https://www.eff.org/files/2014/05/15/who-has-your-back-2014-govt-data-requests.pdf

*The Snowden Effect, 2014.  

The most freaked-out, silently pulled their socks up highest and fastest:  Apple.

AT&T:  ”We never heard of him… even the NSA are mere wayward youth compared to ancient Ma Bell”

Comcast:  ”We already own the Congress, so we despise all users anyway”

MySpace:  ”What’s a snowmen?  Wait… am I still alive?”

Snapchat:  ”Pretend we’re not here and were never here.”

8

ENDLESS FAVORITE FILMS  »  Jurassic Park

"The world has just changed so radically, and we’re all running to catch up. I don’t want to jump to any conclusions, but look…Dinosaurs and man, two species separated by 65 millions years of evolution have just been suddenly thrown back into the mix together. How can we possibly have the slightest idea what to expect?" 

4

How Secure is Your Messaging App?

The Electronic Frontier Foundation, Propublica and the Princeton Center for Information Technology Policy have teamed up to explore the security of common messaging apps.

Via EFF:

The Secure Messaging Scorecard examines dozens of messaging technologies and rates each of them on a range of security best practices. Our campaign is focused on communication technologies — including chat clients, text messaging apps, email applications, and video calling technologies. These are the tools everyday users need to communicate with friends, family members, and colleagues, and we need secure solutions for them.

We chose technologies that have a large user base—and thus a great deal of sensitive user communications—in addition to smaller companies that are pioneering advanced security practices. We’re hoping our scorecard will serve as a race-to-the-top, spurring innovation around strong crypto for digital communications.

Takeaway: choose or change the messaging app you use to maximize communication security but remember this caveat from Propublica’s Julia Angwin:

Keep in mind, even an unbreakable encryption tool can be circumvented by hackers or spies that secretly install software on a computer or phone that hijacks communications before it is encrypted.

And even the best encryption tools still don’t do enough. All the tools require both people communicating to install software. And few tools provide much anonymity – so even if your messages are unreadable by anyone but you, your contact list could still be exposed. And many of the tools are run by rag-tag teams of volunteers, which could mean that they won’t last.

Images: Secure Messaging Scorecard, via EFF. Select to embiggen.