Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
willackerly
100%
0%
willackerly,
User Rank: Author
9/30/2016 | 1:36:37 PM
Re: Secret law
jries921, that is a really thoughtful response, and those are fantastic ideas.  I think there are still real opportunities to make progress on these issues, and I'm pursuing one in particular, so it would be great to connect directly. If you're interested, give me a shout on email – accessible via my author profile
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
9/26/2016 | 7:34:32 AM
Re: World with no secrecy
While I am concerned with the way that the world is moving in terms of personal privacy, this is the silver lining I am secretly hoping for. A world with no privacy is one I don't want to come to pass, but if it does, it needs to be an open book for everyone. If there are some with privacy while everyone is without, that gives enormous power to a select few who can keep their skeletons hidden.

However I am not optimistic. Privelege like that has traditionally been one rule for many and another for a few and it seems likely to continue.
Souheil.M
50%
50%
Souheil.M,
User Rank: Apprentice
9/26/2016 | 6:24:51 AM
Re: A good read on Snowden case !
Yes you're right.  However, I would say when using social media networks you are giving them some "private" information somehow,  but all depends on how the privacy is defined according to the Law. Anyway the question is very complex.

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/24/2016 | 5:09:29 PM
World with no secrecy
 

Another way of getting rid of this complex situation is not to have secret data, if everything is open to everybody then we will not have this madness and no need to play hide and seek game. Not realistic but it would be perfect if it happens. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/24/2016 | 5:07:37 PM
Re: A good read on Snowden case !
"... he general public have no good way of knowing what the downside was. ..."

Agree. We are only hearing what is reported. We do not understand the dynamics I believe.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/24/2016 | 5:05:07 PM
Re: Secret law
I agree. These are all good points, NSA is not operating under a secret law, these would most likely not solve ultimate problem. Also, it is not only US, other countries' information agencies performing secret services of course.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/24/2016 | 5:01:31 PM
Re: A good read on Snowden case !
"... we can't sacrifice our own privacy ..."

I hear you. Privacy will likely be less of an issue in near future, we already give up privacy by being in the Facebook and when we start using tools available to us, more like security is the main concern.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/24/2016 | 4:58:29 PM
Misuse of data
 

I would not consider a potential, if you have data nobody else has you would use it for your benefits, that is main reason you made the effort to get it. Better not to allow anybody have any data exclusively.
jries921
50%
50%
jries921,
User Rank: Ninja
9/24/2016 | 10:40:45 AM
Re: A good read on Snowden case !
Frankly, I don't know enough to ask for his pardon, which is why I will not sign any petitions requesting it.  Specifically, I don't know what damage he has done to our defense, intelligence, or diplomatic efforts, if any; I don't know what information he has given to the Russian authorities, if any (he denies that he has, but I can't imagine President Putin granting him asylum without his having been thoroughly interrogated by a couple of the FSB's finest); and I don't know what there is in the cache that hasn't been publicly reported (and there really isn't any way to secure what is still in Glenn Greenwald's custody).  Admittedly, he has exposed real abuses and provoked a badly needed public debate, but we, the general public have no good way of knowing what the downside was.

If I were President, I wouldn't even think about granting him a pardon until/unless I had a very good idea of what the negative consequences were, and unless the entire contents of the cache were transmitted to the National Security Council staff (so I and the appropriate agencies would know exactly what was leaked, not just what Greenwald has chosen to release).  Then I'd need to have some very long conversations with my Secretaries of State, Defense, and Homeland Security; and with my Director of National Intelligence and probably a remote conversation with Snowden as well (he could be granted safe conduct to and from the US Embassy in Moscow for that purpose).  Only then do I think I would have enough information to make a decision.

In the mean time, I prefer to withhold judgment.  I don't really like deferring to the President, but I don't see much of a choice.
masoodm
50%
50%
masoodm,
User Rank: Apprentice
9/24/2016 | 10:24:32 AM
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
My question to Snowden is that after exposure, to what extent the IT sector had taken real-time challenges on privacy threats.
Page 1 / 2   >   >>


Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
Will This Be the Year of the Branded Cybercriminal?
Raveed Laeb, Product Manager at KELA,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3682
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2019-17361
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-19142
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
CVE-2019-19801
PUBLISHED: 2020-01-17
In Gallagher Command Centre Server versions of v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an unprivileged but authenticated user is able to perform a backup of the Command Centre databases.
CVE-2019-19802
PUBLISHED: 2020-01-17
In Gallagher Command Centre Server v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an authenticated user connecting to OPCUA can view all data that would be replicated in a multi-server setup without p...