Apple’s Technical Solution to Surveillance Legal Issues

I recently wrote about the efforts by the U.S. Government to force Microsoft to deliver the contents of a customer’s e-mail located in Dublin, Ireland. The Court in New York ruled that the computer giant had to deliver to the U.S. grand jury the contents of someone else’s e-mails (not Microsoft’s) in a foreign country,…

Details

Comcast (Heart Symbol) Tor

In the past few days, there have been reports that Comcast, the Philadelphia-based Internet giant (and broadcast giant, and content giant, and giant giant) has been monitoring its users’ activities and has been blocking users’ use of TOR privacy enhancing services. The reports have indicated that Comcast considers the use of TOR to be in furtherance…

Details

A Touch of Class (Action) – Models Sue Apple

There is a predictable pattern when it comes to a data breach. First, the company involves touts its “state of the art” security.  Please, come to us — share your most intimate information with us.  We use “state of the art” or globally recognized or some other euphemism for “we do what everyone else does”…

Details

Privacy with a Side of (Ray) Rice

Much has been said today about the Ray Rice affair.  For those not paying attention, the former NFL player and former Baltimore Ravens running back not only hit his then fiancée (now wife) so hard that he knocked her unconscious, but the videotape unveiled today shows exactly what happened. Although the Atlantic City police department…

Details

Data Breaches: Someone Else’s Problem

INT. SECURE VAULT — NIGHT An impenetrable vault.  Walls 3 feet thick.  Smoke reveals laser motion sensors and heat sensors.  A biometric iris scanner restricts access.  Television monitors show every angle of the room.  Dozens of heavily armed GUARDS await the alarm that will spring them into action.  Our HERO has to break in.  His…

Details