![]() ![]() Documents from Edward Snowden show the researchers claim to have created a modified version of Apple software development tool Xcode, allowing them to sneak surveillance backdoors into apps and programs. While the leaks of Edward Snowden have shed light on the National Security Agency’s surveillance practices, less attention has been paid to other forms of everyday surveillance-license plate readers, facial recognition software, GPS tracking, cellphone metadata and data mining.ĪMY GOODMAN: Just this week, The Intercept revealed CIA researchers have been working for nearly a decade to crack the security of Apple’s iPhones and iPads. The book chronicles how governments and corporations have build an unprecedented surveillance state. JUAN GONZÁLEZ: We turn now to look at what our next guest calls the “golden age of surveillance.” The leading security and privacy researcher Bruce Schneier is out with a new book, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. ![]()
0 Comments
Leave a Reply. |