Apple protecting its customers

Word has it todaythat anyone going to the Tor website is tracked by the NSA after that. So if you clicked that link, you’re now a high value target for the NSA.

Just by coincidence I past the Apple store in Amsterdam today to ask for a new battery for my laptop. Out of curiosity I tried to acces my own server over SSH, the tor website and the Tails website. (Tails is a operating system you can download and run from a USB stick providing some of the best anonymity tools available today)

I guess that Apple really looks after its customers and doesn’t want them to get in trouble because it was all blocked… I made a quick screen cast of this tiny experiment.

Joy and angriness aside… what does todays revelation mean for all the people I advised to download Tor at the Privacy Cafe?

Prism Documents

_
Greetings Netizens, and Citizens of the world.

Anonymous has obtained some documents that “they” do not want you to see, and much to “their” chagrin, we have found them, and are giving them to you.
These documents prove that the NSA is spying on you, and not just Americans. They are spying on the citizens of over 35 different countries.
These documents contain information on the companies involved in GiG, and Prism.
Whats GiG you might ask? well…

The GIG will enable the secure, agile, robust, dependable, interoperable data sharing environment for the Department where warfighter, business, and intelligence users share knowledge on a global network that facilitates information superiority, accelerates decision-making, effective operations, and Net-Centric transformation.

Like we said, this is happening in over 35 countries, and done in cooperation with private businesses, and intelligence partners world wide.
We bring this to you, So that you know just how little rights you have. Your privacy and freedoms are slowly being taken from you, in closed door meetings, in laws buried in
bills, and by people who are supposed to be protecting you.

Download these documents, share them, mirror them, don’t allow them to make them disappear. Spread them wide and far. Let these people know, that we will not be silenced, that we will not be taken advantage of, and that we are not happy about this unwarranted, unnecessary, unethical spying of our private lives, for the monetary gain of the 1%.

And now, the candy: http://thedocs.hostzi.com/

Mirrors:
http://t.co/XVlZQ53Zhp
http://t.co/JYUHrhi3Ue
http://t.co/qR9PRzySbq
http://t.co/yGw2sP976W
http://t.co/MrmBj4kma5

We are Anonymous
We do not forgive
We do not forget
and by now,
You should expect us

From: http://pastebin.com/MPpT7xaf

Mirror on this site: http://dosch.it/wp-content/uploads/2013/06/prismdocs.zip

The mud puddle test

The mud puddle testYou don’t have to dig through Apple’s ToS to determine how they store their encryption keys. There’s a much simpler approach that I call the ‘mud puddle test’:

  • First, drop your devices in a mud puddle. 
  • Next, slip in said puddle and crack yourself on the head. When you regain consciousness you’ll be perfectly fine, but won’t for the life of you be able to recall your device passwords or keys.
  • Now try to get your cloud data back. Did you succeed? If so, you’re screwed.

Or to be a bit less dramatic, I should say: your cloud provider has access to your ‘encrypted’ data, as does the government if they want it, as does any rogue employee who knows their way around your provider’s internal policy checks.

via A Few Thoughts on Cryptographic Engineering.

Owning it

In many ways, the whole ownership model just seems poorly suited to duplicable technology. Square peg, pentalobe hole. When we try to force new technology into the old model, our contracts end up sounding really, well, creepy. In fact, some licensing contracts stipulate that the people who sign them are not allowed to talk about what’s written in them. That just doesn’t sound like our best work. Instead of asking, Whose is this, who gets paid for it, and how much?, the conversation might be better reset by asking What is this, who made it, who uses it, and what’s fair?

read the entire article here

Apple’s Crystal Prison and the Future of Open Platforms

Apple’s recent products, especially their mobile iOS devices, are like beautiful crystal prisons, with a wide range of restrictions imposed by the OS, the hardware, and Apple’s contracts with carriers as well as contracts with developers. Only users who can hack or “jailbreak” their devices can escape these limitations.

link to the article on the EFF website