Digital ID

Pierluigi Paganini September 29, 2016
Why Apple logs your iMessage contacts and other metadata?

Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed that Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]

Pierluigi Paganini September 18, 2016
Mozilla will fix the cross-platform RCE flaw that threatened Tor anonymity

Mozilla plans to fix the cross-platform RCE flaw that threatened Tor anonymity. The flaw affects certificate pinning protections implemented by Mozilla. Mozilla plans to release a Firefox update to address the cross-platform remote code-execution vulnerability recently patched in the Tor browser. The tor is inviting its users to install the security update urgently, and Mozilla follows close […]

Pierluigi Paganini September 12, 2016
Motherboard shows us how surveillance software works

Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software. Recently, the iPhone hack carried out with the NSO Group‘s Pegasus raised the debate about the use of surveillance software. Who uses them? How? Are we able to defend our machines from a so invasive surveillance? NSO Group is […]

Pierluigi Paganini September 09, 2016
Chrome will mark HTTP connections to websites as non-secure from January 2017

From January 2017, Chrome will indicate connection security with an icon in the address bar labeling HTTP connections to sites as non-secure. Google continues its effort to make the web a better place by pushing the adoption of encryption, we left the IT giant in May when it announced the decision to switch on default HTTPS […]

Pierluigi Paganini August 29, 2016
The Network of NewSat satellite telco firm was the ‘most corrupted’ of ever

The Network of NewSat satellite firm was the ‘most corrupted’ of ever, it was hacked by foreign hackers and it had interception kit in its data centre. The story demonstrates the high interest of spy agencies in hacking communication systems. Once upon a time, the Australian satellite company was deeply hacked by cyber spies that […]

Pierluigi Paganini August 29, 2016
DNC staffers are invited to use ‘Snowden-Approved’ App Signal in response to the hack

In the aftermath of the DNC hack the staffers were instructed in the use of the popular instant messaging Signal app, also called the “Snowden-approved” app. The need of privacy is pushing the IT industry in developing secure messaging systems that implement end-to-end encrypted to protect users from prying eyes. Signal is probably the most popular app […]

Pierluigi Paganini August 26, 2016
WhatsApp will share your data with Facebook. How to say no?

WhatsApp has introduced significant changes to its Privacy Policy, such as the sharing of user data with Facebook. Is it possible to say no? How? If you are one of the WhatsApp users there is something that you need to know, the popular messaging app will begin sharing its users’ data with Facebook. Facebook, that […]

Pierluigi Paganini August 22, 2016
Members call for a Tor General Strike and shut down Tor for a day

A few members of the community are calling for a ‘Tor general strike’ to protest against some decisions taken recently by the core members. Last month, the Tor Project announced that an internal investigation had confirmed the allegations of sexual misconduct against the notorious member Jacob Appelbaum. The allegations divided the internet privacy community, as a result of […]

Pierluigi Paganini August 08, 2016
A New Google API Launched, in Avoidance of Android Passwords

Google has launched a new Google API working together with Dashlane, to stop using passwords for Android users and improving the user experience. It is true that Android security apps work wonder and also Google has been trying to use fewer passwords or none whatsoever, making it harder for someone to penetrate the privacy of its users. […]

Pierluigi Paganini July 22, 2016
3D printing of a dead man’s fingers allows unlocking his phone

The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past. The federal authorities […]