Facebook Chokes NSO Group: Will NSO Group Tap Out?

April 27, 2020

Facebook has become a digital world unto itself. From the insouciance demonstrated during the Cambridge Analytica matter to the cheerful attempt to create a global currency, Facebook has was some might call digital schnorrer. Take data and do what’s necessary to get as much as possible for nothing. Pay for data? Nah. Testify so elder statesmen can understand? Nah. Make it easy for consumers to manage their free Facebook accounts? Nah.

These are fascinating characteristics of a social media company eager to bring people together. But the company has another characteristic, and it is one that certainly surprised the hapless researchers at DarkCyber.

Cyberscoop reported that the Facebook legal eagles are doubling down on the bet that they can squeeze the NSO Group. Is it for cash? Is it for power? Is it to make darned clear that Facebook is more powerful than a company which develops specialized software for government agencies? DarkCyber doesn’t know, but it is clear, if the information in “Facebook: NSO Group Used U.S.-Based Servers in Operations against WhatsApp” is accurate, Facebook is ready to rumble.

The write up states:

In court documents, Facebook-owned WhatsApp claims NSO Group used a server run by Los Angeles-based hosting provider QuadraNet “more than 700 times during the attack to direct NSO’s malware to WhatsApp user devices in April and May 2019.”

The article points out that:

The filing is a blow to NSO Group’s claims that its signature product, Pegasus, isn’t capable of running operations in the United States.

What’s remarkable is that the lawsuit has become increasingly high profile. Dust ups related to what DarkCyber calls intelware and third parties usually keep a lower profile. A good example is the efforts expended to keep the lid on the interesting litigation between Analyst’s Notebook and Palantir Technologies. This matter, if mentioned at a conference, evokes the question, “What? When?”

The Facebook NSO Group dispute is getting media traction. Cyberscoop includes the full 35 page document via link in its article.

DarkCyber’s view is:

  1. There are some ironic factors in Facebook’s pursuit of this matter; for example, allegedly Facebook wanted to license NSO Group’s Pegasus. Is Facebook a bride left at the alter?
  2. Is Facebook trying to deflect attention from its own data policies? ( It is helpful to keep in mind that Facebook has to pay $5 billion for its Cambridge Analytica adventure.)
  3. Facebook’s own behaviors have been troubling to some individuals due to its own privacy and data actions; for example, exposing friends of friends without oversight to Facebook partners.
  4. Facebook’s shift from the privacy procedures users assumed were in place to a more Wild West approach to data as the social media firm sought to expand its revenues and user base.

Intelware companies are not new, but they are small compared to today’s Facebook. Intelware companies are like some flowers which die in direct sunlight. A special climate controlled environment is necessary for survival.

Facebook may be waking up to the fact that certain government agencies want access to Facebook data. Specialized firms, not just NSO Group, have the ability to work around, under, and through whatever shields Facebook puts in place to keep Facebook data for Facebook. And when Facebook does play nice with government agencies, Facebook plays by its own rules and brings the ball and the referee to the game.

DarkCyber’s perception is that Facebook was and is offended by what it thinks NSO did or does. DarkCyber assumes that Facebook wants it own NSO Group-style capabilities and is defending itself in order to be the Facebook everyone knows and loves.

With the Facebook – NSO Group matter moving forward, the path each company, the lawyers, and possibly government officials will explore will be interesting to chart.

Plus who knows whether Facebook is fighting hard to protect its customers or fighting another battle.

Also, NSO Group may, like a WWE star, have a masked helper waiting in the wings eager to join the fray.

Stephen E Arnold, April 27, 2020

Palantir Technologies: Getting the NSO Treatment

April 24, 2020

Rupert Murdoch’s real news outfit published “Data Firm Palantir Saw Crisis Coming, Still Faces Pain.” If you want the online version, you will have to pay. The dead tree version of the story is on B5 of the April 22, 2020, edition of the WSJ which is sometimes delivered to me in rural Kentucky.

Enough about the real news outfit. I want to run down some of the assertions made about Palantir. Assertions, I wish to add, from anonymous sources or people close to the vendor of intelware, not verifiable sources.

I highlighted these factoids from the article:

First, Palantir does a lousy job of sharing its financial information. How does the Wall Street Journal get its revenue estimate from 2019? How does the WSJ know that $100 million in costs have be removed from the firm’s operating budget? Easy. People “close to the company” and two unnamed “investors.”

Second, Palantir is pulling back from its rumored initial public offering after the November elections. Palantir has pulled back or put off an IPO for many years. But now Covid enters the picture.

Third, Palantir is providing “a single source of truth about the rapidly evolving situation.” The situation is making sense of pandemic data and the individuals who are infected or infecting. This is a contentious issue. High profile publicity like that the NSO Group has experienced is not a sales booster in some cases.

There are some other factoid assertion like rumors in the write up, but I want to address the three points I selected from the WSJ write up.

  1. With regard to sharing its financial data, privately-held companies are not obligated to share financial data. Palantir does, but it may not be the data investors or employees want to see. Palantir is in the secrecy business, and it is tough for specialist firms to tell anyone anything. This is not something unique to Palantir. Write Blackdot for information. Let me know how that goes, please.
  2. The pullback from an IPO is nothing new. Palantir took shape in 2003. Let’s see. That’s almost 17 years ago. If the firm were in a position to crank out those facing IPO documents and go through the stellar Securities & Exchange Commission process and then hit the road to chat up the market makers, Palantir and its big money backers would have volunteered to drive the minivan from meeting to meeting. There’s a reason why the Palantir IPO is unlikely to happen. Hypothetically the company is concerned about revealing data. Another hypothetical is that companies selling policeware and intelware are not loved by some investors. Check out Verint, please. How much information does the company actually provide about its specialized services? Yeah, about as much as Siemens.
  3. Third, Palantir pitches the single source of truth idea. But that’s marketing, and it is not a tagline that makes potential buyers say, “Hey, I get it.” To make a Palantir-type sales takes time. The reason is that there are not as many customers for these specialized products as some people like high-flying investors assume. Palantir is more than 15 years old, and Herzliya, Israel is chock-a-block with start ups that are spry, hungry, and equipped with better-faster-cheaper specialized solutions. The sales problem is baked into the specialized software sector. Not even IBM can keep some cyber intelligence sheep in line. South Africa selected an intelware vendor from Poland, not the once proud nation of Big Blue.

So what?

From DarkCyber’s point of view, the Wall Street Journal could dive into more substantive aspects of Palantir and actually identify where the information originates. Even middle school students have to provide a footnote even if it is to Wikipedia. That may garner a C. But no verifiable sources? That’s nosing into the murky land of failure.

Stephen E Arnold, April 24, 2020

IBM Suffers a Setback in South Africa: Datawalk Stomps on Big Blue

April 21, 2020

IBM Analyst’s Notebook at one time enjoyed near total market dominance for investigative software, what I call policeware. IBM owns Analyst Notebook, and it has a sustainable revenue stream from some governments. Once installed — even though there may be no or very few qualified operators who can use the system — the money continues to roll in. Furthermore, IBM has home-grown technology, and Big Blue has acquired smaller firms with particularly valuable technology; for example, CyberTap.

Maybe not in South Africa? Datawalk has strolled into the country’s key integrator and plopped itself down in the cat-bird seat.

Under the original i2 founders’ leadership, losing South Africa was not in the game plan. IBM may have misplaced the three ring binder containing the basic strategy of i2 Ltd. To make matters worse, IBM could have asked its Watson (right, the super smart technology tackling cancer and breaking its digital ankle in a wild play) about the South African account.

Also, affected are downstream, third party products and services. Analyst’s Notebook has been available for more than two decades. There are training and support professionals like Tovek in Prague; there are add ins; there are enhancements which like Sintelix could be considered an out-and-out replacement. What happened?

If the information reported by ISB News is accurate, a company headquartered in Poland captured the account and the money. The article asserts that a key third party reseller doing business as SSG Group and its partner TechFINIUM (a Datawalk partner in South Africa) have stepped away from IBM and SAS. These are, in the view of DarkCyber, old school solutions.

The Datawalk replacement, according to John Smit, president of SSG Group, allegedly said:

“DataWalk is a powerful solution that will allow us to combine all data in one repository and then conduct detailed investigations. We often use unstructured data that we receive from our partners. DataWalk will provide us with the previously unattainable ability to view this data in the full context of our own databases “

Datawalk is characterized as a solution that is “more suited to current challenges.”

According to the article:

DataWalk (formerly PiLab) is a technological entity that … connects billions of objects from many sources, finding application in forensic analytics in the public and financial sectors, including in the fight against crime (US agencies), scams (insurers) and fraud identification (central administration).

These are aggressive assertions. IBM may well ask Watson or maybe a human involved with Analyst’s Notebook sales, “What happened?”

Stephen E Arnold, April 21, 2020

Intelware/Policeware Vendors Face Tough Choices and More Sales Pressure

April 20, 2020

The wild and crazy reports about the size of the lawful intercept market, the policeware market, and the intelware market may have to do some recalculations. Research and Markets’ is offering a for fee report which explains the $8.8 billion lawful interception market. The problem is that the report was issued in March 2020, and it does not address changes in the financing of intelware and policeware companies nor the impact of the coronavirus matter. You can get more information about the report from this link.

As you know, it is 2020. Global investments have trended down. Estimates range from a few percent to double digits. Now there is news from Israel that the funding structures for high technology companies are not just sagging. The investors are seeking different paths and payoffs.

Post Covid-19, Exits May Seem Like a Distant Dream But Exercising Options May Become Easier” states:

With Israeli tech companies having to cut employees’ salaries by up to 40%, many have turned to repricing stock options as a means of maintaining their talent.

Repricing means that valuations go down.

Gidi Shalom Bendor, founder and CEO of IBI Capital subsidiary S-Cube Financial Consulting, allegedly said:

You can see the valuations of public companies decreasing and can assume private companies are headed the same way,” Shalom Bendor said. Companies that are considering repricing have been around for several years and have a few dozen employees, so even though an exit is not around the corner for them it is still in sight, he explained. “In some cases, these companies have even had acquisition offers made, so options are a substantial issue.

Ayal Shenhav, head of the tech department at Israel-based firm GKH Law Offices, allegedly said:

Pay cuts and the repricing of options go hand in hand.

Let’s step back. What are the implications of repricing, if indeed it becomes a trend that reaches from Israel to Silicon Valley?

First, the long sales cycles for certain specialized software puts more financial pressure on the vendors. Providing access to software is not burdensome. What is expensive is providing the professional support required for proof of concept, training, and system tuning. Larger companies like BAE Systems and Verint will have an advantage over smaller, possibly more flexible alternatives.

Second, the change in compensation is likely to hamper hiring and retaining employees. The work harder, work longer approach in some startups means that the payoffs have to be juicy. Without the tasty cash at the end of a 70 hour work week, the best and brightest may leave the startup and join a more established firm. Thus, innovation can be slowed.

Third, specialized service providers can flourish in regions/countries which operate with a different approach to funding. Stated simply, Chinese intelware and policeware vendors may be able to capture more customers in markets coveted by some Israeli and US companies.

These are major possibilities. Evidence of change can be discerned. In my DarkCyber video for April 14, 2020, I pointed out that Geospark Analytics was doing a podcast. That’s a marketing move of note as was the firm’s publicity about hiring a new female CEO, who was a US Army major, a former SAIC senior manager, and a familiar figure in some government agencies. LookingGlass issues a steady stream of publicity about its webinars. Recorded Future, since its purchase by Insight, has become more vocal in its marketing to the enterprise. The claims of cyber threat vendors about malware, hacks, and stolen data are flowing from companies once content with a zero profile approach to publicity.

Why?

Sales are being made, but according to the DarkCyber research team the deals are taking longer, have less generous terms, and require proofs of concept. Some police departments are particularly artful with proofs of concepts and are able to tap some high value systems for their analysts with repeated proofs of concept.

To sum up, projections about the size of the lawful intercept, intelware, and policeware market will continue to be generated. But insiders know that the market is finite. Governments have to allocate funds, work with planning windows open for months if not a year or more, and then deal with unexpected demands. Example? The spike in coronavirus related fraud, misdirection of relief checks, and growing citizen unrest in some sectors.

Net net: The change in Israel’s financing, the uptick in marketing from what were once invisible firms, and the environment of the pandemic are disruptive factors. No quick resolution is in sight.

Stephen E Arnold, April 21, 2020

Palantir Technologies: Evidence That Making Big Money Comes from a Financial Play, Not a Product

April 12, 2020

DarkCyber spotted an interesting item of information in “Palantir Eyes $1B in Revenue and a Break-Even Year, Setting the Stage for IPO.” Palantir has ingested more than a billion dollars since it was founded in 2003. (That seems to be 17 years!) The article points out that Palantir “will have its first break even year in 2020.” The message is that it takes time and significant investment to generate $1 billion in revenue and break even.

With dozens and dozens of companies chasing the intelware and policeware markets, what’s the likelihood that a start up will be able to generate enough revenue to:

  • Fund customer support
  • Invest in new features and technologies
  • Attract and retain staff
  • Market to sectors that are expensive, time consuming, and difficult to reach?

The answer is that Palantir is an excellent example of how a useful idea can struggle to generate sustainable revenue among customers under severe budget pressure and aware that the “next big thing” can be obtained either on a trial basis or at a low price.

DarkCyber gives Palantir credit for its perseverance, although its methods of obtaining some traction can be considered more than interesting. In fact, in its dealings with the Analyst Notebook file format, interesting does not quite capture the somewhat unusual techniques the firm found appropriate.

When Palantir goes public, will those patient investors reap massive paydays? The investors hope so. The employees hope so. But the lawyers and accountants know they will be paid.

What about the users of the system? DarkCyber does not know. Perhaps the seeing stone will reveal the answer?

Stephen E Arnold, April 12, 2020

NSO: Back in the News Again

April 3, 2020

Let’s assume that the Beeb is on the money. “Coronavirus: Israeli Spyware Firm Pitches to Be Covid 19 Saviors” is a bit of British snark. First, the word “coronavirus” is newsy, and it is clickbait. Second, “Israeli spyware pitches” converts the use of specialized software into a carnival barker’s shout. (One might ask, “Why?” I think I know the answer. The British Cervantes is on the gallop perhaps?)

The point of the story which contains some loaded words like “controversial” is that NSO has technology which can assist governments in gathering useful information about the virus. The write up states after the Beeb explains that Facebook and NSO are in a legal wrestling match:

NSO says its employees will not have access to any data, but its software will work best if a government asks local mobile phone operators to provide the records of every subscriber in the country. Each person known to be infected with Covid-19 could then be tracked, with the people they had met and the places they had visited, even before showing symptoms, plotted on a map.

Scary, ominous, Orwellian, something that British government agencies would never, ever in a million years consider.

The reality is that monitoring a population is happening in quite a few countries. Perhaps even merrie olde Land of the Angles?

A news story is okay. Shading the coverage to advance the agenda “NSO is just not such a fine piece of British wool” is unsettling — possibly more so than specialized service firms’ software.

Stephen E Arnold, April 3, 2020

MiningLamp Technology: Another Palantir?

March 30, 2020

DarkCyber found “China’s Palantir MiningLamp Raises US$300 Million in Funding Round Co-Led by Temasek, Tencent” intriguing. Palantir Technologies, a company providing commercial and government services, has obtained about $2 billion in funding since it was founded in 2003. Furthermore, Palantir in the past 17 years has worked to become the Analyst Notebook and BAE NetReveal for some of its clients. Note that Analyst Notebook was founded in the early 1990s and BAE’s initial intelware products date from a few years later. In short, MiningLamp wants to become:

  1. A company that requires decades to gain momentum
  2. A company that requires billions in funding or the support of a giant industrialized services firm like BAE to survive
  3. Expert lobbying to spark and obtain government contracts
  4. Remain out of the public spotlight while endeavoring to displace products that are long in the tooth.

Does this make sense? Of course, the MiningLamp operation wants to be a global software and services company. The backers of MiningLamp want to have a seat at the table when certain types of projects are planned and executed.

The write up does not point out these rather obvious facts. DarkCyber learned:

Founded in 2014, MiningLamp gained initial success by offering online ad performance evaluations and fraud detection services for advertisers, before expanding the business to industries such as public security, smart cities, finance, logistics, entertainment, retail and manufacturing.

What’s MiningLamp’s technology deliver?

Although not as well known as US equivalent Palantir Technologies, which reportedly contributed to America’s success in hunting down Osama bin Laden, MiningLamp’s data mining software is used to spot crime patterns, track drug dealers and prevent human trafficking.

Plus, the write up points out:

The company’s software enables users to search huge volumes of heterogeneous data – information with a great variety of types and formats – and process that into actionable knowledge and insight using a combination of proprietary data management tools.

The interesting point is that advertising technology leads to a Palantir metaphor. The second fact is that the funding is anchored in Singapore and the allegedly independent company Tencent. There’s no reference to any other funding, including funding from Chinese government entities or fellow travelers. Finally, Singapore has become a hub for many companies engaged in Palantir-like activities. Need a bagel? Singapore has them because there are quite a few foreign nationals who crave this food essential.

Now how much revenue can specialized software companies generate. Analyst Notebook, BAE NetReveal, Recorded Future, and similar firms do generate revenues, but none of these companies bang into glass ceilings and walls. For example, how many government agencies are there that can pay hundreds of thousands of dollars and dedicate personnel to using these intelware systems? Are there other benefits to companies in the intelware business? The market for intelware is tough to move laterally. Talk about intelware methods and customers in non-government sectors, and many of the prospects get really nervous. There are good reasons.

Is MiningLamp another Palantir? Sure, it will require large amounts of cash, lobbyist support, and funding the peculiar and costly intelware marketing puzzle.

There are interesting facets to the MiningLamp effort, but DarkCyber does not think the answer will be found in providing Bluedot-type services or morphing into an outfit like Palantir Technologies. Palantir, DarkCyber recalls, has experienced employee protests, litigation with Analyst Notebook related to reverse engineering the ANB file format, and bureaucratic scuffles with procurement professionals.

Another Palantir? Maybe, maybe not. Those writing checks for $300 million may be surprised at the intelware market’s behavior. Will the Five Eyes sign up for MiningLamp licenses? Maybe, maybe not.

Stephen E Arnold, March 30, 2020

TikTok, TikTok: What Does That Sound Mean?

March 30, 2020

DarkCyber noted “TikTok, a Chinese Soft Power Time Bomb in US Living Rooms.” The SCMP is, of course, an independent, real news outfit. The use of the B work in the headline is not accidental. Maybe it is one of those warnings or messages hidden in plain sight. A digital purloined letter is one possibility.

Zoom, partially backed by investors from China, is another video outfit. “Zoom iOS App Sends Data to Facebook Even If You Don’t Have a Facebook Account” reports that video can be an interesting service to provide.

The SCMP article reports:

Privacy advocates and several US congressmen want to rein in the app over concerns it may censor and monitor content for the Chinese government, and be used for misinformation and election interference. This despite the fact that TikTok keeps its servers outside China and swears it will not hand over user data.

Would a Chinese company ignore a government order? Yeah, well, sure in bizarro world.

Zoom, on the other hand, shares data:

What the company and its privacy policy don’t make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don’t have a Facebook account…

Now a few questions:

  1. What data are sent where?
  2. With Chinese influence in both TikTok and Zoom what information finds its way (directly or indirectly) to Chinese data pools?
  3. Why are video services presumed to be innocent, just for fun services when Amazon, Facebook, Google, and other firms are essentially in the data collection and analysis business?

Yesterday a person with a mostly technical work history asked me why my Zoom account is listed under the name of a couple of my dogs and a defunct cigarette brand?

Now you know. A standalone computer. A separate Internet connection. An alias. A drug store debit card. These make me feel a little bit more secure when DarkCyber has to do a video conference call.

Maybe we will create a 30 second video about Zoom, Chinese influence, and data leakage? That’s good for eight or nine views.

Stephen E Arnold, March 30, 2020

Clearview: More Tradecraft Exposed

March 26, 2020

After years of dancing around the difference between brain dead products like enterprise search, content management, and predictive analytics, anyone can gain insight into the specialized software provided by generally low profile companies. Verint is publicly traded. Do you know what Verint does? Sure, look it up on Bing or Google.

I read with some discomfort “I Got My File From Clearview AI, and It Freaked Me Out.”

Here are some factoids from the write up. Are these true? DarkCyber assumes that everything the team sees on the Internet meets the highest standards of integrity, objectivity, and truthiness. DarkCyber’s comments are in italic:

  1. “Someone really has been monitoring nearly everything you post to the public internet. And they genuinely are doing “something” with it. The someone is Clearview AI. And the something is this: building a detailed profile about you from the photos you post online, making it searchable using only your face, and then selling it to government agencies and police departments who use it to help track you, identify your face in a crowd, and investigate you — even if you’ve been accused of no crime.”
  2. “Clearview AI was founded in 2017. It’s the brainchild of Australian entrepreneur Hoan Ton-That and former political aide Richard Schwartz. For several years, Clearview essentially operated in the shadows.”
  3. “The Times, not usually an institution prone to hyperbole, wrote that Clearview could “end privacy as we know it.” [This statement is a reference to a New York Times intelware article. The New York Times continues to hunt for real news that advances an agenda of “this stuff is terrible, horrible, unconstitutional, pro anything the NYT believes in, etc.”]
  4. “the company [Clearview] scrapes public images from the internet. These can come from news articles, public Facebook posts, social media profiles, or multiple other sources. Clearview has apparently slurped up more than 3 billion of these images.” [The images are those which are available on the Internet and possibly from other sources; for example, commercial content vendors.]
  5. “The images are then clustered together which allows the company to form a detailed, face-linked profile of nearly anyone who has published a picture of themselves online (or has had their face featured in a news story, a company website, a mug shot, or the like).” [This is called enrichment, context, or machine learning indexing and — heaven help DarkCyber — social graphs or semantic relationships. Jargon varies according to fashion trends.]
  6. “Clearview packages this database into an easy-to-query service (originally called Smartcheckr) and sells it to government agencies, police departments, and a handful of private companies….As of early 2020, the company had more than 2,200 customers using its service.” [DarkCyber wants to point out that law enforcement entities are strapped for cash, and many deals are little more than proofs-of-concept. Some departments cycle through policeware and intelware in order to know what the systems do versus what the marketing people say the systems do. Big difference? Yep, yep.]
  7. “Clearview’s clients can upload a photo of an unknown person to the system. This can be from a surveillance camera, an anonymous video posted online, or any other source.”
  8. “In a matter of seconds, Clearview locates the person in its database using only their face. It then provides their complete profile back to the client.”

Now let’s look at what the write up reported that seemed to DarkCyber to be edging closer to “real news.”

This is the report the author obtained:

image

The article reports that the individual who obtained this information from Clearview was surprised. DarkCyber noted this series of statements:

The depth and variety of data that Clearview has gathered on me is staggering. My profile contains, for example, a story published about me in my alma mater’s alumni magazine from 2012, and a follow-up article published a year later. It also includes a profile page from a Python coders’ meet up group that I had forgotten I belonged to, as well as a wide variety of posts from a personal blog my wife and I started just after getting married. The profile contains the URL of my Facebook page, as well as the names of several people with connections to me, including my faculty advisor and a family member (I have redacted their information and images in red prior to publishing my profile here).

The write up includes commentary on the service, its threats to individual privacy, and similar sentiments.

DarkCyber’s observations include:

  • Perhaps universities could include information about applications of math, statistics, and machine learning in their business and other courses? At a lecture DarkCyber gave at the University of Louisville in January 2019, cluelessness among students and faculty was the principal takeaway for the DarkCyber team.
  • Clearview’s technology is not unique, nor is it competitive with the integrated systems available from other specialized software vendors, based on information available to DarkCyber.
  • The summary of what Clearview does captures information that would have been considered classified and may still be considerate classified in some countries.
  • Clearview does not appear to have video capability like other vendors with richer, more sophisticated technology.

Why did DarkCyber experience discomfort? Some information is not — at this time or in the present environment — suitable for wide dissemination. A good actor with technical expertise can become a bad actor because the systems and methods are presented in sufficient detail to enable certain activities. Knowledge is power, but knowledge in the hands of certain individuals can yield unexpected consequences. DarkCyber is old fashioned and plans to stay that way.

Stephen E Arnold, March 26, 2020

Contact Tracing: A Tradecraft Component Released as Open Source Software

March 25, 2020

DarkCyber does not want to beat the drum about keeping some information from finding its way into general circulation. We want to point to “Singapore Government to Make Its Contact Tracing App Freely Available to Developers Worldwide.” The article states:

the Government [of Singapore] will be making the software for its contact-tracing application TraceTogether, which has already been installed by more than 620,000 people, freely available to developers around the world.

With the code in open source, those with some technical skill can develop, enhance, expand, and implement some of the features of TraceTogether.

image

The article points out:

the TraceTogether app can identify people who have been within 2m of coronavirus patients for at least 30 minutes, using wireless Bluetooth technology.

The article includes a how to graphic. The method revealed in the diagram, in the opinion of DarkCyber, seems similar to specialized tools available but in close hold mode for a number of years.

DarkCyber chooses to let the article speak for itself and you, gentle reader, to formulate your own upsides and downsides to the information disclosed by the Straits Times.

Stephen E Arnold, March 25, 2020

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta