Friday, September 06, 2013

Leaked Verizon doc prices Galaxy Note 3 at $699 retail, $299 with contract, $599 if you bundle the watch

Source: http://www.engadget.com/2013/09/06/verizon-galaxy-note-3-prices/

AT&T and T-Mobile customers already know what they will have to cough up if they want to squeeze Samsung's Galaxy Note 3 into their pockets. Verizon customers, however, are currently in the dark -- despite big red encouraging you commit in advance all the same. A reportedly leaked document received by AndroidSPIN pegs the phone at $699 sans-contract, or $299 if you sign on the dotted line for a two-year fling. Verizon seems keen to bundle in the Galaxy Gear, too, offering a joint package for $599 should you want to go all in. The pricing-curtain officially lifts at 9am ET, but here's a head start if you need to count those beans. Take a squint at the image yourself past the break.

Filed under: , ,

Comments

Via: Sammobile

Source: AndroidSPIN

Read More...

LG's 77-inch Ultra HD curved OLED TV is the biggest, with the most buzzwords (update: eyes-on)

Source: http://www.engadget.com/2013/09/06/lg-77-inch-curved-uhd-oled/

LG's 77inch Ultra HD curved OLED TV is the biggest, with the most buzzwords update eyeson photos

The never ending battle between Korean manufacturers Samsung and LG has moved to its inevitable next level, as LG has introduced an even larger super high-res OLED than its competitor's 55-inch models. The new high water mark is this 77-inch Ultra HD curved OLED it's showing off at IFA 2013, which is a step up in pretty much every way possible and even makes us recall the LCD size wars of the mid '00s. Whether or not we asked for it, it's bringing new display technology, a rare shape and of course, that truly outstanding size. It's only a concept now, but so was the $15,000 55-inch version at one point so we'd suggest keeping your black card handy.%Gallery-slideshow83284%

Filed under: , ,

Comments

Source: LG Newsroom

Read More...

Thursday, September 05, 2013

American and British spy agencies can thwart internet security and encryption

Source: http://www.engadget.com/2013/09/05/american-and-british-spy-agencies-can-thwart-encryption/

American and British spy agencies can thwart internet security and encryption

As reporters at the New York Times, the Guardian and ProPublica dig deeper into the documents leaked by Edward Snowden, new and disturbing revelations continue to be made. Two programs, dubbed Bullrun (NSA) and Edgehill (GCHQ), have just come to light, that focus on circumventing or breaking the security and encryption tools used across the internet. The effort dwarfs the $20 million Prism program that simply gobbled up data. Under the auspices of "Sigint (signals intelligence) enabling" in a recent budget request, the NSA was allocated roughly $255 million dollars this year alone to fund its anti-encryption program.

The agencies' efforts are multi-tiered, and start with a strong cracking tool. Not much detail about the methods or software are known, but a leaked memo indicates that the NSA successfully unlocked "vast amounts" of data in 2010. By then it was already collecting massive quantities of data from taps on internet pipelines, but much of it was safely protected by industry standard encryption protocols. Once that wall fell, what was once simply a torrent of scrambled ones and zeros, became a font of "exploitable" information. HTTPS, VoIP and SSL are all confirmed to have been compromised through Bullrun, though, it appears that some solutions to the NSA's "problem" are less elegant than others. In some cases a super computer and simple brute force are necessary to peel back the layers of encryption.

Filed under:

Comments

Source: New York TImes, Guardian, ProPublica

Read More...

The NSA Has Figured Out How To Access Some Of The Most Private Data On The Internet

Source: http://www.businessinsider.com/the-scariest-part-about-the-nsa-access-2013-9

world Internet map

The New York Times has published a report, drawing on documents leaked by Edward Snowden, that reveals the National Security Agency is able to circumvent the encryption, or digital scrambling, that guards the privacy of much of the traffic on the Internet.

The most alarming part is that they want it all.

The Times' report explains how, exactly, the agency has been able to obtain so much access to the world's web traffic.

From The Times:

Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.

So the world's largest spy agency is paying companies, coercing companies, stealing from companies, and/or altering the software of companies to get the access to Internet data.

In the words of Bruce Schneier, an encryption expert and fellow at Harvard's Berkman Center for Internet and Society, the NSA is "doing it primarily by cheating, not by mathematics."

And the agency can only to this with the voluntary or involuntary cooperation of Internet companies.

That $250-million-a-year effort, called the Sigint Enabling Project“actively engages the U.S. and f! oreign I T industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable."

From The Guardian, which has published a parallel report:

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," stated a 2010 GCHQ document. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."

Ultimately, beyond the capabilities provided through the a highly classified program, code-named Bullrun, is that the NSA and its British counterpart (i.e. GCHQ) want even more access.

From the New York Times (emphasis ours):

But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence.

One way to do this would be to obtain the master keys that companies use for Web encryption. It is unclear how far the U.S. and U.K. spy agencies have come to realizing that goal.

According to Schneier, there are still ways to remain secure against NSA surveillance.

SEE ALSO: CYBER EXPERT: The NSA Has The Means And Motive To Spy On Everyone

Join the conversation about this story »


    






Read More...

PATRIOT Act Author: The NSA Has Abused Its Power Under The Law

Source: http://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9

ACLUThe U.S. government contends that the bulk collection of U.S. phone records is authorized by section 215 of the PATRIOT Act.

Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.

In a amicus brief filed in support of the American Civil Liberties Union's lawsuit against the National Security Agency's bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.

Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if "the records are relevant to an ongoing foreign intelligence investigation."

In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.

Sensenbrenner and the other members of Congress who enacted Section 215 "did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope," according to the brief.

The brief goes on to propose this question (emphasis ours):

The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. How can every call that every American makes or receives be relevant to a specific investigation?"

Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner "was not aware of the full scope of the program when he voted to reauthorize Section 215" and would have voted against it if he had known.

In Sensenbrenner's words: "The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now." 

SEE ALSO: The Best Hope Left For Americans' Privacy Is This 2012 Supreme Court Opinion

Join the conversation about this story »


    






Read More...