Two months after introducing two-factor verification to its Premium account users, Evernote has made it available for all users. With this security feature enabled, you will need to enter your password along with a verification code sent to your mobile phone in order to log in to your account. What this means is that if someone gets a hold of your Evernote password, this nefarious individual would also need to be in possession of your phone to access your data.
Just because the National Security Agency hasn't cracked the anonymizing service Tor doesn't mean that people who use the service are free from surveillance.
The NSA has been able to use ad networks like Google's, and The Onion Router's own entry and exit nodes on the Internet, to follow some Tor users, according to a new report based on documents leaked by whistleblower Edward Snowden and obtained by security researcher Bruce Schneier with the Guardian. Tor is primarily funded by the US State Department and the Department of Defense, home of the NSA.
The National Security Agency has been trying to crack the online anonymity provided by Tor, a US-funded Internet tool designed to keep Net activity private and said to be widely used by dissidents in oppressive countries, as well as by terrorists. That's according to the latest secret intelligence documents drawn from the cache leaked by Edward Snowden and published by the UK's Guardian newspaper.
The NSA hasn't been able to crack Tor outright, but through various means it's been able to "de-anonymize a very small fraction of Tor users," says an internal NSA document … Read more
Lose your cell phone? Well, you can't expect the NSA to help you find it. Or can you?
In the latest revelation kicked up by the privacy brouhaha surrounding leaks by former NSA contractor Edward Snowden, it's come to light that the US National Security Agency tested its systems' ability to handle bulk data on the location of Americans' cell phones (and thus oftentimes, of course, on the location of Americans themselves).
The information comes not from the Snowden documents, but from an answer written out by Director of National Security James Clapper in preparation for potential questions … Read more
You're invited to join CNET at our headquarters in downtown San Francisco this evening for a public discussion about the US government's Internet surveillance programs and online privacy.
Tonight's co-hosted INET San Francisco event will begin with a discussion about the revelations from former NSA contractor Edward Snowden, featuring Alex Abdo, a staff attorney with the National Security Project at the American Civil Liberties Union, and … Read more
A group of some of the biggest names in technology and advocacy has written an open letter to Congress demanding greater transparency when it comes to government requests for user data.
In the letter (PDF), companies like Google, Facebook, Twitter, Apple, and Microsoft, as well as the American Civil Liberties Union, the Electronic Frontier Foundation, Reporters Without Borders, and others wrote to Congress to promote the passage of the Senate's Surveillance Transparency Act of 2013, and the House's Surveillance Order Reporting Act of 2013, "each of which would clarify that companies have the right to publish basic … Read more
The National Security Agency's apparent attempts to weaken encryption technology has led a private-communication startup to move away from encryption algorithms from the US government's National Institute of Standards and Technology.
Silent Circle co-founder Jon Callas called NIST encryption experts "victims of the NSA's perfidy" in a blog post Monday and said the company will move away from using encryption standards that NIST helped create. The standards will still be available, but not by default, he said.
"At Silent Circle, we've been deciding what to do about the whole grand issue of whether … Read more
In a double dose of irony, the National Security Agency's prying has given a big helping hand to Phil Zimmermann's business, Silent Circle.
The first irony is that Zimmermann was the very person the US federal government fought with in the 1990s over the release of the software called PGP, short for Pretty Good Privacy, which made encryption much easier to use. The second irony is that he's now president and co-founder of Silent Circle, a company that seeks to profit from making it harder for the NSA or anybody else to find out what people are … Read more
Facebook, Google, and other tech firms apparently aren't the only ones who've been fascinated by the potential of "social graphs" -- maps of people's social connections. The NSA has reportedly been tapping its giant repositories of phone and e-mail data to create complex diagrams of some Americans' interactions, including lists of associates and travel companions; location info; and other personal data.
The US National Security Agency has, The New York Times reports, been creating such graphs since 2010, using setups like the "Enterprise Knowledge System" -- which, according to a leaked document referenced … Read more
Why bother with boyfriend-vetting sites like ReportYourEx.com when you've got the ginormous spying resources of the NSA at your fingertips?
That seems to have been the thinking of at least one intelligence worker with the US National Security Agency, who, an NSA letter suggests, regularly tapped the agency's now-infamous phone-data collection program to screen people she met at cocktail parties and the like.
The overseas staffer "tasked the telephone number of her foreign-national boyfriend and other foreign nationals and...reviewed the resultant collection," the letter reads, adding later: "The subject asserted that it was her practice to enter foreign national phone numbers she obtained in social settings into the [NSA] system to ensure that she was not talking to 'shady characters.'"… Read more