“Media multitasking is becoming more prevalent in our lives today and there is increasing concern about its impacts on our cognition and social-emotional well-being,” Sussex neuroscientist Kep lee Loh said. “Our study was the first to reveal links between media multitasking and brain structure.” Loh says that more study is required to determine if the brain is changing behavior or if behavior is changing the brain — but if it’s the latter, the work could support previous studies that suggest that heavy media multitasking can make users more susceptible to depression, anxiety and distraction.
1. ………………although both Apple and Google must give out cloud storage data upon request (from FBI)
2. Zdziarski says that “this was a great start to better securing iOS 8, but not everything has been completely protected.”
3. He claims that services used by iTunes and XCode to exchange information between Apple mobile devices and computers or other handhelds while the Apple device is locked down, are still operational and allow detectives to “dump” users’ photos, videos, recordings, iTunes media, and all third-party application data using existing commercial forensics tools. The researcher did this for himself using “private forensics tools” from his locked iPhone running iOS 8.
4. If one shuts their iPhone while going through security, customs and the like, officers won’t be able to exploit this loophole.
NBC has recently predicted that in 2017, all of America will be tagged with microchips. They will be implanted to help identify individuals immediately. According to the report, the technology is used to answer one question, “Am I who I say I am?”
“On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode. Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”
In addition to what’s been fixed, I also outlined some things that haven’t yet been. What’s left are services that iTunes (and Xcode) talk to in order to exchange information with third party applications, or access your media folder. Apple wants you to be able access your photos and other information from your desktop while the phone is locked – for ease of use. This, unfortunately, also opens up the capability for law enforcement to also use this mechanism to dump:
- Your camera reel, videos, and recordings
- Podcasts, Books, and other iTunes media
- All third party application data
Fortunately, there are some precautions you can take to ensure your privacy. One small trick is to shut down your iPhone whenever you go through airport security or customs. Why? Because Apple has included a kill switch that prevents your pairing records from being able to unlock your iPhone if it’s been shut down. The pairing record vulnerability only works if you’ve used your phone since it was last rebooted. Secondly, make sure you’re using strong encryption on your desktop / laptops, and make sure your computers are all shut down when not in use… especially when going through airport security. There are a number of forensics tools capable of dumping the memory (and therefore, encryption keys) of your encrypted disk if you’ve left your computer asleep or in hibernate mode. Shut it down.
Read more: http://www.zdziarski.com/blog/?p=3875