For several years now prosecutors have requested that full restrictions (i.e not be able to read books, newspapers or watch tv, listen to radio and so on) should be in force for most people in jail, at least that is the trend here in Sweden so it would not be a stretch to imagine that the same is happening in Denmark.
Most people never notice this since it only affects "dirty criminals" anyways, but sometimes one or two members of society is put in jail and headlines like this occurs since people for once can see the harsh reality of the judicial system.
I just looked at the source for Apport in Ubuntu and it does encrypt the crash reports when they are sent to Launchpad since they use HTTPS.
return 'https://bugs.%s/%s/+source/%s/+filebug/%s?%s'
Granted, the last time I checked linux makes the memory space of every process for any uid available to any other process running under the same uid (unless you're using SELinux). It is just that big unixy trust-everything-local attitude.
Which mainstream OS does this differently? AFAIK this is the way it works in Windows and OSX aswell, unsure about the BSDs though but I wouldn't be surprised if they also do it like this (it would be a pain to use things like strace or shared memory otherwise and the MMU tables would be quite big)
According to the article in The Guardian the attack was supposed to be in the guise of a firmware patch and not a looming vulnerability in the BIOS:
"Among the more eye-opening claims made by NSA is that it detected what CBS terms the “BIOS Plot” – an attempt by China to launch malicious code in the guise of a firmware update that would have targeted computers apparently linked to the US financial system, rendering them pieces of junk."
Which of course makes this even more ridiculous, because how could the NSA thwart a fake firmware upgrade from happening by "closing a vulnerability"
Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin