New revelations about the NSA show that the agency has sophisticated surveillance gadgets including a USB stick that can eavesdrop. Since the spies also have custom BIOS versions for PCs, the question is raised: is Android immune?
Washington Post: 5 billion cellphone location records collected daily by the NSA
The moral and political aspects of state-level spying will be debated for years to come, but an interesting side-effect of the NSA's actions is that new business is being created specifically to protect people against spies. The question is, are consumers ready to pay for them?
Storm brewing as security experts reckon that Google knows nearly every Wi-Fi password on the planet
Because of Android's "Back up my data" service, Google knows the passwords to all the Wi-Fi networks you access and the NSA can get at that data too. The simplest option right now is to de-activate the service, but how many users will bother?
Google starts automatically encrypting data stored using its Cloud Storage service
Google has started encrypting the all the data written to disk via its Google Cloud Storage service, however the keys are automatically managed by Google making it irrelevant if Google was forced by law to hand of the data and keys,
Google adds seven new security features to Android
Android 4.3 Jelly Bean includes a variety of internal changes that make it more difficult for hackers (and the NSA) to exploit security vulnerabilities. Plus Google is rolling out its find-my-phone service and has added a malware scanner to the Google Play Services.
The USA Prism Plus app makes sure the NSA is watching
The app will take pictures from your mobile device, automatically, and send them to the NSA twitter account. That’s right, all you have to do is download the app and you’re on your way to being a helpful citizen.
Google experimenting with server-side encryption for Drive
Android contains code written by the NSA, but there’s nothing nefarious about it. NSA's code contributions are publicly accessible, which makes it hard, if not impossible, to insert a covert vulnerability.