It’s time to replace insecure GSM networks

Transparent Telematics, UVST No Comments »

Read the rest of this entry »

Carrier IQ, l’FBI e la necessità di una Telematica Trasparente

UVST No Comments »

Read the rest of this entry »

Carrier IQ proves (again) the need for completely open mobile phones

UVST No Comments »

According to the Register and many other sources online, an Android app developer has reported conclusive proof that millions of smartphones are secretly monitoring the key presses, geographic locations, and received messages of its users. In a YouTube video posted on Monday, Trevor Eckhart showed how software from a Silicon Valley company known as Carrier IQ recorded in real time the keys he pressed into a stock EVO handset, which he had reset to factory settings just prior to the demonstration.

The only way to avoid such attacks to one’s privacy are mobile phones are systems that are built from the ground up to provide truly private conversations and to be completely transparent to their end users as the TFF Transparent Telematics system.

Telex, an anti-censorship technology and a possible component of UVT

Transparent Telematics, TFF, UVST No Comments »

Read the rest of this entry »

GPLv3 is great to promote open innovation, but not enough to protect our constitutional communication rights

TFF, UVST No Comments »

(this is a summary of some of the reasons why TFF Founder Rufo Guerreschi and others started the UVT project)

Read the rest of this entry »

A very short comparison between the TFF UVT project and the Freedom Box

The Freedom Box, TFF, UVST No Comments »

Read the rest of this entry »

Transparent Telematics

Transparent Telematics, UVST No Comments »

Transparent Telematics

A research project for the realization of software, hardware and processes that enable ordinary non-technical citizens to affordable access to any internet-based telematic communication with pretty high levels of privacy and security that are fully user-verifiable.

It is not enough for citizens to be told they have certain rights as users of a given telematic service, under a license (such as FLOSS), legislation (such as national and global privacy protection regulations) or a contract with the service provider (such as Terms of Use).

What is the use of privacy laws and rights if a single easy-to-deploy criminal activity can involve their continuous breach through the monitoring and analyzing of the telematic communications of millions, and the detection of such crime is very very difficult and unlikely to happen (or pardoned by presidential decree)?

We believe that to be the case today. We believe that such huge loss of privacy is not an unavoidable price to pay for the comforts of information technology innovations. It is based on the type of software running in current mainstream electronic communication devices and services.

And such software can be substituted, modified directly by users and providers, and indirectly by government through legislations.

Two solutions are therefore available:

  1. Convince legislative body to enact for reaching rules, detection and enforcement processes, that effectively enable all citizens to affordable access to most telematics devices and services with levels of security that are very very high and fully user-verifiable.
  2. A group of citizens, organizations or even a municipality could develop and deploy “user-verifiable telematics” for its members.

WP Theme & Icons by N.Design Studio
Entries RSS Comments RSS Log in