Tech News: iOS 8, Apple’s “New” Privacy Policy, Interceptor Cell Towers
iOS 8 will do what with my contacts?
With the iOS 8 update comes a plethora of new features, the latest update seems to be causing a lot of fuss around a potential invasion of privacy. When you double click your home button a row of your most recently used contacts appears at the top of the screen, regardless if the exchange was deleted or not. In a perfect world, this would be great but, unfortunately many people are concerned about the wrong people seeing who you’ve contacted. Apple has yet to respond to this but it is likely that this will be fixed in the next software update.
There’s no privacy in that cloud
After the iCloud security hack that led to quite a few celebrities’ “personal” pictures getting leaked, Apple has strengthened its iCloud security. Tim Cook did not directly address the breach of security during Apple’s iPhone event but they have added a new two-factor authentication in the hopes of regaining the trust of their customers. In addition to this new feature, Cook is stating that apple never worked with any government agency to create a way for them to gain access to their products and that if they want information they need a court order.
Interceptor Cell Towers: Foreign or Domestic Owned?
This is a very interesting story that has been developing over the last few weeks. The recent discovery of “interceptor” cell towers around the D.C. area, specifically in the vicinity of the White House and senate, has raised some concerns about a “foreign entity” monitoring calls. These interceptors can be referred to as towers but they can be as small as a briefcase. Earlier this month there were only 19 known receptors, but due to the recent tips from Cryptophone users, the number is now closer to 45 spread all around the country. It is interesting to note that these interceptor towers are peculaiarly placed towards the southern border of the US, along with inside major “hub” cities. Who, if anyone, will come forward to claim ownership of these devices? They have been determined to spoof cell phones into thinking that they are “real” cell towers, except they route all of your data and call traffic through them, before going on to the original destination.
For more news updated in real-time, visit http://daily.moka5.com