To Serve, Protecte, And Hide, If Necessary

image

One of the latest rumors has it that Facebook managed to get its hand on the former chief of the Yahoo security system. Alex Stamos is supposed to do exactly what in Facebook? The same job he was doing in Yahoo. Right? Is Facebook in trouble? Should we be worried about our cyber security on Facebook?

If you scratch a little bit deeper underneath the Facebook surface, you will realize that it still cares about its users. In a profitable way, of course. That is why, anything and anyone to make users uncomfortable is not welcome on this most popular social network in the world.

Here is the catch. The list of most unwanted guests includes our dear government among other notorious men in black. This means that we will be safe from all kinds of spying and tracking programs made in the NSA or the CIA. If that is really the case here, then our hats off to Facebook.

We have to admit that we are a little bit suspicious. Facebook and Google have quite a negative reputation as being extremely “government-friendly”. They just cannot say no to the government, can they? Let us just hope that Facebook hackers will lose their job, thanks to this man Alex Stamos .

Who’ll Guard The Guardians?

image

Can you imagine this worst case scenario? Your password manager just got hacked. That is the trouble with a strategy, let me put all of my eggs in one basket. On the other side, what other real options do we have? They say, do not use the same password for all of your various devices.

OK, we got it, but who is going to remember dozen of different passwords. Now, you see what is the big problem here. When it comes to the password managers, we expect from them to be bulletproof in terms of flawless cyber security. When they fail, what are we supposed to do?

Passwords are going to be our most annoying problem for quite some time. We are literally helpless. Every now and then, you hear about the more or less successful innovations in this field. There are some experts, who are suggesting us to use Emoji symbols as a password alternative.

Can you believe it? How about body implants? Can this work for you? Do we really need to trade our privacy for an adequate password? The more we talk about passwords, the more frustrated we eventually become. Should we use the word password for our only password?

Emoji Password

image

OK, we got it. We are not rocket scientists, but we know for sure that a password based on Emoji symbols is actually a picture-based security measure. It makes a perfect sense, doesn’t it? This new type of password is supposed to be a tougher challenge for hackers.

For what is worth, thanks to Emoji, we have more combinations at our disposal to play with. On the other side, we could not help ourselves noticing one obvious practical problem. How we are supposed to remember our new Emoji password? This is going to be a little bit harder, than it seems.

If you want a strong password, then you will have to use quite a few Emoji symbols. Very different ones. Right? Which eventually brings us back to the very beginning of our story about the bullet-proof passwords. Do we have to use a special program to memorize our Emoji passwords for us?

We are pretty much convinced that some reckless users are the perfect match for the category called the helpless-cyber-security-cases. Someone will just put six or eight smileys in a row. And, that will be it. The Emoji version of a password for the password.

Cyberphone The New BlackPhone

image

Since the beginning of the smartphone time, we have dreamed about the magical model, which will be a synonym for the uncompromising safety and bulletproof privacy. This is how, we have ended up one fine day with a thing called the BlackPhone under our pillow. Yet, that was not enough.

The main purpose of this dark-knight-smartphone was to encrypt all of your mobile data. Protection of your privacy was its primary and only purpose. However, we still could not find a solution for the secure mobile transactions. This is the reason, the Cyberphone is introduced.

This is the early part of the smartphone day, that is why, we cannot tell you a lot. This smartphone, which comes with a straightforward name Cyberphone, walks in the mysterious mobile ways, as it should be. Nevertheless, this does not solve all of our problems. We need a double-bubble solution.

What if the Cyberphone and the Blackphone can have kids? Smart kids, if possible. This way, we will be able to kill two most troubling cyber-threats with just one smart-stone-phone. Protecting privacy, while ensuring safe mobile transactions. It really sounds like a dream, doesn’t it?

When Experts Walks In, Security Walks Out

image

Here is the thing with the cyber security experts. They talk too much. When you ask them to give you a couple of life saving tips, this is what you get as a result. The very first thing you are going to hear is that you should always walk on the safe side of the cyber cliff. What is that supposed to mean?

Use only legitimate software. Avoid suspicious websites. Do not do anything foolish while being online. Seriously? It is just like they are referring to the regular users of the notorious Silk Road. What else do these brainiacs have to share with us that can improve our security?

We are supposed to forget about all those ridiculous passwords, which include among other hard to believe “crown jewels” of pure ingenuity, such as password, 123456, 123456789, iloveyou, and similar. Do you feel safer already? What is the moral of this story about the top cyber security secrets?

Well, either these experts were in the bad mood mode, or we, the users, are helplessly naive and reckless. Maybe, we can really strengthen our cyber security position, with a few simple steps, we fail to apply over and over again. Maybe, the image in our cyber security mirror is too scary to look at.

USA Patriot Act vs USA Freedom Act

image

The busy little bees in the Congress are not going to be bored this summer, that is for sure. The clash of the legal titans USA Patriot Act and US Freedom Act is far from over. In addition, all the voices calling Edward Snowden to come back home are perhaps still premature despite their noble intentions.

From what we know for sure, the most decisive battle is going to be fought over the phone records. The NSA has a couple of months left to do what it wants with our phone records. After the moment the USA Freedom Act reaches its full legal power, a court order would be an absolute must in this field.

Either way, this is a tricky situation, and there are no winners here. Our privacy is incurably lost between our need for the flawless security and our desire to be left alone, from time to time. You cannot have it both, can you? One side of this story has to suffer, either our privacy or our safety.

The President Obama is going to have more than one sleepless night. His signature will set the beginning of this legal war. We sure hope that a new devastating terrorist attack is not going to be required to determine a winner. Maybe, it is simply impossible to enjoy your privacy and safety at the same time.

The Four-Million Super-Hack

image

No one knows for sure, what has actually happened. Maybe, we are too embarrassed to admit it. Yet, for what is worth, some 4 million federal employee data were stolen. Does it mean that all federal data are compromised? How many federal employees, we have in the first place?

Or, let us ask the right question. Who is to blame? It turns out that all eyes are on Chinese hackers, for the moment. Although, it is not quite clear, what are you supposed to do with these federal data. Can you sell them? Are these people more attractive to people, because they have reliable sources of income?

The black-cyber-markets can be very generous for these types of data. On the other hand, this is a huge blow straight in the face of the federal cyber security. If the US government cannot protect its own employees, then what is going to happen to the so-called ordinary citizens?

You can rest assured that this cyber embarrassment is not going to disappear so easily. We are going to write and read much more about the aftermath of this hack attack of epic proportions. Can you hack an entire country? Now, under these circumstances, this question does not sound crazy at all.

Edward Please Go Back Home

image

Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act. Are you confused with this sentence? In order to ease this task for you, we have bolded the most important letters. Your job is to get something meaningful out of it. Do you need more help?

How about the USA Freedom Act? Oh dear, it sounds so lovely and inspirational. What is it supposed to do? Well, for what is worth, this shiny document is supposed to work against the good men in black, who are doing bad things to our privacy. Is it going to be effective and enough?

We only wish that Edward Snowden was here to witness one of the very few acts, which aims directly at the NSA operations. This is an obvious acknowledgement that Snowden has been absolutely right all of this time. However, this is not going to save him from prison.

The world’s most famous whistleblower may never come back home. It is a hard thing to say, but that is not the most important thing. We believe that Snowden would have appreciated a hypothetical situation of not being able to recognize his home country thanks to this and similar acts.

Bill & Ted’s Deep Web Adventure

image

If you are a huge Bill & Ted fan, then you definitely appreciate each and any rare opportunity to see Keanu Reeves and Alex Winter together. Yet, how about a documentary? Can this work for you? At the same time, we have not quite used to see these hilarious team in some more serious roles.

Here is an unprecedented surprise for these two. Alex Winter took care of organizing a mind blowing documentary about the so-called Deep Web. On the other side, Keanu Reeves narrated the whole thing. The final results were really impressive. They went deep into the Deep Web, that is for sure.

As soon as you hear Keanu’s voice-over, you will get this unpleasant and cold Matrix feeling. When it comes to the Deep Web aka Dark Net, you cannot make a movie with a happy end. Nevertheless, it is unreasonable to treat this invaluable part of the World Wide Web with superstition and fear.

Our hats off to these two most unlikely cyber heroes. We loved them when they used to entertain us. We should appreciate when they are trying to warn us. Our ignorance is the worst enemy of both worlds the real and the virtual one. What is the Matrix? What is the Deep Web?

Hey Congress, This Is A Blackout

image

It seems that someone has just had enough of laws with lovely names for the media, but with the devastating consequences for the already compromised privacy. All cyber-eyes are on Congress right now. What is going to happen with a few quite notorious surveillance laws?

Both Freedom and Patriotic Act, in the name of our freedom and rights, ask from us to give up our privacy more or less, directly or indirectly. On the other hand, there are more than 1,000 websites and even more people behind them, who strongly believe that the days of greatest dangers are gone.

We have seen all kinds of protests. Some of them were quite simple and obvious, while others were surprisingly creative and complex. Can you protest with a code? This is exactly what is happening right now. Some busy little bees have come up with a brilliant idea to “block” the Congress.

Here is the catch. All users working or “coming” from the Congress will not be able to access quite a few websites. The only thing they will be able to see is a blackout message. Will it work? Time will tell, and in the meantime, this blackout protest is spreading like a wildfire all over the Internet.