<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Security trends for 2013</title>
	<atom:link href="http://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 09:03:13 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Website</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-294775</link>
		<dc:creator><![CDATA[Website]]></dc:creator>
		<pubDate>Sat, 15 Mar 2014 22:33:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-294775</guid>
		<description><![CDATA[Melontek provides Exchange Hosting at reasonable costs.]]></description>
		<content:encoded><![CDATA[<p>Melontek provides Exchange Hosting at reasonable costs.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: apc</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-96125</link>
		<dc:creator><![CDATA[apc]]></dc:creator>
		<pubDate>Fri, 07 Feb 2014 16:48:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-96125</guid>
		<description><![CDATA[Aw, this was an incredibly nice post. Taking a few minutes and actual effort to produce a good article… but what can I say… I put things off 
a whole lot and don&#039;t seem to get nearly anything done.]]></description>
		<content:encoded><![CDATA[<p>Aw, this was an incredibly nice post. Taking a few minutes and actual effort to produce a good article… but what can I say… I put things off<br />
a whole lot and don&#8217;t seem to get nearly anything done.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: free pokebank subscription</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31509</link>
		<dc:creator><![CDATA[free pokebank subscription]]></dc:creator>
		<pubDate>Sat, 11 Jan 2014 19:47:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31509</guid>
		<description><![CDATA[Wow, amazing weblog format! How lengthy have you been running a blog for? you make running a blog look easy. The overall look of your website is great, let alone the content material!]]></description>
		<content:encoded><![CDATA[<p>Wow, amazing weblog format! How lengthy have you been running a blog for? you make running a blog look easy. The overall look of your website is great, let alone the content material!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Keeping Your Data Private From the NSA &#171; Tomi Engdahl&#8217;s ePanorama blog</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31508</link>
		<dc:creator><![CDATA[Keeping Your Data Private From the NSA &#171; Tomi Engdahl&#8217;s ePanorama blog]]></dc:creator>
		<pubDate>Wed, 08 Jan 2014 06:49:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31508</guid>
		<description><![CDATA[[...] over the NSA&#8217;s controversial PRISM surveillance program (check the latest comments on my Security trends for 2013 article) after top-secret slides detailing the massive electronic surveillance programme were [...] ]]></description>
		<content:encoded><![CDATA[<p>[...] over the NSA&#8217;s controversial PRISM surveillance program (check the latest comments on my Security trends for 2013 article) after top-secret slides detailing the massive electronic surveillance programme were [...] </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31507</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 10:27:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31507</guid>
		<description><![CDATA[Editorial
Edward Snowden, Whistle-Blower
http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html?pagewanted=all&amp;_r=0]]></description>
		<content:encoded><![CDATA[<p>Editorial<br />
Edward Snowden, Whistle-Blower<br />
<a href="http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html?pagewanted=all&#038;_r=0" rel="nofollow">http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html?pagewanted=all&#038;_r=0</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31506</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 08:55:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31506</guid>
		<description><![CDATA[Dual_EC_DRBG Backdoor: a Proof of Concept
http://it.slashdot.org/story/14/01/01/1830238/dualecdrbg-backdoor-a-proof-of-concept

&quot;Dual_EC_DRBG is an pseudo-random number generator promoted by NIST in NIST SP 800-90A and created by NSA. This algorithm is problematic because it has been made mandatory by the FIPS norm (and should be implemented in every FIPS approved software)&quot;

&quot; It is quite obvious in light of the recent revelations from Snowden that this weakness was introduced by purpose by the NSA. It is very elegant and leaks its complete internal state in only 32 bytes of output&quot;]]></description>
		<content:encoded><![CDATA[<p>Dual_EC_DRBG Backdoor: a Proof of Concept<br />
<a href="http://it.slashdot.org/story/14/01/01/1830238/dualecdrbg-backdoor-a-proof-of-concept" rel="nofollow">http://it.slashdot.org/story/14/01/01/1830238/dualecdrbg-backdoor-a-proof-of-concept</a></p>
<p>&#8220;Dual_EC_DRBG is an pseudo-random number generator promoted by NIST in NIST SP 800-90A and created by NSA. This algorithm is problematic because it has been made mandatory by the FIPS norm (and should be implemented in every FIPS approved software)&#8221;</p>
<p>&#8221; It is quite obvious in light of the recent revelations from Snowden that this weakness was introduced by purpose by the NSA. It is very elegant and leaks its complete internal state in only 32 bytes of output&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31505</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 08:50:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31505</guid>
		<description><![CDATA[How the NSA hacks PCs, phones, routers, hard disks &#039;at speed of light&#039;: Spy tech catalog leaks
It&#039;s not as bad as you thought - it&#039;s much worse
http://www.theregister.co.uk/2013/12/31/nsa_weapons_catalogue_promises_pwnage_at_the_speed_of_light/]]></description>
		<content:encoded><![CDATA[<p>How the NSA hacks PCs, phones, routers, hard disks &#8216;at speed of light&#8217;: Spy tech catalog leaks<br />
It&#8217;s not as bad as you thought &#8211; it&#8217;s much worse<br />
<a href="http://www.theregister.co.uk/2013/12/31/nsa_weapons_catalogue_promises_pwnage_at_the_speed_of_light/" rel="nofollow">http://www.theregister.co.uk/2013/12/31/nsa_weapons_catalogue_promises_pwnage_at_the_speed_of_light/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31504</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 08:49:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31504</guid>
		<description><![CDATA[Skype social media platforms hacked by &#039;Syrian Electronic Army&#039;
http://www.bbc.co.uk/news/technology-25572771

The social media platforms of Skype have been hacked by a group claiming to be the Syrian Electronic Army (SEA).

The group posted anti-surveillance messages, including a message telling people not to use email services of Microsoft, the owner of Skype.

It claimed &quot;they are monitoring your accounts and selling the data to the governments&quot;.]]></description>
		<content:encoded><![CDATA[<p>Skype social media platforms hacked by &#8216;Syrian Electronic Army&#8217;<br />
<a href="http://www.bbc.co.uk/news/technology-25572771" rel="nofollow">http://www.bbc.co.uk/news/technology-25572771</a></p>
<p>The social media platforms of Skype have been hacked by a group claiming to be the Syrian Electronic Army (SEA).</p>
<p>The group posted anti-surveillance messages, including a message telling people not to use email services of Microsoft, the owner of Skype.</p>
<p>It claimed &#8220;they are monitoring your accounts and selling the data to the governments&#8221;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31503</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 08:43:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31503</guid>
		<description><![CDATA[Orange to take legal action after report of spying via its cable
http://www.reuters.com/article/2013/12/30/us-usa-security-orange-idUSBRE9BT0MN20131230

 Orange (ORAN.PA) is preparing its legal response to a report alleging the U.S. National Security Agency (NSA) accessed customers&#039; data transmitted by a submarine cable partly used by the French telecoms operator.

German website Spiegel Online said it had seen documents showing the NSA had tapped telecoms data from the cable running from Marseille to North Africa and Asia.

Orange uses the submarine cable along with 13 other telecoms companies, which collectively operate the cable.]]></description>
		<content:encoded><![CDATA[<p>Orange to take legal action after report of spying via its cable<br />
<a href="http://www.reuters.com/article/2013/12/30/us-usa-security-orange-idUSBRE9BT0MN20131230" rel="nofollow">http://www.reuters.com/article/2013/12/30/us-usa-security-orange-idUSBRE9BT0MN20131230</a></p>
<p> Orange (ORAN.PA) is preparing its legal response to a report alleging the U.S. National Security Agency (NSA) accessed customers&#8217; data transmitted by a submarine cable partly used by the French telecoms operator.</p>
<p>German website Spiegel Online said it had seen documents showing the NSA had tapped telecoms data from the cable running from Marseille to North Africa and Asia.</p>
<p>Orange uses the submarine cable along with 13 other telecoms companies, which collectively operate the cable.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/01/14/security-trends-for-2013/comment-page-39/#comment-31502</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 07:37:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15311#comment-31502</guid>
		<description><![CDATA[Apple Denies Working with NSA on iPhone Backdoor
http://allthingsd.com/20131231/apple-says-it-is-unaware-of-nsas-iphone-backdoor/

Apple just responded to newly released documents claiming that the U.S. National Security Agency has a method for gaining backdoor access to its iPhone. It says it has never worked with the agency, and is unaware of the alleged program targeting the iPhone known as DROPOUTJEEP.

The program was disclosed in a trove of documents leaked yesterday and shared by the security researcher Jacob Appelbaum and the German news magazine Der Spiegel.]]></description>
		<content:encoded><![CDATA[<p>Apple Denies Working with NSA on iPhone Backdoor<br />
<a href="http://allthingsd.com/20131231/apple-says-it-is-unaware-of-nsas-iphone-backdoor/" rel="nofollow">http://allthingsd.com/20131231/apple-says-it-is-unaware-of-nsas-iphone-backdoor/</a></p>
<p>Apple just responded to newly released documents claiming that the U.S. National Security Agency has a method for gaining backdoor access to its iPhone. It says it has never worked with the agency, and is unaware of the alleged program targeting the iPhone known as DROPOUTJEEP.</p>
<p>The program was disclosed in a trove of documents leaked yesterday and shared by the security researcher Jacob Appelbaum and the German news magazine Der Spiegel.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
