Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Over 87GB of email addresses and passwords exposed in Collection 1 dump

ZDNet: “Almost 773 million unique email addresses and just under 22 million unique passwords were found to be hosted on cloud service MEGA. In a blog post, security researcher Troy Hunt said the collection totalled over 12,000 separate files and more than 87GB of data. The data, dubbed Collection #1, is a set of email… Continue Reading

Once-revolutionary smartphone is losing its power to amaze and maybe its singular hold on our lives

WSJ [paywall] The Big Hangup: Why the Future Is Not Just Your Phone The once-revolutionary smartphone is losing its power to amaze—and maybe its singular hold on our live: “Steve Jobs took to a stage a dozen years ago this week to introduce a revolutionary new product to the world: the first Apple iPhone. That… Continue Reading

The Federal Government Offers a Case Study in Bad Email Tracking

EFF: “The U.S. government sends a lot of emails. Like any large, modern organization, it wants to “optimize” for “user engagement” using “analytics” and “big data.” In practice, that means tracking the people it communicates with—secretly, thoroughly, and often, insecurely. Granicus is a third-party contractor that builds communication tools to help governments engage constituents online.… Continue Reading

U.S. Government Has Amassed Terabytes of Internal WikiLeaks Data

Gizmodo: “Late last year, the U.S. government accidentally revealed that a sealed complaint had been filed against Julian Assange, the founder of WikiLeaks. Shortly before this was made public, the FBI reconfirmed its investigation of WikiLeaks was ongoing, and the Wall Street Journal reported that the Department of Justice was optimistic that it would be… Continue Reading

(Don’t) Return to Sender: How to Protect Yourself From Email Tracking

EFF: “There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data, similar to page hits: enough to let the sender get a sense of how well their campaign is doing without invading users’… Continue Reading

Our Cellphones Aren’t Safe

Opinion | Our Cellphones Aren’t Safe – The New York Times: “Security flaws threaten our privacy and bank accounts. So why aren’t we fixing them? America’s cellular network is as vital to society as the highway system and power grids. Vulnerabilities in the mobile phone infrastructure threaten not only personal privacy and security, but also… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues December 2018

Before the end of 2018, please take some time to catch-up with the cyber related updates provided by Pete Weiss every week on LLRX. Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational… Continue Reading

Cellphones, Law Enforcement, and the Right to Privacy

Brennan Center for Social Justice: How the Government Is Collecting and Using Your Location Data “Cell phones are ubiquitous. As of 2017, there were more cell phones than people in the United States. Nearly 70 percent of those were smartphones, with 94 percent of millennials carrying a smart device. Cell phones go nearly everywhere, and… Continue Reading

Almost every part of Trump’s life is under investigation

WASHINGTON (AP) — “Investigations now entangle Donald Trump’s White House, campaign, transition, inauguration, charity and business. For Trump, the political, the personal and the deeply personal are all under examination. Less than two years into Trump’s presidency, his business associates, political advisers and family members are being probed, along with the practices of his late… Continue Reading

What Happens When You Reply All to 22,000 State Workers

The New York Times: “Reply All, the scourge that has afflicted office workers everywhere, has hit 22,000 government employees in Utah, demonstrating that decades into the invention of email, many of us still don’t understand its etiquette. This is a public advisory: PLEASE DO NOT REPLY ALL. For at least 20 years now, emailers everywhere… Continue Reading

DHS OIG Report – CBP’s Searches of Electronic Devices At Ports of Entry

DHS Office of Inspector General Audit – CBP’s Searches of Electronic Devices At Ports of Entry / Redacted, December 3, 2018: “Between April 2016 and July 2017, CBP’s [U.S. Customs and Border Protection] Office of Field Operations (OFO) did not always conduct searches of electronic devices at U.S. ports of entry according to its SOPs. Specifically,… Continue Reading

People from all over the world are sending emails to Melbourne’s trees

ABC.Net.Au: “Melbourne gave 70,000 trees email addresses so people could report on their condition. But instead people are writing love letters, existential queries and sometimes just bad puns…” Please take a couple of minutes and read this article – you may cry, you may appreciate how important trees are in our urban areas (and if… Continue Reading