Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. ICYMI, from Reuters:

ICYMI, from Reuters:

Scheduled Pinned Locked Moved Uncategorized
18 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

    @mattblaze @briankrebs @ai6yr So now they know
    - your phone number,
    - your dad's phone number,
    - your voice,
    - your dad's voice,
    - your phone or phone OS,
    - the location you're calling from,
    - the approximate location of your dad's house,
    - that you live with your dad or are visiting him,
    - that your dad has a house with a driveway,
    - and that there is a garage there.
    This is metadata that, when combined with other metadata, can paint an alarmingly accurate picture of you.

    mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
    mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
    mousey@mastodon.seattlematrix.org
    wrote last edited by
    #8

    @ron_olafsson @mattblaze @briankrebs @ai6yr
    ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
    - population densities
    - family size averages
    - local and regional events
    - almost any financial transaction

    There's too much value to count it all.

    Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

    ron_olafsson@mastodon.socialR vatvslpr@c.imV 2 Replies Last reply
    0
    • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

      @ron_olafsson @mattblaze @briankrebs @ai6yr
      ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
      - population densities
      - family size averages
      - local and regional events
      - almost any financial transaction

      There's too much value to count it all.

      Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

      ron_olafsson@mastodon.socialR This user is from outside of this forum
      ron_olafsson@mastodon.socialR This user is from outside of this forum
      ron_olafsson@mastodon.social
      wrote last edited by
      #9

      @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

      ai6yr@m.ai6yr.orgA mousey@mastodon.seattlematrix.orgM 2 Replies Last reply
      0
      • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

        @mattblaze @briankrebs @ai6yr So now they know
        - your phone number,
        - your dad's phone number,
        - your voice,
        - your dad's voice,
        - your phone or phone OS,
        - the location you're calling from,
        - the approximate location of your dad's house,
        - that you live with your dad or are visiting him,
        - that your dad has a house with a driveway,
        - and that there is a garage there.
        This is metadata that, when combined with other metadata, can paint an alarmingly accurate picture of you.

        cellomomoncars@mastodon.socialC This user is from outside of this forum
        cellomomoncars@mastodon.socialC This user is from outside of this forum
        cellomomoncars@mastodon.social
        wrote last edited by
        #10

        @ron_olafsson @mattblaze @briankrebs @ai6yr

        I am nobody, and still my voicemail recording doesn't have my voice on it. And I don't pickup on unknown numbers, if it's important they will leave a voicemail.

        Signal FTW

        1 Reply Last reply
        0
        • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

          @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

          ai6yr@m.ai6yr.orgA This user is from outside of this forum
          ai6yr@m.ai6yr.orgA This user is from outside of this forum
          ai6yr@m.ai6yr.org
          wrote last edited by
          #11

          @ron_olafsson @mattblaze @briankrebs @mousey That said (having not analyzed it), how much relationship / traffic analysis can you do on Signal?

          i.e. if you drunk buddy Pete keeps on texting you hot tips about things going down overseas, can you look at addressing/trace network traffic, even if you can't read the messages? i.e. he keeps on texting your OTHER friend, Marc about him needing to find a girlfriend in his new job running the overseas branch of your franchise, but he's got to learn Spanish first? And suddenly they're exchanging traffic at 2am on Signal?"

          ron_olafsson@mastodon.socialR 1 Reply Last reply
          0
          • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

            @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

            mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
            mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
            mousey@mastodon.seattlematrix.org
            wrote last edited by
            #12

            @ron_olafsson @mattblaze @briankrebs @ai6yr

            Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

            Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

            Every carrier is Security without Privacy.

            Every stupid backdoor, like the CALEA law, is another camera in your toilet.

            ai6yr@m.ai6yr.orgA ron_olafsson@mastodon.socialR 2 Replies Last reply
            0
            • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

              @ron_olafsson @mattblaze @briankrebs @ai6yr

              Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

              Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

              Every carrier is Security without Privacy.

              Every stupid backdoor, like the CALEA law, is another camera in your toilet.

              ai6yr@m.ai6yr.orgA This user is from outside of this forum
              ai6yr@m.ai6yr.orgA This user is from outside of this forum
              ai6yr@m.ai6yr.org
              wrote last edited by
              #13

              @mousey @ron_olafsson @mattblaze @briankrebs "I'm totally secure! Look at this cool app, Grammarly AI Keyboard! Now I never make typos!" 🤪

              1 Reply Last reply
              0
              • ai6yr@m.ai6yr.orgA ai6yr@m.ai6yr.org

                @ron_olafsson @mattblaze @briankrebs @mousey That said (having not analyzed it), how much relationship / traffic analysis can you do on Signal?

                i.e. if you drunk buddy Pete keeps on texting you hot tips about things going down overseas, can you look at addressing/trace network traffic, even if you can't read the messages? i.e. he keeps on texting your OTHER friend, Marc about him needing to find a girlfriend in his new job running the overseas branch of your franchise, but he's got to learn Spanish first? And suddenly they're exchanging traffic at 2am on Signal?"

                ron_olafsson@mastodon.socialR This user is from outside of this forum
                ron_olafsson@mastodon.socialR This user is from outside of this forum
                ron_olafsson@mastodon.social
                wrote last edited by
                #14

                @mattblaze @briankrebs @mousey @ai6yr Fair point: Signal also collects metadata to a small extent (when messages are sent allows conclusions to be drawn about lifestyle habits). Even more problematic is that Google can also evaluate this metadata, as Signal messages are delivered via Google Play Service FCM (at least on Android). A better option for Android is the more privacy-friendly Signal client Molly, which supports UnifiedPush and thus completely bypasses Google.

                1 Reply Last reply
                0
                • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                  ICYMI, from Reuters:

                  "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

                  "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

                  "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

                  "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

                  reuters.com

                  favicon

                  (www.reuters.com)

                  emory@soc.kvet.chE This user is from outside of this forum
                  emory@soc.kvet.chE This user is from outside of this forum
                  emory@soc.kvet.ch
                  wrote last edited by
                  #15

                  @briankrebs this is exactly why out of 9 business entities i have participated in forming 0 of them are anything more than a side hustle.

                  i cannot afford to go all-in without an extremely generous investor.

                  #entrepreneur #healthcare

                  1 Reply Last reply
                  0
                  • R relay@relay.an.exchange shared this topic
                  • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                    @ron_olafsson @mattblaze @briankrebs @ai6yr

                    Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

                    Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

                    Every carrier is Security without Privacy.

                    Every stupid backdoor, like the CALEA law, is another camera in your toilet.

                    ron_olafsson@mastodon.socialR This user is from outside of this forum
                    ron_olafsson@mastodon.socialR This user is from outside of this forum
                    ron_olafsson@mastodon.social
                    wrote last edited by
                    #16

                    @mattblaze @briankrebs @ai6yr @mousey There are ways to regain control of your own data. For Android, @GrapheneOS is recommended, for example. For a private keyboard, you can find several options on F-Droid, such as FlorisBoard, which does not send any data to the internet. You can check this (and restrict all other apps as you wish) with @rdns. Once everything is configured, it works great. But sure, there's no 100%.

                    1 Reply Last reply
                    0
                    • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                      @ron_olafsson @mattblaze @briankrebs @ai6yr
                      ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
                      - population densities
                      - family size averages
                      - local and regional events
                      - almost any financial transaction

                      There's too much value to count it all.

                      Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

                      vatvslpr@c.imV This user is from outside of this forum
                      vatvslpr@c.imV This user is from outside of this forum
                      vatvslpr@c.im
                      wrote last edited by
                      #17

                      @mousey @ron_olafsson @mattblaze @briankrebs @ai6yr
                      You can get information on things like population density and average family size from census.gov; it's out there for the taking by anyone who wants to know. Similarly, you can find out about local and regional events by looking at public advertisements. I'm not saying the breach isn't catastrophic, but a lot of the information you're talking about is already public knowledge.

                      1 Reply Last reply
                      0
                      • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                        ICYMI, from Reuters:

                        "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

                        "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

                        "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

                        "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

                        reuters.com

                        favicon

                        (www.reuters.com)

                        H This user is from outside of this forum
                        H This user is from outside of this forum
                        hiddenpineapple@infosec.exchange
                        wrote last edited by
                        #18

                        @briankrebs I feel like it happens enough, with great percision, this effect should have a name.

                        1. Telecommunications breach occurs
                        2. Someone mentions Signal
                        3. Nuanced hypotheticals are exchanged
                        4. Argument over metadata takes place
                        5. There's a Molly vs. Signal comparison
                        5b. Something about Matrix
                        6. GrapheneOS
                        7. Someone knows too much about keyboards

                        It feels like a Godwin's law type event where it's just a matter of when, not if.

                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                          R relay@relay.mycrowd.ca shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups