{"id":1157,"date":"2015-02-23T14:44:20","date_gmt":"2015-02-23T14:44:20","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/berkmannews\/?p=1157"},"modified":"2015-02-23T14:44:20","modified_gmt":"2015-02-23T14:44:20","slug":"stolen-sim-card-keys-could-be-powerful-spy-tool-business-insider-20-february-2015","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/2015\/02\/23\/stolen-sim-card-keys-could-be-powerful-spy-tool-business-insider-20-february-2015\/","title":{"rendered":"Stolen SIM card keys could be powerful spy tool &#8211; Business Insider, 20 February 2015"},"content":{"rendered":"<p>&#8220;This is a huge deal,&#8221; said Bruce Schneier, a cryptographer who is chief technology officer at the security firm Resilient Systems, and a fellow at Harvard&#8217;s Berkman Center.<\/p>\n<p>&#8220;The things that are the most egregious are when the NSA hacks everybody to get a few people,&#8221; Schneier told AFP.<\/p>\n<p>&#8220;They&#8217;re getting encryption keys of everybody, including you and me. It&#8217;s a scorched earth policy.&#8221;<\/p>\n<p>via <a href=\"http:\/\/www.businessinsider.com\/afp-stolen-sim-card-keys-could-be-powerful-spy-tool-2015-2\">Stolen SIM card keys could be powerful spy tool &#8211; Business Insider<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;This is a huge deal,&#8221; said Bruce Schneier, a cryptographer who is chief technology officer at the security firm Resilient Systems, and a fellow at Harvard&#8217;s Berkman Center. &#8220;The things that are the most egregious are when the NSA hacks &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/berkmannews\/2015\/02\/23\/stolen-sim-card-keys-could-be-powerful-spy-tool-business-insider-20-february-2015\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6502,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1157","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/users\/6502"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":1,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":1158,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/1157\/revisions\/1158"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}