Security 37 – More News

Once again, news hit as we were doing our pre show in that Avast security says that wiping your phone will not actually wipe it. We ask Tom if that is true, and he responds with a well researched Ars Technica article.

After we talk about how someone is suing the TOR network because he doesn’t understand how it works.

Show Notes

Ars Technica | Panicking over Android’s factory reset is (mostly) unwarranted

Avast | Tens of Thousands Sell Themselves Every Day

Lifehacker | How Do I Securely Erase My Phone Before I Sell It?

RT | XKeyscore exposed: How NSA tracks all German Tor users as ‘extremists’

Washington Post | In NSA-intercepted data, those not targeted far outnumber the foreigners who are

Security 35 – News of the Week

This week was another news week. We only got to three of the four stories listed below:

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

Congress passes amendment to defund NSA ‘backdoor’ surveillance

National Transparency Report

Supreme Court bans warrantless cell phone searches, updates privacy laws

Security 12 – [Explicit] NSA Gets the iOS7 Treatment (Part 3 of Many)

We had a great show for you, but once again, news that couldn’t wait popped up. Once again we talk about what is going on with the NSA revelations. The big news is that iOS devices could potentially have malware that sends the data back to Utah. While only a physical attack, remote attacks ‘are coming soon.’

Next, your new laptop may have been intercepted by the NSA while in transit. Hardware modifications to send back data could have been installed.

Finally, we don’t know what is safe anymore.  We do know that most devices have some sort of back door.

Show Notes:
iPhone Access | Daily Dot
Laptop Hijacking | The Verge
NSA Back Doors | Der Spiegel


Security 03 – NSA (Part 1 of Many)

New information came out proving that Google and Yahoo were correct in their statement that they have not given or allowed the NSA to come in and parse user data. On today’s show we discuss how the NSA tapped Google and Yahoo at the weakest link.

Show Notes:

Security 01 – Pilot

Welcome to our podcast on security. Our goal is to take complicated issues and break them down for the average person. On our first episode of inSecurity, we discuss what it means to have your buddy list and address book shared with the NSA. Next we tackle what is meant by Glen Greenwald with “The worst is yet to come.” We finish up discussing Tom’s talk on security should be shiny.