Author: Jonny Evans

UK government ignites debate over privacy vs. safety

Most technologists understand that end-to-end encryption in messaging keeps people safe and empowers commerce. But the UK government is launching a publicity blitz to have that layer of protection removed.

The decision will affect every nation the UK does business with, including those that still value the right to privacy and free speech.

Privacy versus safety

Rolling Stone reports the UK has developed an emotive ad campaign around child safety to build support for its argument. Of course, this campaign comes nowhere near addressing the threat to free speech, commerce, or privacy in such a move. Naturally, the reaction across most of the tech industry has been a series of shared oaths as people who know about this stuff ask: “Do we have to explain this again?”

To read this article in full, please click here

UK government ignites debate over privacy vs. safety

Most technologists understand that end-to-end encryption in messaging keeps people safe and empowers commerce. But the UK government is launching a publicity blitz to have that layer of protection removed.

The decision will affect every nation the UK does business with, including those that still value the right to privacy and free speech.

Privacy versus safety

Rolling Stone reports the UK has developed an emotive ad campaign around child safety to build support for its argument. Of course, this campaign comes nowhere near addressing the threat to free speech, commerce, or privacy in such a move. Naturally, the reaction across most of the tech industry has been a series of shared oaths as people who know about this stuff ask: “Do we have to explain this again?”

To read this article in full, please click here

Cellular networks revolt against Apple privacy moves

Every time Apple attempts to inject a little more privacy into the digital world, it faces pushback – but the evidence suggests opponents would be better off going along for the ride.

A bigger business with more privacy

Take Do Not Track for ads and the move to quash IDFA tracking in iOS 14. When Apple first announced its plan, critics across the ad industry complained it would damage their business.

Apple counter-argued that it would simply inspire advertisers to think more creatively about how to reach customers — while also providing more privacy to those customers.  

To read this article in full, please click here

Microsoft Defender for Endpoint brings remote deployment to iOS

With the latest Microsoft Defender for Endpoint (MDE) preview for iOS, Microsoft has taken another step that should make life easier for IT administrators who need to secure remote iOS devices at the endpoint.

Endpoint protection without the user friction

The MDE preview includes a new capability to install Defender for Endpoint remotely and automatically on any devices enrolled in the service. The company first announced its intention to deliver the feature last month.

In practice, this seems relatively friction-free.

To read this article in full, please click here

Did Apple send its controversial CSAM scanning back to the lab?

Apple appears to have stepped back on its least popular innovation since the Butterfly Keyboard, stealthily slicing mentions of its controversial CSAM scanning/surveillance tech from its website following widespread criticism of the idea.

Child protection tools

The company in August announced plans to introduce ‘surveillance as a service’ on iPhones.

At that time, it revealed new communication safety features now available in iOS 15.2 and another tool – including the capacity to scan a user’s devices against a set of data to identify child sexual abuse material (CSAM). If such material was discovered, the system flagged that user up for investigation.

To read this article in full, please click here

Why you should install the latest Apple updates

If you use a Mac and an iPad to get things done, the fact that Apple hasn’t yet introduced Universal Control (now promised for spring), might put you off installing the latest Apple updates — iOS 15.2, iPadOS 15.2 and macOS 12.1.

But there are very good reasons to do so.

The update that fixed the internet

Last week news arrived of a nasty vulnerability in Apache’s Log4j software library that could easily be used to steal data and credentials from web services and install software onto servers running Log4j.

To read this article in full, please click here

Apple should enforce the App Store privacy promise

A Financial Times report seems to argue that Apple has allowed app developers to collect customer data from iPhone users without their permission. This isn’t a new story, but shows that those of us who have denied App Tracking permission may still be tracked, thanks to a loophole.

When privacy…isn’t

Apple’s decision to introduce App Tracking Privacy controls generated lots of controversy and considerable pushback from Facebook. The latter even complained it would make life hard for small businesses. Apple took a little time, but introduced it all the same.

To read this article in full, please click here

Designer smartphone hacks will trickle down in 2022

What happens to state-sponsored smartphone hacks when they're uncovered? They get reverse-engineered and enter the cybercrime underworld, of course.

There is no ‘safe’ back door

The inconvenient truth is there is no such thing as a safe back door into smartphone security. Authoritarian governments may force smartphone platform developers to create them, but they make everyone less safe as those exploits will be identified and criminals – who are just as smart as government developers and (sometimes) the same people – will eventually find and exploit them.

To read this article in full, please click here

How to use FileVault to protect business data on Macs

If you run a business on Macs (and many companies do) then you should become familiar with FileVault, the disk encryption system that's built into macOS. When used properly, it makes it extremely hard for any malicious person to access your company’s confidential data in the event your Mac is lost or stolen.

What's the problem FileVault tries to solve?

Most businesses possess various forms of sensitive data. This might include corporate  or supplier data, confidential order books, financial records, contact names and addresses, and more. That information has business value, but if compromised could also place you, your employees, or your customers at risk. In many industries, protection of such information is mandatory and legally required.

To read this article in full, please click here