ongoing online service issues plaguing users, … Continue reading How Apple Is Giving Design A Bad Name

Hyde Park visitors covertly tracked via mobile phone data

This type of detailed tracking of individuals can easily be deanonymised, as it’s usually based on unique MAC or IMSI address on the mobile device. Advertiser databases are instantly cross-referenced to provide specific demographic (and more) data of the individual as they enter an area – it’s already being used in shopping areas to track which shops (and sometimes, which shelves) people go to. Some … Continue reading Hyde Park visitors covertly tracked via mobile phone data