Firefox Focus llega a Android y se convierte en un navegador anónimo – El Mostrador

La empresa de software Mozilla anunció que Firefox Focus, su navegador especialmente diseñado para proteger la privacidad de los usuarios, ya está disponible para el sistema operativo Android.

Fuente: Firefox Focus llega a Android y se convierte en un navegador anónimo – El Mostrador


Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal

it’s possible to make sure that your private conversations are actually private. It starts with installing an app known as Signal, and getting your friends to install it too. Then you’ll want to tweak the settings to lock everything down.

Fuente: Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal


Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian

From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?

Fuente: Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian


Apple Says It Fixed CIA Vulnerabilities Years Ago

Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.

Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago


La ciudad vigilada | The Santiago Times

Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.

Fuente: La ciudad vigilada | The Santiago Times


Las ciudades inteligentes y el problema de la vigilancia | Derechos Digitales

Las tecnologías inteligentes apuntan a mejorar las condiciones de vida en las ciudades. Sin embargo, son también capaces de poner en entredicho nuestra privacidad. ¿Cuál es el límite de lo smart?

Fuente: Las ciudades inteligentes y el problema de la vigilancia | Derechos Digitales


Your private medical data is for sale – and it’s driving a business worth billions | Technology | The Guardian

Your medical data is for sale – all of it. Adam Tanner, a fellow at Harvard’s institute for quantitative social science and author of a new book on the topic, Our Bodies, Our Data, said that patients generally don’t know that their most personal information – what diseases they test positive for, what surgeries they have had – is the stuff of multibillion-dollar business.

Fuente: Your private medical data is for sale – and it’s driving a business worth billions | Technology | The Guardian


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


A Macri se le tildó el voto electrónico | Página12 | La otra mirada

“Se recogieron las objeciones que los expertos informáticos presentaron en las reuniones de Comisión en cuanto a la alta vulnerabilidad de algunos de los métodos electrónicos propuestos, lo cual determina la imposibilidad del apoyo al proyecto tal cual fue aprobado por la Cámara de Diputados”, sentenciaron los senadores en un comunicado para justificar su rechazo.

Fuente: A Macri se le tildó el voto electrónico | Página12 | La otra mirada


Los peligros del voto electrónico | Derechos Digitales

El voto electrónico presenta serias vulnerabilidades que afectan directamente derechos como la privacidad, la seguridad o la protección de datos personales. El software utilizado durante las votaciones almacena datos de los y las votantes, que podrían ser usados para identificarles.

Fuente: Los peligros del voto electrónico | Derechos Digitales


New York’s New Digital Crime Lab Is a Forensic Marvel

In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.

Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel


Organizaciones Latinas preocupadas por reforma electoral argentina

Las abajo firmantes, organizaciones dedicadas a la defensa de los derechos humanos y civiles en entornos tecnológicos, expresamos nuestra profunda preocupación por el proyecto de ley argentino para la incorporación de tecnologías informáticas en la emisión del voto.Seguidamente, detallaremos tres puntos clave del proyecto aprobado en la Cámara de Diputados Argentina que tendrían un impacto negativo en los derechos fundamentales de los ciudadanos.

Fuente: Organizaciones Latinas preocupadas por reforma electoral argentina


Google and Microsoft in war of words over bug disclosure | Technology | The Guardian

The bug, which allows privilege escalation in Windows, was discovered by Google on 21 October. An attacker can use it to access things they should not be able to, and according to Google, it is already being actively exploited in the wild.

Fuente: Google and Microsoft in war of words over bug disclosure | Technology | The Guardian


When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers

just as Apple has come to be seen as a warrior for digital protection and privacy against overreaching government surveillance, Cellebrite is emerging as its law-and-order counterpart, endeavoring to build tools to break through the barriers Apple and other phone makers erect to protect data.

Fuente: When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers


How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian

The how-old.net website – which uses photos to judge your age – didn’t work for me. For women and refugees, of course, there’s the Daily Mail

Fuente: How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian


Google’s ad tracking is as creepy as Facebook’s. Here’s how to disable it | Technology | The Guardian

Google in June deleted a clause in its privacy settings that said it would not combine cookie information with personal information without consent

Fuente: Google’s ad tracking is as creepy as Facebook’s. Here’s how to disable it | Technology | The Guardian


Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones


Amistosa Caja Anti Vigilancia | Derechos Digitales

Con mucho orgullo y de manera oficial, Derechos Digitales presenta hoy la Amistosa Caja Anti Vigilancia, un conjunto de herramientas y consejos prácticos que te ayudarán a resguardar mejor tu información personal y la de otros. Pareciera ser que hoy más que nunca es necesario proteger nuestros datos, pues siempre hay alguien intentando acceder a ellos: empresas privadas, cibercriminales y el mismo Estado.

Fuente: Amistosa Caja Anti Vigilancia | Derechos Digitales


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners

National Security Agency whistleblower Edward Snowden has been working with prominent hardware hacker Andrew “Bunnie” Huang to solve this problem. The pair are developing a way for potentially imperiled smartphone users to monitor whether their devices are making any potentially compromising radio transmissions. They argue that a smartphone’s user interface can’t be relied on to tell you the truth about that state of its radios. Their initial prototyping work uses an iPhone 6.

Fuente: Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners


Privacy Scandal Haunts Pokemon Go’s CEO

The suddenly vast scale of Pokemon Go adoption is matched by the game’s aggressive use of personal information. Unlike, say, Twitter, Facebook, or Netflix, the app requires uninterrupted use of your location and camera — a “trove of sensitive user data,” as one privacy watchdog put it in a concerned letter to federal regulators.All the more alarming, then, that Pokemon Go is run by a man whose team literally drove one of the greatest privacy debacles of the internet era, in which Google vehicles, in the course of photographing neighborhoods for the Street View feature of the company’s online maps, secretly copied digital traffic from home networks, scooping up passwords, email messages, medical records, financial information, and audio and video files.

Fuente: Privacy Scandal Haunts Pokemon Go’s CEO


El fallo de Whatsapp que deja huella: las conversaciones borradas no desaparecen

“Lo siento amigos, mientras que los expertos alaban los nuevos controles de cifrado de Whatsapp, la última actualización de la aplicación deja un rastro forense de todos los chats, incluso después de eliminarlos, borrarlos o archivarlos… incluso si le das a ‘Borrar todos los chats’. De hecho, la única manera de deshacerse de ellos parece ser la de eliminar completamente la aplicación”.

Fuente: El fallo de Whatsapp que deja huella: las conversaciones borradas no desaparecen


Microsoft Pitches Technology That Can Read Facial Expressions at Political Rallies

On the 21st floor of a high-rise hotel in Cleveland, in a room full of political operatives, Microsoft’s Research Division was advertising a technology that could read each facial expression in a massive crowd, analyze the emotions, and report back in real time. “You could use this at a Trump rally,” a sales representative told me.

Fuente: Microsoft Pitches Technology That Can Read Facial Expressions at Political Rallies


Cyber experts warn of hacking capability of drones – FT.com

Hackers could employ flying drones to buzz office buildings and intercept corporate communications, cyber security researchers have warned ahead of the industry’s annual gathering.A simple drone can be used to attack WiFi, bluetooth and other wireless connections such as those used in contactless payment cards, making it as easy to intercept information in a private building as it is in a public café.

Fuente: Cyber experts warn of hacking capability of drones – FT.com


Security Tips Every Signal User Should Know

Although Signal is well-designed, there are extra steps you must take if you want to maximize the security for your most sensitive conversations — the ones that could be misinterpreted by an employer, client, or airport security screener; might be of interest to a snooping government, whether at home or abroad; or could allow a thief or hacker to blackmail you or steal your identity.

Fuente: Security Tips Every Signal User Should Know


Take that, FBI: Apple goes all in on encryption | Technology | The Guardian

The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.

Fuente: Take that, FBI: Apple goes all in on encryption | Technology | The Guardian


The Princeton Web Census: a 1-million-site measurement and analysis of web privacy

Today I’m pleased to release initial analysis results from our monthly, 1-million-site measurement. This is the largest and most detailed measurement of online tracking to date, including measurements for stateful (cookie-based) and stateless (fingerprinting-based) tracking, the effect of browser privacy tools, and “cookie syncing”. These results represent a snapshot of web tracking, but the analysis is part of an effort to collect data on a monthly basis and analyze the evolution of web tracking and privacy over time.

Fuente: The Princeton Web Census: a 1-million-site measurement and analysis of web privacy


El celular de 16 mil dólares que ofrece seguridad militar a los famosos – El Mostrador

El nuevo celular de la startup londinense Sirin Labs se jacta de ser el mejor en lo que a seguridad se refiere: tiene un sistema de cifrado “nivel militar”.

Fuente: El celular de 16 mil dólares que ofrece seguridad militar a los famosos – El Mostrador


¿Hasta qué punto son seguras las telecomunicaciones cifradas? – El Mostrador

Con la mirada puesta en la anhelada meta de la privacidad, la universalización del cifrado para la seguridad de las telecomunicaciones en internet se perfila ya como un camino sin retorno, avalado por los últimos movimientos de populares plataformas en el sector, aunque teñido de sombras.

Fuente: ¿Hasta qué punto son seguras las telecomunicaciones cifradas? – El Mostrador


El imperio ‘Ilegal’ de Hacking Team en América Latina | Motherboard

A principios de Abril de 2014, un espía del servicio de inteligencia de Ecuador mandó una serie de correos electrónicos al servicio al cliente de Hacking Team, una compañía italiana de hackers pagados que trabaja con agencias gubernamentales alrededor del mundo.

Fuente: El imperio ‘Ilegal’ de Hacking Team en América Latina | Motherboard


The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard

Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.That mystery has finally been revealed.

Fuente: The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard


El auge del software de vigilancia en América Latina – Derechos Digitales

El software de Hacking Team es contrario a los estándares legales y violatorio de los derechos a la privacidad, a la libertad de expresión y al debido proceso.

Fuente: El auge del software de vigilancia en América Latina – Derechos Digitales


San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian

With the court filing, Silicon Valley and Washington are poised to return to a cold war over the balance between privacy and law enforcement in the age of apps

Fuente: San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian


Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian

Revealed: After postponing a court hearing with Apple, the FBI is testing a new technique which Apple says they will pressure government to reveal

Fuente: Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian


Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian

Spurred on by Apple’s battles against the FBI, some of tech’s biggest names are to expand encryption of user data in their services, the Guardian can reveal

Fuente: Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian


Wanting it badly isn't enough: backdoors and weakened crypto threaten the net / Boing Boing

As you know, Apple just said no to the FBI’s request for a backdoor in the iPhone, bringing more public attention to the already hot discussion on encryption, civil liberties, and whether “those in authority” should have the ability to see private content and communications — what’s referred to as “exceptional access.”

Fuente: Wanting it badly isn’t enough: backdoors and weakened crypto threaten the net / Boing Boing


Paraguay y Uruguay en polémica por adquirir software espía

Paraguay y Uruguay están inmersos en la polémica tras haber adquirido distintos software avanzados para intervenir comunicaciones como parte de su estrategia nacional de seguridad, un tema que se debate entre la defensa de la privacidad de los ciudadanos y las tácticas para identificar a posibles cibercriminales. Lo anterior pone en duda ¿hasta dónde es válida la vigilancia de comunicaciones privadas por parte de los Estados?

Fuente: Paraguay y Uruguay en polémica por adquirir software espía


Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.  In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

Fuente: Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Cómo empezar a utilizar el navegador anónimo Tor, paso a paso

Tor es una de las mejores herramientas para conectarse a Internet de manera segura (si no la mejor). Aunque no es perfecta, configurarla es tan sencillo que cualquier persona que acceda a la web con frecuencia debería tenerla instalada y lista para usarse. Te explicamos cómo hacerlo. Dejando a un lado el apartado técnico, conectarse […]

Fuente: Cómo empezar a utilizar el navegador anónimo Tor, paso a paso