All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
Upgrade the memory of your 2020 iMac up to 128GB
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$399 $199
SAVE $200

$2797 $2497
SAVE $300

$1398 $998
SAVE $400

$1499 $999
SAVE $500

$549 $499
SAVE $50

$799 $549
SAVE $250

$1699 $949
SAVE $750

$3899 $1499
SAVE $2400

$999 $849
SAVE $150

$1398 $998
SAVE $400

$1798 $1198
SAVE $600

$240 $175
SAVE $65

$240 $175
SAVE $65

$1399 $799
SAVE $600

$1798 $1198
SAVE $600

$1997 $1797
SAVE $200

$3399 $2699
SAVE $700

$400 $300
SAVE $100

$1699 $949
SAVE $750

$1199 $1099
SAVE $100

$1199 $1099
SAVE $100

$999 $949
SAVE $50

$1699 $949
SAVE $750

What’s all the Fuss About iPhone Security Anyway?

With all the fuss about iPhone encryption (and the absurd contention that it matters much to the average user given that iCloud has everything right there instantly avaialble to law enforcement), some perspective on a more real threat is appropriate. Namely, hackers or just about any well financed organization can track cell phone users.

IEEE Spectrum reports in Alarming Security Defects in SS7, the Global Cellular Network—and How to Fix Them:

The global network that transfers calls between mobile phone carriers has security defects that permit hackers and governments to monitor users’ locations and eavesdrop on conversations. As more reports of these activities surface, carriers are scrambling to protect customers from a few specific types of attacks.
...
Once they’re in, hackers and government intelligence agencies have found ways to exploit security defects to monitor users or record calls. Experts who study SS7 have found some individuals are tracked by as many as nine entities at once. While the average citizen isn’t likely to be a target, it’s impossible for consumers to know whether or not they’re being watched.

The sheer scale of SS7 means that these flaws present a massive cybersecurity problem that could theoretically affect any mobile phone user in the world. “Technically speaking, more people use the SS7 than use the Internet,” says Cathal McDaid, chief intelligence officer at network security firm AdaptiveMobile. “It’s the majority of the world’s population.”

MPG’s view is that Apple’s legal positions have great merit, but also make for great PR while yet being all but irrelevant to 99.999% of Apple users—much ado about squat given that these same users sync their stuff up with iCloud, which is essentially a real-time feed to law enforcement. Issues like the defects above + the hacker threat form a far more concerning issue. Think corporate espionage, organizations like ISIS looking to track and kill enemies, just for starters.

Thunderbolt 4 Dock

Thunderbolt 4 hub and ports!

Any Mac with Thunderbolt 3.


diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__