HACKINTOSH.ORG | Macintosh discussion forums

Macintosh News => iPhone/iPod/iPad News => Topic started by: HCK on February 20, 2015, 09:00:25 am



Title: The NSA and GCHQ gave themselves a direct line into your phone
Post by: HCK on February 20, 2015, 09:00:25 am
The NSA and GCHQ gave themselves a direct line into your phone

<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><a href='http://www.imore.com/nsa-and-gchq-gave-themselves-direct-line-your-phone' title="The NSA and GCHQ gave themselves a direct line into your phone"><img src='http://www.imore.com/sites/imore.com/files/styles/large_wm_brw/public/field/image/2015/02/sim-card-tray-iphone6-hero.jpg?itok=xNDNfUel' />[/url]</p> <p>According to new documents leaked by Edward Snowden, the NSA and its UK counterpart, Government Communications Headquarters (GCHQ), hacked into the computers of Gemalto, a company that manufactures SIM cards for a large number of carriers around the world. In doing so, the intelligence agencies acquired encryption keys that would allow them to intercept communications from customers of all four major U.S. carriers, along with 450 others around the world.</p> <!--break--> <p>Snowden, who has been a blowing the whistle on secret NSA surveillance programs since 2013, leaked the documents to The Intercept (https://firstlook.org/theintercept/2015/02/19/great-sim-heist/), which broke the news earlier today:</p>
<p>With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider's network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.</p>
<p>It's difficult to assess the extent and effects of this breach right now, but it definitely represents a massive blow to mobile security, as The Intercept notes that Gemalto produces 2 billion SIM cards each year — making it highly likely that the SIM in your phone was produced by the company.</p> <p>For much more on this, check out The Intercept's full report from the source link below.</p> <p>Source: The Intercept (https://firstlook.org/theintercept/2015/02/19/great-sim-heist/); Via: The Verge (http://www.theverge.com/2015/2/19/8071453/nsa-gchq-snowden-sim-phone-security)</p> </div></div></div><div id="comment-wrapper-nid-30038"></div><img width='1' height='1' src='http://tipb.com.feedsportal.com/c/33998/f/616881/s/4390e8aa/sc/46/mf.gif' border='0'/><br clear='all'/>

<a href="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/1/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/2/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/rc/3/rc.img" border="0"/>[/url]

<img src="http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/a2.img" border="0"/> (http://da.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/a2.htm)<img width="1" height="1" src="http://pi.feedsportal.com/r/218612034214/u/49/f/616881/c/33998/s/4390e8aa/sc/46/a2t.img" border="0"/><img src="//feeds.feedburner.com/~r/TheIphoneBlog/~4/PVIVcy13fUA" height="1" width="1" alt=""/>

Source: The NSA and GCHQ gave themselves a direct line into your phone (http://feedproxy.google.com/~r/TheIphoneBlog/~3/PVIVcy13fUA/story01.htm)