FBI Paid $900K for San Bernardino iPhone Hack

· · News

Cellebrite's servers hit with data breach

The FBI refused to ever share how much it paid for the hack into San Bernardino shooter Syed Farook’s iPhone, but thanks to Senator Diane Feinstein we now know the price was US$900,000. The Senator accidentally spilled the beans during a Judiciary Committee meeting on accessing encrypted data on smartphones and personal computers.

Physical Security Matters, Too – Mac Geek Gab 652

· & · Mac Geek Gab Podcast

Mac Geek Gab Logo

SMC Resets, Migration Assistant tricks, Auto-Upgrade solutions and Renting vs. Owning your Cable Modem are just the beginning for your two favorite geeks today. S/MIME is taken to a whole other level with guest Jeff Butts who helps us all understand how to make this work on both macOS and iOS! Then it’s time to dive into your system certificates – and which ones you can touch vs. those that you can’t. Security is always on the mind and a quick VPN discussion rounds that out. Then John and Dave move on to something more pleasing to the ear: sound, and how best to manage it on your Mac!

TMO Staff Share their Favorite VPN Services

· · News

The Mac Observer staff shares their favorite VPN, or virtual private network, services

Thanks to a new law green lighting ISPs selling our personal web browsing data, along with restrictions prohibiting the FCC from stopping the activity, there’s a lot of talk about VPNs, or Virtual Private Networks. With so many VPN services to choose from it’s hard to decide which is best for you, so I asked the TMO staff what they rely on.

Now Would Be a Great Time for an Apple VPN

· · The Back Page

If Apple Operated a VPN

There are many things Bryan Chaffin wishes Apple would release. Streaming TV, a smarthome hub, new freaking Macs, the list goes on. But something new on his mind is an Apple owned and operated virtual private network (VPN). He explains why this would be a welcome port in the storm of surveillance capitalism.

5 Things to Consider when Evaluating a VPN for Privacy

· · Deep Dive

Yesterday we explained what a VPN is and covered the benefits of using one. Today we’re examining how to figure out if you have a trustworthy VPN provider. In place of your ISP, your VPN provider receives your browsing data, and it’s good to shop around and compare privacy policies. Andrew Orr tells us what to look out for.

What Is A VPN, And How Can It Help You?

· · Deep Dive

Now that Congress have chosen to allow ISPs to sell your data, many people are turning to VPNs to help. But you may not know how VPNs work, or how a VPN can help you browse the web safely. In this article Andrew Orr explores the technical details and gives you our VPN recommendations.

macOS: Creating an App-Specific Password for iCloud

· · Tips

Learn how to generate an app-specific password

When you first enable two-factor authentication in iCloud, you might notice some of your apps appear broken. This is because those apps don’t support 2FA, and require app-specific passwords. Follow along with Jeff Butts as he demonstrates how to generate and manage your app-specific passwords.

Britain's Home Secretary Pushes for Encryption Back Door

· · Analysis

Cellebrite's servers hit with data breach

British Home Secretary Amber Rudd says it’s time for technology companies to give law enforcement a way to decrypt private communications because terrorists shouldn’t have a way to secretly chat. Her comments come in the wake of a terrorist attack in London where five people were killed.

UK Anti-encryption Push, Woz at Startup World Cup - TMO Daily Observations 2017-03-27

· · The Mac Observer's Daily Observations Podcast

TMO Daily Observations Podcast Logo

There’s a new government call to for tech companies to let law enforcement bypass our security and encryption, but this time it’s from the United Kingdom. Bryan Chaffin and Jeff Butts join Jeff Gamet to look at the ramifications if the U.K. forces the issue, plus Bryan fills us in on Steve Wozniak’s presentation at Startup World Cup.

Pwn2Own Hackers Found Two Safari Zero Day Exploits

· · News

Yesterday was the annual Pwn2Own hacking contest, and also marks the contest’s 10th anniversary. Hackers compete in challenges to find security holes in popular software and mobile devices. This year, two Safari zero days were found by the white-hat hackers.

Android Insecurity, Messaging Anachronisms, and Legacy Apple Auctions - ACM 402

· · Apple Context Machine Podcast

Apple Context Machine Logo

Bryan and Jeff try and wrap their heads around a world where malware is being installed on Android devices in the supply chain, before customers even get the devices. They also take a trip into the anachronistic world of sealing wax and sealing wax stamps, as well as the fascinating world where 40 year-old Apple I computers are auctioned for hundreds of thousands of dollars.