Hackers Post Cellebrite’s Smartphone Cracking Tools Online

· · News

UFED hacking tools

A hacker dumped 900GB of hacking tools and data used by Cellebrite. The cache of data is on Pastebin, for now, at least. Cellebrite is an Israeli security company that came to public prominence when the FBI used its services to hack into the San Bernadino shooter’s iPhone.

Cellebrite Hacked, Reaffirming Apple’s iOS No-backdoor Stance

· · Analysis

Cellebrite's servers hit with data breach

A year ago the FBI was pushing to force Apple into making a hackable version of iOS for a terrorist investigation while claiming the code would stay secure. Now Cellebrite—the company the FBI reportedly hired to break through the iPhone’s encryption—has been hacked, validating Apple’s concerns the tools would eventually leak.

Apple Posts Its Public Encryption Key, Encourages Customers to Verify Emails

· · Cool Stuff Found

Apple has a new support document encouraging customers to verify encrypted emails, especially security emails from Apple. The document includes Apple’s own public PGP key for those verifications. Apple noted that its current PGP key will be valid until May of 2018. PGP, or “pretty good privacy” is one of the most popular encryption schemes in general use today, through both the PGP Corporation and the open source GnuPGP. Apple posted links to both. You can subscribe to Apple’s Security-announce emails at Apple’s website.

Apple Posts Its Public Encryption Key, Encourages Customers to Verify Emails

Congressional Encryption Working Group Backs Encryption, Thoughts on CES – ACM 390

· · Apple Context Machine Podcast

Apple Context Machine Logo

The Congressional Encryption Working Group has issued a year-end report on encryption that finds weakening encryption would harm the national security interests of the United States. Bryan and Jeff discuss the implications, as well as a new request from the Turkish government asking Apple to unlock an iPhone 4s owned by an assassin. They cap the show with a preview of CES expectations.

Time for a Mac Security Checkup!

· · Quick Tip

The end of the year is a good time to think through your security practices and especially what types of passwords you use (and how you store them). In today’s Quick Tip, Melissa Holt will walk us through a few of her favorite ways you can stay safe, both online and at home.

Preview: How to Create Encrypted PDFs

· · Quick Tip

If you need to send a PDF with sensitive information on it through email, then encrypt it first! Please? OK, so calling someone to give him a password isn’t the most convenient thing on earth, but it’s better than having your data compromised. Especially if said data is your social security number. Come on in to read Melissa Holt’s Quick Tip on how to protect your PDFs!

Fake News and Snatched iPhones – TMO Daily Observations 2016-12-05

· & · The Mac Observer's Daily Observations Podcast

TMO Daily Observations

The UK police got unlocked access to a suspect’s iPhone but, unlike the FBI earlier this year, they didn’t have to ask Apple to hack it. Interestingly, though, the FBI did something very similar to the UK police a few years ago. Listen to hear more. Then it’s on to how Apple might just be our last hope to save the integrity of the internet. John Martellaro explains!

Why Is There So Much Pain Extracting Truth From Apple?

· · Particle Debris

Apple Media Invitation

Astonishingly, Apple creates unnecessary problems for itself. Locked in the old era, modern Apple executive thinking continues to focus on drama while excising important elements of its vision. That leads to pain, criticism, and disaffection with Apple.  It wouldn’t be hard to avoid all that these days. John explains.

Get Ready for the FBI’s New Encryption Back Door Push

· · Analysis

iPhone encryption

The FBI’s fight for government mandated backdoors into our encrypted data and devices is far from over, and Director James Comey says he plans to bring that back to the forefront next year. Mr. Comey says it’s time for an “adult conversation” on the topic, and that law enforcement needs an easy way to access our private data for criminal investigations.