jsr's avatar
jsr
jsr@primal.net
npub1vz03...ttwj
Chasing digital badness at the citizen lab. All words here are my own.
jsr's avatar
jsr 9 months ago
Most folks don't love security theater & everyone has had a bad time at a screening checkpoint. So, let's think for a second about hypothetical private-#TSA companies. I'd expect them to gravitate towards AI-assigned individual risk ratings to minimize the cost of hiring & training people to interact with travelers. To create ratings, I'd expect them to demand & consolidate invasive pools of our biometrics, web browsing, commenting, purchasing, movements & private lives. Just don't call it a "social credit score" You can bet they'll pivot to trying to monetize their data. 2026: We're a terminal security company 2029: We're a person rating company Would these ratings make their way into other parts of our lives & things we want to visit? And who exactly would stand up for us when the ratings are wrong? Or our data is shipped to foreign buyers. Who holds #PrivateTSA companies accountable? The US doesn't have strong #privacy protections... I'm also not optimistic about private sector security companies' ability to stop breaches. History backs me up here. But I do expect that private-TSA companies could use lobbying to limit oversight & accountability. That's been the history of other privacy-invasive tech companies. So, as an airline security privatization conversation kicks off, remember that it can't just be "current thing is bad" but needs to consider what kind of future we're inviting in. image
jsr's avatar
jsr 9 months ago
What's your best focused work music? I'm getting habituated to mine. Please drop a link.
jsr's avatar
jsr 9 months ago
So, more journalists were just targeted with #Pegasus spyware. This time journalists in #Serbia that were investigating corruption. image “In Serbia, you can hire a hitman for a half of the money...what else would they be prepared to pay for?!” - a spyware-targeted reporter. Indeed. image Notice that the targeting is happening over a messenger program with a link, not a zero-click? The why is unclear. Maybe Pegasus didn't have a working exploit against those phones. Or maybe the customer didn't get the platinum zero click package and so had to do some social engineering. Interesting. BACKGROUND: This is the THIRD report of Pegasus abuses in Serbia in 2 years. And nearly a decade after the first Pegasus abuses got reported, NSO Group is still fueling attacks against freedom of speech. We're here because spyware companies still don't feel meaningful consequences. image And DC is home to a seemingly-infinite number of lobbyists that are willing to help them try to get off sanctions lists... READ THE REPORT by Amnesty Tech & BIRN.
jsr's avatar
jsr 9 months ago
BREAKING: more journalists targeted with #Pegasus spyware. This time journalists in #Serbia that were investigating corruption.
jsr's avatar
jsr 9 months ago
Private data & passwords for US officials found online? Sure. This is true for every official, regardless of party. And you, if you're an American reading this. The US hasn't enacted serious privacy protections for citizens. image This is a consequence. Companies intrusively soak up your personal data, get breached, and nobody blinks. image Breaches are one of the first places attackers go when they want to target. image This is why password re-use is dangerous. And two factor authentication is key. If your favorite 'strong password' is in a breach, an attacker is going to try it against every other account you have. image Story:
jsr's avatar
jsr 9 months ago
Datapoint: this administration uses Signal. Like every other administration. Because encrypted messaging is critical infrastructure. Remember this the next time a government demands an encryption backdoor. image How did a reporter get added? Well, the use of encrypted chat is ubiquitous but not explicitly accepted, supported or discussed in most institutions. Which means users are left to fend for themselves in how they use & understand these tools. And are usually about 1 mistake away from self-doxxing group contents. image This also left me wondering: is anyone screening these devices for mercenary spyware like Pegasus? image Experience tells me the answer is: maybe not. Article:
jsr's avatar
jsr 9 months ago
Report: Researcher's device got searched at US border. Turned away because he expressed personal view in private about how scientists were being treated. Seems like France is taking a dim view & speaking to the press as a signal of their displeasure image (Machine translated) Original (FR): https://www.lemonde.fr/international/article/2025/03/19/etats-unis-un-chercheur-francais-refoule-pour-avoir-exprime-une-opinion-personnelle-sur-la-politique-menee-par-l-administration-trump_6583618_3210.html
jsr's avatar
jsr 9 months ago
🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy... Known targets: Activists & journalists. We also found deployments around the world. Including ...Canada? So #Paragon makes zero-click spyware marketed as better than NSO's Pegasus... Harder to find... image ...And more ethical too! This caught our attention at #Citizenlab. And we were skeptical. image So.. it was time to start digging. image We got a tip about a single bit of #Paragon infrastructure & my brilliant colleague Bill Marczak developed a technique to fingerprint some of the mercenary spyware infrastructure (both victim-facing & customer side) globally. image So much for invisibility. What we found startled us. We found a bunch of apparent deployments of Paragon's mercenary spyware in places like #Australia, #Denmark, #Israel, #Cyprus #Singapore and... #Canada. Fun. image We also found interesting stuff at a datacenter in #Germany image Caveats: the methodology we use only surfaces a subset of customers at a particular time. So ...about #Canada. My colleagues on the legal side began digging. The more they pulled, the more questions surfaced about whether the Ontario Provincial Police is rolling mercenary spyware. image While investigating, we found signs #WhatsApp was being used as a vector for infections. We shared our analysis with Meta which had an ongoing investigation into Paragon. They shared findings with WhatsApp which discovered & mitigated a zero-click attack. They went public, and notified ~90 users that they believed were targeted. image WhatsApp's notifications to targets turbocharged what we all knew about #Paragon. image Cases began coming out: an investigative journalist in #Italy and sea rescue activists were among the first. Francesco Cancellato. Editor in Chief of Fanpage.it, & Luca Casarini and Dr. Giuseppe “Beppe” Caccia of Mediterranea Saving Humans They consented to us doing a forensic analysis... image Sure enough, we found traces of infection on several Androids. We call the indicator #BIGPRETZEL & #WhatsApp confirms that they believe BIGPRETZEL is associated with #Paragon's spyware. In the weeds a bit: Android log forensics are tricky. Logs get overwritten fast, are captured sporadically & may not go back very far. So, not finding BIGPRETZEL on a targeted phone wouldn't be enough to say it wasn't infected. In such a case, the only safe course of action for a notified Paragon target would be to presume they had been infected. image Our analysis is ongoing. .... but There's more! There's more! We'd been analyzing the iPhone of human rights activist David Yambio, who is focused on abuses against migrants in Libya (they are often victims of torture, trafficking, and killings) who works closely with the other targets. image Last year he got notified by Apple that he was targeted with sophisticated spyware. We've forensically confirmed the infection & shared details with Apple. image Apple confirms they fixed the vectors used to target him as of iOS 18. We're not doing a full technical attribution of this novel spyware to a particular company yet. But it's not like anything we've seen. Troublingly, timeline of David's spyware targeting lines up with when he was providing information to the International Criminal Court about torture by human traffickers in #Libya. But there's even more spying afoot against this cluster of activists! Luca also got a notification last February about targeting with a different kind of surveillance tech. image He wasn't alone. Father Mattia Ferrari, chaplain of Luca's lifesaving organization' also got a notification. image #Italy's response to the unfolding #Paragon scandal has been exceptionally chaotic. So we included a little timeline. Denials, then admissions, then refusals to say more citing secrecy. image Honestly, deja vu of how Pegasus-abusing governments have handled PR... TAKEAWAYS: TAKEAWAY 1: you can't abuse-proof mercenary spyware. Selling just democracies won't prevent abuses. Most democracies have plenty of historic examples of surveillance abuses. Why should spyware be different? image TAKEAWAY 2: #Paragon's technical tradeoffs to be less detectable didn't prevent them getting discovered. Just made it harder. image TAKEAWAY 3: I think we're only looking at the tip the #Paragon hackberg For example, the ~90 notification number from #WhatsApp only represents 1 infection vector that got caught & notified. There may be non-notified spyware victims walking around right now who were infected via a different mechanism. In #Italy, too we also need to better understand the other surveillance technologies pointed at this cluster of people. Finally, we gave #Paragon room to respond to a summary of our key findings. Their US Executive Chairman, a 30+ year #CIA veteran, responded in a way that sounded very familiar to how NSO Group did PR. image 1 - Say there are inaccuracies.. 2- ..But refuse to specify them 3-Cite customer confidentiality as a reason to not say more. image We welcome any clarifications they have now that they've read our full report. FINAL NOTES: our #citizenlab investigations are usually big, collaborative team productions. Smart co-authors, awesome collaborators. image The key to nearly all our research into spyware is targets' brave choice to speak out. And work with us to forensically analyze their devices... We are very grateful to them. This is how we collectively get a better understanding of mercenary spyware abuses. And journey towards accountability. Thanks for reading! Drop questions in the replies! READ THE FULL REPORT
jsr's avatar
jsr 11 months ago
Full biometric KYC for a sandwich. Absolutely not, Jeff. image
jsr's avatar
jsr 11 months ago
NEW: UK secretly demanded Apple build a backdoor into ALL encrypted iCloud accounts. image You haven't heard about this before because these orders are secret & there are typically bans on talking about them. SHORT TERM IMPACT: Apple will probably stop offering encrypted iCloud storage in the UK. DETAILS: the UK Home Secretary sent #Apple a so-called "Technical Capability Notice" which is a demand for access. These flow from the 2016 Investigatory Powers Act (aka "Snooper's Charter") and is a mechanism for the government to *compel* companies to provide access. ENFORCED SILENCE: Among the more pernicious parts of this secret demand: Apple would be *FORBIDDEN* from telling users that the backdoor had been introduced into iCloud's Advanced Data Protection. BIG PICTURE: The public really doesn't realize it, but cloud backups of phones are constantly used for surveillance. Huge #privacy & #encryption gap. By introducing optional Advanced Data Protection, Apple extended similar protections of device encryption to users' clouds. So, since ADP was introduced in 2022, governments have been scheming to undermine it. LOOKING INTO THE FUTURE: It's only a matter of time before governments try to target Private Cloud Compute. And do so with the same secret legal tools. REPORT: https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/
jsr's avatar
jsr 11 months ago
No notes. #deepseek #openai image
jsr's avatar
jsr 11 months ago
Monday edition of *Car privacy is an absolute nightmare*: image Subaru's employee portal holds a year's worth of location data for all internet-connected cars. image We know this because it was vulnerable (now fixed). You could pull a year's worth of driving just with a license plate. image Props to Sam Curry & Shubham Shah for exposing it. Pic is a years' worth of Sam's mom's #Subaru locations. I seriously doubt any owner has a clear idea that this data is being collected on them. But the same thing is replicated for almost every car mfr (see the #Mozilla foundation report on car privacy link) Literally no car owner has asked for their whip to be turned into a surveillance portal. And yet.. Car companies feel basically no pressure to do right by customers, but experience a lot of incentives to mine their movements for money. Sidenote: same (now closed) vulnerability also enabled remote unlocks & starts and a bunch of other highly undesirable things. Reading list: The Subaru research: News report on it: Mozilla Foundation's key investigation into car privacy:
jsr's avatar
jsr 11 months ago
Who on #nostr is saying interesting things about #privacy? Help me fill out my follows!
jsr's avatar
jsr 11 months ago
It shouldn’t take a panic over Chinese AI to remind people that most companies in the business set the terms for how they use your private data. And when you use their AI apps, you’re doing work for them, not the other way around.
jsr's avatar
jsr 11 months ago
Hi everyone, I'm JSR. Me & my colleagues chase government hacking & censorship of dissidents & activists. Heard of Pegasus spyware? Then you know about our work. I'm part of the Citizen Lab, a ferociously independent research group based at the University of Toronto. We try to 🥊punch above our weight. Your device has probably gotten security updates that flowed from our collaborative investigations. Craziest story? When we punked a team of mercenary🕵️ spies sent to target our research. I'm so proud of my colleagues & talented collaborators in the fight to serve fat helpings of good trouble & accountability. All the good research I've worked on has been a team production... But everything I say here, especially the typos & bad ideas are100% mine.
jsr's avatar
jsr 11 months ago
The official instinct to solve all problems by application of surveillance dystopia is a feature, not a bug.
jsr's avatar
jsr 11 months ago
Back in September, the FTC painted a picture of social media companies collecting a staggering amount of people's data. Made it clear that platform self-regulation on privacy was a joke. Respectfully, duh. But the question is: will any of that scrutiny continue? Because the reckless disrespect of privacy & mining of interactions for profit is only going to accelerate. For now that report is still online. We'll see for how long: https://www.ftc.gov/system/files/ftc_gov/pdf/Social-Media-6b-Report-9-11-2024.pdf
jsr's avatar
jsr 11 months ago
NEW: the US is seeking extradition of an Israeli private spy over sprawling hack & leak operations against 🇺🇸American nonprofits. Let me tell you a story... image Amit Forlit's alleged customer: a US lobbying firm named DCI Group...representing oil & gas giant ExxonMobil. image IT BEGINS The criminal case was triggered back in 2018, when US-based nonprofits targeted by hackers whom we'd been working with requested that we notify the authorities. We'd found an absolute raft of targeting and attributed the fingers-on-keyboards to an Indian hack-for-hire operation. THE TARGETS Targets ranged from environmental orgs to net neutrality advocates , everyone that asked questions about massive financial fraud by payment processor WireCard & so many more. image Our friends at EFF also spotted the phishing against net neutrality orgs & reported on it, we later attributed it to the Indian group. image TIME TO NAME & SHAME We published alongside Reuters, naming the Indian group (BellTrox) back in 2020. image TWO ISRAELI PRIVATE SPIES... Fast forward to today's efforts to extradite Amit Forlit, who was arrested at Heathrow last year. He's actually the *second Israeli private investigator* charged in this massive hacking scheme. The first, Aviram Azari, was arrested in 2019 on his way to Disney World, convicted & is serving out his sentence. image The US accuses Forlit of serving as a go-between for Indian hack-for-hire groups.. and a global client list. image The US doesn't name the lobbying firm or the big oil and gas company in their filing.....but Forlit's own lawyer helpfully filled in the details, as reported by Reuters. image THE SCHEME The operation targeting environmental groups is pretty wild, and when we timelined phishing attempts against their advocacy strategies. The targeting was smart & super-aware of relationships between the targets. image When hacking is corporate, they make memos. And email about them. "Why the *** was he sending e mails what a dumb arse" image Epic line: The kind of message that prosecutors of... TAKEAWAY Today, many legal fights, including attacks on nonprofits & civil liberties groups, have a secret undercurrent of hacking-for-hire. image The powerful interests that commission the hacking & benefit from the often-manipulated 'leaks' escape consequences. But if you are around these issues, you may get targeted too. This case goes further up the chain than any before. We'll see just how high, but it is great to see some consequence brought to this shady ecosystem. I'll keep folks here updated. Reading list: Our Citizen lab investigation: EFF report on targeting of net neutrality orgs: Report on Forlit hearing: https://www.reuters.com/world/israeli-private-eye-wanted-us-over-alleged-hacking-exxon-lobbyist-lawyer-says-2025-01-22/ Aviram conviction story: https://www.reuters.com/technology/cybersecurity/israeli-private-detective-sentenced-us-6-23-years-hacker-for-hire-scheme-2023-11-16/ Today, many legal fights, including attacks on nonprofits, have a secret undercurrent of hacking.
jsr's avatar
jsr 11 months ago
Wait, people can support me in real value, not just magic internet points that are revokable without notice? Zaps just blew my mind.