Against the Law: Countering Lawful Abuses of Digital Surveillance

Working Draft (2 Saved Versions)chevron-down
24 Discussions (#public)
2 Contributors
Against the Law: Countering Lawful Abuses of Digital Surveillance
··
Read Only You have view permissions to the working draft but cannot edit it.
1

Loading...


Discussions


Labels
Sort
Editorial decision for TJOE
Devin Berg: Dr. Huang and Mr. Snowden, After a review of your revised document submitted in response to the reviewers comments, we have decided to accept your article for publication in the Journal of Open En...
non-technical review
Matthew Jones: I was invited to review this important, timely, and sound article from a non-technical standpoint by TJOE. My comments focus on making more explicit the urgent current need for such a case and othe...
IMEI spoofing
Jeffrey Rhoades: Could IMEI spoofing be added to this device?
Vendors or skilled technicians?
Jeffrey Rhoades: Can you be more precise about what you mean by ‘phone vendors’? Would skilled enough technicians be capable of this mod, or does it need to happen at a factory level?
Discussion on Sep 20, 2016
Nathan Seidle: I was invited to review the article by TJOE:> TECHNICAL SOUNDNESSHaving low-level access to the radio control signals is a feasible method for user verification that the hardware is doing what the ...
Discussion on Jul 26, 2016
Josh B: Until this become feasible for everyday use, there's a company called Silent Pocket making Faraday cage cell phone sleeves. I have one, and use it every day, except for at work and home. It block...
Discussion on Jul 26, 2016
M PR: The idea is genial - relatively simple and very efficient. And it can serve as a basis to implement additional features. In my thesis "Detection and countermeasures of attacks on smartphones" I des...
M PR: "genial" means great!
Discussion on Jul 25, 2016
David Haahr: There will always be the "DE-BUNKERS" and "ILL-WISHERS" of the world because they did not come up with the idea first. I think That Huang and Snowden are onto something and it MUST BE PUT FORWARD, ...
Discussion on Jul 23, 2016
John Schmidt: I get it. Having a recognizeable case (that says hey, I care about my security/anonymity) might not be very covert. I stand by the effort being put forth here. This is low level reverse engineering...
Discussion on Jul 23, 2016
OK Dokie: So it identifies when a broadcast is occurring, but doesn't actually stop it. At that point isn't it already too late for a high-risk endeavor?
Discussion on Jul 22, 2016
Jeff Flowers: Kickstarter, Indiegogo, Bitcoin, Litecoin, etc... How can we help make this a reality?
Discussion on Jul 22, 2016
Minnie Mouse: I have long held freedom of speech dear, however, I have to say that Mr Snowden has a childlike view of the modern world. I would like this device banned because it will work against our security s...
Mak Di: Naive Minnie
Minnie Mouse: Far from naive, it's all about balancing risks and priorities. while I feel for people who risk their lives to fight brutal and repressive regimes, I have two beautiful children. Have you seen the ...
1 more...
Discussion on Jul 22, 2016
Ariel undefined: It will be hardened phone at the end of the day competing with other hardened phones that try hard to provide solutions to all types of eavesdropping as well. as it requires physical hacking connec...
Discussion on Jul 21, 2016
Zach H: While a fantastically conceived idea, I doubt the engineers are naive enough to not have considered the potential for such a cloaking device to fall into the hands of those with intentions more nef...
N D: This device just tells you when the radios on your device are in use. That is all it does. It does not "cloak" anything. If you want to communicate with anyone, the radios must be on. What this dev...
Thomas McLeod: A similar argument can be made for encryption, or really any privacy enhancing technology. Just because a technology could assist "nefarious" individuals doesn't mean that the technology shouldn't ...
Discussion on Jul 21, 2016
One Interested Individual: While the idea of a phone case-like design for a final product is a good idea, the presence of a screen might cause it to be visible to hostile regimes. With the display located on the back of a ph...
N Mindz: Maybe the display could be masked in a flip-cover sort of case. Or, maybe, the case could cover all of the phone's back and the top part of it be a foldable display.
Discussion on Jul 21, 2016
keith comess: How will the public be notified that the case/blocker is commercially available?
David Lieder: To hide the back, the case should wrap around the entire phone, with the entry hole (to insert the phone in the case) at the top or bottom. This would imply an elastic body with the counter-measure...