<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Wandering &#187; legal</title>
	<atom:link href="http://securitywandering.com/?feed=rss2&#038;cat=11" rel="self" type="application/rss+xml" />
	<link>http://securitywandering.com</link>
	<description>Digital common sense</description>
	<lastBuildDate>Fri, 21 Oct 2016 15:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>UH notifies 7,100 patients of stolen hard drive with personal medical information on it</title>
		<link>http://securitywandering.com/?p=520</link>
		<comments>http://securitywandering.com/?p=520#comments</comments>
		<pubDate>Thu, 07 Nov 2013 01:09:55 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Sec for Dumies]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=520</guid>
		<description><![CDATA[<p>CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems . Someone stole the hard drive from the car [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">CLEVELAND, Ohio &#8212; More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system&#8217;s computer systems .</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Someone stole the hard drive from the car of one of the vendor’s employees, according to the letter. UH was informed of the theft Aug. 8, and the hospital system has been determining the exact information that was on the drive since then, said hospital spokeswoman Janice Guhl. </p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Link to full story</p>
<p style="color: #363636; font-family: Georgia, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 24px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><a href="http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html">http://www.cleveland.com/healthfit/index.ssf/2013/11/uh_notifies_7100_patients_of_l.html</a></p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=520">UH notifies 7,100 patients of stolen hard drive with personal medical information on it</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=520</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</title>
		<link>http://securitywandering.com/?p=516</link>
		<comments>http://securitywandering.com/?p=516#comments</comments>
		<pubDate>Fri, 01 Nov 2013 15:12:28 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=516</guid>
		<description><![CDATA[<p>Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.   Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h1 class="heading" style="list-style: none; padding: 0px; margin: 0px; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; font-family: NoticiaBold, 'Times New Roman', serif; text-decoration: none; color: #263034; font-size: 30px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps</h1>
<h2 class="standalone-deck" style="list-style: none; padding: 0px 0px 12px; margin: 0px 0px 8px; color: #657b83; font-size: 16px; font-weight: normal; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #dddddd; font-family: Arial, sans-serif; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.</h2>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"> </p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;"><span class="Apple-style-span" style="color: #000000; font-family: Helvetica; line-height: normal; font-size: medium;"><img title="badbios.jpg" src="http://securitywandering.com/wp-content/uploads/2013/11/badbios.jpg" alt="Badbios" width="600" height="337" border="0" /></span>Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn&#8217;t know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.</p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">linked from:<br /> <a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/">http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/</a></p>
<p style="margin: 0px 0px 15px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;">it was just a matter of time before microcode injections into the controller on various sub systems of a computer would be targeted.<br />This is a very troubling discovery for many people. </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=516">Ultrasonic more then bugs talking…….or &#8220;bab bios&#8221; or should it be sound gaps not air gaps</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=516</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>what happens when airlines merge&#8230;or why no ones cares once they get your cash</title>
		<link>http://securitywandering.com/?p=266</link>
		<comments>http://securitywandering.com/?p=266#comments</comments>
		<pubDate>Thu, 07 Jul 2011 13:05:53 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[bots & botnets]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cool Tech]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[general security]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[Interesting information]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[Sec for Dumies]]></category>
		<category><![CDATA[social phishing]]></category>
		<category><![CDATA[Staying off the grid]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=266</guid>
		<description><![CDATA[<p>So the story goes something like this. bout airplane tickest a while ago&#8230;..great priceDay before try to get 2 seats together  online at check in&#8230;. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>So the story goes something like this.</p>
<p>bout airplane tickest a while ago&#8230;..great price<br />Day before try to get 2 seats together  online at check in&#8230;.</p>
<p>That did not happen, normal not a big deal.<br />but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife.</p>
<p>Security at the airport was a breeze for everyone including the wife in her ankle boot contraption.<br />security made sure that the kid did not go wondering off well mom got scanned.<br />I get to deal with the 10 little gray bins and getting them thru the xray thing<br />as odd as it sounds it was like they wanted to help&#8230;.got to love that.</p>
<p>Get to the gate wait for the gate folks to get there.<br />Now the gate folks had always been very helpful  for me</p>
<p>So I know they could easily fix the seating issue for me&#8230;..</p>
<p>WRONG<br />&#8220;the flight is full figure it out yourself when you get on the plane&#8221; <br />The message from the gate folks</p>
<p>it was like they were more concerned about themselves then helping me an mine.<br />no even an earl boarding invite&#8230;.wife in a walking boot for her ankle injure and 7 year old boy&#8230;.</p>
<p>so we wait and yet more self involved airline folks come and go.</p>
<p>they open the plane for boarding&#8230;</p>
<p>final yet another group of airline folks&#8230;<br />about half way thu boarding we get invited to board after the wife hobbles around in the waiting line.</p>
<p>I new face from airline&#8230;.who had just helped a 13 year old traveling alone&#8230; was the yes please go bored voice of reason</p>
<p>we go down the empty gate ramp took like 5 minutes down hill walking slow&#8230;.<br />get on the plane and there are people sitting in all of our seats&#8230;.<br />kid starts crying&#8230; have i mentioned yet that the wife &#8220;does not like to fly &#8220;motion sickens&#8221;&#8221;</p>
<p>get the tickets from the wife&#8230;<br />kick an old couple out of my seat and the 13 year old seat&#8230;.<br />then the 13 year old says I&#8217;ll change with you..</p>
<p>So the the wife and the kids get 2 seats together&#8230;..finally<br />the 13 year old stranger gets a window seat beind me&#8230;</p>
<p>Oh yeah forgot to mention the flight crew losing it because we had stopped anyone from boarding  the plane.<br />that kind of happens on the small jets  when you are in row 3 waiting for some folks to move out of your seats&#8230;.</p>
<p>longer story short..</p>
<p>flight was great 20 minutes early kind of great.</p>
<p>moral of the story you should always call the airplane phone support folks to fix seating issues and wait on hold for an hour to talk to <br />SAM &#8220;shrewas&#8221;  who think that the yankees are a florida baseball team&#8230;&#8230;</p>
<p> </p>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=266">what happens when airlines merge&#8230;or why no ones cares once they get your cash</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=266</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>EU ministers seek to ban creation of &#8216;hacking tools&#8217; &#8211; Computerworld</title>
		<link>http://securitywandering.com/?p=264</link>
		<comments>http://securitywandering.com/?p=264#comments</comments>
		<pubDate>Wed, 15 Jun 2011 20:11:42 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=264</guid>
		<description><![CDATA[<p>And next it will be books because they teach you how to create&#8230;..so therefore they allow you to create hacking tools Over on the post &#8220;EU ministers seek to ban creation of &#8216;hacking tools&#8217; &#8211; Computerworld&#8221; contains this text: &#8220;EU ministers seek to ban creation of &#8216;hacking tools&#8217; By Jennifer Baker June 15, 2011 07:27 [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=264">EU ministers seek to ban creation of &#8216;hacking tools&#8217; &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>And next it will be books because they teach you how to create&#8230;..so therefore they allow you to create hacking tools</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.computerworld.com/s/article/9217634/EU_ministers_seek_to_ban_creation_of_hacking_tools_?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F17+%28Computerworld+Security+News%29">EU ministers seek to ban creation of &#8216;hacking tools&#8217; &#8211; Computerworld</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;EU ministers seek to ban creation of &#8216;hacking tools&#8217; By Jennifer Baker June 15, 2011 07:27 AM ETComments (2)Recommended (4) IDG News Service &#8211; Justice Ministers across Europe want to make the creation of &#8216;hacking tools&#8217; a criminal offense, but critics have hit back at the plans, saying that they are unworkable.</p>
<p><span style="font-style: normal;"><em></p>
<p style="display: inline !important;">Ministers from all 27 countries of the European Union met on June 9 to discuss European Commission proposals for a directive on attacks against information systems. But in addition to approving the Commission&#8217;s text, the ministers extended the draft to include &#8216;the production and making available of tools for committing offenses&#8217;.</p>
<p></em></span></p>
<p></em></p>
<p><em>This is problematic, as much legal and legitimate software could be put to criminal use by hackers. The draft mentions &#8216;malicious software designed to create botnets or unrightfully obtained computer passwords,&#8217; but goes no further in attempting to clarify what &#8216;tools&#8217; might be subject to criminal sanctions. For example, the distinction between a password cracker and a password recovery tool is not specified. Nor is there any mention of legitimate use for testing. Many tools that could be used for hacking in the wrong hands, are used by system administrators and security consultants to probe for vulnerabilities in corporate systems.&#8221;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=264">EU ministers seek to ban creation of &#8216;hacking tools&#8217; &#8211; Computerworld</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=264</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schneier on Security: Tennessee Makes Password Sharing Illegal</title>
		<link>http://securitywandering.com/?p=252</link>
		<comments>http://securitywandering.com/?p=252#comments</comments>
		<pubDate>Tue, 07 Jun 2011 18:35:35 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[general security]]></category>
		<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=252</guid>
		<description><![CDATA[<p>Over on the post &#8220;Schneier on Security: Tennessee Makes Password Sharing Illegal&#8221; contains this text: &#8220;Tennessee Makes Password Sharing Illegal Here&#8217;s a new law that won&#8217;t work: State lawmakers in country music&#8217;s capital have passed a groundbreaking measure that would make it a crime to use a friend&#8217;s login &#8212; even with permission &#8212; to [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=252">Schneier on Security: Tennessee Makes Password Sharing Illegal</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.schneier.com/blog/archives/2011/06/tennessee_makes.html">Schneier on Security: Tennessee Makes Password Sharing Illegal</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Tennessee Makes Password Sharing Illegal Here&#8217;s a new law that won&#8217;t work: State lawmakers in country music&#8217;s capital have passed a groundbreaking measure that would make it a crime to use a friend&#8217;s login &#8212; even with permission &#8212; to listen to songs or watch movies from services such as Netflix or Rhapsody. [&#8230;] The legislation was aimed at hackers and thieves who sell passwords in bulk, but its sponsors acknowledge it could be employed against people who use a friend&#8217;s or relative&#8217;s subscription. While those who share their subscriptions with a spouse or other family members under the same roof almost certainly have nothing to fear, blatant offenders &#8212; say, college students who give their logins to everyone on their dormitory floor &#8212; could get in troubl&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=252">Schneier on Security: Tennessee Makes Password Sharing Illegal</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=252</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</title>
		<link>http://securitywandering.com/?p=180</link>
		<comments>http://securitywandering.com/?p=180#comments</comments>
		<pubDate>Thu, 21 Apr 2011 17:02:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Hack and Hackers]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>
		<category><![CDATA[software issues]]></category>
		<category><![CDATA[feat]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=180</guid>
		<description><![CDATA[<p>&#160; Over on the post &#8220;iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App&#8221; contains this text: &#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App &#160; Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://gizmodo.com/#!5794369/ispy-conspiracy-break-apples-secret-tracking-with-this-app">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;iSpy Conspiracy: Break Apple’s Secret Tracking with This App</em></p>
<p><em>&nbsp;</p>
<p>Sam Biddle — Not entirely cool with the idea of your iPhone or iPad following your every move without your consent? Understandable! Luckily, only a day after the privacy revelation, a fix has been cooked up that switches off Apple&#8217;s covert tracking. The root of the tracking problem is a single file that logs your location. Untrackerd nukes the location logs from that database. Although it requires a jailbroken device, it&#8217;s a cinch to use—it simply runs in the background, erasing that dubious info: &#8216;A package installs a daemon (process that can run in the background) to clean consolidated.db file. No new icons are added to your homescreen. There are no options to configure.&#8217;</p>
<p>Sounds good to us! This is, however, only a bandaid—a fairly inconvenient bandaid. This is a problem that affects and potentially compromises the privacy of every single iPhone and iPad user. And most of these users aren&#8217;t ever going to consider jailbreaking.</p>
<p></em><em> </em></p>
<p><em>So as much as Untrackerd is a laudable effort, it answers none of the underlying questions about why this data was being logged in the first place where normal—not just carriers and law enforcement—can get to it from our computers and handsets. The only real fix will be one that comes from Apple, allowing all users to opt-out of the tracking with a simple tap. Or hey, crazy idea—don&#8217;t have it enabled to begin with. [via TNW]&#8221;</em></p></blockquote>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=180">iSpy Conspiracy: Break Apple&#8217;s Secret Tracking with This App</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=180</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</title>
		<link>http://securitywandering.com/?p=176</link>
		<comments>http://securitywandering.com/?p=176#comments</comments>
		<pubDate>Thu, 21 Apr 2011 14:08:02 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[legal]]></category>
		<category><![CDATA[Product info]]></category>

		<guid isPermaLink="false">http://securitywandering.com/?p=176</guid>
		<description><![CDATA[<p>  Over on the post &#8220;Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab&#8221; contains this text: &#8220;esterday, security researchers Pete Warden and Alasdair Allan released an application that can take such a file and show your movements on a map.   Now, this sounds bad [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=176">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p> </p>
<p>Over on <em><a></a></em> the post &#8220;<em><a href="http://www.f-secure.com/weblog/archives/00002145.html">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;esterday, security researchers Pete Warden and Alasdair Allan released an application that can take such a file and show your movements on a map.</p>
<p> </p>
<p>Now, this sounds bad from a privacy viewpoint. For example, authorities could gain a court order to do a forensic examination on your phone to figure out where you&#8217;ve been.</p>
<p>But why is Apple collecting this information to begin with? We don&#8217;t know for sure. But we&#8217;re guessing it&#8217;s likely related to Apple&#8217;s global location database.</p>
<p>Like Google, Apple maintains a global database of the locations of Wi-Fi networks. They use this to get an estimate of your location without using GPS. For example, if your handset sees three hotspots which have MAC addresses that Apple knows are within a certain city block in London, it&#8217;s a fair bet you&#8217;re in that city block.</p>
<p>We know how Google collected their location database: they recorded them world-wide while they had their Google Maps Street View cars driving around the globe.</p>
<p>Where did Apple get their location database? They used to license it from a company called Skyhook. How did Skyhook obtain this information? Well, they had their own cars drive around the world, just like Google.</p>
<p>However, the Skyhook database is expensive. So beginning with iPhone OS 3.2 released in April 2010, Apple started replacing the Skyhook location database with their own location database.</p>
<p>And the real question is: How did Apple create their own location database? They did not have cars driving around the world. They didn&#8217;t need to. They had existing iPhone owners around the world do the work for them.</p>
<p>If you run a modern iPhone, it will send your location history to Apple twice a day. This is the default operation of the device.</p>
<p>How can they do this? By asking for your permission first. There is an opt-in process during initial iTunes installation, but the prompt is highly misleading:</p>
<p>The iTunes prompt talks about helping Apple with Diagnostics information. It says nothing about recording your locations. If you take the time to read Apple&#8217;s Privacy Policy, it does explain what they are doing:</p>
<p>To provide location-based services on Apple products, Apple and our partners    and licensees may collect, use, and share precise location data, including the    real-time geographic location of your Apple computer or device.    This location data is collected anonymously in a form that does not personally    identify you and is used by Apple and our partners and licensees to provide and    improve location-based products and services.</p>
<p></em></p>
<p><em>We believe the new secret location database found on the devices is connected to this functionality. Apparently iPhones always collect your location information, even if it&#8217;s not getting sent to Apple. &#8220;</em></p>
</blockquote>
<p> </p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=176">Actually, iPhone sends your location to Apple twice a day &#8211; F-Secure Weblog : News from the Lab</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=176</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Research Center &#8211; Network World</title>
		<link>http://securitywandering.com/?p=62</link>
		<comments>http://securitywandering.com/?p=62#comments</comments>
		<pubDate>Wed, 13 Apr 2011 18:47:23 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[good practices]]></category>
		<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=62</guid>
		<description><![CDATA[<p>Over on the post &#8220;Security Research Center &#8211; Network World&#8221; contains this text: &#8220;Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits. * * * Have you ever responded to an e-mail, &#8216;Give me [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=62">Security Research Center &#8211; Network World</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.networkworld.com/topics/security.html">Security Research Center &#8211; Network World</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits.<br />
* * *<br />
Have you ever responded to an e-mail, &#8216;Give me a call and let&#8217;s discuss&#8217; because you were uncomfortable putting private information in the reply? Lawyers are no longer the primary professionals who are circumspect about what they put in electronic messages. There is a growing sense that pressing &#8216;send&#8217; for an electronic message is tantamount to publishing the content. The potential for disclosure and the lack of privacy in electronic communication is becoming sand in the gears of progress. The lack of privacy, or the fear of public disclosure, is driving business people away from traditional written electronic messaging, despite the proliferation of mobile devices, and &#8216;Give me a call and let&#8217;s discuss that&#8217; is a phrase returning &#8220;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=62">Security Research Center &#8211; Network World</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=62</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Legal issues in the Cloud &#8211; Part 4 &#8211; Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing &#8211; CIO</title>
		<link>http://securitywandering.com/?p=56</link>
		<comments>http://securitywandering.com/?p=56#comments</comments>
		<pubDate>Wed, 13 Apr 2011 09:55:30 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=56</guid>
		<description><![CDATA[<p>Over on the post &#8220;Legal issues in the Cloud &#8211; Part 4 &#8211; Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing &#8211; CIO&#8221; contains this text: &#8220;Legal issues in the Cloud &#8211; Part 4 There are no laws unique to the Cloud, but you must consider your exit strategy&#8221;</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=56">Legal issues in the Cloud &#8211; Part 4 &#8211; Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing &#8211; CIO</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.cio.com.au/article/382657/legal_issues_cloud_-_part_4/?rid=-154">Legal issues in the Cloud &#8211; Part 4 &#8211; Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing &#8211; CIO</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Legal issues in the Cloud &#8211; Part 4<br />
There are no laws unique to the Cloud, but you must consider your exit strategy&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=56">Legal issues in the Cloud &#8211; Part 4 &#8211; Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing &#8211; CIO</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=56</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Senate bill would set consumer privacy rights &#8211; USATODAY.com</title>
		<link>http://securitywandering.com/?p=50</link>
		<comments>http://securitywandering.com/?p=50#comments</comments>
		<pubDate>Wed, 13 Apr 2011 09:16:13 +0000</pubDate>
		<dc:creator><![CDATA[lou]]></dc:creator>
				<category><![CDATA[legal]]></category>

		<guid isPermaLink="false">https://securitywandering.wordpress.com/?p=50</guid>
		<description><![CDATA[<p>Over on the post &#8220;Senate bill would set consumer privacy rights &#8211; USATODAY.com&#8221; contains this text: &#8220;Senate bill would set consumer privacy rights By Joelle Tessler, Associated PressPosted 11h 26m ago WASHINGTON — A new Senate bill introduced Tuesday would establish a ‘privacy bill of rights’ to set ground rules for companies that collect consumer [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=50">Senate bill would set consumer privacy rights &#8211; USATODAY.com</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over on <em><a href=""></a></em> the post &#8220;<em><a href="http://www.usatoday.com/tech/news/2011-04-12-senate-privacy-bill.htm?csp=34tech&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+usatoday-TechTopStories+%28Tech+-+Top+Stories%29">Senate bill would set consumer privacy rights &#8211; USATODAY.com</a></em>&#8221; contains this text:</p>
<blockquote><p><em>&#8220;Senate bill would set consumer privacy rights<br />
By Joelle Tessler, Associated PressPosted 11h 26m ago </p>
<p>WASHINGTON — A new Senate bill introduced Tuesday would establish a ‘privacy bill of rights’ to set ground rules for companies that collect consumer data, including personal data amassed on the Internet and then mined to target online advertising.&#8221;</em></p></blockquote>
<p>The post <a rel="nofollow" href="http://securitywandering.com/?p=50">Senate bill would set consumer privacy rights &#8211; USATODAY.com</a> appeared first on <a rel="nofollow" href="http://securitywandering.com">Security Wandering</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://securitywandering.com/?feed=rss2&#038;p=50</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
