article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. I wrote about all this, and more, in 2013.).

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Last month, Attorney General William Barr gave a major speech on encryption policy­what is commonly known as "going dark." Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. I wrote about all this, and more, in 2013.).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Probably not.

article thumbnail

Ferocious Kitten: 6 years of covert surveillance in Iran

SecureList

From 2015 to February 2018, the malware was compiled with Visual Studio 2013 and 2015, whereas in February 2018, the developers moved to Visual Studio 2017 and embedded the malware’s logic within Microsoft Foundation Class (MFC) classes. argument: path to file to upload. – List files and repositories.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

DNS encryption. DNS encryption plugs a gap that makes it easy to track the websites you visit. DNS encryption restores your privacy by making it impossible for anything other than the DNS resolver to read and respond to your queries. FIDO2 is a specification that uses public key encryption for authentication.

Internet 109
article thumbnail

The Origins and History of the Dark Web

Identity IQ

From 2011 to 2013, the Silk Road hosted 1.2 2013: The End of the Silk Road Authorities were able to trace the pseudonym back to Ulbricht thanks to the efforts of an IRS investigator who was working with the DEA on the Silk Road case in mid-2013. The FBI shut down the Silk Road in October 2013. billion in value.

article thumbnail

What is Schrems II and how does it affect your data protection in 2021?

CyberSecurity Insiders

On July 16 2020, the Court of Justice of the European Union (EU) issued a verdict that ruled that the EU-US Data Protection Shield, on which many companies relied on to transfer their data between the US and the EU, was invalidated due to concerns around surveillance by US state and law enforcement agencies. Interested and want to learn more?