"These companies are certainly pissed that the publicity surrounding the NSA's actions is undermining their users' trust in their services, and they're losing money because of it. Cisco, IBM, cloud service providers, and others have announced that they're losing billions, mostly in foreign sales.
"These companies are doing their best to convince users that their data is secure. But they're relying on their users not understanding what real security looks like. IBM's letter to its clients last week is an excellent example. The letter lists five "simple facts" that it hopes will mollify its customers, but the items are so qualified with caveats that they do the exact opposite to anyone who understands the full extent of NSA surveillance. And IBM's spending $1.2B on data centers outside the U.S. will only reassure customers who don't realize that National Security Letters require a company to turn over data, regardless of where in the world it is stored.
"Google's recent actions, and similar actions of many Internet companies, will definitely improve its users' security against surreptitious government collection programs -- both the NSA's and other governments' -- but their assurances deliberately ignores the massive security vulnerability built into its services by design. Google, and by extension, the U.S. government, still has access to your communications on Google's servers.
"Google could change that. It could encrypt your e-mail so only you could decrypt and read it. It could provide for secure voice and video so no one outside the conversations could eavesdrop.
"It doesn't. And neither does Microsoft, Facebook, Yahoo, Apple, or any of the others.
"Why not? They don't partly because they want to keep the ability to eavesdrop on your conversations. Surveillance is still the business model of the Internet, and every one of those companies wants access to your communications and your metadata. Your private thoughts and conversations are the product they sell to their customers. We also have learned that they read your e-mail for their own internal investigations.
"But even if this were not true, even if -- for example -- Google were willing to forgo data mining your e-mail and video conversations in exchange for the marketing advantage it would give it over Microsoft, it still won't offer you real security. It can't.
"The biggest Internet companies don't offer real security because the U.S. government won't permit it.
"This isn't paranoia. We know that the U.S. government ordered the secure e-mail provider Lavabit to turn over its master keys and compromise every one of its users. We know that the U.S. government convinced Microsoft -- either through bribery, coercion, threat, or legal compulsion -- to make changes in how Skype operates, to make eavesdropping easier. [...]
"The best we have are caveat-laden pseudo-assurances. At SXSW earlier this month, CEO Eric Schmidt tried to reassure the audience by saying that he was "pretty sure that information within Google is now safe from any government's prying eyes." A more accurate statement might be, "Your data is safe from governments, except for the ways we don't know about and the ways we cannot tell you about. And, of course, we still have complete access to it all, and can sell it at will to whomever we want." That's a lousy marketing pitch, but as long as the NSA is allowed to operate using secret court orders based on secret interpretations of secret law, it'll never be any different."
- OpenRemote Inc.Co-founder, present
- JBoss Inc.
Scientists in Australia make cochlear implants even better (Science Alert)
Researchers have used electrical impulses from a bionic ear to deliver gene therapy and regrow auditory nerves.
Easter egg: DSL router patch merely hides backdoor instead of closing it
Researcher finds secret “knock” opens admin for some Linksys, Netgear routers.
Creepstreams: an interactive map of insecure webcam feeds (update)
Message boards on Reddit and 4chan were ablaze last January over a freshly exposed vulnerability in certain models of Trendnet home security
Schneier on Security: Security Risks of Embedded Systems
Security Risks of Embedded Systems. We're at a crisis point now with regard to the security of embedded systems, where computing is embedded
Smart Device Makers Put on Notice for Poor Security
Companies need to make basic security efforts or face government action, panelists at a Feb. 28 RSA Conference session concluded.
Venture Capital | Early Stage & Series A Funding | Balderton
Balderton has a track record of helping entrepreneurs build substantial businesses – with more $250m+ exits in the past five years than any
This Extraordinary Pyramid House Could Open New Chapter In Private Homes...
This extraordinary pyramid house concept has been designed by Juan Carlos Ramos, an architect from Michoacan, Mexico. He has been working wi
Yle Uutiset pilotoi Twitterin mahdollisuuksia - "Haluamme tarjota entist...
Yle Uutiset aloittaa noin kuukauden kestävän Twitter-pilotin. Pilotin aikana toimittajat päivittävät Yle Uutisten Twitter-tiliä käsin ja aut
This Is What Happens When A Rich Guy Buys A Water Tower From 1938. It's ...
Time to make an offer on my town's water tower.
Jeremy Wagstaff - Wikipedia, the free encyclopedia
General Background. Born in Northampton, UK, Wagstaff studied History at the University of Exeter and got his master's degree in South
Internet Engineering Task Force - Wikipedia, the free encyclopedia
This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. Please help to impr
New Technology Pipes Daylight into Windowless Rooms
An innovative technology from a recent South Korean and British joint venture promises to deliver natural daylight to windowless spaces thro
Humans will be kept between life and death in the first suspended animat...
At a hospital in Pittsburgh, surgeons are now allowed to place patients into a state of suspended animation. If a patient arrives with a tra
How millions of DSL modems were hacked in Brazil, to pay for Rio prostit...
Brazilian hackers remotely took over 4.5 million home routers, and compromised their DNS settings in their plot to make a fortune. And what
Efforts Underway to Secure Connected Devices | MIT Technology Review
Efforts are underway to make your smart toilet—and other connected devices—less vulnerable to hackers.
When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via...
Getting to live the Jetsons' lifestyle has downsides; as we bring the things in our homes onto the Internet, we run into the same kind of se