Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Monday October 27 2014, @01:39AM   Printer-friendly
from the privacy-forecast:-iCloudy dept.

Jeffery Paul, a Berlin security researcher has a complaint about the latest OS X version:

"Fast forward to 10.10. Presumably to support Continuity, current document state is no longer only saved locally - those in-progress (not yet explicitly “saved”) documents live in iCloud Drive, so that they can be opened on other devices without ever having to hit “save”. This is useful, however, all of my previous open files have now been synchronized to Apple servers.

Notice that all of my locally-stored, “unsaved” documents open in my text editor have now been uploaded in full to a partner in NSA’s PRISM program. This happens for all applications (think iA Writer, Pixelmator, etc.) that had saved application state. Any open and yet-unsaved document within an app is now silently and automatically uploaded to iCloud Drive, and, by extension, the government.

Apple has taken local files on my computer not stored in iCloud and silently and without my permission uploaded them to their servers - across all applications, Apple and otherwise.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by hemocyanin on Monday October 27 2014, @04:39AM

    by hemocyanin (186) on Monday October 27 2014, @04:39AM (#110429) Journal

    Have you ever used a text editor to write a document, say a list of passwords -- not just to places like SN, but maybe the 80 character pass-sentence you use for whole disc encryption on a system you don't boot up frequently -- and then encrypted that document with GPG? This could be a very serious issue.

    Secondly, I have a huge problem PRISM. I also very much like my Macbook Pro -- it's an excellently built machine and very nice to use. I treat it for what it is though -- a potentially infected snitch and I'm aware of what I do with it and try to be aware of the ways it could bite me. So I found this story very informative and I appreciate the PRISM reference just in case I was too sleepy, drunk, distracted, or whatever to make it myself.

    I also don't really feel that comfortable with Linux at the moment either. I'm a long time user but computer systems are so complex, it is easy to misconfigure something even for the people whose sole job is computer security (which my job is not) (and of course humanity would suffer if everyone had the same job). Often, I've purposefully made my Linux systems less secure (installed Flash to watch youtube as well as many different programs because honestly, I want more than just a shell (speaking of which ....)). Anyway, I'm pretty convinced there is no way I could be certain about the privacy of my internet usage or the security of my systems. I've sort of gamed out in my head, what I would have to do have some sense of anonymity if I wanted to search for something in secret, and I've concluded I don't have the skills to actually do it:

    • Buy a computer with cash (CC number gives name and the manufacturer certainly knows a few serials/addresses, e.g., MAC address).
    • Disable the internal bluetooth card (disconnect from power) (Not positive but I could imagine BT can keep track of devices around it, much like wifi can log networks it senses but does not connect with).
    • Disable the wifi card (preferably in a way that is switchable, otherwise disable and get a USB wifi card with cash).
    • Find the microphone and webcam and disconnect them from power. At least tape them over but be aware that ambient noise can be informative.
    • Remove the battery.
    • Go to a coffee shop or other public wifi, avoiding license plate scanners and other video equipment (a picture of you in the coffee shop at the same time a certain search was made pretty much is the end of that anonymous surfing) or find an open wifi you can reach with a long range antenna (but beware of antenna locating techniques the authorities could use). Of course you'll get all your antenna gear with cash.
    • Insert battery, boot from a USB stick, probably Tails or something along those lines.
    • Switch on wifi/plug in USB wifi.
    • Spoof MAC address (There's probably a whole host of identifiers that I'm missing -- screen resolution, mouse mfgr, etc. etc. -- spoof as much as you can).
    • Have already learned how to use Tor properly (I've never even used it once so I'm sure I'd screw it up).
    • Of course you'll be running no-script, not using flash, etc. etc. -- may even be browsing with linx (although that is pretty unique -- probably better to go with something ubiquitous)
    • Sit with your back to the wall.
    • Do your search.
    • Shutdown the computer saving nothing from the session except what is in your brain, and then remove the battery.
    • When you leave, be aware of video/license surveillance and avoid it (good luck with that BTW, I doubt you'll even see it).

    Even then, I would think there are going to be issues I haven't even considered. After thinking all that through, I have decided to treat every computer I use as if it was infected because I just don't think that I, in my evenings after work, would be able to actually secure my devices with any great certainty.

    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 3, Informative) by mojo chan on Monday October 27 2014, @08:29AM

    by mojo chan (266) on Monday October 27 2014, @08:29AM (#110444)

    It's easier to just use a Tails live CD. Pre-build Linux environment with Tor, spoofs your MAC address, nothing saved anywhere.

    --
    const int one = 65536; (Silvermoon, Texture.cs)
    • (Score: 2) by hemocyanin on Monday October 27 2014, @02:42PM

      by hemocyanin (186) on Monday October 27 2014, @02:42PM (#110531) Journal

      That's my step 7, except I'd boot from a USB stick for performance reasons. LiveCDs sort of suck performance wise.

      • (Score: 0) by Anonymous Coward on Monday October 27 2014, @04:34PM

        by Anonymous Coward on Monday October 27 2014, @04:34PM (#110576)

        But CDs are harder to compromise than USB sticks.

        • (Score: 2) by hemocyanin on Monday October 27 2014, @07:47PM

          by hemocyanin (186) on Monday October 27 2014, @07:47PM (#110644) Journal

          I totally agree, but what about a complete reformat of the USB stick between uses? Maybe a multipass write of random data (*), then a reformat, then reload the OS from an ISO. I only cringe at the CD option because of the performance issues.

          (*) is this necessary with non-magnetic media?