Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales

Derechos Digitales comienza hoy una nueva etapa de trabajo en defensa de los derechos fundamentales en América Latina. Nuestro camino se dirige a la identificación de un entorno cambiante para los usuarios, los gobiernos y la sociedad civil en general.

Fuente: Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


WhatsApp asked by European regulators to pause sharing user data with Facebook | Technology | The Guardian

The letters come as European nations express concern over WhatsApp’s changes and Yahoo’s mishandling of its hack and the revelations over US intelligence operations.

Fuente: WhatsApp asked by European regulators to pause sharing user data with Facebook | Technology | The Guardian


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees

Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.

Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees


NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian

Shares183Save for laterThe FBI has arrested a National Security Agency contractor on suspicion of the theft of top secret classified data and documents in an alleged security breach at the same intelligence agency whose spy secrets were exposed by Edward Snowden.

Fuente: NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian


Amistosa Caja Anti Vigilancia | Derechos Digitales

Con mucho orgullo y de manera oficial, Derechos Digitales presenta hoy la Amistosa Caja Anti Vigilancia, un conjunto de herramientas y consejos prácticos que te ayudarán a resguardar mejor tu información personal y la de otros. Pareciera ser que hoy más que nunca es necesario proteger nuestros datos, pues siempre hay alguien intentando acceder a ellos: empresas privadas, cibercriminales y el mismo Estado.

Fuente: Amistosa Caja Anti Vigilancia | Derechos Digitales


Internet or Splinternet? by Joseph S. Nye – Project Syndicate

The Internet is a network of networks. Each of the separate networks belongs to different companies and organizations, and they rely on physical servers in different countries with varying laws and regulations. But without some common rules and norms, these networks cannot be linked effectively. Fragmentation – meaning the end of the Internet – is a real threat.

Fuente: Internet or Splinternet? by Joseph S. Nye – Project Syndicate


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners

National Security Agency whistleblower Edward Snowden has been working with prominent hardware hacker Andrew “Bunnie” Huang to solve this problem. The pair are developing a way for potentially imperiled smartphone users to monitor whether their devices are making any potentially compromising radio transmissions. They argue that a smartphone’s user interface can’t be relied on to tell you the truth about that state of its radios. Their initial prototyping work uses an iPhone 6.

Fuente: Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners


Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil

Diante deste cenário, o país tem se esforçado em mostrar que é seguro com a prisão de suspeitos de terrorismo, o aumento de contingente de forças de ordem recrutadas para jogos — são milhares de policiais, soldados do exército e da guarda nacional — e também com o uso da tecnologia. Um dos destaques é a aquisição de quatro balões de vigilância comprados pelo governo do Rio de Janeiro.

Fuente: Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil


America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian

The Electronic Frontier Foundation is suing the US government over ‘unconstitutional’ use of the Digital Millennium Copyright Act

Fuente: America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian


Sextear o no sextear en México

Con la colaboración de autoridades mexicanas, una campaña pide a la gente que no haga sexting: la práctica en la que una persona envía a otra mensajes con contenido sexual, incluyendo fotografías o videos de desnudos, por medio de internet.Sin embargo, algunos activistas y académicos consideran que esta tiene un enfoque inadecuado, e incluso moralista.

Fuente: Sextear o no sextear en México


¿Para qué necesitamos anonimato y por qué es importante defenderlo? | Derechos Digitales

En la medida en que nuestras vidas transcurren en internet de forma creciente e interactuamos cada vez más con tecnologías digitales, también se vuelve más sencillo identificarnos y recolectar información sobre nuestros hábitos, gustos, opiniones e incluso sobre nuestros cuerpos.

Fuente: ¿Para qué necesitamos anonimato y por qué es importante defenderlo? | Derechos Digitales


Security Tips Every Signal User Should Know

Although Signal is well-designed, there are extra steps you must take if you want to maximize the security for your most sensitive conversations — the ones that could be misinterpreted by an employer, client, or airport security screener; might be of interest to a snooping government, whether at home or abroad; or could allow a thief or hacker to blackmail you or steal your identity.

Fuente: Security Tips Every Signal User Should Know


A Conversation on Privacy With Edward Snowden, Noam Chomsky, and Glenn Greenwald

NSA WHISTLEBLOWER Edward Snowden joined MIT professor Noam Chomsky and The Intercept’s Glenn Greenwald on Friday for a discussion on privacy rights hosted by the University of Arizona College of Social and Behavioral Sciences. The panel was moderated by Nuala O’Connor, the president of the Center for Democracy and Technology.

Fuente: A Conversation on Privacy With Edward Snowden, Noam Chomsky, and Glenn Greenwald


San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian

With the court filing, Silicon Valley and Washington are poised to return to a cold war over the balance between privacy and law enforcement in the age of apps

Fuente: San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian


Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian

Revealed: After postponing a court hearing with Apple, the FBI is testing a new technique which Apple says they will pressure government to reveal

Fuente: Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian


FBI may have found way to unlock San Bernardino shooter’s iPhone without Apple | Technology | The Guardian

Federal authorities have cancelled Tuesday’s court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s phone

Fuente: FBI may have found way to unlock San Bernardino shooter’s iPhone without Apple | Technology | The Guardian


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian

Spurred on by Apple’s battles against the FBI, some of tech’s biggest names are to expand encryption of user data in their services, the Guardian can reveal

Fuente: Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian


Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”

Obama’s first extended disquisition on the contentious issue of encryption suggests he’s only been listening to one side.

Fuente: Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit' | Technology | The Guardian

NSA whistleblower rubbishes claims that only Apple can unlock killer’s iPhone 5C, indicating FBI has the means itself

Fuente: Snowden: FBI’s claim it can’t unlock the San Bernardino iPhone is ‘bullshit’ | Technology | The Guardian


Cinco claves sobre el fallo que pone fin a los globos de vigilancia – Derechos Digitales

El fallo establece que el funcionamiento de los globos es ilegal y afectan la vida privada. Además argumenta que la seguridad no es justificación para intromisión en la intimidad y llama la atención sobre la falta de regulación expresa sobre la videovigilancia en Chile.

Fuente: Cinco claves sobre el fallo que pone fin a los globos de vigilancia – Derechos Digitales


Corte de Apelaciones de Santiago prohíbe el funcionamiento de los globos de vigilancia en Las Condes y Lo Barnechea – Derechos Digitales

La tarde de hoy, la Segunda Sala de la Corte de Apelaciones de Santiago ha acogido el recurso de protección interpuesto contra los globos de vigilancia que, desde agosto de 2015, flotan sobre las comunas de Las Condes y Lo Barnechea. Por decisión unánime, la Corte ha decretado el cese inmediato de los planes de vigilancia comunal, argumentando que atentan contra el derecho a la vida privada y la inviolabilidad del hogar, garantizado en el artículo 19 de la Constitución, numerales 4 y 5.

Fuente: Corte de Apelaciones de Santiago prohíbe el funcionamiento de los globos de vigilancia en Las Condes y Lo Barnechea – Derechos Digitales


NSA Is Mysteriously Absent From FBI-Apple Fight

The Federal Bureau of Investigation insisted that it was helpless. The bureau told a judge in February that Apple has the “exclusive technical means” to try to unlock the contents of San Bernardino shooter Syed Rizwan Farook’s iPhone — and that’s why it should be forced to do so. But notably missing from the FBI’s argument was any mention of whether it had consulted spies and sleuths from the government’s intelligence community — particularly the National Security Agency. The Twitterverse exploded with q

Fuente: NSA Is Mysteriously Absent From FBI-Apple Fight


Apple gains support from tech rivals in FBI case – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Management Life & Arts March 4, 2016 2:25 amApple gains support from tech rivals in FBI caseTim Bradshaw in San Francisco Share Print Clip CommentsFBI and Apple logos©FBI/AppleAmerica’s largest technology companies have joined Apple’s fight against the government over data protection and security, in an unusual display of unity by the Silicon Valley rivals.More than a dozen motions filed on Thursday sided with Apple as it tries to resist a demand to write software that would help the FBI unlock the San Bernardino shooter’s iPhone. Civil liberties groups and IT trade associations lined up alongside dozens of law professors and cryptography experts, after Apple filed its own motion for the judicial order to be withdrawn last week.

Fuente: Apple gains support from tech rivals in FBI case – FT.com


Apple recurre la orden para dar acceso al FBI al móvil del terrorista de San Bernardino | Internacional | EL PAÍS

Cook reitera su negativa a crear un software que altere su sistema de encriptación. El buró dice que este caso no sentaría precedentes

Fuente: Apple recurre la orden para dar acceso al FBI al móvil del terrorista de San Bernardino | Internacional | EL PAÍS


What has the FBI ordered Apple to do and why is it refusing? – FT.com

What has Apple been ordered to do?The US court has told Apple to write a piece of software that lowers an iPhone’s defences, enabling the FBI to use brute force to break in by bombarding the device with many possible passwords until it gets the right answer. The new tool would do three things:

Fuente: What has the FBI ordered Apple to do and why is it refusing? – FT.com


N.Y. judge backs Apple in encryption fight with government | Reuters

The U.S. government cannot force Apple Inc (AAPL.O) to unlock an iPhone in a New York drug case, a federal judge in Brooklyn said on Monday, a ruling that bolsters the company’s arguments in its landmark legal showdown with the Justice Department over encryption and privacy.

Fuente: N.Y. judge backs Apple in encryption fight with government | Reuters


Apple vs. FBI: Cuando las compañías hacen activismo | Hiperderecho

Durante la semana pasada se ha dicho y escrito mucho sobre la orden judicial que ordena a Apple colaborar con el FBI para acceder a los datos del iPhone de uno de los autores de la masacre de San Bernardino. La negativa de Tim Cook, CEO de la compañía, ha sido apoyada y criticada desde …

Fuente: Apple vs. FBI: Cuando las compañías hacen activismo | Hiperderecho


Wanting it badly isn't enough: backdoors and weakened crypto threaten the net / Boing Boing

As you know, Apple just said no to the FBI’s request for a backdoor in the iPhone, bringing more public attention to the already hot discussion on encryption, civil liberties, and whether “those in authority” should have the ability to see private content and communications — what’s referred to as “exceptional access.”

Fuente: Wanting it badly isn’t enough: backdoors and weakened crypto threaten the net / Boing Boing


EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge

The American Civil Liberties Union (ACLU), Electronic Frontier Foundation (EFF), and Amnesty International have come out in support of Apple, after the company said it would contest a judge’s order to unlock an iPhone used by one of the San Bernardino shooters.

Fuente: EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge


Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.  In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

Fuente: Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Bill Gates backs FBI in battle with Apple over San Bernardino killer's phone | Technology | The Guardian

US government is asking for a particular case, and Apple should comply, says Microsoft co-founder Gates

Fuente: Bill Gates backs FBI in battle with Apple over San Bernardino killer’s phone | Technology | The Guardian


Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI

Both candidates tried to occupy a middle ground that doesn’t really exist – either in the war between Apple and the FBI, or when it comes to the spread of unbreakable encryption.

Fuente: Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI


FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It

The Justice Department says Apple can destroy the hacking software it makes after it’s used once. But other law enforcers are already lining up to use it themselves.

Fuente: FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It


Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing

Boing Boing is proud to publish two original documents disclosed by Edward Snowden, in connection with “Sherlock Holmes and the Adventure of the Extraordinary Rendition,” a short story …

Fuente: Exclusive: Snowden intelligence docs reveal UK spooks’ malware checklist / Boing Boing


New Safe Harbor Data “Deal” May Be More Politicking Than Surveillance Reform

European privacy activists criticized a new Safe Harbor data agreement with the U.S. as a superficial political fix that fails to address NSA spying.

Fuente: New Safe Harbor Data “Deal” May Be More Politicking Than Surveillance Reform