This week unfolded with significant tech and security developments in the US. At the beginning of the week, TikTok faced a temporary ban as its access to US users was halted. This occurred ahead of a deadline that mandated Apple and Google to remove the app from their stores. However, by midday Sunday, TikTok access was restored after President Trump signed an executive order delaying the ban by 75 days.
On Tuesday, Trump also pardoned Ross Ulbricht, the creator of the Silk Road, a notorious dark-web market involved in illegal activities. Ulbricht had been imprisoned for over 11 years following his arrest in 2013. His pardon is thought to be influenced by his supporters in the libertarian cryptocurrency community.
In a broader discussion on cybersecurity, Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency, offered insights into the evolving cyber threats facing the US and the agency’s role moving forward. Meanwhile, researchers disclosed vulnerabilities in Subaru’s tracking systems, which unintentionally exposed the precise locations of vehicles for nearly a year’s worth of data. Although patched, there remain concerns about employees accessing sensitive driver location information.
In legal news, a judge in New York determined that the FBI’s practice of conducting warrantless searches on US citizens’ data under Section 702 of the Foreign Intelligence Surveillance Act was unconstitutional. This ruling underscores the necessity of obtaining a warrant before accessing private communications, reinforcing privacy rights.
In a separate incident, a significant flaw was reported in Cloudflare’s system, which could potentially expose app users’ rough locations. Following the identification of this issue by a security researcher, Cloudflare acknowledged the problem and claimed to have implemented a fix.
Lastly, the Trump administration disbanded the Cyber Safety Review Board, which was investigating Chinese hacking through the Salt Typhoon group, leading to concerns over national cybersecurity defenses and oversight.
For more on these stories and details surrounding them, see the following links: