Pinboard (jm)
https://pinboard.in/u:jm/public/
recent bookmarks from jmThe disturbingly simple way dozens of celebrities had their nude photos stolen2016-03-16T11:08:33+00:00
http://fusion.net/story/281132/feds-busted-celebgate-hacker/
jmsecurity phishing nudes fappening celebs gmail icloud applehttps://pinboard.in/https://pinboard.in/u:jm/b:7dbc253c7d6e/Not Safe For Not Working On2014-09-10T10:43:59+00:00
http://dankaminsky.com/2014/09/03/not-safe-for-not-working-on/
jm*It's time to ban Password1*: [...] Defenders are using simple rules like “doesn’t have an uppercase letter” and “not enough punctuation” to block passwords while attackers are just straight up analyzing password dumps and figuring out the most likely passwords to attempt in any scenario. Attackers are just way ahead. That has to change. Defenders have password dumps too now. It’s time we start outright blocking passwords common enough that they can be online brute forced, and it’s time we admit we know what they are. [...]
*People use communication technologies for sexy times. Deal with it*: Just like browsers have porn mode for the personal consumption of private imagery, cell phones have applications that are significantly less likely to lead to anyone else but your special friends seeing your special bits. I personally advise Wickr, an instant messaging firm that develops secure software for iPhone and Android. What’s important about Wickr here isn’t just the deep crypto they’ve implemented, though it’s useful too. What’s important in this context is that with this code there’s just a lot fewer places to steal your data from. Photos and other content sent in Wickr don’t get backed up to your desktop, don’t get saved in any cloud, and by default get removed from your friend’s phone after an amount of time you control. Wickr is of course not the only company supporting what’s called “ephemeral messaging”; SnapChat also dramatically reduces the exposure of your private imagery. [...]
via Leonard.]]>icloud apple privacy security via:lhl snapchat wickr dan-kaminsky cloud-services backuphttps://pinboard.in/https://pinboard.in/u:jm/b:4e8c6ab195ee/Apple: Untrustable2014-09-10T10:13:18+00:00
http://randomfoo.net/2014/09/09/apple-untrustable
jmToday, Apple announced their “Most Personal Device Ever”. They also announced Apple Pay (the only mentions of “security” and “privacy” in today’s event), and are rolling out health tracking and home automation in iOS 8.
Given their feckless track record [with cloud-service security], would you really trust Apple with (even more of) your digital life?
]]>icloud apple fail security hacks privacyhttps://pinboard.in/https://pinboard.in/u:jm/b:ffd2b91e2bd0/Nik Cubrilovic - Notes on the Celebrity Data Theft2014-09-03T09:55:38+00:00
https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/
jmapple privacy security celebrities pics hacking iphone ipad ios exploits brute-force passwords 2fa mfa find-my-iphone icloud backupshttps://pinboard.in/https://pinboard.in/u:jm/b:3512d47bb1b8/How the NSA Spies on Smartphones2013-09-09T20:57:25+00:00
http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html
jmOne of the US agents' tools is the use of backup files established by smartphones. According to one NSA document, these files contain the kind of information that is of particular interest to analysts, such as lists of contacts, call logs and drafts of text messages. To sort out such data, the analysts don't even require access to the iPhone itself, the document indicates. The department merely needs to infiltrate the target's computer, with which the smartphone is synchronized, in advance. Under the heading "iPhone capability," the NSA specialists list the kinds of data they can analyze in these cases. The document notes that there are small NSA programs, known as "scripts," that can perform surveillance on 38 different features of the iPhone 3 and 4 operating systems. They include the mapping feature, voicemail and photos, as well as the Google Earth, Facebook and Yahoo Messenger applications.
and, of course, the alternative means of backup is iCloud.... wonder how secure those backups are.]]>nsa surveillance gchq iphone smartphones backups icloud securityhttps://pinboard.in/https://pinboard.in/u:jm/b:0dd393492c81/how to restore from iCloud backup2012-06-20T15:50:42+00:00
http://oberhaus-iphone.blogspot.com/2011/10/using-icloud-to-restore-accidentally.html
jmbackup iphone restore sysadmin phones icloud apple howtohttps://pinboard.in/https://pinboard.in/u:jm/b:f78abb08d92a/