• NSA Compliance

    Carol D. Leonnig reporting on the rather obvious: “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie B. Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, […]

    Published
  • Keyboard Maestro Macro: Attach and Send

    I’ve long had a need to take a file sitting on my computer and send to to someone. While you can do that with the share menu on OS X, it’s not that great for a couple of reasons: It’s a menu item you have to click. It doesn’t, and can’t, set simple things like […]

    Published
  • ‘Shift the Evilness’

    Peter Lewis, in response to my post about the Gmail scanning, has two fantastic App.net posts, the latter of which ends: They both [U.S. Government and Google] think they are not being evil to learn absolutely everything, as long as they only use it for “good”. So they shift the evilness onto the use of […]

    Published
  • ‘Secure’ Email is the Wrong Approach

    Email, by its very design, cannot be a truly secure system, so let’s stop trying to make “secure” email systems. In order for email to work, headers (recipients, subjects, from) need to be sent in the clear so that servers can route the email to the correct server — think of this data like the […]

    Published
  • ‘Google: Gmail Users Shouldn’t Expect Email Privacy’

    Dominic Rushe has published an article about Google’s response to a lawsuit. The article paints the picture that Google has written a big “fuck you” to users, and thus has Google saying that users are stupid if they think their email isn’t being read, or in Google parlance “scanned”. Instead of trusting Rushe’s article, here’s […]

    Published
  • Deserving Attention

    Adam Siegel writing about his not-yet-year-old daughter’s interactions with him: In an almost unconscious habit whenever I have a short moment of free time in between tasks, I took the brief respite to pull out my phone and check my mail. 60 seconds later after reading a couple messages and deleting a few more, I […]

    Published
  • Android Niceties

    This article, that I skimmed, sent me over to the Android Niceties Tumblr, basically a site showing you screenshots of Android apps they think are beautiful. I guess this could easily be a post where you expect me to say “not even close to iOS”, but that’s not the case. There’s some really great looking […]

    Published
  • ‘A Low Point in Barack Obama’s Presidency’

    You know how idiots write stupid shit about Apple, and then an Apple writer will go section by section through the idiotic post and show how stupid, and verifiably false, the post is? You know what I am talking about. Well, Conor Friedersdorf just did that for The Atlantic, except the target of his article […]

    Published
  • A Democracy Doesn’t Work if the Laws are Secret

    Two interesting posts surrounding the greater NSA debate caught my eye recently. The first is an Op-Ed in The LA Times by Andrew Liepman, titled “What did Edward Snowden get wrong? Everything”. Don’t be confused though (as easy it would be with that headline), because the article is not refuting the validity of the leaks […]

    Published
  • Time to Host Your Own Email?

    One of the things that I’ve been asked about since the Snowden leaks, and especially since last night when two major “secure” email services shut down, is how do I host my email? I host my email on my Mac mini server, and it’s quite a bit easier than you probably think, but likely not […]

    Published
  • Quote of the Date: The New York Times Editorial Board

    “Time and again, the N.S.A. has pushed past the limits that lawmakers thought they had imposed to prevent it from invading basic privacy, as guaranteed by the Constitution.” — The New York Times Editorial Board

    Published
  • ‘Google, Build Up This Wall’

    Stephen Hackett on the lack of security overview on Google Play (store?): In short, Craig Young, a researcher at security firm Tripwire, built an app that can steal weblogin tokens and pass them off to another server. Once there, they can be used in a non-Android browser to log in to users’ Google accounts without […]

    Published
  • ‘Firefox’ Complicated and Very Secure Way of Retrieving Passwords’

    Michiel Bijl shows the “complicated and very secure way” FireFox handles passwords. I guess you are left with Safari if you are a Mac user… Though, I would be willing to forgive FireFox if they make Tor a standard part of their browser.

    Published
  • Snowden on Lavabit

    Edward Snowden commenting on the Lavabit shutdown, via Glenn Greenwald at The Gaurdian: America cannot succeed as a country where individuals like Mr. Levison have to relocate their businesses abroad to be successful. Employees and leaders at Google, Facebook, Microsoft, Yahoo, Apple, and the rest of our internet titans must ask themselves why they aren’t […]

    Published
  • Silent Circle Also Shuts Down

    Jon Callas on the Silent Circle blog: Today, another secure email provider, Lavabit, shut down their system lest they “be complicit in crimes against the American people.” We see the writing the wall, and we have decided that it is best for us to shut down Silent Mail now. We have not received subpoenas, warrants, […]

    Published
  • Lavabit Shuts Down

    The site has been replaced with a splash page, which starts: I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. Lavabit was […]

    Published
  • ‘Change the Airport Security Mindset’

    Kip Hawley, former TSA head, writing for CNN: The “prohibited items” list needs to be radically reduced to ban only real security threats such as explosives and toxins. As far as carrying knives, the FAA should make it a serious federal offense to intimidate a member of the flight crew or another passenger with a […]

    Published
  • The DEA’s Collection of American Phone Logs

    Reuters on the DEA’s “legal” database on American phone calls: The DEA database, called DICE, consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged, DEA officials said. […]

    Published
  • ‘Chrome’s Insane Password Security Strategy’

    Elliott Kember has a post up which details a security flaw in Google’s Chrome browser. The flaw is that if you enter chrome://settings/passwords into Chrome you are taken to a screen which shows you the saved passwords in Chrome. Nothing crazy about that — you can do that for Mac OS X by opening Keychain […]

    Published
  • Dialogue — Handsfree Calling Through Your Mac

    Dialogue is a very cool Mac app, which pairs your laptop with your phone, allowing you to send and receive your calls through the Mac. I’ve been using it for half-a-dozen phone calls today with my Apple EarPods and it works really well. A nice screen appears to allow you to accept or decline calls, […]

    Published