$15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica

“There is one key used for communication between the operators and the SIM card that is very well protected, because that protects their monetary interest,” Nohl said. “The other key is less well protected, because it only protects your private data.”

Source: $15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica

Just because you pay for a service (or device) doesn’t mean you can trust it.

Young will have to change names to escape ‘cyber past’ warns Google’s Eric Schmidt – Telegraph

The private lives of young people are now so well documented on the internet that many will have to change their names on reaching adulthood, Google’s CEO has claimed.

Source: Young will have to change names to escape ‘cyber past’ warns Google’s Eric Schmidt – Telegraph

 

From comments:

His attitude is appalling! “We won’t honor your right to privacy…so instead, you will have to change your identity.” What a concept.

— anonymous

 

Another thing to consider is that your “friends” are also not respecting your right to privacy either (e.g. by posting your current location through Foursquare or tagging pictures of you they uploaded to Facebook).

No peeking: TSA’s naked body scan images stay secret | Ars Technica

A privacy group that wanted the Transportation Security Authority’s collection of 2,000 “see through your clothing” body scans was blocked this week by a federal court. Releasing those images could reveal the machine’s vulnerabilities, it turns out.

Source: No peeking: TSA’s naked body scan images stay secret | Ars Technica

So the machines are hideously expensive, don’t work to catch terrorists, and can save and transmit images of naked people…

 

Security in 2020 – Schneier on Security

There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something. In the next 10 years, the traditional definition of IT security—­that it protects you from hackers, criminals, and other bad guys—­will undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you.

Source: Security in 2020 – Schneier on Security