SlideShare a Scribd company logo
1 of 15
The Year 2014’s Biggest
Winners and Losers in
Privacy and Security
PRESENTED BY: GOLDEN LOCKSMITHSURVEY BY: WIRED
Apple
Florida Supreme Court
Yahoo
WhatsApp
U.S. Supreme Court
Google’s Project Zero
Apple
If the NSA can be thanked for anything it’s for the
competitive race the spy agency helped spur among
tech companies scrambling to outdo one another in the
privacy realm. Apple took the lead when it announced
that the operating system, iOS8, would encrypt nearly all
data on iPhones and iPads by default—including text
messages, photos and contacts—and that Apple itself
would not be able to decrypt it without the user’s
passcode.
WhatsApp
The mobile messaging app outdid even Apple’s own messaging
protections when it announced it was implementing end-to-end
encryption for its hundreds of millions of users. WhatsApp
communication is now encrypted with a key that only the user
possesses and stores on his or her mobile phone or tablet, which
means that even WhatsApp cannot read the user’s
communication or be compelled by spy agencies and law
enforcement to decrypt it.
Florida Supreme Court
In an important case closely watched by civil liberties groups,
Florida’s top court ruled that cops need a warrant to obtain cell
tower data. The court ruled that obtaining cell phone location
data to track a person’s location or movement in real time
constitutes a Fourth Amendment search and therefore requires a
court-ordered warrant. But the ruling would also cover law
enforcement’s use of so-called “stingrays”—–devices that simulate
a legitimate cell tower and force mobile devices in the vicinity to
connect to them so that law enforcement agencies can locate
and track people in the field without assistance from telecoms.
U.S. Supreme Court
In another important case, the nation’s top court ruled that cops
can’t search the cell phones of arrestees without a warrant. U.S.
prosecutors had argued that an arrestee’s cell phone was
“materially indistinguishable” from any other storage device, such
as a bag or wallet, found on an arrestee. But the justices weren’t
buying that claim. “Modern cell phones, as a category,” they
wrote in their decision, “implicate privacy concerns far beyond
those implicated by a cigarette pack, a wallet or a purse.”
Yahoo!
The company launched the fight after receiving a warrantless
request for data in 2007. It’s not clear the extent of the data the
government sought, but Yahoo fought back on Fourth
Amendment grounds, asserting that the request required a
probable-cause warrant and that the request was too broad and
unreasonable and, therefore, violated the Constitution. The battle
came to an end in 2008 after the Feds threatened the company
with a massive $250,000 a day fine if it didn’t comply, and a court
ruled that Yahoo’s arguments for resisting had no merit
Google’s Project Zero
Vendor bug bounty programs have been around for at least a
decade, with software makers and web sites increasingly upping
the amount they’re willing to pay to anyone who finds and reports
a security vulnerability in their program or system. This year Google
upended the tradition by announcing it had built an in-house
hacking team to hunt for vulnerabilities not only in its own software,
but in the software of other vendors as well. Project Zero aims to
make the internet more secure for everyone by focusing on
uncovering the high-value vulnerabilities, like Heartbleed and
Shellshock, that put everyone at risk.
Sony
US Marshals
Gamma International
President Obama
Verizon
Sony
Plenty of companies over the years have suffered sensational
hacks, but Sony’s breach may turn out to be the hack of the
decade—not only because of the nature of the breach and
the information stolen, but the way the pilfered data is being
rolled out in batches, prolonging the agony and suspense for
workers and executives. Some of the disclosures have been
lame and mundane—for example, the pseudonyms
celebrities use to check into hotels. Others have been
embarrassing, such as the tasteless and racist exchange
about President Obama between Sony Co-Chairman Amy
Pascal and producer Scott Rudin.
President Obama
This year the U.S. government finally acknowledged that it
withholds information about security vulnerabilities to exploit
them, rather than passing the information on to software vendors
and others to fix them. In making this revelation, the White House
announced it was “reinvigorating” a so-called equities process
designed to determine when to withhold and when to disclose—
overseen by the president’s National Security Council. Going
forward, the NSA must disclose any vulnerabilities it discovers—
unless the hole would be useful for intelligence agencies or law
enforcement to exploit.
US Marshals
In a move so stunning that civil liberties groups are still shaking
their heads over it, the U.S. Marshals Service in Florida made a
Hail Mary to seize public records about a surveillance tool
before the ACLU could obtain them. The civil liberties group
had filed a public records request with the Sarasota, Florida,
police department for information detailing its use of stingrays
and had made an appointment to visit the facility where the
documents were being held. But before they could get there,
marshals swooped in to grab the records and abscond with
them, claiming the police department didn’t own them
Verizon
Consider it the digital cookie monster that gobbles all your
footprints. Verizon Wireless ran into trouble when a technologist
with the Electronic Frontier Foundation noticed that the telecom
had been tracking its wireless users online activity by subtly
slipping a “permacookie”—a string of about 50 letters, numbers,
and characters—into data flowing between users and the
websites they visited. Users got the cookie whether they wanted
to be tracked or not, since Verizon revealed there was no way
to “turn it off.” AT&T was testing a similar system with its
customers until the backlash prompted the telecom to stop the
practice.
Gamma International
In October, the UK civil liberties group Privacy International filed a
criminal complaint against with the National Cyber Crime Unit of
the National Crime Agency alleging that the company was
criminally complicit in helping the Bahrain government engage in
unlawful interception of communications—a violation of UK’s
Regulation of Investigatory Powers Act 2000—and that Gamma
was not only aware of the surveillance but actively assisted it. By
selling and assisting Bahraini authorities in their surveillance, the
complaint asserts, Gamma is liable as an accessory under the
Accessories and Abettors Act 1861 and is also guilty of
encouraging and assisting the unlawful activity, a crime under the
Serious Crime Act 2007.
Questions?
LEAVE YOU QUESTIONS IN COMMENTS

More Related Content

What's hot

Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1James Williams
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEBPoch Montilla
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...Lainey Feingold
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhousechildlikeegg1000
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate statesIlya Ponomarev
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaperVAYTON
 

What's hot (20)

Internet law
Internet lawInternet law
Internet law
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate states
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaper
 
Wills and estates law in the digital age
Wills and estates law in the digital ageWills and estates law in the digital age
Wills and estates law in the digital age
 

Viewers also liked

Intro to the Cold War (1945 1991)
Intro to the Cold War (1945 1991)Intro to the Cold War (1945 1991)
Intro to the Cold War (1945 1991)MillsWHHS
 
Kryzys w mediach społecznościowych
Kryzys w mediach społecznościowychKryzys w mediach społecznościowych
Kryzys w mediach społecznościowychgringot
 
Tyler campbellpd.7 flipbook
Tyler campbellpd.7 flipbookTyler campbellpd.7 flipbook
Tyler campbellpd.7 flipbookpunxsyscience
 
Fundamentos de administración johana
Fundamentos de administración   johanaFundamentos de administración   johana
Fundamentos de administración johanajohanamarin-7211
 
Adverse Possession Under The 2008 Amendments
Adverse Possession Under The 2008 AmendmentsAdverse Possession Under The 2008 Amendments
Adverse Possession Under The 2008 AmendmentsAdam Leitman Bailey, P.C.
 
Herramientas de trabajo con nuevas tecnologias
Herramientas de trabajo  con nuevas tecnologiasHerramientas de trabajo  con nuevas tecnologias
Herramientas de trabajo con nuevas tecnologiasauralmeida
 
Spring: uma introdução prática
Spring: uma introdução práticaSpring: uma introdução prática
Spring: uma introdução práticaJosé Barros
 
El meu monstre 3r b
El meu monstre 3r bEl meu monstre 3r b
El meu monstre 3r bAgusti Gomez
 
Fundamentos de administración
Fundamentos de administraciónFundamentos de administración
Fundamentos de administraciónjohanamarin-7211
 
Trial & Rules Regarding Examination in Chief/Cross
Trial & Rules Regarding Examination in Chief/CrossTrial & Rules Regarding Examination in Chief/Cross
Trial & Rules Regarding Examination in Chief/CrossMahamud Wazed (Wazii)
 
Rèptil llangardaix pirinenc
Rèptil  llangardaix pirinencRèptil  llangardaix pirinenc
Rèptil llangardaix pirinenclorena2319
 

Viewers also liked (20)

Intro to the Cold War (1945 1991)
Intro to the Cold War (1945 1991)Intro to the Cold War (1945 1991)
Intro to the Cold War (1945 1991)
 
Kryzys w mediach społecznościowych
Kryzys w mediach społecznościowychKryzys w mediach społecznościowych
Kryzys w mediach społecznościowych
 
Tyler campbellpd.7 flipbook
Tyler campbellpd.7 flipbookTyler campbellpd.7 flipbook
Tyler campbellpd.7 flipbook
 
Fundamentos de administración johana
Fundamentos de administración   johanaFundamentos de administración   johana
Fundamentos de administración johana
 
A long flip_book
A long flip_bookA long flip_book
A long flip_book
 
Adverse Possession Under The 2008 Amendments
Adverse Possession Under The 2008 AmendmentsAdverse Possession Under The 2008 Amendments
Adverse Possession Under The 2008 Amendments
 
Adviserenkanjeleren
AdviserenkanjelerenAdviserenkanjeleren
Adviserenkanjeleren
 
Vacacional 3°
Vacacional 3°Vacacional 3°
Vacacional 3°
 
Herramientas de trabajo con nuevas tecnologias
Herramientas de trabajo  con nuevas tecnologiasHerramientas de trabajo  con nuevas tecnologias
Herramientas de trabajo con nuevas tecnologias
 
Spring: uma introdução prática
Spring: uma introdução práticaSpring: uma introdução prática
Spring: uma introdução prática
 
El meu monstre 3r b
El meu monstre 3r bEl meu monstre 3r b
El meu monstre 3r b
 
Fundamentos de administración
Fundamentos de administraciónFundamentos de administración
Fundamentos de administración
 
Trial & Rules Regarding Examination in Chief/Cross
Trial & Rules Regarding Examination in Chief/CrossTrial & Rules Regarding Examination in Chief/Cross
Trial & Rules Regarding Examination in Chief/Cross
 
Chinabella
ChinabellaChinabella
Chinabella
 
Ocell
OcellOcell
Ocell
 
Calamar vampir
Calamar vampirCalamar vampir
Calamar vampir
 
Conclusão juliano cipa (2)
Conclusão juliano cipa (2)Conclusão juliano cipa (2)
Conclusão juliano cipa (2)
 
Llebre de mar
Llebre de marLlebre de mar
Llebre de mar
 
Rèptil llangardaix pirinenc
Rèptil  llangardaix pirinencRèptil  llangardaix pirinenc
Rèptil llangardaix pirinenc
 
Llagosta
LlagostaLlagosta
Llagosta
 

Similar to 2014’s biggest winners and losers in privacy and security

Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxwhitneyleman54422
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxnettletondevon
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTier10
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresJason Fernandes
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastbattery-fast. com
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Silicon Valley companies will receive more freedom to disclose data requests ...
Silicon Valley companies will receive more freedom to disclose data requests ...Silicon Valley companies will receive more freedom to disclose data requests ...
Silicon Valley companies will receive more freedom to disclose data requests ...illustriousacne45
 

Similar to 2014’s biggest winners and losers in privacy and security (20)

Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfast
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Silicon Valley companies will receive more freedom to disclose data requests ...
Silicon Valley companies will receive more freedom to disclose data requests ...Silicon Valley companies will receive more freedom to disclose data requests ...
Silicon Valley companies will receive more freedom to disclose data requests ...
 

More from Golden Locksmith

Troubleshoot and fixing a deadbolt
Troubleshoot and fixing a deadboltTroubleshoot and fixing a deadbolt
Troubleshoot and fixing a deadboltGolden Locksmith
 
Your 17 diy home security essentials
Your 17 diy home security essentialsYour 17 diy home security essentials
Your 17 diy home security essentialsGolden Locksmith
 
Most common auto security mistakes
Most common auto security mistakesMost common auto security mistakes
Most common auto security mistakesGolden Locksmith
 
Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Golden Locksmith
 
Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Golden Locksmith
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradoxGolden Locksmith
 
How to Reinforce a door during installation
How to Reinforce a door during installationHow to Reinforce a door during installation
How to Reinforce a door during installationGolden Locksmith
 

More from Golden Locksmith (7)

Troubleshoot and fixing a deadbolt
Troubleshoot and fixing a deadboltTroubleshoot and fixing a deadbolt
Troubleshoot and fixing a deadbolt
 
Your 17 diy home security essentials
Your 17 diy home security essentialsYour 17 diy home security essentials
Your 17 diy home security essentials
 
Most common auto security mistakes
Most common auto security mistakesMost common auto security mistakes
Most common auto security mistakes
 
Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Is your home at the gun point of burglars?
Is your home at the gun point of burglars?
 
Is your home at the gun point of burglars?
Is your home at the gun point of burglars?Is your home at the gun point of burglars?
Is your home at the gun point of burglars?
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradox
 
How to Reinforce a door during installation
How to Reinforce a door during installationHow to Reinforce a door during installation
How to Reinforce a door during installation
 

Recently uploaded

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 

2014’s biggest winners and losers in privacy and security

  • 1. The Year 2014’s Biggest Winners and Losers in Privacy and Security PRESENTED BY: GOLDEN LOCKSMITHSURVEY BY: WIRED
  • 2. Apple Florida Supreme Court Yahoo WhatsApp U.S. Supreme Court Google’s Project Zero
  • 3. Apple If the NSA can be thanked for anything it’s for the competitive race the spy agency helped spur among tech companies scrambling to outdo one another in the privacy realm. Apple took the lead when it announced that the operating system, iOS8, would encrypt nearly all data on iPhones and iPads by default—including text messages, photos and contacts—and that Apple itself would not be able to decrypt it without the user’s passcode.
  • 4. WhatsApp The mobile messaging app outdid even Apple’s own messaging protections when it announced it was implementing end-to-end encryption for its hundreds of millions of users. WhatsApp communication is now encrypted with a key that only the user possesses and stores on his or her mobile phone or tablet, which means that even WhatsApp cannot read the user’s communication or be compelled by spy agencies and law enforcement to decrypt it.
  • 5. Florida Supreme Court In an important case closely watched by civil liberties groups, Florida’s top court ruled that cops need a warrant to obtain cell tower data. The court ruled that obtaining cell phone location data to track a person’s location or movement in real time constitutes a Fourth Amendment search and therefore requires a court-ordered warrant. But the ruling would also cover law enforcement’s use of so-called “stingrays”—–devices that simulate a legitimate cell tower and force mobile devices in the vicinity to connect to them so that law enforcement agencies can locate and track people in the field without assistance from telecoms.
  • 6. U.S. Supreme Court In another important case, the nation’s top court ruled that cops can’t search the cell phones of arrestees without a warrant. U.S. prosecutors had argued that an arrestee’s cell phone was “materially indistinguishable” from any other storage device, such as a bag or wallet, found on an arrestee. But the justices weren’t buying that claim. “Modern cell phones, as a category,” they wrote in their decision, “implicate privacy concerns far beyond those implicated by a cigarette pack, a wallet or a purse.”
  • 7. Yahoo! The company launched the fight after receiving a warrantless request for data in 2007. It’s not clear the extent of the data the government sought, but Yahoo fought back on Fourth Amendment grounds, asserting that the request required a probable-cause warrant and that the request was too broad and unreasonable and, therefore, violated the Constitution. The battle came to an end in 2008 after the Feds threatened the company with a massive $250,000 a day fine if it didn’t comply, and a court ruled that Yahoo’s arguments for resisting had no merit
  • 8. Google’s Project Zero Vendor bug bounty programs have been around for at least a decade, with software makers and web sites increasingly upping the amount they’re willing to pay to anyone who finds and reports a security vulnerability in their program or system. This year Google upended the tradition by announcing it had built an in-house hacking team to hunt for vulnerabilities not only in its own software, but in the software of other vendors as well. Project Zero aims to make the internet more secure for everyone by focusing on uncovering the high-value vulnerabilities, like Heartbleed and Shellshock, that put everyone at risk.
  • 10. Sony Plenty of companies over the years have suffered sensational hacks, but Sony’s breach may turn out to be the hack of the decade—not only because of the nature of the breach and the information stolen, but the way the pilfered data is being rolled out in batches, prolonging the agony and suspense for workers and executives. Some of the disclosures have been lame and mundane—for example, the pseudonyms celebrities use to check into hotels. Others have been embarrassing, such as the tasteless and racist exchange about President Obama between Sony Co-Chairman Amy Pascal and producer Scott Rudin.
  • 11. President Obama This year the U.S. government finally acknowledged that it withholds information about security vulnerabilities to exploit them, rather than passing the information on to software vendors and others to fix them. In making this revelation, the White House announced it was “reinvigorating” a so-called equities process designed to determine when to withhold and when to disclose— overseen by the president’s National Security Council. Going forward, the NSA must disclose any vulnerabilities it discovers— unless the hole would be useful for intelligence agencies or law enforcement to exploit.
  • 12. US Marshals In a move so stunning that civil liberties groups are still shaking their heads over it, the U.S. Marshals Service in Florida made a Hail Mary to seize public records about a surveillance tool before the ACLU could obtain them. The civil liberties group had filed a public records request with the Sarasota, Florida, police department for information detailing its use of stingrays and had made an appointment to visit the facility where the documents were being held. But before they could get there, marshals swooped in to grab the records and abscond with them, claiming the police department didn’t own them
  • 13. Verizon Consider it the digital cookie monster that gobbles all your footprints. Verizon Wireless ran into trouble when a technologist with the Electronic Frontier Foundation noticed that the telecom had been tracking its wireless users online activity by subtly slipping a “permacookie”—a string of about 50 letters, numbers, and characters—into data flowing between users and the websites they visited. Users got the cookie whether they wanted to be tracked or not, since Verizon revealed there was no way to “turn it off.” AT&T was testing a similar system with its customers until the backlash prompted the telecom to stop the practice.
  • 14. Gamma International In October, the UK civil liberties group Privacy International filed a criminal complaint against with the National Cyber Crime Unit of the National Crime Agency alleging that the company was criminally complicit in helping the Bahrain government engage in unlawful interception of communications—a violation of UK’s Regulation of Investigatory Powers Act 2000—and that Gamma was not only aware of the surveillance but actively assisted it. By selling and assisting Bahraini authorities in their surveillance, the complaint asserts, Gamma is liable as an accessory under the Accessories and Abettors Act 1861 and is also guilty of encouraging and assisting the unlawful activity, a crime under the Serious Crime Act 2007.