Zoom Clarifies its Relationship with Law Enforcement and FBI

Zoom founder and chief executive Eric Yuan said his company will assist the FBI and law enforcement by providing end-to-end encryption only to paying customers, but not for the majority of those who use its free version, “in case some people use Zoom for a bad purpose.” During widespread U.S. protests over the death of George Floyd, Yuan’s comments did not go over well, with some users threatening to switch to rival services. But his words were misinterpreted and taken out of context. “We plan to provide end-to-end encryption to users for whom we can verify identity, thereby limiting harm to vulnerable groups,” explained Yuan. Continue reading Zoom Clarifies its Relationship with Law Enforcement and FBI

Law Could Stoke Battle Between Congress and Silicon Valley

Senate Judiciary Committee chair Lindsey Graham and senator Richard Blumenthal plan to introduce a law that could interfere with Big Tech’s ability to provide end-to-end encryption. The Eliminating Abuse and Rampant Neglect of Interactive Technologies Act of 2019 (EARN IT Act) targets the distribution of child sexual abuse material on platforms such as Facebook and Google, making them liable for state prosecution and civil lawsuits for user-posted content currently protected by Section 230. Continue reading Law Could Stoke Battle Between Congress and Silicon Valley

CCleaner Malware Is Linked to Attack Against 20 Tech Firms

Security companies Morphisec and Cisco reported the extent of the damage caused by a malware attack on security software CCleaner. Experts say that the software, distributed by Czech company Avast, was targeted not simply to disrupt as many computers as possible, but to conduct espionage. Hackers penetrated the software and added a backdoor, ultimately installing malware on more than 700,000 computers. But hackers also sought to find computers among those infected that resided in networks of 20 leading tech firms. Continue reading CCleaner Malware Is Linked to Attack Against 20 Tech Firms

Government Says iPhone Unlocked, Apple No Longer Needed

The Justice Department revealed it has learned a way to unlock Syed Rizwan Farook’s iPhone without help from Apple. Farook was a gunman in the San Bernardino shooting that killed 14 people. The announcement stalls the legal standoff between the federal government and Apple; the Justice Department will withdraw its efforts to enlist the tech company’s help in the investigation. While the news suspends the privacy vs. security debate, at least temporarily, law enforcement’s ability to open the device without Apple’s assistance raises new concerns. Continue reading Government Says iPhone Unlocked, Apple No Longer Needed

Europe Divides in Battle Between Privacy, Digital Decryption

As the issue of digital encryption versus privacy roiled in the U.S. over the FBI’s demand that Apple unlock the iPhone of a mass murderer in California, recent violence in Brussels and Paris has brought those same issues to the fore in Europe. Although privacy is enshrined as a basic right in much of Europe, lawmakers in some countries are considering proposals that would give greater powers to law enforcement to access personal digital data. But privacy advocates in those same countries are fighting back. Continue reading Europe Divides in Battle Between Privacy, Digital Decryption

RSA Conference Reveals More Nuances in FBI-Apple Battle

By now, everyone knows the general outline of the argument between Apple and the FBI, over the latter’s request for a backdoor into the San Bernardino shooter’s iPhone. Apple’s refusal to do so has sparked a war of words and legal actions between Apple and other proponents of data protection/digital privacy and the government, as well as others who believe national security trumps digital privacy. More recently, at the RSA Conference, an information security event, more nuances were revealed. Continue reading RSA Conference Reveals More Nuances in FBI-Apple Battle

Apple and U.S. Government Battle Over Privacy vs. Terrorism

The battle between terrorism and privacy has been brewing for quite some time, and the tipping point was the iPhone belonging to Syed Rizwan Farook, who, with his wife, opened fire at an office party in December 2015, killing 14 people and injuring 22. The FBI has been trying to decrypt Farook’s phone, unsuccessfully, and asked Apple to create a “backdoor” code into the phone. Apple refused, and now a court order gives the Silicon Valley company five days to comply. Chief executive Tim Cook is holding firm. Continue reading Apple and U.S. Government Battle Over Privacy vs. Terrorism

Juniper Networks Backdoor Hack Likely From Foreign Nation

Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation

Tech Industry Urges President to Not Weaken Encryption Tech

Tech companies including Apple, Facebook, Google and Microsoft joined Internet security experts and civil liberties organizations this week to draft a letter to President Obama warning that a “backdoor” for U.S. law enforcement could also serve as a backdoor for hackers and other governments. The Obama administration has been considering whether companies should only be allowed to use encryption that provides law enforcement with unscrambled access (or a “backdoor”). Critics are concerned about weakening encryption tech that protects Internet communications. Continue reading Tech Industry Urges President to Not Weaken Encryption Tech