Archiv: Apple Inc. (monopolies)


09.02.2025 - 17:35 [ Computer and Communications Industry Association (CCIA) ]

CCIA Responds to Reports of UK Demand for Worldwide Apple iCloud Access

The following can be attributed to CCIA President & CEO Matt Schruers:

“As the recent Salt Typhoon breach makes clear, end-to-end encryption may be the only safeguard standing between Americans’ sensitive personal and business data and foreign adversaries.

“Reports that Apple has been secretly ordered by the UK Government to weaken its encryption, including in the United States, are a troubling development, if accurate. Decisions about Americans’ privacy and security should be made in America, in an open and transparent fashion, not through secret orders from abroad requiring keys be left under doormats.”

09.02.2025 - 17:30 [ Forbes ]

Apple’s ‘Dangerous’ iPhone Update Is Much Worse Than You Think

So, why is this worse than you think. In my view — and no one can officially comment, so “views” will be all we can share — any such government action would not stop with Apple. Not to over-simplify matters, but a bad actor would simply run Google’s helpful switch to Android software. If the U.K is going after Apple, it’s also going after Google and Meta and others. Why would they not? But Soviet-style, none of these other parties can comment or answer questions or confirm or deny.

08.02.2025 - 17:46 [ Washington Post ]

U.K. orders Apple to let it spy on users’ encrypted accounts

(February 7, 2025)

The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand. An Apple spokesman declined to comment.

Apple can appeal the U.K. capability notice to a secret technical panel, which would consider arguments about the expense of the requirement, and to a judge who would weigh whether the request was in proportion to the government’s needs. But the law does not permit Apple to delay complying during an appeal.

08.02.2025 - 17:26 [ theVerge.com ]

Apple ordered to open encrypted user accounts globally to UK spying

Apple’s iCloud backups aren’t encrypted by default, but the Advanced Data Protection option was added in 2022, and must be enabled manually. It uses end-to-end encryption so that not even Apple can access encrypted files. In response to the order, Apple is expected to simply stop offering Advanced Data Protection in the UK. This wouldn’t meet the UK’s demand for access to files shared by global users, however.

08.02.2025 - 17:21 [ TKP.at ]

UK verlangt Zugriff auf verschlüsselte Daten aller Apple-Nutzer weltweit

(today)

Hintertüren, wie die von den Briten geforderte, sind von Natur aus gefährlich. Beim Hack der US-Kommunikationssysteme im Jahr 2024, der angeblich von chinesischen Akteuren durchgeführt wurde, wurde eine Hintertür verwendet, die die USA und andere Regierungen gefordert hatten:

„Dies ist nicht das erste Mal, dass Hacker die von CALEA vorgeschriebenen Abhör-Backdoors ausnutzen. Wie der Computersicherheitsexperte Nicholas Weaver 2015 gegenüber Lawfare betonte, „muss jede in den USA verkaufte Telefonanlage die Möglichkeit bieten, eine große Anzahl von Anrufen effizient abzuhören. Und da die USA einen so großen Markt darstellen, bedeutet dies, dass praktisch jede weltweit verkaufte Telefonanlage die Funktion ‚Lawful Intercept‘ enthält.“

Vor zwei Jahrzehnten wurde diese obligatorische Abhörfunktion von Hackern, die es auf Vodafone Griechenland abgesehen hatten, unterwandert. Sie fingen Telefongespräche des Premierministers des Landes und hochrangiger politischer, polizeilicher und militärischer Beamter ab.“

01.07.2023 - 13:40 [ SearchEngineJournal.com ]

Elon Musk Hires Prolific Hacker George Hotz To Fix Twitter Search

(November 23, 2022)

In the span of a 12-week internship, Hotz promises to “fix” Twitter search and introduce all-new features, such as the ability to search within liked tweets.

As the first person in the world to jailbreak the iPhone, Hotz is no stranger to bringing new capabilities to existing platforms.

01.07.2023 - 13:06 [ DailyMail.co.uk ]

Revealed: Google and Facebook DID allow NSA access to data and were in talks to set up ‚spying rooms‘ despite denials by Zuckerberg and Page over PRISM project

(8 June 2013)

Meanwhile, Twitter is one company which has managed to keep mum in PRISM discussions.

01.07.2023 - 13:04 [ theGuardian.com ]

NSA Prism program taps in to user data of Apple, Google and others

(7 Jun 2013)

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims „collection directly from the servers“ of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

23.05.2023 - 11:35 [ Al Jazeera ]

US says China can spy with TikTok. It spies on world with Google

(28.03.2023)

Section 702 of the Foreign Intelligence Surveillance Act (FISA), which the US Congress must vote to reauthorise by December to prevent it from lapsing under a sunset clause, allows US intelligence agencies to carry out warrantless spying on foreigners’ email, phone and other online communications.

While US citizens have some protections against warrantless searches under the Fourth Amendment of the US Constitution, the US government has maintained that these rights do not extend to foreigners overseas, giving agencies such as the National Security Agency (NSA), Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA) practically free rein to snoop on their communications.

12.04.2023 - 15:33 [ Haaretz ]

Spyware From Israeli Firm QuaDream Used to Hack Journalists, Activists Around the World

Israel‘s offensive cyber industry accounts for a wide variety of surveillance and espionage technologies. A number of these are tools sold to policing bodies which reveal the geographic location of a target. There are also more advanced technologies, sold to law enforcement and intelligence bodies, which allow clients to hack into computers, mobile phones and encrypted messaging apps, extracting all information stored on a device and secretly turning on its microphone and camera to create a tool which spies on its owner.

29.01.2023 - 20:32 [ Bert Walther / Nitter ]

Schlapphüte offen für neue Technologien…

02.01.2023 - 17:23 [ 9to5mac.com ]

How to turn on end-to-end encryption for iMessage, iCloud, iPhone backups in iOS 16.2

(Dec. 16th 2022)

While end-to-end encryption (E2E) has been already present for Apple’s Messages, iCloud Keychain, Health data, and more, the update brings E2E to your Messages Backup (Messages in iCloud) your iPhone iCloud backup, iCloud Drive, Notes, Photos, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, and Wallet Passes.

25.06.2022 - 08:59 [ theRegister.com ]

Google: How we tackled this iPhone, Android spyware

We‘re told it is potentially capable of spying on the victims‘ chat apps, camera and microphone, contacts book and calendars, browser, and clipboard, and beam that info back to base. It‘s said that Italian authorities have used this tool in tackling corruption cases, and the Kazakh government has had its hands on it, too.

On Thursday this week, TAG revealed its analysis of the software, and how it helped dismantle the infection.

25.06.2022 - 08:49 [ ORF.at ]

Google: Spionageangriffe auf Handys in Italien

Google erklärte weiter, in einigen der nun aufgedeckten Fälle mit der Spähsoftware aus Italien hätten die Hacker die Spionagesoftware möglicherweise unter Zusammenarbeit mit Internetdienstanbietern eingesetzt. Daraus könne geschlossen werden, dass die Käufer der Programme Verbindungen zu staatlich unterstützten Akteuren hatten.

25.06.2022 - 08:08 [ Google Threat Analysis Group ]

Spyware vendor targets users in Italy and Kazakhstan

(23.06.2022)

Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors. TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.

(..)

In some cases, we believe the actors worked with the target’s ISP to disable the target’s mobile data connectivity. Once disabled, the attacker would send a malicious link via SMS asking the target to install an application to recover their data connectivity. We believe this is the reason why most of the applications masqueraded as mobile carrier applications. When ISP involvement is not possible, applications are masqueraded as messaging applications. (…)

We assess, based on the extensive body of research and analysis by TAG and Project Zero, that the commercial spyware industry is thriving and growing at a significant rate. This trend should be concerning to all Internet users.

These vendors are enabling the proliferation of dangerous hacking tools and arming governments that would not be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are often found to be used by governments for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers and opposition party politicians.

30.04.2022 - 17:25 [ addons.mozilla.org ]

Cloud Firewall

Block connections to pages and web resources hosted in major cloud services if the user wishes to do so. Supports blocking Google, Amazon, Facebook, Apple, Microsoft and Cloudflare.

01.04.2022 - 06:41 [ Reuters ]

U.S. bars ex-spies from becoming ‚mercenaries,‘ following Reuters series

(March 16, 2022)

“We don‘t want our best trained intel officers going straight into the hands of foreign governments for the sake of money,“ Castro said. „This discourages intelligence mercenaries and protects our national interest.“

The UAE spying operation, called Project Raven, hacked into Facebook and Google accounts and thousands of Apple iPhones, targeting activists that human rights groups say were later arrested and tortured

01.04.2022 - 06:05 [ ReclaimTheNet.org ]

Lawsuit accusing tech giants of spying is allowed to proceed

(September 14, 2022)

In the legal battles with a focus on listening devices like “smart speakers,” etc, that are currently active in the US, Google and Amazon are not spared either. Reports, including by Reuters, say that a number of filings allege that their devices and apps are recording users’ conversations without their consent, and that Big Tech companies use this material to make money by giving it to advertisers, who can then more precisely target people based on knowledge of their behavior and interests.

03.01.2022 - 11:04 [ IndianExpress.com ]

If you suspect being targeted with Pegasus, get in touch by January 7: Supreme Court panel

The committee constituted by the Supreme Court to look into allegations of snooping using the Pegasus spyware invited all citizens who suspected their mobile phones had been targeted to contact the panel by noon on January 7.

“The committee requests any citizen of India who has reasonable cause to suspect that his/her mobile has been compromised due to specific usage of NSO Group Israel’s Pegasus software to contact the technical committee appointed by the Hon’ble Supreme Court of India, with reasons as to why you believe your device may have been infected with Pegasus malware, and whether you would be in a position to allow the Technical Committee to examine your device,” the three-member panel said in an advertisement in several national dailies.

16.12.2021 - 04:33 [ Wired ]

Google Warns That NSO Hacking Is On Par With Elite Nation-State Spies

“This is on par with serious nation-state capabilities,” he says. “It‘s really sophisticated stuff, and when it‘s wielded by an all-gas, no-brakes autocrat, it‘s totally terrifying. And it just makes you wonder what else is out there being used right now that is just waiting to be discovered. If this is the kind of threat civil society is facing, it is truly an emergency.”

After years of controversy, there may be growing political will to call out private spyware developers.

14.12.2021 - 08:10 [ Boris Reitschuster ]

Bundespressekonferenz: Wünschen sich Journalisten mehr Zensur?

Bemerkenswert finde ich auch etwa die Frage vom Kollegen von der »Süddeutschen Zeitung«, ob sich aus der Protestbewegung eine Terrorbewegung entwickelt. Und die Frage, ob man Apple und Google auffordern könne, die Telegram-App nicht mehr anzubieten. Kommentatoren sahen diese Frage als indirekte Aufforderung an die Regierung, das zu tun.

28.11.2021 - 18:57 [ theGuardian.com ]

Notorious Pegasus spyware faces its day of reckoning

If you were compiling a list of the most toxic tech companies, Facebook – strangely – would not come out on top. First place belongs to NSO, an outfit of which most people have probably never heard. Wikipedia tells us that “NSO Group is an Israeli technology firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones”.

Pause for a moment on that phrase: “remote zero-click surveillance of smartphones”.

17.11.2021 - 18:12 [ Heise.de ]

Biotechnologie, Staat und Kapital

Dieser Markt ließe sich unermesslich steigern, sollte die Propaganda, dass die gesamte Menschheit (B. Gates) und in Deutschland fast die gesamte Bevölkerung (A. Merkel) geimpft werden solle und auch müsse, umgesetzt werden. Deshalb schätzt das Finanz- und Analyseunternehmen „Morningstar“ für 2021 zu erwartenden Umsatz von 67 Milliarden US-Dollar für Covid-19-Impfstoffe. Der Umsatz der Rüstungsindustrie umfasste 2019 166 Mrd. US-Dollar.

Zwei dieser Biotech-Unternehmen sollen näher betrachtet werden: Biontech und Curevac.

05.10.2021 - 00:35 [ Middle East Monitor ]

After NSO Group, warning issued against second Israeli spyware firm

(October 4, 2021)

The July report by Citizen‘s Lab and Microsoft found that Candiru had been used to spy on more than 100 human rights activists, regime opponents, journalists and scholars from countries such as Iran, Lebanon, Yemen, UK, Turkey and even Israel.

Revelations about Candiru make it the first time that fingers were being pointed at a second Israeli cyber-surveillance company, which is considered a competitor of the NSO Group. The notorious Israeli firm sparked a global scandal in July following the discovery that as many as 50,000 phones were targeted by its Pegasus spyware.

05.10.2021 - 00:24 [ Haaretz ]

Cellphone Hacking and Millions in Gulf Deals: Inner Workings of Top Secret Israeli Cyberattack Firm Revealed

(Sep. 7, 2020)

NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.

05.10.2021 - 00:20 [ Forbes ]

Meet Candiru — The Mysterious Mercenaries Hacking Apple And Microsoft PCs For Profit

(Oct 3, 2019)

Israel is home to scores of hacker-for-hire businesses, but one of the most clandestine has been Candiru. With no website and few records available, it’s operated largely under the radar.

But now a researcher is claiming the elite Tel Aviv-based firm sold cyber weapons to the government of Uzbekistan, while industry sources tell Forbes the company is hacking both Microsoft Windows and Apple Macs for various nation states.

03.09.2021 - 20:21 [ Wired ]

Apple Backs Down on Its Controversial Photo-Scanning Plans

In August, Apple detailed several new features intended to stop the dissemination of child sexual abuse materials. The backlash from cryptographers to privacy advocates to Edward Snowden himself was near-instantaneous, largely tied to Apple‘s decision not only to scan iCloud photos for CSAM, but to also check for matches on your iPhone or iPad. After weeks of sustained outcry, Apple is standing down. At least for now.

09.08.2021 - 09:38 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Apple distributed this internal memo this morning, dismissing their critics as „the screeching voices of the minority.“ I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.

(06.08.2021)

09.08.2021 - 09:04 [ CyberPreserve / Twitter ]

A week after Apple introduced an important update iOS 14.7, which despite including critical security fixes, failed to address a vulnerability in iMessage that can be misused by the adversaries to pose a threat and attack iPhones via Pegasus malware.

(02.08.2021)

09.08.2021 - 08:53 [ Raya / Twitter ]

Shocking how Apple still has the nerve to claim they care about user privacy, just a few weeks after the Pegasus leak revealed that a spyware took advantage of (among other things) a big vulnerability on iMessage… the same app they‘re now deploying a privacy backdoor to…

(06.08.2021)

09.08.2021 - 08:36 [ Will Cathcart, Head of @WhatsApp at @Facebook / Twitter ]

I read the information Apple put out yesterday and I‘m concerned. I think this is the wrong approach and a setback for people‘s privacy all over the world. People have asked if we‘ll adopt this system for WhatsApp. The answer is no.

(06.08.2021)

09.08.2021 - 06:42 [ Electronic Frontier Foundation ]

Apple‘s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life

(05.08.2021)

To say that we are disappointed by Apple’s plans is an understatement. Apple has historically been a champion of end-to-end encryption, for all of the same reasons that EFF has articulated time and time again. Apple’s compromise on end-to-end encryption may appease government agencies in the U.S. and abroad, but it is a shocking about-face for users who have relied on the company’s leadership in privacy and security.

There are two main features that the company is planning to install in every Apple device. One is a scanning feature that will scan all photos as they get uploaded into iCloud Photos to see if they match a photo in the database of known child sexual abuse material (CSAM) maintained by the National Center for Missing & Exploited Children (NCMEC). The other feature scans all iMessage images sent or received by child accounts—that is, accounts designated as owned by a minor—for sexually explicit material, and if the child is young enough, notifies the parent when these images are sent or received. This feature can be turned on or off by parents.

09.08.2021 - 06:37 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Louder, for the people in the back: it’s impossible to build a client-side scanning system that can only be used for sexually explicit images sent or received by children.

(05.08.2021)

09.08.2021 - 06:31 [ newsnationnow.com ]

Apple’s plan to scan iPhone images raises privacy concerns

(05.08.2021)

Apple intends to install software on iPhones sold in the United States to scan for child abuse imagery, raising alarm that the move could open the door to surveillance of millions of personal devices.

Liberty Vittert, a professor of data science at Washington University in St. Louis and the features editor of the Harvard Data Science Review, says this is “a cosmic shift in big tech monitoring.”

09.08.2021 - 06:18 [ BGR.com ]

Apple just announced a major change that has privacy advocates totally freaked out

If the thousands of security and privacy experts who’ve raised an outcry on social media over the past few days — and signed at least one letter calling for change — are correct, then Apple is about to make a staggeringly awful miscalculation. More specifically, they’re warning that a new feature set baked into the company’s software in the name of cracking down on one very specific, very horrible act (using iPhones in the service of child exploitation) will actually open the door to the very dystopian privacy nightmare that Apple’s own leaders have warned about for years.

19.07.2021 - 06:19 [ Organized Crime and Corruption Reporting Project / Twitter ]

iMessage, WhatsApp, and FaceTime are vulnerable to „zero-click exploits“ — bugs that allow hackers to commandeer a mobile phone even when the target does nothing to trigger the breach. #PegasusProject

19.07.2021 - 06:15 [ Bill Marczak / Twitter ]

(1) @AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones.

19.07.2021 - 05:06 [ Tagesschau.de ]

Spähsoftware: Wie „Pegasus“ aufs Handy kommt

Sicherheitsexperten von Amnesty International fanden auf mehreren, auch aktuellen iPhones Spuren der „Pegasus“-Software, die anscheinend auf diesem Weg auf das Gerät gelangt war. Ihrer Analyse zufolge kann das Spähprogramm unter Ausnutzung des internetbasierten Dienstes iMessage aus der Ferne installiert werden. Die NSO-Kunden müssen dafür nur die Telefonnummer der Zielperson eingeben.

12.06.2021 - 07:11 [ CNBC.com ]

Apple says it didn‘t know Trump‘s DOJ was asking for Democrats‘ data when it complied with subpoena

Apple on Friday said it didn‘t know former President Donald Trump‘s Department of Justice was subpoenaed data on Democrats when it complied with the request.
Apple said it was under a gag order not to disclose the subpoena to the affected parties.
Microsoft also acknowledged it received a similar subpoena.

12.06.2021 - 07:06 [ ORF.at ]

Ausspähung durch Trump-Regierung sorgt für Empörung

Die „New York Times“ schrieb, Angehörige des Justizministeriums hätten 2017 und 2018 von Apple unter Strafandrohung die Herausgabe von Daten der Betroffenen verlangt – als Teil von Untersuchungen zu möglicher Weitergabe offizieller Informationen rund um die Russland-Ermittlungen gegen Trump. Apple sei zugleich verpflichtet worden, Stillschweigen über die Datenanforderung zu wahren.

14.01.2021 - 12:29 [ Achse des Guten ]

Der Internet-Putsch

Die großen Medientechnologiekonzerne der Wall Street haben eine beispiellose Säuberungswelle im Internet gestartet. Big Tech löscht nicht mehr länger nur Nutzerbeiträge. Nun wollen Facebook, Google, Twitter, Apple und Amazon aller Welt zeigen, dass sie als Meinungswächter frei entscheiden können, wer sich im Internet äußern darf – und wer nicht.

11.01.2021 - 10:04 [ Caitlin Johnstone. ]

Patriot Act 2, Censorship, And Other Notes From The Edge Of The Narrative Matrix

“We need to stop fascism so let’s give massive sweeping powers to an elite alliance of unelected authoritarians.”

“Well I’m a leftist and I haven’t been banned on social media.”

That’s because the left is politically impotent in our society. Unless this is just a hobby for you, at some point you should plan on the left becoming a threat to the oligarchs and warmongers. What do you think happens then?

Do you really think if the left actually becomes a threat to the status quo the Neera Tandens and Rachel Maddows aren’t going to suddenly discover a reason why you’re dangerous and need to be censored? The only way to be fine with censorship is to plan on never challenging power.

11.01.2021 - 09:51 [ Jesse Singal, author / Twitter ]

It‘s sorta weird that Twitter does this mass banning of accounts, including, like, Red Scare, and the response from so many people is „Well they were all Nazis.“ Were they? What has Twitter revealed to you guys about the process that they are hiding from the rest of us?

11.01.2021 - 09:33 [ Glenn Greenwald / Twitter ]

It was a *Democratic-controlled* House sub-committee that just a few months ago issued a lengthy report concluding that FB, Amazon, Google & Apple are *monopolies*. That means competition is impossible. Now Dems are happy that it‘s used for them:

I‘ve been resisting the conclusion that this is Liberals‘ 9/11 because it at first seemed hyperbolic, even though they‘re using the same weapons against their critics (if you question all the new powers they want, it means you love the Terrorists).

But this is Liberals‘ 9/11.

03.01.2021 - 09:45 [ Haaretz ]

A Shady Israeli Intel Genius, His Cyber-spy Van and Million-dollar Deals

(31.12.2020)

Aliada, according to the suit, is a group of cyberweapon companies whose products are branded under the name Intellexa. In May 2019, it added, the group recruited Eran Beck, a former head of the Military Intelligence’s cyber department, as its director of development.

30.11.2020 - 10:11 [ PrivacyIsNotACrime / Twitter ]

According to leaked documents from the @ORF , secret services from the so called „five eyes“ are initiators of the EU Resolution in the #encryptionban. For them this would be a very easy way to monitor all our messages and data, without the possibility to hide them.

17.11.2020 - 20:34 [ International Network of Civil Liberties Organizations ]

INCLO CALLS ON STATES TO DEFEND END-TO-END ENCRYPTION

Fourteen members of INCLO express grave concerns regarding recent moves by various groups to breakencryption. We note with alarm calls from the ​Council of the European Union​, the ​EuropeanCommission​, and the ​Department of Justice in the US​, with support from Australia, Canada, New Zealand, India, Japan and the UK, to allow police authorities intercept encrypted communications.

17.11.2020 - 20:29 [ europa.eu ]

Joint statement by the EU home affairs ministers on the recent terrorist attacks in Europe

(13.11.2020)

We will also examine with interest the Commission’s announced proposal to designate hate speech and hate crime and incitement as criminal offences that are provided for and regulated under European Union law.

In the same vein, the Council must consider the matter of data encryption so that digital evidence can be lawfully collected and used by the competent authorities while maintaining the trustworthiness of the products and services based on encryption technology.

09.11.2020 - 09:50 [ .euractiv.com ]

‘Five Eyes’ alliance demands ways to access encrypted apps

(12.10.2020)

The top justice officials of the United States, Britain, Australia, Canada and New Zealand said in a statement that the growth of end-to-end encrypted apps that make official oversight impossible – like Signal, Telegram, FaceBook Messenger and WhatsApp – “pose significant challenges to public safety.”

“There is increasing consensus across governments and international institutions that action must be taken,” they said.

09.11.2020 - 09:39 [ Geheimdienste-Allianz Five Eyes / US Justizministerium ]

International Statement: End-To-End Encryption and Public Safety

(11.10.2020)

We urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content. We call on technology companies to work with governments to take the following steps, focused on reasonable, technically feasible solutions:

– Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;
– Enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and
– Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.

29.07.2020 - 11:19 [ Cnet.com ]

Apple, Google, Amazon and Facebook CEOs to appear at antitrust hearing on July 27

The House Judiciary Subcommittee on Antitrust will hear from the tech giants‘ leaders.

02.07.2020 - 16:41 [ DailyMail..co.uk ]

Is there a secret Covid tracker on your phone? Android and iPhone users say new feature has suddenly appeared on their handsets – without anyone installing it

Proponents are hailing the arrival of the system as a step towards stamping out the virus and ending lockdown.

The function is automatically disabled in countries without contact-tracing apps, such as Britain and the US.

18.06.2020 - 18:00 [ BBC ]

UK virus-tracing app switches to Google-Apple model

The UK follows Germany, Italy and Denmark among others in switching from a so-called „centralised“ approach to a „decentralised“ one.

The government is expected to confirm the news shortly.

29.04.2020 - 13:51 [ Radio Utopie ]

„Corona-App“: Nächster Anlauf des elektronischen Polizeistaates

Nach dem ihr Programm auf E.U.-Ebene ausgerechnet an Google und Apple gescheitert ist, versucht es die Bundesregierung jetzt im Inland – unter fast amüsanter Nachrichtensperre.

15.04.2020 - 20:05 [ ORF ]

Rotkreuz-App „nicht praxistauglich“

„Von Exitstrategie keine Spur, eine ungeeignete Smartphone-App wird als Lösung aller Probleme verkauft“, lautet das Attest der ARGE Daten, die daher empfiehlt: „Finger weg von der App, vernünftige Distanz halten, regelmäßig Hände waschen!“

04.11.2019 - 16:58 [ ORF.at ]

Apple verspricht 2,5 Milliarden für Wohnraum in Kalifornien

pple kündigte heute ein 2,5 Milliarden Dollar (2,2 Mrd. Euro) schweres Maßnahmenpaket an. Zuvor hatten bereits Google und Facebook jeweils eine Milliarde Dollar zugesagt.

Der Anstieg der Immobilienpreise hat in den vergangenen Jahren Wohnraum für viele unerschwinglich gemacht.

31.08.2019 - 08:38 [ Project Zero team at Google ]

Implant Teardown

The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. We can see here screenshots of the apps on the left, and on the right the contents of the database files stolen by the implant which contain the unencrypted, plain-text of the messages sent and received using the apps:

(…)

There‘s something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you‘re connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.

This means that not only is the end-point of the end-to-end encryption offered by messaging apps compromised; the attackers then send all the contents of the end-to-end encrypted messages in plain text over the network to their server.

31.08.2019 - 08:26 [ Project Zero team at Google ]

A very deep dive into iOS Exploit chains found in the wild

I recommend that these posts are read in the following order:

31.08.2019 - 08:20 [ Gizmodo ]

Google Hackers Reveal Websites Hacked Thousands of iPhone Users Silently for Years

“To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group,” he said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”

31.08.2019 - 07:50 [ derStandard.at ]

Mysteriöser iOS-Hack: Websites infizierten jahrelang iPhones

Außerdem war die IP-Adresse des Servers, zu dem die Daten versandt wurden, fest in der Malware kodiert. Das erleichtert es, den Angreifer ausfindig zu machen – Google hat aber hierzu keine weiteren Informationen öffentlich gemacht.

31.07.2019 - 16:57 [ derStandard.at ]

Apple ist wieder eine Billion Dollar wert

Techkonzern Apple ist an der Börse wieder mehr wert als eine Billion Dollar (knapp 897 Mrd. Euro).

21.07.2019 - 14:36 [ Apple App Store ]

Antidote for Tox

Antidote is a free Tox client for iOS.

Whether it‘s corporations or governments, digital surveillance today is widespread. Antidote is easy-to-use software that connects you with friends and family without anyone else listening in. While other services may require you to pay for features, Antidote is completely free and comes without advertising.

01.06.2019 - 13:20 [ Bloomberg ]

DEA Investigated Honduras President for Cocaine Trafficking

The document, filed Tuesday, sought a court order to force tech companies including Apple, Google and Microsoft, to turn over email information from eight targets of the investigation, including President Juan Orlando Hernandez and Security Minister Julian Pacheco.

21.04.2019 - 19:04 [ Netzpolitik.org ]

Die Verlegerverleger: Google, Apple und Facebook wollen die Paywall kapern

Google hat einen entscheidenden Vorteil: Der Datenkonzern hat die besseren Beziehungen zu Verlagen, die zugleich seine Klienten und Konkurrenten sind. Seit 2015 finanziert Google journalistische Innovationsprojekte mit Millionenbeträgen und bietet den Verlagen nützliche Dienste – von Google Analytics bis zum AMP-Standard, der schnelleres Laden von Inhalten ermöglicht. Der Konzern hat die großen Presseverlage dadurch zu Partnern erzogen.

Der Einstieg von Google, Apple und Facebook ins Abo-Geschäft wird das Machtgefälle zwischen Digitalkonzernen und Nachrichtenmedien ohne Frage verstärken.

10.02.2019 - 08:21 [ Techcrunch.com ]

Many popular iPhone apps secretly record your screen without asking

Every tap, button push and keyboard entry is recorded — effectively screenshotted — and sent back to the app developers.

Or, as Glassbox said in a recent tweet: “Imagine if your website or mobile app could see exactly what your customers do in real time, and why they did it?”

10.02.2019 - 08:19 [ derStandard.at ]

Inklusive Kreditkartendaten: iPhone-Apps zeichnen Bildschirm ungefragt auf

Doch einige populäre iPhone-Apps erfassen nicht nur, wann und wie oft der Nutzer auf irgendwelche Buttons gedrückt hat. Sie nehmen gleich den ganzen Bildschirm auf, berichtet Techcrunch. Es sind etwa die Apps der Modekette Abercrombie & Fitch, Hotels.com oder verschiedener Airlines, die eine Funktion namens „Session Replay“ mitbringen.

05.12.2018 - 03:57 [ Radio Utopie ]

Apples Verschlüsselungs-Experte Jon Callas bei A.C.L.U. unter Vertrag

Die Bürgerrechtsorganisation American Civil Liberties Union (A.C.L.U.) und Jon Callas arbeiten seit dem 3.12.2018 für die nächsten beiden Jahre zusammen. Jon Callas ist Profi auf dem Gebiet der sicheren, verschlüsselten Kommunikation.