Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps

FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

The maintainers of the security-conscious FreeBSD operating system have declared that they will no longer rely on the random number generators in Intel and Via’s chips , on the grounds that the NSA likely has weakened these opaque hardware systems in order to ease surveillance. The decision is tied to the revelations of the BULLRUN/EDGEHILL programs, wherein the NSA and GCHQ spend $250M/year sabotaging security in standards, operating systems, software, and networks. “For 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random,” FreeBSD developers said. “It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more.” In separate meeting minutes, developers specifically invoked Snowden’s name when discussing the change. “Edward Snowdon [sic] — v. high probability of backdoors in some (HW) RNGs,” the notes read, referring to hardware RNGs. Then, alluding to the Dual EC_DRBG RNG forged by the National Institute of Standards and Technology and said to contain an NSA-engineered backdoor, the notes read: “Including elliptic curve generator included in NIST. rdrand in ivbridge not implemented by Intel… Cannot trust HW RNGs to provide good entropy directly. (rdrand implemented in microcode. Intel will add opcode to go directly to HW.) This means partial revert of some work on rdrand and padlock.” “We cannot trust” Intel and Via’s chip-based crypto, FreeBSD developers say [Dan Goodin/Ars Technica]        

Read the original post:
FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

Crowfunded prize for first open jailbreak of Ios 7

Elizabeth Stark writes, “We’re pleased to announce the Device Freedom Prize : a crowdfunded reward for the first developer(s) who release an open source iOS 7 jailbreak. Providing users the ability to control their devices is crucial in an age where we’re increasingly dependent on our mobile phones. An open source jailbreak provides users the capability to install what they want on their own devices, the ability to audit the code they’re using to do so, and enables disabled users to more easily use their devices .” “We’ve assembled a judging panel of awesome folks that care a lot about these issues, including Boing Boing’s own Cory Doctorow; Kyle Wiens, CEO of iFixit; Biella Coleman, Professor and Author of Coding Freedom, and Chris Maury, Accessibility Advocate. Contribute to the prize to help make an open source iOS jailbreak a reality.” Is iOS7 jailbroken yet? ( Thanks, Elizabeth ! )        

Taken from:
Crowfunded prize for first open jailbreak of Ios 7

Super Mario fully implemented in HTML5

Full Screen Mario is Josh Goldberg ‘s complete remake of the classic Super Mario Brothers in HTML5. You can play re-creations of the original levels, make your own in an HTML5-based level editor, or play any of an infinite number of randomly generated levels.        

Visit link:
Super Mario fully implemented in HTML5

DIY cellphone

David Mellis at the High-Low Tech group at the MIT Media Lab built a DIY Cellphone, making a custom circuit-board and laser-cutting his own wooden case. The files are hosted on GitHub in case you’d like to try your hand at it. An exploration into the possibilities for individual construction and customization of the most ubiquitous of electronic devices, the cellphone. By creating and sharing open-source designs for the phone’s circuit board and case, we hope to encourage a proliferation of personalized and diverse mobile phones. Freed from the constraints of mass production, we plan to explore diverse materials, shapes, and functions. We hope that the project will help us explore and expand the limits of do-it-yourself (DIY) practice. How close can a homemade project come to the design of a cutting edge device? What are the economics of building a high-tech device in small quantities? Which parts are even available to individual consumers? What’s required for people to customize and build their own devices? The initial prototype combines a custom electronic circuit board with a laser-cut plywood and veneer enclosure. The phone accepts a standard SIM card and works with any GSM provider. Cellular connectivity is provided by the SM5100B GSM Module, available from SparkFun Electronics. The display is a color 1.8″, 160×128 pixel, TFT screen on a breakout board from Adafruit Industries. Flexures in the veneer allow pressing of the buttons beneath. Currently, the software supports voice calls, although SMS and other functionality could be added with the same hardware. The prototype contains about $150 in parts. Mellis’s Master’s thesis is “Case studies in the digital fabrication of open-source consumer electronic products” and includes a 3D printed mouse, fabbed speakers and a fabbed FM radio. High-Low Tech – DIY Cellphone ( via Hacker News ) ( Images: Laser-cut plywood and veneer case , a Creative Commons Attribution (2.0) image from mellis’s photostream; Making a call , a Creative Commons Attribution (2.0) image from mellis’s photostream )

See the article here:
DIY cellphone

Bunnie Huang is building a laptop

Virtuoso hardware hacker Bunnie Huang is building an open hardware laptop. Want. We started the design in June, and last week I got my first prototype motherboards, hot off the SMT line. It’s booting linux, and I’m currently grinding through the validation of all the sub-components. I thought I’d share the design progress with my readers. Of course, a feature of a build-it-yourself laptop is that all the design documentation is open, so others of sufficient skill and resources can also build it. The hardware and its sub-components are picked so as to make this the most practically open hardware laptop I could create using state of the art technology. You can download, without NDA, the datasheets for all the components, and key peripheral options are available so it’s possible to build a complete firmware from source with no opaque blobs. Building my Own Laptop

Read More:
Bunnie Huang is building a laptop

EFF delivers easy full-disk encryption for Ubuntu

Douglas sez, 18 months ago Boing Boing posted about EFF’s effort to get Ubuntu to make full disk encryption (FDE) easy upon install. EFF has delivered. I’m sure many of us have had and continue to have the experience of trying to nudge someone (or ourselves) over from OS X or Windows to GNU/Linux and LUKS full disk encryption, but the process got roadblocked at some point because using the alternate installer to config the partitions and all for FDE was just too much of a hassle for parties involved. Now in Ubuntu 12.10, FDE is just a tickbox in the default installer. How cool is that? This means it’s a good time to donate to EFF . And if you’re using Ubuntu 12.10, don’t forget to fix the privacy problems for which EFF provides a tutorial (thanks again!). ( Thanks, Doug ! )

See original article:
EFF delivers easy full-disk encryption for Ubuntu

All-in-one Sable Complete PC, an Ubuntu-based desktop PC that competes on price and power

OMGUbuntu reviews the new System76 Sable Complete , a $799, expandable, open all-in-one computer that is price-competitive and performance-competitive with iMacs and other all-in-ones. I’ve owned some System76 laptops and have been generally impressed with both the build-quality and the support offered by the company — they’re always a good bet if you want to get a pre-installed GNU/Linux machine. The Sable is a gorgeous looking PC that (on paper at least) is faster, cheaper, more expandable, and better at running Ubuntu than the 2011 iMac I’m writing this article on. More impressively to my mind (and my wallet) is that although System76 are a niché retailer (meaning costs are often higher than those of mass-manufacturers) the all-in-one PC is competitively priced, even without WiFi, a disc drive, or input accessories. Compared against two similarly specc’d machines using other OSes – namely the Vizio and the 2011 iMac – the Sable stands up well. Meet The $799 All-in-One Ubuntu PC from System76 ( via Engadget )

Continue Reading:
All-in-one Sable Complete PC, an Ubuntu-based desktop PC that competes on price and power