Press

“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver

With new iPhone, Trump still a target for hackers
March 30, 2017 | Rob Lever, Phys.org

Nicholas Weaver, a researcher at the California-based International Computer Science Institute, said Trump's phone swap "massively reduces, but does not completely eliminate, the security risks." But while he agreed foreign governments are likely to try to hack the phone, Weaver said US intelligence services may have modified it to be "a nice honeypot to trap attempted attacks."

It’s highly likely the government knows where the leak came from, or has a good idea, said Nick Weaver, a senior staff researcher at the International Computer Science Institute in Berkeley.

Electronics ban wastes effort to improve security
March 28, 2017 | Alina Agha, The Daily Texan

“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, a senior researcher at the International Computer Science Institute at the University of California, Berkeley, in an interview with “The Guardian.” “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold.”

Is Trump Still Tweeting From His Unsecured Android Phone?
March 27, 2017 | Kaveh Waddell, The Atlantic

The device, likely a Samsung Galaxy S3, has such serious security problems that it’s probably “compromised by at least one—probably multiple—hostile foreign intelligence services and is actively being exploited,” according to Nicholas Weaver, a security researcher at the University of California, Berkeley.

Security experts skeptical about electronics ban on aircraft
March 26, 2017 | Robert Silk, Travel Weekly

"Yes, bombs in laptops are a threat, but this assumes the laptop has to be manually detonated or placed, while a timer can work just as well in the cargo hold," Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California-Berkeley wrote in an email. "At the same time, by only targeting a few source airports but not transit, this assumes that said suicidal terrorist is willing to blow up a plane but is unwilling to transfer through Frankfurt."

"If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold," International Computer Science Institute researcher Nicholas Weaver told the Guardian. "If you're worried about hacking, a cellphone is a computer."

Comey’s idea means that all countries will essentially agree to weaken the security in their vendors’ tech products, Weaver said. However, other countries will balk, fearing that the U.S. might exploit the cooperation for spying purposes.

“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California, Berkeley, in an interview with the Guardian. “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold. If you’re worried about hacking, a cellphone is a computer.”

Experts criticize US electronic devices ban on some flights from Middle East
March 21, 2017 | Sam Theilman and Sam Levin, The Guardian

“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, researcher at the International Computer Science Institute at the University of California, Berkeley. “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold.” “If you’re worried about hacking, a cellphone is a computer.”

Pages