Aurich Lawson Ever since the National Security Agency’s secret surveillance program came to light three weeks ago, implicated companies have issued carefully worded statements denying that government snoops have direct or wholesale access to e-mail and other sensitive customer data. The most strenuous denial came 10 days ago, when Apple said it took pains to protect personal information stored on its servers , in many cases by not collecting it in the first place. “For example, conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them,” company officials wrote . “Apple cannot decrypt that data. Similarly, we do not store data related to customers’ location, Map searches or Siri requests in any identifiable form.” Some cryptographers and civil liberties advocates have chafed at the claim that even Apple is unable to bypass the end-to-end encryption protecting them. After all, Apple controls the password-based authentication system that locks and unlocks customer data. More subtly, but no less important, cryptographic protections are highly nuanced things that involve huge numbers of moving parts. Choices about the types of keys that are used, the ways they’re distributed, and the specific data that is and isn’t encrypted have a huge effect on precisely what data is and isn’t protected and under what circumstances. Read 15 remaining paragraphs | Comments
View post:
Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims
In a nine-year deal, the Salesforce.com and Oracle clouds — including applications, platform, and infrastructure — will be integrated. [Read more]
The social network is embarrassed by a glitch in its “Download Your Information” tool that unintentionally shared some members’ phone numbers and e-mail addresses. [Read more]
That’s the claim from TechCrunch, which says that Facebook’s special press event on June 20 will be focused in part on video and Instagram. [Read more]