Results for "transparency"

LG G3 Review

LG G3 Review

This month we’ve had an extended look at the LG G3 in its international edition, preparing for the USA-bound version(s) which will be launching later this Summer. What we’re seeing here is a phone that out-does the competition while it remains (somehow) humble in the public. It’s not for a lack of trying, of course, but for a lack of successful fanfare that most people we show the LG G3 to have never seen the handset before - it or its predecessor.

Continue Reading

Gmail reveals how much of your email is secret

Gmail reveals how much of your email is secret

Just added to Google’s Transparency Report this week is Gmail, with a section called "Email encryption in transit". This report shows, "generally speaking", how much of your email is encrypted going in and out of Gmail. While Google appears to have some control over this, responsibility for security also lies in the hands of the email client you’re communicating with.

Continue Reading

White House aims to protect companies who give up requested data

White House aims to protect companies who give up requested data

Post Edward Snowden and the revelations of widespread NSA intrusion, many larger tech companies have been as forthcoming as possible about what information they’re giving to authorities. In anticipation of reform bills for how and why the NSA does what they do (as well as those currently in process), The White House is asking that any legislation include language to keep tech companies safeguarded from prosecution.

Continue Reading

Kim Dotcom points out Cisco “backdoor” for law enforcement

Kim Dotcom points out Cisco “backdoor” for law enforcement

It would appear that Kim Dotcom does not trust United States-made electronics. He suggests this week that the world should "never trust US tech", using #NSA to point out a Cisco listing of lawful intercept architecture. He calls these systems "interception backdoors", suggesting that Cisco is amongst the companies that willingly allow the NSA to take hold of their data at any given time - but that's just not true.

Continue Reading

Prev 1 2 3 4 5 6 7 8 Next