ITsecurity
twitter facebook rss

What future for BT Openreach?

Posted by Monica Horten on February 24, 2016

What should be done with Openreach? Tomorrow Ofcom will present its conclusions from a review of the UK telecoms industry. In advance of the Ofcom announcement, this post considers some of the options. The regulator is widely  tipped to take a cautious ‘leave it as it is’ stance.  The wider public interest question is whether   […]

iPhone and the FBI backdoor

Posted by Kevin on February 17, 2016

Much is being written about the FBI’s court order instructing Apple to provide a backdoor into a terrorist’s iPhone. And much praise is being heaped upon Apple for its disinclination to do so. This disinclination is described by Tim Cook in a letter to Apple users: A Message to Our Customers. I think, however, it […]

The European Parliament Demands Protection for Snowden

Posted by Kevin on October 29, 2015

The European Parliament, that is, the only elected and democratic part of the European Union, has passed a new resolution: Calls on EU Member States to drop criminal charges, if any, against Edward Snowden and grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistle blower […]

Get ready for some serious DoubleSpeak

Posted by Kevin on October 28, 2015

Two mutually exclusive principles continue their collision course: the European demand for privacy and the US demand for access to personal data. On Monday this week the European Justice Commissioner Vera Jourova was talking about the need to replace Safe Harbor with something mutually and legally acceptable. Following talks between Washington and Brussels she said, […]

Have Lynch and Europol just set in motion a solution to the Microsoft problem?

Posted by Kevin on September 16, 2015

It’s a conundrum. Microsoft is caught between two masters: Europe, where it is desperately seeking to increase marketshare against the dominant Google; and the US, its homeland overlord that it must, and indeed would like to, honor and obey. This conundrum is illustrated by Microsoft’s refusal to simply hand over a European customer’s emails from […]

Section 94 – the UK Section 215

Posted by Kevin on August 15, 2015

Julian Huppert, lecturer at Cambridge and formerly a Lib Dem MP, has written about a disturbing piece of legislation that most of us don’t know exists: Section 94 of The Telecommunications Act 1984. It is somewhat secretive — so secretive that even he, when an elected representative of the people, could not discover how often […]

The agony of indecision – Windows 10

Posted by Kevin on August 12, 2015

It’s just sitting there. Mostly it’s being quiet – but every now and again it pops up: ‘Here I am. What are you going to do about me.’ Well I don’t know. Do I install Windows 10 and obey the business logic; or do I ignore it and obey the privacy logic? The Business Logic […]

The other drug money

Posted by Kevin on August 12, 2015

This is from Science Daily yesterday: Are these the same scientists that we educate with our money to be paid by the drug companies to produce statistics that will persuade the politicians who we pay with our money to make laws to force us to have the vaccinations that don’t work and make us more […]

Cameron’s Fecking Controls

Posted by Kevin on August 10, 2015

There are two problems with this image. The first is obvious. BT is blocking LinkedIn. LinkedIn? Really? The second is perhaps only immediately obvious to me. It is this: I don’t have fecking Parental Controls set on my account. So what the feck is going on? Has Cameron made ‘Parental Controls’ suddenly obligatory without me […]

DNA-based access control: the dystopian endgame

Posted by Kevin on July 27, 2015

Martin Zinaich yesterday excellently described what he calls the PIT: privacy invasive technology (Falling into the PIT). The implication is that this is a deep, steep pit from which it is already too late to escape. But there was one comment he makes that implies it is going to get worse: The problem with technology […]