article thumbnail

Transacting in Person with Strangers from the Internet

Krebs on Security

But when dealing with strangers from the Internet, there is always a risk that the person you’ve agreed to meet has other intentions. These safe trading places exist because sometimes in-person transactions from the Internet don’t end well for one or more parties involved. Nearly all U.S. Nearly all U.S.

Internet 294
article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

The example in the presentation is a kidnapper. But if you assume that he has some sort of smart phone in his pocket that identifies itself over the Internet, you might be able to find him in that dataset. There’s a whole lot of surveillance you can do if you can follow everyone, everywhere, all the time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

The app also includes a censorship keyword list, which, while presently inactive, targets a variety of political topics including domestic issues such as Xinjiang and Tibet as well as references to Chinese government agencies. MY2022 includes features that allow users to report “politically sensitive” content.

article thumbnail

Tor’s (security) role in the future of the Internet, with Alec Muffett

Malwarebytes

The open-source project lets people browse the Internet more anonymously by routing their traffic across different nodes before making a final connection between their device and a desired website. The post Tor’s (security) role in the future of the Internet, with Alec Muffett appeared first on Malwarebytes Labs.

article thumbnail

AI and Microdirectives

Schneier on Security

China is experimenting with even more powerful forms of automated legal enforcement and targeted surveillance. Made possible by advances in surveillance, communications technologies, and big-data analytics, microdirectives will be a new and predominant form of law shaped largely by machines. Yet it is not a future we must endure.

article thumbnail

RuNet – Russia successfully concluded tests on its Internet infrastructure

Security Affairs

Russia successfully disconnected from the internet. Russia’s government announced that it has successfully concluded a series of tests for its RuNet intranet aimed at country disconnection from the Internet. One of them is checking the integrity and security of the Internet as a result of external negative influences.”

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I paged through weekly reports, presentation slides from status meetings, and general briefings to educate visitors. The meeting presenters try to spice things up. Very probably. Definitely.