Tag: encryption back doors


Worth Reading

In a tweet early this morning, cybersecurity researcher Christopher Soghoian pointed to an internal memo of India’s Military Intelligence that has been liberated by hackers and posted on the Net. The memo suggests that, “in exchange for the Indian market presence” mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as “RINOA”) have agreed to provide backdoor access on their devices. The Indian government then “utilized backdoors provided by RINOA” to intercept internal emails of the U.S.-China Economic and Security Review Commission, a U.S. government body with a mandate to monitor, investigate and report to Congress on ‘the national security implications of the bilateral trade and economic relationship’ between the U.S. and China. … If Apple is providing governments with a backdoor to iOS, can we assume that they have also done so with Mac OS X? –Slashdot

Today there are more than 2 billion Internet users—that’s nearly 30 percent of the world’s entire population connected to each other. No other human endeavor has ever been this big.

And those users are busy. Every single minute of every day, they conduct 700,000 Google searches and 11 million IM (instant message) conversations and post 1 million Facebook status updates. Every single minute, they create more than 1,800 terabytes of new information and data. How big is a terabyte? Well, according to the Library of Congress, the approximate amount of its collections that are digitized and freely and publicly available on the Internet is about 74 terabytes—so every minute of every day, we add 24 new digital Libraries of Congress to the world’s storehouse of information (granted, some of it isn’t worth adding, but that’s another story). In other words, more content is posted to YouTube every month than the combined output of all U.S. television networks since their inception in the 1940s.

And with the growth of information also comes a growing threat to our security. Every minute, more than 168 million email messages are sent. That’s 88 quadrillion messages every year—and each and every one of them is a potential threat vector and source of a malware intrusion. The scale of the vulnerability is exactly as great as the scale of the Internet.


If you think solar cells are going to solve all of our energy problems, you need to read this last one.

The tests showed that charging a mobile phone by simply using a solar charging panel on the back cover is possible but challenging. When carefully positioned, the prototype phones were able, at best, to harvest enough energy to keep the phone on standby mode but with a very restricted amount of talk time. This means there’s still some way to go before a workable and care-free solution is achieved. The most substantial challenge is the limited size of a phone’s back cover, which restricts the extent to which the battery can be charged. What’s more, to ensure mobility, it is essential that the phone’s weather protection doesn’t cover the solar charging panel. –Nokia

© Copyright 2014, All Rights Reserved