All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd B&H Deal Finder...
Buy other stuff at Amazon.com...
Upgrade the memory of your 2020 iMac up to 128GB
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$4499 $3499
SAVE $1000

$249 $219
SAVE $30

$1398 $898
SAVE $500

$1699 $1349
SAVE $350

$21999 $19999
SAVE $2000

$8399 $7599
SAVE $800

$1149 $799
SAVE $350

$260 $180
SAVE $80

$4998 $3998
SAVE $1000

$569 $519
SAVE $50

$899 $799
SAVE $100

$2347 $1997
SAVE $350

$883 $633
SAVE $250

$1299 $949
SAVE $350

$1699 $1349
SAVE $350

$2798 $2498
SAVE $300

$1199 $1099
SAVE $100

Organic Lab Tested Full Spectrum CBD

20% off every day with coupon code diglloyd20 at NuLeafNaturals.com

Updated formula with more CBD!
100% organic non-GMO, no additives or preservatives, lab tested for purity and quality.

The Commercialization of Digital Spying

The Commercialization of Digital Spying

Gamma International markets a digital spying software called FinFisher, expressly made and marketed to hack your phone and computer. Marketed to governments.

Way back in 2006 I recognized the anti-value of running Windows (PC or Mac—Making a Sensible Choice): the security risks were unacceptable, and this remains the case today.

Apple OS X is certainly not immune from Trojans, but it seems that every security hack article I read has only Windows screen shots, as is this case.

But since this report shows that iOS is susceptible (Android and all the others too), and since iOS and OS X increasingly share code, one has to assume that OS X does have weaknesses as well.

It also makes one wonder about the wisdom of iOS-ifying OS X, unpalatable to begin with as far as I’m concerned. Ultimately it’s a bad design if both one’s phone and one’s computer can both be compromised by the same weakness, so let us hope thing don’t go that far (become that well shared).

I would like to see Apple be much more proactive on security:

  • Submitting to 3rd-party security audits (apparently not done at present!),
  • Using legal hammers: patents, cease and desist lawsuits using anti-hacking laws, lobbying for federal legislation blacklisting such nefarious companies and so on. Get creative Apple!
  • A prominent “hacker award” program with large cash rewards for finding exploitable security holes.
  • Apple becomes a customer of these nefarious commercial hacker companies, and with every new release, defeat the mechanisms involved.

The unscrupulous already sell zero-day security exploits which are then kept hidden so they can be exploited to build internet surveillance tools by your favorite government agency (whatever the country).

The report

For Their Eyes Only — The Commercialization of Digital Spying

These tools provide substantial surveillance functionality; however, we’d like to highlight that, without exploitation of the underlying platforms, all of the samples we’ve described require some form of interaction to install.

As with the previously analyzed FinSpy tool this interaction might involve some form of socially engineered e-mail or other delivery, prompting unsuspecting users to execute the program. Or, it might involve covert or coercive physical installation of the tool, or use of a user’s credentials to perform a third- party installation.

The thing is, Illegitimi Carborundum in some countries. But here in the USA it is foolish to think one is secure given the international nature of the internet.

For Their Eyes Only — The Commercialization of Digital Spying


Schneier on Security

Bruce Schneier, an outspoken security expert, reports on the FinFisher software deployment among government across the world:

  • We have identified FinFisher Command & Control servers in 11 new Countries. Hungary, Turkey, Romania, Panama, Lithuania, Macedonia, South Africa, Pakistan, Nigeria, Bulgaria, Austria.
  • Taken together with our previous research, we can now assert that FinFisher Command & Control servers are currently active, or have been present, in 36 countries.

Meaning that there are at least 36 governments that consider it just fine to hack phones and computers for monitoring their citizens, or anyone for that matter.

View all handpicked deals...

Pentax 8x42 S-Series SD WP Binoculars
$249 $219
SAVE $30

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__