{"id":17565,"date":"2019-02-09T17:26:03","date_gmt":"2019-02-10T01:26:03","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=17565"},"modified":"2019-02-09T17:33:37","modified_gmt":"2019-02-10T01:33:37","slug":"sb-2019-02-08","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2019\/02\/sb-2019-02-08\/","title":{"rendered":"Security Bits \u2013 8 Feb 2019"},"content":{"rendered":"<h4>&#x1f1ef;&#x1f1f5; A Correction \u2014 Japan is not the next Australia!<\/h4>\n<p>Last time I briefly mentioned a story about the Japanese government working on proposals to subject foreign companies to their laws. I had only speed-read the article, and assumed it was about defeating users privacy, but I actually had it 180\u00b0 reversed! Japan wants to do a GDPR, and force foreign companies to obey its <strong>pro<\/strong> privacy laws!<\/p>\n<p>The story: <a href=\"https:\/\/www.macobserver.com\/news\/japan-tech-privacy-laws\/\">Japan Wants Foreign Tech Companies to Follow its Privacy Laws \u2014 www.macobserver.com\/\u2026<\/a><br \/>\n<!--more--><\/p>\n<h3>Followup<\/h3>\n<ul>\n<li>Following on from <em>Collection #1<\/em> we now know that Collections #2\u20135 contain an additional 2.2Bn sets of credentials \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/01\/credential-dump-contains-another-2-2-billion-pwned-accounts\/\">nakedsecurity.sophos.com\/\u2026<\/a> <\/li>\n<li>Another Nest user gets bitten by password re-use: <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/01\/hacker-talks-to-baby-through-nest-security-cam-jacks-up-thermostat\/\">Hacker talks to baby through Nest security cam, jacks up thermostat \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 1 \u2014 The Group FaceTime Bug<\/h3>\n<p>A teenager discovered a very serious bug in Apple&#8217;s new Group FaceTime. The bug was easy to trigger and allowed an attacker to remotely enable the microphone on a victim&#8217;s iOS device or Mac. There were also reports that the camera could be activated remotely too. To trigger the bug and attacker would simply have to start a FaceTime call to the victim, then, before the victim answers the call, add a third person to the call. The third person can be anyone, even a second copy of the attacker themselves!<\/p>\n<p>The technical details underlying the problems have not been detailed, but the most plausible explanation I&#8217;ve seen is that there was a bug in the code that handed a call over from regular FaceTime to Group FaceTime, and that it omitted a check to see if the call had actually been accepted in the original regular FaceTime call before enabling the mic in the new Group FaceTime call.<\/p>\n<p>It initially appeared that Apple responded promptly \u2014 shortly after the story broke in the media Apple took Group FaceTime offline to prevent attacks, and promised it would release a security update shortly thereafter. That has now happened, and the service is back online.<\/p>\n<p>It later emerged that the mother of the teenager who made the discovery tried desperately to bring the problem to Apple&#8217;s attention for a week, but did not succeed.<\/p>\n<p>Apple have since met with the family in person, accepted the teenager into their bug bounty program so they can pay him a bounty, and promised to improve their vulnerability reporting procedures.<\/p>\n<h4>Links:<\/h4>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/facetime-spying-bug-discovered-temporarily-worked-around\/\">Everything You Need To Know About the FaceTime Spying Bug \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/?p=1447543\">FaceTime bug lets callers hear you before you answer (really) \u2014 arstechnica.com<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/link\/facetime-security-bug-twitter\/\">Group FaceTime Security Bug was Apparently Highlighted by Twitter User a Week Ago \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2019\/02\/01\/apple-apologizes-facetime-bug\/\">Apple Apologizes About FaceTime Bug, Software Update With Fix Delayed Until Next Week \u2014 www.macrumors.com\/\u2026<\/a><\/li>\n<li><a href=\"http:\/\/www.loopinsight.com\/2019\/02\/05\/high-level-apple-exec-flies-to-tucson-to-meet-with-14-year-old-who-discovered-facetime-flaw\/\">High level Apple exec flies to Tucson to meet with 14-year-old who discovered FaceTime flaw \u2014 www.loopinsight.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2019\/2\/7\/18215885\/apple-group-facetime-security-bug-bounty-compensation\">Apple is compensating the 14-year-old who discovered major FaceTime security bug \u2014 www.theverge.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2019\/02\/07\/apple-re-enables-group-facetime-with-ios-12-1-4-and-macos-10-14-3-supplemental-update\/\">Apple Re-Enables Group FaceTime with iOS 12.1.4 and macOS 10.14.3 Supplemental Update \u2014 tidbits.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/www.macobserver.com\/news\/democrats-tim-cook-facetime-bug\/\">Democrats Question Tim Cook Over FaceTime Bug \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 \u2014 Facebook &amp; Google Abuse Apple&#8217;s Enterprise Developer Program to Spy on <em>&#8216;Volunteers&#8217;<\/em><\/h3>\n<p>Apple provides a program to enterprises that allows them to bypass the iOS app store and effectively side-load apps onto devices used by their employees. Apple issue the company a certificate that they then use to sign their apps. Any iOS device with a matching configuration profile installed can then run these private apps.<\/p>\n<p>To enter the program enterprises have to sign a legal contract with Apple, and part of that contract stipulates that apps delivered via this program are only for use by employees, and can&#8217;t be distributed to customers.<\/p>\n<p>This week it emerged that FaceBook had been using this program to distribute a special copy of their officially discontinued VPN product Onavo to volunteers aged between 13 and 35 in exchanged for gift vouchers worth about $20 per month. The app included a custom root certificate so it could do SSL\/TLS interception.<\/p>\n<p>We can&#8217;t know what FaceBook was actually recording, but the technologies they employed gave them the ability to record every packet of data sent between the users phones and the internet, regardless of whether or not the connection was secured. The level of access this app gave FaceBook is almost impossible to over-state. Could a non-technical adult really give informed consent to this level of tracking? How about a 13 year old?<\/p>\n<p>It has since emerged that users were forced to sign an NDA preventing them from disclosing the app&#8217;s existence. Also, on signup, users were not informed they would be sharing data with FaceBook until after they complete the initial signup process, front-companies were used during the initial steps.<\/p>\n<p>When the news was reported, Apple revoked FaceBook&#8217;s enterprise certificate, killing all their internal apps. After some (presumably tense) negotiations, a new certificate was issued to them, and they could then re-build and re-distribute their compliant internal apps.<\/p>\n<p>Google was also found to be doing something similar, though a little more transparently and a little less egregiously, and they quickly put their hands up and apologised. Their cert was deleted too, but a new one was generated for them much more quickly.<\/p>\n<p>Finally, according to Leo on Security Now, both apps are still available on the Android platform!<\/p>\n<h4>Links:<\/h4>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/facebook-google-caught-deploying-invasive-apps-apple-shuts-them-down\/\">Facebook, Google Caught Deploying Invasive Apps; Apple Shuts Them Down \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/01\/google-says-sorry-for-pulling-a-facebook-with-monitoring-program\/\">Google says sorry for pulling a Facebook with monitoring program \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/?p=1449571\">Apple, Facebook spat is over, for now\u2014iOS certificate access restored \u2014 arstechnica.com<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2019\/02\/01\/certificate-wars-a-quick-rundown-of-apples-dustup-with-facebook-and-google\/\">Certificate Wars: A Quick Rundown of Apple\u2019s Dustup with Facebook and Google \u2014 tidbits.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 3 \u2014 <em>KeySteal<\/em><\/h3>\n<p>A security researcher has released a video demonstrating an attack against Apple&#8217;s Keychain. The video appears to show that a rogue app can exfiltrate passwords from the keychain. As a protest against the fact that Apple does not have a macOS bug bounty program, the researcher has not shared how the bug works either publicly or directly with Apple.<\/p>\n<p>For now, there&#8217;s no need to worry about this bug, but a frantic race has now been kicked off between Apple and cyber criminals to see who can re-discover this bug the quickest. So, it&#8217;s possible that this will develop into a real danger in the future.<\/p>\n<h4>Links:<\/h4>\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/07\/keysteal-could-allow-someone-to-steal-your-apple-keychain-passwords\/\">KeySteal could allow someone to steal your Apple Keychain passwords \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/daringfireball.net\/linked\/2019\/02\/07\/henze-keychain-exploit\">Purported Exploit Exposes Keychain Passwords on MacOS \u2014 daringfireball.net\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2019\/02\/06\/mac-keychain-exploit\/\">Security researcher demos macOS exploit to access Keychain passwords, but won\u2019t share details with Apple out of protest \u2014 9to5mac.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Apple have released a number of security updates\n<ul>\n<li>iOS 12.1.4 (patches 3 bugs in addition to the Group FaceTime bug) \u2014 <a href=\"https:\/\/support.apple.com\/en-us\/HT209520\">support.apple.com\/\u2026<\/a><\/li>\n<li>macOS Mojave 10.14.3 Supplemental Update (patches two vulnerabilities in addition to the Group FaceTime bug) \u2014 <a href=\"https:\/\/support.apple.com\/en-us\/HT209521\">support.apple.com\/\u2026<\/a><\/li>\n<li>Shortcuts 2.1.3 for iOS \u2014 <a href=\"https:\/\/support.apple.com\/en-us\/HT209522\">support.apple.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Both FireFox 65 and Chrome 72 patched critical security vulnerabilities, and both also bring new security enhancements \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/31\/update-now-chrome-and-firefox-patch-security-flaws\/\">nakedsecurity.sophos.com\/\u2026<\/a>\n<ul>\n<li>FireFox 65 brings new tracking protections and a new UI for controlling them \u2014 <a href=\"https:\/\/blog.mozilla.org\/firefox\/control-trackers-with-firefox\/\">blog.mozilla.org\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/30\/firefox-makes-ad-tracker-dodging-easier-for-privacy-conscious-users\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Chrome 72 adds warnings about <em>look-alike<\/em> URLs (URLs that are confusingly similar to prominent websites) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/chrome-can-now-detect-lookalike-urls\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Chrome 72 add warnings about password breaches as you browse \u2014 <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/02\/google-releases-chrome-extension-that-alerts-to-breached-passwords\/\">arstechnica.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The February 2019 security update for Android patches three remote code execution bugs in the image processing library Skia. The bug affects Android versions 7, 8 &amp; 9, and can be triggered by simply viewing an image. Android users who can update really should (<strong>Editorial by Bart:<\/strong> and Android users who can&#8217;t should consider getting a securable device!) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/08\/android-vulnerabilities-open-pie-to-booby-trapped-image-attacks\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Many Linux desktop distributions should be patched ASAP to fix a nasty vulnerability in <code>systemd<\/code>, one of the process managers used by some Linux distributions (very like Apple&#8217;s <code>launchd<\/code> on macOS) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/01\/linux-user-check-those-patches-public-exploit-published-for-systemd-security-holes\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/openoffice-vulnerable-to-remote-code-execution-libreoffice-patched\/\">OpenOffice Vulnerable to Remote Code Execution, LibreOffice Patched \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/59000-reported-gdpr-breaches-8-months\/\">59,000 Reported GDPR Breaches in Just 8 Months \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/techcrunch.com\/2019\/02\/06\/iphone-session-replay-screenshots\/\">Many popular iPhone apps secretly record your screen without asking \u2014 techcrunch.com\/\u2026<\/a>\n<ul>\n<li><a href=\"https:\/\/techcrunch.com\/2019\/02\/07\/apple-glassbox-apps\/\">Apple tells app developers to disclose or remove screen recording code \u2014 techcrunch.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/29\/credential-stuffing-attack-prompts-dailymotion-password-reset\/\">Credential-stuffing attack prompts Dailymotion password reset \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ef;&#x1f1f5; The Japanese government have approved a plan from the country&#8217;s <em>National Institute of Information and Communications Technology<\/em> (NICT) to launch a credential stuffing attack against Japanese IP addresses in an attempt to find and deal with insecure IoT devices to help secure the nation in advance of the Tokyo Olympics next year \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/29\/japanese-government-will-try-to-hack-its-citizens-iot-devices\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1f7;&#x1f1fa; Apple has been forced to start storing some Russian user data on servers within Russia to comply with local laws \u2014 <a href=\"https:\/\/foreignpolicy.com\/2019\/01\/31\/how-russia-is-strong-arming-apple-data-security-icloud\/\">foreignpolicy.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/www.macobserver.com\/news\/gchq-imessage-facetime\/\">GCHQ Wants Apple to add GCHQ&#8217;s public keys to iMessage, FaceTime Chats \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>A year on from a report released by the Norwegian Consumer Council which found that smart watches aimed at kids had horrific security and privacy problems, security researchers looked at the category again and found that it&#8217;s still &#8220;a train wreck&#8221; \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/05\/kids-gps-watches-are-still-a-security-train-wreck\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Home DNA Kit firm FamilyTreeDNA has admitted that it shares data with the FBI \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/05\/home-dna-kit-company-says-its-working-with-the-fbi\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>\n<p>&#x1f1e9;&#x1f1ea; Facebook&#8217;s plans to merge the back-ends of their various apps have hit a speed bump as a German court has ruled that explicit content is needed from users to merge their data \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/08\/facebook-ordered-to-keep-apps-data-separate-without-user-consent\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/p>\n<\/li>\n<li>\n<p>Microsoft has announced the termination of support for Internet Explorer 10 in January 2020 \u2014 <a href=\"https:\/\/www.theregister.co.uk\/2019\/01\/29\/microsoft_internet_explorer_10\/\">www.theregister.co.uk\/\u2026<\/a><\/p>\n<\/li>\n<li>Main-stream (free) support for Windows 7 also ends in January 2020, and leaked documents suggest that Microsoft will attempt to push corporations to upgrade sooner rather than later by doubling the price of extended support each year \u2014 <a href=\"https:\/\/arstechnica.com\/?p=1452401\">arstechnica.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/whatsapp-face-id-touch-id\/\">WhatsApp Updated to Lock with Face ID and Touch ID \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice<br \/>\n* <\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li><a href=\"https:\/\/www.macobserver.com\/link\/mumsnet-refers-itself-uk-privacy-regulator-after-bug\/\">Mumsnet Refers Itself to UK Privacy Regulator After Bug \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f1f8;&#x1f1ec; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/31\/14k-hiv-records-leaked-singapore-says-sorry\/\">https:\/\/nakedsecurity.sophos.com\/2019\/01\/31\/14k-hiv-records-leaked-singapore-says-sorry\/ \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/29\/bqs-dodgy-database-divulges-data-on-70000-diyers\/\">Thieves\u2019 names and descriptions made public on B&amp;Q database \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/06\/jackd-dating-app-is-showing-users-intimate-pics-to-strangers\/\">Jack\u2019d dating app is showing users\u2019 intimate pics to strangers \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x2b50;&#xfe0f; &#x1f1fa;&#x1f1f8; <a href=\"https:\/\/www.macobserver.com\/news\/dhs-investigate-foreign-vpns\/\">Department of Homeland Security to Investigate Foreign VPNs \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; A ruling by an NY judge begins to add a little clarity to how digital assets will be treated under US inheritance law. A surviving spouse has been granted the right to have access to the deceased spouse&#8217;s Apple ID. Apple did not fight the case, they just wanted an order from a court before triggering a password reset \u2014 <a href=\"https:\/\/www.marketwatch.com\/story\/apple-must-give-grieving-husband-access-to-cloud-stored-family-photos-judge-rules-2019-01-25\">www.marketwatch.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/selling-fake-likes-and-follows-is-illegal-rules-new-york\/\">Selling fake likes and follows is illegal, rules New York \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/sir-nick-clegg-facebook-to-create-fake-news-war-room-for-eu-elections\/\">Sir Nick Clegg: Facebook to Create Fake News \u2018War Room\u2019 for EU Elections \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.propublica.org\/article\/facebook-blocks-ad-transparency-tools\">Facebook Moves to Block Ad Transparency Tools &#8211; Including Ours \u2014 www.propublica.org\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/fbi-burrowing-into-north-koreas-big-bad-botnet\/\">https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/fbi-burrowing-into-north-koreas-big-bad-botnet\/ \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/30\/privilege-escalation-vulnerability-uncovered-in-microsoft-exchange\/\">Privilege escalation vulnerability uncovered in Microsoft Exchange \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/04\/security-weaknesses-in-5g-4g-and-3g-could-expose-users-locations\/\">Security weaknesses in 5G, 4G and 3G could expose users\u2019 locations \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/05\/cryptocurrency-exchange-in-limbo-after-founder-dies-with-password\/\">Crypto exchange in limbo after founder dies with password \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/uk.reuters.com\/article\/us-huawei-europe-britain-exclusive\/exclusive-huawei-needs-3-5-years-to-resolve-british-security-fears-letter-idUKKCN1PV1CG\">Exclusive: Huawei needs 3-5 years to resolve British security fears &#8211; letter \u2014 uk.reuters.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xyq8v\/how-to-unlock-icloud-stolen-iphone\">How Hackers and Scammers Break into iCloud-Locked iPhones \u2014 motherboard.vice.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/qz.com\/1525661\/your-digital-identity-has-three-layers-and-you-can-only-protect-one-of-them\/\">Your digital identity has three layers, and you can only protect one of them \u2014 qz.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/07\/serious-security-post-quantum-cryptography-and-why-we-are-getting-it\/\">Serious Security: Post-Quantum Cryptography (and why we\u2019re getting it) \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/www.politico.com\/story\/2019\/02\/03\/health-risk-scores-opioid-abuse-1139978\">How your health information is sold and turned into \u2018risk scores\u2019 \u2014 www.politico.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.cnet.com\/news\/on-data-privacy-day-heres-a-reminder-that-you-have-none\/#ftag=CAD-09-10aai5b\">On Data Privacy Day, here&#8217;s a reminder that you have none \u2014 www.cnet.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/28\/how-my-instagram-account-got-hacked\/\">How my Instagram account got hacked \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-spying-karma\/\">&#8216;Karma&#8217;: Inside the hack used by the UAE to break into iPhones of foes \u2014 www.reuters.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li>(via Allison) <a href=\"https:\/\/xkcd.com\/2106\/\">Sharing Options \u2014 xkcd.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&#x1f1ef;&#x1f1f5; A Correction \u2014 Japan is not the next Australia! Last time I briefly mentioned a story about the Japanese government working on proposals to subject foreign companies to their laws. I had only speed-read the article, and assumed it was about defeating users privacy, but I actually had it 180\u00b0 reversed! Japan wants to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":14958,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[3139,3141,3140],"class_list":["post-17565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-collection-1","tag-facebook-vpn-spy","tag-group-facetime-bug"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2018\/04\/Security-Bits-Logo_1000px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=17565"}],"version-history":[{"count":2,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17565\/revisions"}],"predecessor-version":[{"id":17567,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17565\/revisions\/17567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/14958"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=17565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=17565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=17565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}