Monthly Shaarli

All links of one month in a single page.

July, 2018

Facial recognition to be deployed by police across London, sparking human rights concerns | The Independent

The Independent on the scene as police trial controversial new technology

Why Vietnam is quitting Facebook | Asia Times

Activists, dissidents and writers are gravitating to other social media platforms as Facebook appears to acquiesce to government censorship demands

Some Amazon Reviews Are Too Good To Be Believed. They're Paid For : NPR
Le projet d'intelligence artificielle de Google en santé inquiète son comité éthique
Qwant, l'Europe, la vie privée et l'éthique : 5 questions à Tristan Nitot
L’aiguille et la botte de foin – Second Glance
Etats-Unis : les données de millions de personnes et d’entreprises ont fuité

C’est une fuite d’une ampleur rare. Vinny Troia, un chercheur en sécurité informatique, a découvert en juin une base de données contenant les informations personnelles d’environ 230 millions d’Américains et 110 millions d’entreprises, a rapporté le site spécialisé Wired mercredi 27 juin. Elle appartenait à l’entreprise Exactis, spécialisée dans le marketing et l’agrégation de données.

Au total, Vinny Troia a trouvé près de deux téraoctets de données, accessibles depuis Internet, concernant « presque tous les citoyens américains » : des nom, adresse, numéro de téléphone, adresse e-mails, âge, et des informations sur de potentiels centres d’intérêt comme le statut de fumeur, la religion, le genre des enfants ou encore la possession ou non d’animaux de compagnie. Plus de quatre cents variables par personne figurent dans la base, grâce à des méthodes que ne détaille pas la firme sur son site tout en assurant être en conformité avec la loi dans sa collecte de données.

Qwant multiplie les annonces de services, publie du code source et finalise sa v4
PeerTube, enfin une alternative éthique à YouTube - L'actu Médias / Net - Télérama.fr
Notice - Non-official site with a tampered version of KeePass - Infoteam SA

KeePass is probably one of the most popular password managers. Simple, free and open source, it quickly became largely adopted at home and at work. Beware, a non-official website using an URL similar to the real one lets you download a tampered version of the password manager with some adware in it.

HTTP Sites Marked as "Not Secure"

The Chrome team is delighted to announce the promotion of Chrome 68 to the stable channel for Windows, Mac and Linux. This will roll out ove...

Under GDPR, Data Breach Reports in UK Have Quadrupled

Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant

Stay away from any websites or apps (there's numerous) powered by Metabrite's SD... | Hacker News

Stay away from any websites or apps (there's numerous) powered by Metabrite's SDK. They data mine and resell [1] the receipts scanned.

[1] https://www.metabrite.com/use-cases/

Shedding too much Light on a Microcontroller’s Firmware Protection - Fraunhofer AISEC
La valeur sociale de la vie privée | InternetActu.net

Souvent, la réponse aux inquiétudes concernant la confidentialité de nos données consiste à dire que ceux qui ne transgressent pas la loi ...

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle of Higher Education

What's the problem with ubiquitous surveillance? Don't think Orwell; think Kafka.

Rien à cacher | Le Club de Mediapart

Quand on est, comme moi, un vieil activiste désabusé, il y a des lieux et des moments où on s’attend à déposer les armes.Se reposer l’esprit en assistant à un débat réunissant des gens qui partagent nos idées. Écouter tranquillement sans avoir à repérer les pièges et les non-dits. Lâcher prise.Et puis, paf le chien.

Lettre ouverte à ceux qui n’ont rien à cacher | InternetActu.net

Apportez-moi deux lignes du plus honnête homme et jy découvrirai de quoi le faire pendre. -- Louis-Benoît Picard, inspiré de cette citation ...

Flicage-brouillon - Partie 1 chapitre 7 - l'impact de la surveillance sur la société - Standblog

Il est une question à laquelle j’avoue avoir du mal à répondre : « pourquoi la surveillance de masse est-elle néfaste à la société dans son ensemble ? ». Comme beaucoup, j’ai une

Dozens of PC games drop Red Shell tracking software after surveillance fears | WIRED UK

Games developers are removing data collecting software created by Red Shell after sleuthing players discovered it was recording their information

Farewell, Google Maps | In der Apotheke

Google decided to make Maps its next billion dollar business by raising prices 14 times and decreasing free usage limit almost 30 times, all with minimal notice period. Fortunately, the move energised map competitors. Apple Maps, Mapbox, TomTom - which alternative is best for mid- and larger sites?

Thermanator Attack Steals Passwords by Reading Thermal Residue on Keyboards

A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on the keyboard, according to a recently published research paper by three scientists from the University of California, Irvine (UCI).

Commission Européenne - COMMUNIQUES DE PRESSE - Communiqué de presse - Antitrust: Commission fines Google €4.34 billion for illegal practices regarding Android mobile devices to strengthen dominance of Google's search engine

European Commission - Press Release details page - European Commission - Press release Brussels, 18 July 2018 The European Commission has fined Google €4.34 billion for breaching EU antitrust rules. Since 2011, Google has imposed illegal restrictions on Android device manufacturers and mobile network operators to cement its dominant position in general internet search. Google must now bring

1,4 milliard de comptes exposés dans une base de données de 41 Go

Une trouvaille qui fait froid dans le dos

Et si on quittait les réseaux sociaux ?

Ces derniers mois beaucoup de personnes hésitent à quitter les réseaux sociaux, pour fuir les trolls, pour gagner du temps ou pour arrêter d'en perdre. Faux mouvement ou vraie réflexion, nos rapports aux réseaux sociaux évoluent.

How I Fully Quit Google (And You Can, Too) – Member Feature Stories – Medium

It's getting harder to escape Google and other powerful tech companies. Here is a list of open-source or paid alternatives to every component of the Googleverse.

Labour HQ used Facebook ads to deceive Jeremy Corbyn during election campaign | News | The Times

Labour officials ran a secret operation to deceive Jeremy Corbyn at last year’s general election, micro-targeting Facebook adverts at the leader and his closest aides to convince them the party was...

Telegram Ordered to Hand Over Encryption Keys to Russian Authorities | The first stop for security news | Threatpost

Popular secure messaging service Telegram loses battle with Russian courts and now must hand over encryption keys or face being blocked from the country.

Wire application-level security audits – Wire – Medium

Kudelski Security and X-41 D-Sec have published application-level security audits of Wire’s iOS, Android, web application, and calling…

WhatsApp also has the glaring vulnerability that Facebook could at any time rese... | Hacker News

WhatsApp also has the glaring vulnerability that Facebook could at any time reset your key to a compromised one without your knowledge, and WhatsApp will resend any hanging messages automatically upon the change, making any undelivered messages available to the one who has the decryption capability associated with that new key. It's possible they've put in a method to do this without notifying the user. Also, this "automatic resend" behavior means that a physical attack can be made simply by switching SIMs on the phone before the message is sent. It requires some careful timing to be a real vulnerability and anyone using a phone to communicate will certainly opt for a more secure platform for critical applications.

Des mouchards publicitaires dans les téléviseurs connectés

La collecte de données jusque dans les salons

Twitter supprime plus de 1 million de comptes par jour depuis 2 mois

Modération à plein régime

SimpleMobileTools · GitHub

A group of simple, stupid, open source Android apps with customizable widgets, without annoying ads and unnecessary permissions.

Yes, Amazon Is Tracking People | Cato Institute

In order to protect civil liberties without hampering innovation, lawmakers should require public input before surveillance tools are deployed and ensure that facial recognition databases are purged of data related to law-abiding people.

Les surprises de la capitalisation boursière des géants du numérique

PwC vient de publier son Top 100 mondial

Votre smartphone ne vous écoute peut-être pas, mais il vous observe

Des applis un peu trop curieuses

Des millions de registres téléphoniques illégaux détruits par la NSA

L'agence de surveillance US victime de son zèle

RGPD : un rapport norvégien accuse Facebook et Google de manipulations

Les géants ne jouent pas le jeu

Samsung phones sending pictures to contacts without users knowing

The issue appears to be affecting Galaxy S9 and Galaxy Note 8 users.

Privacy risks with Facebook’s PII-based targeting: auditing a data broker’s advertising interface | the morning paper

Privacy risks with Facebook’s PII-based targeting: auditing a data broker’s advertising interface Venkatadri et al., IEEE Security and Privacy 2018 This is one of those jaw-hits-the-floor, can’t qu…

Microsoft Releases 125 million Building Footprints in the US as Open Data | Maps Blog

Bing has made very significant investments in the area of deep learning, computer vision and artificial intelligence to support a number of different search scenarios. The Bing Maps team has been applying these techniques as well with the goal to increase the coverage of building footprints available for OpenStreetMap.

Russian Hackers Reach U.S. Utility Control Rooms, Homeland Security Officials Say - WSJ

Hackers working for Russia claimed “hundreds of victims” last year in a long-running campaign that put them inside the control rooms of U.S. electric utilities where they could have caused blackouts, federal officials said.

Amazon Dark Patterns - Censuring Unhappy Customers

In which I attempt to leave honest, critical reviews of products and am eventually not allowed, yet bots and fake reviews are everywhere.

Ditching Windows: 2 Weeks With Ubuntu Linux On The Dell XPS 13

After more than 2 decades relying on Windows, I was finally pushed over the edge and into the embrace of Ubuntu Linux. I haven't looked back.

Thermostats, Locks and Lights: Digital Tools of Domestic Abuse - The New York Times

The people who called into the help hotlines and domestic violence shelters said they felt as if they were going crazy.

One woman had turned on her air-conditioner, but said it then switched off without her touching it. Another said the code numbers of the digital lock at her front door changed every day and she could not figure out why. Still another told an abuse help line that she kept hearing the doorbell ring, but no one was there.

Their stories are part of a new pattern of behavior in domestic abuse cases tied to the rise of smart home technology. Internet-connected locks, speakers, thermostats, lights and cameras that have been marketed as the newest conveniences are now also being used as a means for harassment, monitoring, revenge and control.

La NSA efface des millions de données collectées « par erreur »
Is My Phone Recording Everything I Say?
Leaked Emails Show Cops Trying to Hide Emails About Phone Hacking Tools - Motherboard
Des quiz Facebook compromettent les données de 120 millions de comptes
Facebook fined for data breaches in Cambridge Analytica scandal | Technology | The Guardian
En vrac de la fete nationale - Standblog
Pop!_OS 18.04: the state of the art in GNU/Linux on desktop – Aral Balkan

Pop!_OS is beautiful, thanks in no small part to a consistent minimalist visual style and Kate Hazen’s beautiful space-themed illustrations. Pop!_OS 18.04 is a GNU/Linux distribution curated by US-based computer maker System76. It is the state of the art in usability and experience when it comes to desktop Linux today1.
The genius of the System76 team was in realising that all the components for a usable, convenient, and delightful GNU/Linux desktop experience are already here, they’re just not tastefully curated.

Departing Facebook Security Officer's Memo: "We Need To Be Willing To Pick Sides"
Introducing Address Verification and Full PGP Support - ProtonMail Blog

Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted email interoperability. Starting with the latest release of ProtonMail on web (v3.14), iOS and Android (v1.9), and the latest versions of the ProtonMail IMAP/SMTP Bridge, ProtonMail now supports Address Verification, along with full PGP interoperability …

Positive Technologies - learn and secure : Intel patches new ME vulnerabilities
In early July, Intel issued security advisories SA-00112  and SA-00118  regarding fixes for vulnerabilities in Intel Management Engine. ...
The Eternal Value of Privacy | WIRED

Supporters of wholesale government surveillance are fond of saying that only the guilty should be worried about spying. Let's put that spurious argument out to pasture once and for all. Commentary by Bruce Schneier.

Non, je n’ai rien à cacher | ploum.net

On entend régulièrement la formule « Celui qui n'a rien à se reprocher n'a rien à cacher ». Cet aphorisme devrait vous rassurer lorsque vous vous inquiétez de l'invasion des technologies dans votre vie. Je voudrais illustrer la tromperie de cette phrase au travers d'une anecdote réelle, vécue à une

L’autocensure des idées minoritaires, conséquence de la surveillance de masse

Une étude américaine montre que la surveillance gouvernementale incite les internautes à taire leurs opinions quand ils les considèrent minoritaires.

Grâce à vos données, on peut tout savoir de vous : voyez par vous-même

<p>En vous observant, Facebook peut deviner quand vous tombez amoureux, Google sait quelles langues vous parlez ou si vous avez l’habitude de fréquenter un lieu de culte.</p>

Négationnisme : le faux-pas du patron de Facebook sur les fake news

La position controversée de Zuckerberg

Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software

Cisco has released 25 security updates yesterday, including a critical patch for Cisco Policy Suite that removes an undocumented password for the "root" account.

Glenn Greenwald: Why privacy matters | TED Talk

TED Talk Subtitles and Transcript: Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you're "not doing anything you need to hide."

Twitter’s vast metadata haul is a privacy nightmare for users | WIRED UK

Working with publicly available metadata from Twitter, a machine learning algorithm was able to identify users with 96.7 per cent accuracy

Mlle Licious sur Twitter : "Just found out the car I drive from @Ford has an app that enables the car’s location to be tracked. There are good reasons I might not want someone else who drives the car to know my location. Dealership laughed at my privacy concerns. This just seems wrong to me."

Just found out the car I drive from @Ford has an app that enables the car’s location to be tracked. There are good reasons I might not want someone else who drives the car to know my location. Dealership laughed at my privacy concerns. This just seems wrong to me.

tridactyl/readme.md at master · cmcaine/tridactyl · GitHub

tridactyl - Implementing Vimperator/Pentadactyl as a WebExtension.

Goodbye - CopperheadOS
HERE. Maps for Life.
NSA Prism program taps in to user data of Apple, Google and others | US news | The Guardian

• Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook• Companies deny any knowledge of program in operation since 2007

Facebook labels Russian users as ‘interested in treason’ | Technology | The Guardian

Firm removes category, which affected 65,000 people, from ad tools, following safety fears

Facebook changes settings after outing members of a medical support group - The Verge

Membership in closed groups was easily accessible before the change

Wire Chat App's SAME ORIGIN POLICY restrictions do not allow 3rd parties to build on top of its open source code · Issue #10 · caura/wire · GitHub

Documenting here Wire's restrictions on CORS(Cross-Origin Resource Sharing). Without this change, building on top of Wire's open source project is not an option. This is a continuation of g...

Russia: Move to block Telegram the latest blow in government assault on freedom of expression online | Amnesty International

On Friday, the Tagansky District Court in Moscow is expected to rule on a request by Roskomnadzor, the Russian media watchdog, to block Telegram for its refusal to provide the Federal Security Service (FSB) with backdoor access to encrypted messages.

Have the Tech Giants Grown Too Powerful? That’s an Easy One - The New York Times

Tech companies have changed the world by building answers to obvious questions — but now the obvious, pressing questions are about them.

How Smart TVs in Millions of U.S. Homes Track More Than What’s On Tonight - The New York Times

Samba TV, which has deals to put its software on sets made by about a dozen TV brands, uses viewing data to make personalized show recommendations. But that’s not the big draw for advertisers.

Telegram temporarily removed from Apple’s App Store due to ‘inappropriate content’ - The Verge

Apple has removed Telegram’s official app from its iOS App Store. The app disappeared yesterday, shortly after Telegram launched a rewritten Telegram X app for Android. Telegram X is currently in...

Emails Show How Amazon is Selling Facial Recognition System to Law Enforcement | ACLU of Northern CA

Today the American Civil Liberties Union Foundations of California released emails between Amazon employees and local law enforcement revealing how the company has been pushing its facial re

Un indice de réparabilité des produits mis en place en janvier 2020

Contre l'obsolescence programmée

Gmail : des développeurs accèdent à l’intégralité des emails

Le passe-droit abusif accordé par Google

Des quiz Facebook compromettent les données de 120 millions de membres

La faille de sécurité de l'application Nametests

Evaluating the privacy implications of a canvas fingerprinting countermeasure

Because of their side effects, browser fingerprinting countermeasures may have a negative impact on users privacy. In this post we look more in details at Canvas Defender, a canvas fingerprinting countermeasure.

Samsung phones are spontaneously texting users’ photos to random contacts without their permission - The Verge

Protect the nudes

Facebook relaxed its rules to give these 61 companies special access to user data

Facebook told US lawmakers that while it imposed new data-sharing restrictions on most app developers in May 2015, 61 companies received a special 'one-time' extension.

Troy Hunt: Here's Why Your Static Website Needs HTTPS

It was Jan last year that I suggested HTTPS adoption had passed the "tipping point", that is, it had passed the moment of critical mass and as I said at the time, "will very shortly become the norm". Since that time, the percentage of web pages

Google: Security Keys Neutralized Employee Phishing — Krebs on Security
Security Begins at the Home Router
3ème édition du label Territoire Numérique Libre : participez ! - adullact.org
Masq, le service sur lequel mise le moteur de recherche français Qwant pour décoller
Dans la Silicon Valley, les géants du Web craignent la fronde de leurs propres employés
Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records | WIRED
En vrac du jeudi - Standblog
Données personnelles : Facebook, Google et Microsoft accusés de « manipuler » les utilisateurs
Les «dark patterns»: comment les technologies nous manipulent
Nos smartphones peuvent envoyer des captures d'écran à notre insu - L'Express L'Expansion
Chrome, Firefox pull very unstylish Stylish invasive browser plugin • The Register
This popular Facebook app publicly exposed your data for years
En Vrac du vendredi - Standblog
France Télévisions passe ses équipes sous Qwant - Next INpact
Polar suspend son service Explorer, bien trop bavard sur des lieux et personnes sensibles

Utiliser une montre connectée pour suivre ses performances physiques n'est parfois pas sans conséquence sur sa vie privée. Sur Polar Explorer, il était encore récemment possible de remonter jusqu'à l'adresse personnelle de personnes s'entrainant dans des lieux réputés sensibles. Une faille est aussi évoquée, mais Polar réfute.

Bugs in Samsung IoT Hub Leave Smart Home Open To Attack | The first stop for security news | Threatpost

Researchers found 20 flaws in Samsung’s SmartThings Hub controller - opening up supported third-party smart home devices to attack.

Amazon’s Face Recognition Falsely Matched 28 Members of Congress With Mugshots | American Civil Liberties Union

Amazon’s face surveillance technology is the target of growing opposition nationwide, and today, there are 28 more causes for concern. In a test the ACLU recently conducted of the facial recognition tool, called “Rekognition,” the software incorrectly matched 28 members of Congress, identifying them as other people who have been arrested for a crime. The members of Congress who were falsely matched with the mugshot database we used in the test include Republicans and Democrats, men and women, and legislators of all ages, from all across the country.

Un rapport prouve l’inefficacité de la vidéosurveillance | BUG BROTHER

Un rapport prouve l’inefficacité de la vidéosurveillance

Nothing to Hide: The False Tradeoff Between Privacy and Security - Daniel J. Solove - Google Livres

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. -- David Cole

Facebook to publish data on Irish abortion referendum ads | Technology | The Guardian

Social media company to provide details of spending on ads targeting Irish voters

Droppers Is How Android Malware Keeps Sneaking Into the Play Store

For the past year, Android malware authors have been increasingly relying on a solid trick for bypassing Google's security scans and sneaking malicious apps into the official Play Store.

“Who cares, I have nothing to hide” — Why the popular response to online privacy is so flawed

Would you publish your passwords?

Bruxelles condamne Google à payer 4,34 milliards d'euros d'amende

La Commission européenne frappe fort

Google Maps devient payant pour les professionnels

Ouf, rien ne change pour les particuliers

Nothing to hide argument - Wikipedia
Rien à cacher (argument) — Wikipédia
How Much Money Facebook Gets From Selling Your Data

Mark Zuckerberg is making bank on your information.

Why the Girl Scouts Are Learning to Pick Locks and Hack Computers

Forget cookies. America's Girl Scouts are learning to pick locks and hack computers as an inside track toward careers in science and tec

GPS can spy on you, even when you turn it off

ATM skimming is on the rise and getting more sophisticated.

Photopea | Online Image Editor

Open and edit PSD, XCF, Sketch (Photoshop, Gimp and Sketch) or any other image files. Inspect PSD and Sketch files. Convert Sketch to PSD. Apply photo effects and filters. A perfect alternative to Photoshop or Gimp.

Un jeune libriste part à l’asso des mauvaises habitudes – Framablog
Seven Months, No Facebook

Quitting Facebook, and the hope of a new, socially conscious, open-source social network for good.

Facebook lets advertisers target users based on sensitive interests | Technology | The Guardian

Social network categorises users based on potentially sensitive interests such as Islam or homosexuality

Journal de jbelien | Why use OpenStreetMap instead of Google Maps ? | OpenStreetMap

OpenStreetMap is a map of the world, created by people like you and free to use under an open license.

Facebook : une nouvelle faille dévoile des données de groupes privés

2018, l'année de la fuite

Wire server code now 100% open source — the journey continues

Earlier this year, we started open sourcing Wire server code under the AGPL license. Today, the code necessary to run Wire servers is…

Apple is sharing your face with apps. That’s a new privacy worry. - The Washington Post
Edward Snowden sur Twitter : "Many don't seem to understand why I object to @Telegram having unsafe, censorable public channels in an app that is promoted as a secure messenger. Some presumed I just don't understand how channels work. So let's talk about it:"

Many don't seem to understand why I object to @Telegram having unsafe, censorable public channels in an app that is promoted as a secure messenger. Some presumed I just don't understand how channels work. So let's talk about it

Battling Fake Accounts, Twitter to Slash Millions of Followers - The New York Times

Twitter will begin removing tens of millions of suspicious accounts from follower numbers, signaling a major new effort to fight fraud and restore trust on the platform.

Framasoft réussit le financement participatif de PeerTube

Plus de 50 000 € pour le YouTube décentralisé

200,000,000 Monthly Active Users
My favorite apps on F-Droid - [Quaap.com]

I often recommend F-Droid to my Android-using friends. F-Droid is an alternative app store which contains only Free and Open Source Software (FOSS). It's great because the apps are almost all not evil. Did you know that a flashlight app doesn't need access to your contacts, location, and pictures? Did you know that every app doesn't need to serve you ads?

How Smart TVs in Millions of U.S. Homes Track More Than What’s On Tonight - The New York Times

Samba TV, which has deals to put its software on sets made by about a dozen TV brands, uses viewing data to make personalized show recommendations. But that’s not the big draw for advertisers.

Tinder renforce sa sécurité : entre chiffrement et "swipes" modifiés

Pas de chantage en cas de piratage

Firefox Monitor, un futur outil de sécurité très pratique

Le navigateur signalera les comptes compromis

Google De-lists AntiPolygraph.org on Key Search Terms – AntiPolygraph.org News
"Stylish" browser extension steals all your internet history | Robert Heaton

Before it became a covert surveillance tool disguised as an outstanding browser extension, Stylish really was an outstanding browser extension. It bestowed upon its users nothing less than the power to change the appearance of the internet. Its extensive bank of user-made skins gave bright websites a dark background, undid disliked UI changes, and added manga pictures to everything that wasn’t a manga picture already. I spent many wonderful hours in its simple CSS editor, hiding the distracting parts of the web whilst unknowingly being spied on. Facebook news feed...

How a Hacker Proved Cops Used a Secret Government Phone Tracker to Find Him - POLITICO Magazine

And how it might change what cops can do with our smartphones.