"Protected communication" or who owns the information, he...

in #technology7 years ago

it's No secret that the smartphone today is the perfect device for round-the-clock surveillance and listening because we voluntarily carry it anywhere you go.

sourse

To the delight of both special services, and intruders, many people do not think about how easy it is to connect to the communication channel or to steal data (though maybe it's they don't need to).

the Messengers the last time, too puny, software systems quickly-search actions connected legal mechanisms pressure written, you can begin to control. And for some reason many people I know are switching to Telegram Signal and, interestingly, this is a signal for what?!

do Not forget about the good old method of hacking into specific devices, for which a more loyal attitude to Apple, not yielding to the attempts of the FBI to get the loopholes to access the user data iPhone. Reasonable, since the attack bitcoin extortionist Bad Rabbit from the news, as previous code used at the time, stolen from the NSA. So let the FBI "exploit", and it will have a month to use someone unknown.

a Similar situation once again shows us all that and the government regularly used software hacking of electronic media. This popular Elcomsoft products, and systems from the Israeli company Cellebrite, which recently received its "black PR" in connection with the leak of customer data in the face of American, European and Russian "law enforcement".

typically, you use the standard functions selection of the password/pin code, recover deleted data (photos, messages, contacts), the experts in cryptography say that to this day the device on the Android operating system even with the use of full encryption is memory not protected from cracking because of store keys on the device.

According to statements of the same Snowden, from the current capabilities of the intelligence agencies not fully protected smartphones. As what he gives the example of a set of Smurf software Suite, with which the British intelligence services can get access not only to wiretap but also to include the microphone, camera, GPS if the phone is switched off. That's no wonder: the battery throw ))

Over the past year, the FBI due to the new encryption methods have not been used as evidence in court - more than 7 thousand devices, which, no doubt, indicates the approach of the struggle of the authorities with corporations that stand to protect the values underlying the security and privacy of millions of people around the world.

In Russia to think about hacking and it is not necessary, because the operators do not check or when one of the subscribers listen to with the use of SORM. Yes, and a great deal of frustration on the basis of information from law enforcement officials, very few people use the sensible ways of protection.

a well-Known technique, when the above criminal case number, you can add a couple that does not have to investigate any relationship. Here and ready to "legitimate" reason which even confirm is not necessary. Well, after the changes in the Russian laws, it will be possible to get a list of data which the authorities of most countries only dream!

in addition, remember there are known cases of connecting directly to carrier optical fiber (to capture traffic as a whole), when for one reason or another cannot . equipment to access the servers. And foreign practice of using the intercept subscriber traffic about base stations (with stronger signal), or the control information frame to the local network companies, etc.

Yes, the more you know the details, the less delusional thoughts be of the popular dystopia. Now, certainly - the world belongs to those who will analyze and use the information. Do not forget that you store on their device :)