I firmly believe that AI is, ultimately, a good thing for the world. However, it also has a dark side. Our best approach to handle it is to learn as much as we possibly can.
I just listened to the podcast episode “AI Unchained”: #003 – The Dark Side of AI by Guy Swann, featuring Alex Lewin, a pro in software development and cybersecurity. This podcast seriously made me stop and think.
It dives deep into the vast possibilities of AI—from enhancing our productivity and creativity to opening up potential threats that are dauntingly magnified. As AI swiftly progresses to manage larger goals through task hierarchies, the concept of a broad, self-spreading, and malicious AI becomes frighteningly more conceivable every day.
Imagine an out-of-control wildfire—that’s how bad the aftermath could be. But what’s our plan, and what can we do to prevent this?
I highly recommend giving this episode a listen. It’s a compelling discussion that highlights the lesser-known aspects of AI. Trust me, it’s eye-opening!
If you want to learn more about AI, I suggest subscribing to AI Unchained.
The realm of online security has come a long way from the early days when ‘password123’ would suffice as a security measure. Fast forward to the current digital landscape where we deal with a multitude of online accounts, and the demands for a stronger, more efficient method of authentication is greater than ever. Enter passkeys, the revolutionary login solution that provides a more streamlined, secure, and straightforward approach to online authentication.
So, what are passkeys?
Imagine signing into your accounts without the need to enter a password. Yes, that’s right, no passwords! Passkeys offer a novel solution to the problem of password creation and memorization. Powered by the API WebAuthn (Web Authentication), a joint project between the FIDO Alliance and the World Wide Web Consortium (W3C), passkeys provide an opportunity for users to quickly create and sign into their accounts without the need for passwords.
These powerful keys consist of a pair of public-private cryptographic keys. The public key can be shared publicly, stored by the website or app you want to sign in to, while the private key remains secure and secret, used to decrypt data that’s been encrypted with your public key. Importantly, this private key is never shared with the website, enhancing the level of security offered.
One major advantage of passkeys is their ability to deter phishing and social engineering attacks. With this technology, you never share your credentials with untrusted websites, adding an additional layer of protection against cyber threats.
Transitioning to Passkeys
Companies like Apple, Google, Microsoft, 1Password, and Bitwarden are championing the adoption of passkeys. Services like Bitwarden plan to launch passkey management, allowing users to store passkeys in their vault and sync them among devices. Meanwhile, 1Password is working to integrate passkeys into their password manager, supporting users to manage all that’s important in their digital life.
Many major websites are already supporting passkeys, including Google, eBay, BestBuy, and NVIDIA. This list is expected to grow significantly as we move further into 2023 and beyond. Furthermore, there is a community-driven index at passkeys.directory which provides an extensive list of websites, apps, and services that offer signing in with passkeys.
The Benefits of Passkeys
Passkeys present several key benefits. They offer strong, default security as each passkey is unique and associated with a single account. This eliminates the risk of weak or reused passwords. Additionally, with passkeys, users are protected against phishing attacks since private keys never leave their devices. Also, there’s no need to remember or type out your passkeys; they are stored on your device and retrieved automatically when you need to sign in.
The Impact on Businesses
The transition to passkeys is not just a win for end users, but for businesses too. With stronger account security, businesses are less likely to suffer data breaches. Since passkeys can’t be stolen via phishing attacks, businesses will have less worry about user accounts being compromised.
In a nutshell, passkeys promise to herald a new era in passwordless authentication, simplifying the login process while bolstering online security. As we move towards a future where passkeys become the norm, users can look forward to a more streamlined, efficient, and secure way of managing their online accounts.
The popularity of digital payment methods like Zelle®, Venmo, and PayPal has been shadowed by a rise in associated fraud and scams. It’s vital to distinguish between fraud (unauthorized access and use of your account) and scams (where you’re deceived into making a transaction). Both can be avoided with certain precautions.
Common digital payment scams include social engineering, such as phishing and bank impersonation, and more specific strategies like utility scams, marketplace scams, and “pay yourself” scams. To keep your transactions secure:
1. Only send digital payments to individuals you know and trust.
2. Beware of any request to send money to yourself, a common scam tactic.
3. Confirm that contact details match the intended recipient before transferring funds.
4. Never share sensitive account information like passwords, PINs, or temporary access codes.
5. Remember that legitimate banks, like Fifth Third Bank, will never ask for your login information.
By following these steps, you can ensure your digital transactions are safer and directed to the correct individual or company.
Today, Apple has once again strengthened its commitment to user privacy and security with the announcement of several powerful new features. These enhancements provide users with even greater control over their data, bolster existing safeguards, and introduce several fresh concepts, all grounded in Apple’s unwavering belief that privacy is a fundamental human right.
Apple’s Privacy-First Approach
Apple has long held a reputation for valuing user privacy, weaving it into the fabric of every product and feature it creates. The latest announcement by Craig Federighi, Apple’s senior vice president of Software Engineering, confirmed that the company is doubling down on these values, further bolstering its efforts to keep users firmly in control of their data. This philosophy is evident in the significant updates to Safari Private Browsing and the expansion of Lockdown Mode, among other features.
Major Updates to Enhance Data Control and Security Enhanced Safari Private Browsing
Apple’s pioneering private browsing feature in Safari sees a significant update, offering advanced tracking and fingerprinting protections to further impede websites from identifying a user’s device. A new locking mechanism safeguards browsing data even when users step away from their device.
App and Photos Privacy Improvements
Apple has enhanced app privacy by equipping developers with more data about the practices of third-party software development kits (SDKs) they use. This allows for more accurate Privacy Nutrition Labels and adds an additional layer of protection against misuse. The photos app also sees an update with a new embedded picker feature that ensures only selected photos are shared with apps, keeping the rest of the photo library private.
Communication Safety and Content Warnings
Communication Safety, a feature designed to safeguard children from inappropriate content, now extends to video content. Parents can disable these warnings, which are activated by default for child accounts in their Family Sharing plan. Similarly, Sensitive Content Warning helps adult users avoid unwanted content, using the same privacy-preserving technology as Communication Safety.
Powerful Security Protections
Updates to the password and passkey sharing feature make the process easier and more secure. Users can now share a set of passwords via iCloud Keychain, which is end-to-end encrypted. A new feature in Safari autofills one-time verification codes received in Mail for a more secure and convenient login process.
Lockdown Mode has been expanded to provide additional protections against potential threats from mercenary spyware. The mode offers safer wireless connectivity defaults, optimizes network security, and strictly limits certain functionalities, drastically reducing the attack surface.
Innovative Privacy and Security Features
Check In, a feature designed with user safety in mind, allows users to notify selected contacts when they have reached their intended destination. The NameDrop feature provides a secure way to share contact information via AirDrop. Live Voicemail offers real-time transcription of voicemail messages, providing users with greater control over their call handling.
These security and privacy advancements reiterate Apple’s commitment to user data protection. They demonstrate that the company not only upholds privacy as a fundamental human right, but also leads the industry in implementing practical, user-friendly features that put control back into the hands of the users. Look out for these features coming in free software updates this fall.
In a recently released video, The CryptoDad, a known voice in the realm of cybersecurity and digital privacy, delves into a feature update on Google Authenticator’s app: the new Cloud Backup function. This addition, while seemingly convenient, raises concerns due to its lack of end-to-end encryption. The question is, should you trust it?
What’s New with Google Authenticator?
As a background, Google Authenticator is a widely used application that provides 2-step verification services. The app generates a six to eight digit one-time password (OTP) used in conjunction with your regular login information, providing an additional layer of security.
Recently, Google has introduced a Cloud Backup feature in Authenticator. This allows users to save their OTP secrets to Google’s cloud servers, which can be beneficial in case of loss or theft of the device on which the app is installed. It eliminates the rather complicated process of reconfiguring 2FA for each account in such situations.
The Controversy: No End-to-End Encryption
However, what has prompted CryptoDad’s insightful discussion is the absence of end-to-end encryption for this new feature. For the uninitiated, end-to-end encryption is a security measure where only the communicating users can read the messages. In principle, this prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.
The lack of this encryption means that, theoretically, Google (or anyone who gains access to their servers) could access the backed-up OTP secrets. This opens a potential window for security breaches.
Weighing the Pros and Cons with CryptoDad
In his video, CryptoDad, known for his accessible, honest, and insightful tech commentary, methodically weighs the pros and cons of this new feature. He discusses how the convenience of easy recovery needs to be balanced with the risk of potential security breaches due to the lack of end-to-end encryption.
CryptoDad points out that while Google has an overall strong security record, no system is impervious. He encourages users to be aware of the risks involved and to evaluate if the convenience of the cloud backup outweighs the potential security risks for their personal use case.
CryptoDad’s discussion is not just a critique, but a call for users to be informed and responsible. This conversation, he emphasizes, is not just about Google Authenticator but a broader discussion on online security, data privacy, and trust in tech companies.
This video is a must-watch for anyone who uses Google Authenticator or is interested in online security. CryptoDad breaks down the issue into simple terms, making the complex world of encryption and data privacy accessible to everyone.
To stay updated on more tech insights and discussions, do remember to like, share, and subscribe to CryptoDad’s YouTube channel. As he rightfully points out, understanding technology and its implications can make a crucial difference in navigating the digital world securely.
Remember, in an age where our lives are increasingly digital, awareness is the first step towards security. Make sure to stay informed and make tech choices that align with your comfort level of risk and convenience.
Watch the video here for more on Google Authenticator’s Cloud Backup feature and decide whether it’s the right choice for you.