Search the Community
Showing results for tags 'nsa'.
-
Hello, After a topic where I asked if Tor can still be considered secure (resounding No from the community), I began to wonder, is anonymity even possible anymore? Really the only way I can think of is using Tails via flash drive on a laptop using wifi in places like coffee shops. Even then I find it doubtful if specifically targeted that it will work. Is anonymity even possible online anymore? What tools/methods would you use to accomplish this? What if you aren't specifically targeted?
- 19 replies
-
Check out these digits: 31A7 0953 D8D5 90BA 1FAB 3776 2F38 98CE DEE9 58CF Facebook now offers the option to encrypt all email notifications sent to you with a public gpg key you set in your profile, and sign all of their emails to you with their public key. These two steps should ensure that; 1. Nobody but you can read the notification emails facebook sends you. 2. You can verify any notification email as coming from facebook, against the current operation key they are using (which will in turn be signed by their primary key) Adding your public key to your profile will also make it show up on your profile. If all of this seems like gibberish to you, the EFF has a pretty good explanation of the technology here: https://ssd.eff.org/en/module/introduction-public-key-cryptography-and-pgp It seems that facebook want to continue in their quest to have all of your data, but make sure nobody else has it. (unless they pay :^) Source: https://www.facebook.com/notes/1611941762379302 -----BEGIN PGP MESSAGE----- Version: GnuPG v1 owF1VgtwVNUZToKvbENrqQ3FR+eIw2ua3c0mwG6SOk7eiSgEs7Ri1PbsvWf3Hvbu PTf3nJvlgjJWY4PjWMBHx8JUbRAHRcQxIh0LClMQaKviCLZqKYw1UhWiFqLDY6D/ OXd32bQ0szPZe8/5//P93//939mV48eVlJV+++GWed8ER0ZK//x5omSB+eJVzQbR 0oi5AgmDcIJ0mqKC16PaSGMUVdfNqkUtsZZZqK66qRFF2hqbUG00OhvVtNXGUF2s uRW1tLbWoVmx5rZAINBDM6k7DCHs+nCYhuDBdUIay4RvriZ1TQkvZFupnrDcEwi0 YY0kGEsji2URSyaJwyUAxGxBmYUEQ8TSHM8WCJsmIhlMTdgqaJJqWO7giBNLyH0e c1GWCgNhZLsJk2ooZadQmnhqhROBqCW/Osh2WJKapAphS0ecpiyVmyXlwdTxD+Fj UvoLubSQMhSIK5JEliEuiA0oDOaaOoDlrgPvDSwaAoFICM1lCaZ7KAG8ymwatpBD sK5qLK4jf2oyzweUpXMZEwrUhNDCXGwfcWjSA+DeBaIR5ghoplYKJR2WKeSCQlOY Wly1Fmmu40jKmE0cP1hyBCuQFqC7XMZPzxpUM6B4IAZoE65joQRRZBEdJbw8Iw7N YMeTGWZA3xt1XQb7JBfIyjFZ4N3Pik3OUAanCaJCspdFro3Y2A6F/r+UauOpljiO Fksp0NPrMkHu6BTTuCTKQzRjM0dgXx8uV21RHNiE2RKIIV8TVBBhkhATcZwkShqS cOG4ijc/EErWmGURLS/OQiSVQgRqSQNKMgdJtrGlSSXACnyyhoeyBDmuVZRBiUzW y6kAyQNm1BGPd3X7ouvojncrHLlYIKWP6gANxeEEZkkIKlAeWFRRNlcwsRYxz0dF hYdSLnZghRAOnfSYJTXIoHg1dH5T1eGhQAfLEonFNwJBNMNiJktRiAQM8AzisUyl AbAJRz4X15SDonpbRFEIdfkLqvMQRWgfNN8C9Blfh0q00CZFhGZgSAkTwV0QIihb STyEfmrAmIjzxHNC0opHn/7/ZlfJyZ+OHH+Oz278pu4qVQEXTJYPcUKNRTLHS4Zw jlNQcwZ7UvtY0+ANTcgKoEgTJkqQxQJGRZmOEFgzMpCBz5DnwoQyy++HH0j4BbGw /BvYxVxLgLPIzhk58ciu0z6seT4umqMhjxYqYDpW6pCzm3Kw7oKXechhpilHUfo5 qJgshmGnEh0G+yRZEDoWeaOC4zBUVWicRK/raJ5NrK72rqJBVoTmB18NaENOI2pR jktCGgiwCRsng4EFBQvCv8kFE7+Q5SkDV70vNPW8YxAQp2zPGJJ4QUuyN0pPmsFk 06QODElFHr1CppKPAV7li4D5YpAsKRIkZTmocOaYewa8aKG6DsC7pBoSPlOurWMY QYWWZa0itqpyVoqRTnhaMBslHJblxAE7FvUBBH/S1zgYWzabDeXNWrlbhoRxAlDd wH0pXy/7jTURlOMCRhf2nS4Q6Eyev7uUBZEMRyaFyUvRRAJ6zo0cmb7YW9vakAHy xZJaIV2Bse1ClwIxseW3xb8Iz8+9hwwwiPoCWs71EEkmQ8xJhYkVzjDdNUkYpsGB bwpu0GchCCwEFZkMlGkbXhDcLGinbMAtcliVAAuXXt66ZLnUcom6e1Tfel3C1ZKB +0i+ZsU68I+r1AWrHEfdv5Z/64J9EFUuFSE03bVA5Ny/6WzQTf2d8s7qhhxaUXX/ 0wtQAeHhyOxIpG5mJDq7pjZaV1tdE3ig7OqLSkrLSi65uEz+fCoJlF+e/001eeZ3 zi1Zs/Ivj28c7V2cTD+bPH6CHTl8t/XpvXOenV/2zUtXL1s7da6xrXLnqHHF1/P+ ldm8o3pg5Pq3b1n44MTggUUffNV005ovHts7/NQL9x178qNHfrH1haEjS89uuvyL U/qQMXXiuhVzl76/9svB1nd73nzq+yefmTTxTJqvov2bn7uq/OV7FuzZYTUcWzX5 gbP7+fbPSUUmXH64srRnzoSnD/x6aEiLLY8sbx/9YPTaLacH5hwdeuOW5zt3fZj6 +sCDHaUVW1Z9/N1V5Us+2nlprOfnS1PrywcGFp97hrdHX981/DFbdij2t070xPLf /jX7s/6DFYv2773m+JWD6c7HBrefHD4S++Otv1rWNe79dxpH26sfLx148/YbdvcO v9UQ+cn81+IN9/59/r4V8Z1d66r2nLjr0W+9uGNj24+3hN++nUwZid7z77s/ib6z 7+RL0zb0Hbiu8vVjIv27+2sum3CYV3csOd2w+tyPTg9Or5hZX7lpypw2fcorFZnf LJu3evvKQ+HRwyseGnji5emvvnen+YdtqyfsWHtX+4w+un9N6+7Z65+cv/7GyoOT PhshmZsv+oF1aMEvB49/1t+/nGyaqfXe1lW74Yx56tS0PzW92z/uwxXj/9Gz4Xvk tYcCV3751TW7m7vHb9w3PPLp1JZd0V3Vt01t3muKDvTemTceLrt423Ox0vu2jiys P7vz2k/Grxl+64p1/3zkRNfv1046eqO7+SC65OirWy/b8+j6H/4H =mfqb -----END PGP MESSAGE-----
-
The NSA's domestic surveillance program expired at midnight after the Senate failed to reach a deal to pass legislation Sunday evening. The expiration came after the Senate convened for a rare Sunday session to deal with the expiring provisions of the Patriot Act. Before adjourning without reaching a deal, the Senate made some progress, clearing a key procedural hurdle on the USA Freedom Act, but due to procedural objections by Sen. Rand Paul, the Senate was unable to hold any additional votes to move forward with the measure. Three key provisions of the Patriot Act expired at midnight -- Section 215, which authorizes the NSA's bulk collection of Americans' phone records; a roving wiretap provision that allows law enforcement officials to monitor terror suspects that use multiple phones; and a program that officials can use to monitor "lone wolf" terror suspects, not connected to any known terrorist organizations. The NSA started the shutdown process at 4 p.m. Sunday. It will take an entire day to reboot the system, if Congress passes legislation reforming the metadata collection program. Senators returned to Capitol Hill Sunday afternoon, just hours before key provisions of the Patriot Act, including the NSA's controversial bulk collection of American's phone records, were set to expire. The Senate cleared a key procedural hurdle on the House-passed USA Freedom Act with a vote of 77 to 17. But objections by Paul, R-Kentucky, delayed further votes on the measure. Senate Majority Leader Mitch McConnell originally opposed the House-passed USA Freedom Act, but Sunday, he said it was the only option. Legislation allowing mass collection of phone records expired Sunday Patriot Act also enabled wire taps and warrants issued without evidence Senate tried to pass reform bill but was frustrated by Rand Paul (R-KY) Paul claimed victory, but admitted replacement law is likely to be passed Head of CIA now warns terrorists are 'watching developments carefully' and says ordinary Americans at risk because of political grandstanding Source : http://www.dailymail.co.uk/news/article-3105089/Senate-makes-ditch-bid-extend-NSA-s-bulk-collection-phone-records-Rand-Paul-swears-block-legislation-let-Patriot-Act-expire.html http://www.kitguru.net/gaming/security-software/jon-martindale/us-phone-tapping-clause-expires-nsa-halts-servers/
-
I guess having access to all your nudes and dirty jokes is very important to the NSA et al, who seem hellbent on having AS MANY ways of accessing your information as humanely possible. One would think they already have enough ways to get what they need, but according to this article they clearly want more and have resorted to straight up theft to get access to what they need. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ http://gizmodo.com/the-nsa-has-the-master-key-to-unlock-your-phones-secure-1686825874
-
The NSA and its allies (GCHQ) have stolen encryption keys from a major manufacture of sim cards Gemalto according to a new report by The Intercept Gemalto makes on average makes 2 Billion sims cards per year, and was totally oblivious to what was happening until now. It is not known how many people are effected, but its safe to say that the number is great judging by the number of sim cards Gemalto produces each year, and the costumers Gemalto supplies (ATT, T-Mobile, Sprint and Verizon as some major examples) The way the spies got their hands on there keys was by spying on individual Gemalto employees, through accessing their email and facebook accounts effectively cyberstalking them. Its basically over for phone encryption, they have the keys to the castle. "it's a massive security breach that means your phone could be vulnerable to the whims of the world's most powerful spy agencies." Article (The Verge): http://www.theverge.com/2015/2/19/8071453/nsa-gchq-snowden-sim-phone-security
-
http://in.reuters.com/article/2015/02/17/us-usa-cyberspying-idINKBN0LK1QV20150217 Moscow-based security software maker - Kaspersky Lab exposed a new part in a series of the Western cyberespionage operations. Kaspersky Lab didn't actually publicly announce which country is behind the spying campaign, but said it was close to Stuxnet, the NSA-led cyberweapon used to attack Iran's uranium enrichment facility. "A former NSA employee told Reuters that Kaspersky analysis is correct and that people still in the NSA valued these espionage programs as highly as Stuxnet. Another former intelligence operative confirmed that NSA had developed the prized technique of concealing spyware in hard drives, but said he didn't know which spy efforts relied on it." So I just read this and I'm more than slightly worried because who knows how much people are using "infected" HDDs from WD, Seagate or Toshiba(read: EVERYONE), but the question is if all the drives are "infected" or just those which were bought by governments and other "interesting" parties
-
Der Spiegel has just released a report on new documents from Edward Snowden, detailing even more of the NSA's antics. It's kind of a long read, but the TL;DR version is much the same as the rest of the Snowden leaks: the NSA likes haxxoring, finding every way to collect all the datas and ideally leaving no trace. None of this comes as a huge surprise, which in itself is a sad and scary prospect, but there are some new details that I imagine will ruffle the feathers of the international community; especially some of the US's closest allies. On to some of my thoughts in the article: They have tapped into other countries' intelligence networks to collect that countries' data. The NSA went with the 'I Drink Your Milkshake' reference; I propose, 'SIGINT-CEPTION' They're working hard to hide any trace of responsibility and dodge any potential legal actions: Then there's this, 'Yo dawg, I heard you like spying!' and the shuffling of data to mask the origin/destination. One of the many issues I have with all of this, is that the NSA would be hugely naive to think that whatever tools, patches, hacks, software, etc they are using, will remain only in the hands of the NSA. If Stuxnet has taught us anything, it will get out, and people will find ways to use it. Then there's the recent Obama announcement about going after hackers with harsher penalties. Nearly everything that would be considered 'hacking' by a civilian, is being done ten-fold (at the least) by the government itself. There was a point in time where this kind of government spying, hacking and surveillance was in the realm of tin-foil hat conspiracy theorists and dystopian science-fiction. Keep in mind a lot of these documents are several years old, which begs the question: what are they using now? Full article with links to PDF's of the Snowden documents: http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html
- 40 replies
-
- der spiegel
- snowden
-
(and 1 more)
Tagged with:
-
So there is one thing I guess I never understood, internet privacy. I personally don't care if the government read all my emails, knew who I hated, knew who I liked and monitored me. I've got nothing to hide so why should I care? Why do you care? Obviously internet pimps and cyber gang bangers care, they don't want to be caught. If you're doing nothing illegal why does it matter if some old dudes read your private messages and monitor the websites you've visited. If I had some NSA agent following me around in real life, I probably wouldn't act the same. That would get annoying but since I don't know who's reading my shit & I will most likely never meet them I just don't care. Can't wait to see some responses. Is it more than just some old guy viewing your personal stuff?
-
On Tuesday 31c3, the annual Chaos Communication Congress by Chaos Computer Club, ended. This is a short list of the talks I attended and deem to be important or at least informative, this list is by no means complete. Links to the Youtube videos: ------------------------------------ In German: -------------- 1) https://www.youtube.com/watch?v=vVivA0eoNGM --> "Starbug: Ich sehe, also bin ich.... Du" by Starbug In short for all non german speakers: Starbug demonstrated how easy it is to fool biometric security systems, that you can develope a keylogger using the reflection of the screen in your eye and made a step by step guide how you to recreate a fake fingerprint. In Englisch -------------- 2) https://www.youtube.com/watch?v=sKxj-Jh9pmY --> "Whatever happened to nuclear weapons?" by Michael Büker 3) https://www.youtube.com/watch?v=-l4B7C5MNMQ --> "Inside field Station Berlin" by Bill Scannell 4) https://www.youtube.com/watch?v=KKLnhmri8Cg --> "Forging the USB armory - Creating an open source secure flash-drive-sized computer" by Andrea Barisani 5) https://www.youtube.com/watch?v=lQ0I5tl0YLY --> "SS7: Locate. Track. Manipulate" by Tobias Engel 6) https://www.youtube.com/watch?v=5BrdX7VdOr0 --> "Thunderstrike: EFI bootkits for Apple MacBooks" by Trammell Hudson 7) https://www.youtube.com/watch?v=0SgGMj3Mf88 --> "Jacob Appelbaum: Reconstructing narratives - transparency in the service of justice" by Jacob Appelbaum 8) https://www.youtube.com/watch?v=ZmKqdMDastM --> "Crypto Tales from the Trenches" by Nadia Heninger, Julia Angwin, Laura Poitras, Jack Gillum 9) https://www.youtube.com/watch?v=pRrFWwA-47U --> ""State of the Onion" by Jacob Appelbaum and arma You can find descriptions to all talks of 31c3 here: http://halfnarp.events.ccc.de/ Keep in mind that this was a meeting of people with different backrounds, from press to kids to security specialists. As stated above, this is just a very short list of talks I found interesting and is by no means complete. I suggest you check out recordings of the other talks on the following channels: https://www.youtube.com/user/CCCen https://www.youtube.com/user/CCCdeVideos My intention with this post is to spread awareness of the topics that were discussed during 31c3. If you don't want to concern yourself with netpolitics, some of the topics might not be for you. If you read this far, thank you. Happy new year! (although I'm a bit late for that)
-
Shortly ISP's may soon have the ability to hand out your information to private companies. http://action.sumofus.org/a/corporate-isp-abuse/
- 22 replies
-
Section 309 is the scary bit of this Bill, which is headed to President Obama's desk. https://www.congress.gov/bill/113th-congress/house-bill/4681/text There is a petition on the White House site, but it needs 100,000 signatures to be addressed. Currently, there's just over 9,000 signatures.. https://petitions.whitehouse.gov/petition/protect-our-privacy-and-please-veto-hr-4681-aka-intelligence-authorization-act-fiscal-year-2015/lln5hN5c
-
Symantec just announced the discovery of Regin, a new kind of spyware that uses Stealth technology to hide itself and what it's doing on infected machines. So far it has been found on ISP servers, but appears to be targeting companies, governments, research facilities, etc. Apparently it's been active for a few years already. Considering the complexity of the thing, this is designed at great expense by a government. The question of course is which one. Source : Reuters UK http://uk.reuters.com/article/2014/11/23/uk-symantec-malware-regin-idUKKCN0J70S920141123 Source 2 : deredactie.be (only in dutch unfortunately, but this was my first source) http://deredactie.be/cm/vrtnieuws/binnenland/1.2157506
-
I'm writing a current topic paper on a controversial topic, and I just so happened to be assigned internet privacy. So what do you guys think about the evidence that the NSA without a doubt is looking through peoples personal emails, texts and maybe even listening to phone calls. Do you think this is wrong, or can be justified because it will end up protecting the people of the US. If you guys could give me just a couple sentence on what your views are that would be great!
-
Here's another bombshell @Trik'Stari According to WSJ The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, Fake Flying Cell Towers Target Fugitives, But can ID Your Phone as well..a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations. According to the report, the federal government gathers the data from Cessna airplanes and can cover most of the U.S. population. These devices typically trick phones into sharing its location data and revealing the phone's identity. the planes carry a box that serves as a dummy cell phone site. That device mimics actual towers, duping nearby cell phones into connecting to it instead of a real phone company tower. Local police and federal agents make widespread use of these types of devices. Public records, such as this Florida court transcript, have revealed that police use this technology to gather information about suspects. Here's how ground based stingrays work.. So How do they do it..? These stingrays are so called dirtboxes & these are sophisticated enough to mimic a particular provider. If a drug dealer under surveillance uses Verizon, for instance, then the machine pretends to be a Verizon cell tower and connects only to all the carrier's subscribers in the area. Once a target's phone is identified (at which point, connections to other people's phones are dropped), the box can pinpoint his location within 3 meters and down to a specific room.the Cessnas fly out regularly to target a handful of criminals per flight. Obviously, the more densely populated the target area is, the more data the boxes collect, but it's unclear what steps are in place to safeguard innocent people's information. It's also unclear at this point if they've ever used the newer dirtboxes' capabilities, which include jamming phones and extracting messages, photos and other data remotely. as always Police agencies refuse to disclose information about the devices. Law enforcement agencies have non-disclosure agreements FYI The original source is undisclosed & will remain as it is.. Please do Leave your thoughts & comments down Below.., Technology can be amazing sometimes things like this are somewhat essential, but humans have been unpredictable & history has shown it..it will be interesting where the line between being human & a psycho maniac cross over... Bonus: Link: http://online.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533 http://money.cnn.com/2014/11/13/technology/security/federal-planes-spy/index.html
- 14 replies
-
- espionage
- mass surveillence
- (and 7 more)
-
Move over Blackberry.. Samsung Fanboys.. Unite... Samsung Galaxy phones and tablets have just become the first consumer mobile devices approved by the US National Security Agency (NSA) to carry classified documents. This accomplishment is the direct result of Samsung’s successful testing and certification under the U.S. government’s Common Criteria Mobile Device Fundamental Protection Profile (MDFPP) and VPN Protection Profile (VPNPP) programs As long as the device comes with Knox , The edict covers most of its newer Galaxy devices, including Galaxy S5 , Note 4, and the Note 10.1 (2014 edition) , Knox-enabled devices have already been approved by the US Department of Defense, But only for general, not classified use Earlier this year Samsung mobile devices were officially included on the Defense Information Systems Agency (DISA) Department of Defense Approved Products List for Sensitive But Unclassified use. The CSfC list for high security solutions supplements the DISA listing, enabling the U.S. government and its contractors to create composed solutions meeting the full range of U.S. government security objectives. Samsung is the only manufacturer with mobile devices on both lists Samsung Electronics announced its solutions have been approved by the United States government as the first NIAP-validated consumer mobile devices to handle the full range of classified information. The growing number of Samsung devices on both lists allows the U.S. government to enjoy cost effective and highly secured mobile experiences with a variety of options. After completing ten Memoranda of Agreements (MOAs) To those who doesn't know about knox.. Knox is an Android-based platform that aims to enhance security of the current open-source Android. Devices using the platform allow users to switch between a personal space where personal data can be stored and the protected Knox Workspace container. This sector was ruled BlackBerry in markets such as enterprise and government where security of data is often a key factor in purchase decisions, But now it seems that smsung is now the No#1 Choice.. The Commercial Solutions for Classified (CSfC) program only lists devices that have met the agency’s security standards, and may not necessarily translate into large government orders for the South Korean company. To Recap These Samsung Devices have been approved by the NSA : Galaxy S4, Galaxy S5, Galaxy Note 3, Galaxy Note 4, Galaxy Note 10.1 (2014 Edition), Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S 8.4, Galaxy Tab S 10.5 Galaxy IPSEC Virtual Private Network (VPN) service The listing may, however, serve to boost the standing of Samsung devices based on the Knox platform as an alternative to other products such as those of BlackBerry in markets such as enterprise and government where security of data is often a key factor in purchase decisions Bonus: Good news & this one goes out to all them SamBoys out there, What do you guys think? Post your thoughts/comments & Rants down below... link: http://www.nsa.gov/ia/programs/csfc_program/component_list.shtml http://global.samsungtomorrow.com/?p=43522 http://www.pcworld.com/article/2836612/samsung-knox-devices-approved-for-government-use-by-nsa.html
- 9 replies
-
- samsung
- tech_dreamer
-
(and 4 more)
Tagged with:
-
Wow! Now that's something i didn't expect from Yahoo.. Newly released Documents* says that Yahoo (along with other search engines out there) were threatened by the US government to comply with PRISM surveillance requirements, or face a $250,000 per day fine in 2008. While Yahoo fought the demand through the US Foreign Intelligence Surveillance Court of Review, it ultimately lost and complied with the order, which paved the way towards mass surveillance of Internet users. *more than 1,500 pages of once-secret papers from Yahoo’s 2007-2008 challenge to the expansion of U.S. surveillance laws, contents of the documents are still a secret & only a few have been able to 'physically' see them. The FISC ruled that "the U.S. Government has sufficient procedures in place to ensure that the Fourth Amendment rights of targeted US persons are adequately protected and that the acquisition of foreign intelligence to be obtained through the directives issued to Yahoo!, as to these individuals, is reasonable under the Fourth Amendment." Additionally, it ruled that "any incidental acquisition of the communications of non-targeted persons located in the United States and of non-targeted U.S. persons, wherever they may be located, is also reasonable under the Fourth Amendment." portions of the documents remain sealed and classified to this day,only the very top yahoo officials had eyes only access to the released document, even some high tier yahoo team members haven't been able to get access to the declassified documents, the news is out from those who have seen it.. Yahoo, which endured heavy criticism after The Washington Post and Britain’s Guardian newspaper used Snowden’s documents to reveal the existence of PRISM last year, was legally bound from revealing its efforts in attempting to resist government pressure. The New York Times first reported Yahoo’s role in the case in June 2013, a week after the initial PRISM revelations. Link: http://www.electronista.com/articles/14/09/12/newly.released.documents.shed.light.on.2008.fisc.hearings/ Post your thoughts & comments down below...
-
Today there was a live stream from the Auckland town hall, I only caught the ending to it, but it was very interesting to hear what Glenn Greenwald, Snowden, Assange, Kim Dotcom and others had to say. It was chilling in parts to see the levels that the New Zealand government were involved with the NSA spying and the 5 eye's program. I don't have time at the moment to give my full thoughts on it. But if you are interested here is the archive up on youtube. Coverage starts around 21 mins which I think I queued it up for. https://www.youtube.com/watch?v=Pbps1EwAW-0#t=1313
-
As noted by Gigoam, Apple has removed the mention of not having been subjected to section 215 Patriot Act requests. In Apple's transparency report they stated that: "Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us." That part is now gone. This would be Apple's way of warning users that they have received demand on data, and they are not allowed to speak about the demands publicly. This is exactly what would happen if for example the NSA or FBI requested data from Apple and forced them to not talk about it. Instead of talking about it they remove something telling the public everything is fine. There isn't that much to say about it right now. Hopefully we will be able to get a public statement from Apple as to why the mention of section 215 in the Patriot Arc was removed, but if we don't get that we should suspect that they have gotten requests they can't deny or talk about. Source: Gigaom - Apple's "warranty canary" disappears, suggesting new Patriot Act demands
-
In light of recent news surrounding security expert Steve Blank stating that he would not be surprised if the NSA had built backdoors into both Intel & AMD processrs, AMD however has shot down these claims in a statement, claiming their processors are as secure as can be & denying the existence of any NSA backdoors to overcome encryption AMD Told Fudzilla. .
-
In light of the all the current "big brother"/government-is-watching political mumbo jumbo that has recently surfaced, I thought this was a really interesting website that has complied some obscure Google Street View pictures. I'm not sure that all of them are real but I thought they were neat and share-worthy. Check it out: http://9-eyes.com/ How would you feel if you showed up on a Google Street View photo? What if you had just been pantsed or were in the act of an illegal activity? Or maybe the photo verified an alibi? Do you think that these types of pictures should be permitted in court?
-
Author: Ryan Martin (eTeknix) ABC.es reports that the USA is exerting threats as well as political and economic sanctions in a bid to get Venezuela to revoke Snowden’s asylum, or hand the NSA whistleblower over to the USA if he arrives on American soil. With Snowden seeking temporary asylum within Russia in a bid to help him make the final move to a Latin American nation like Venezuela, the USA is worried that he might make it there and is preparing for the worst. The USA has already revoked the visas of entry to the USA for Venezuelan government officials and businessman associated with the current government in power in Venezuela. Additionally John Kerry, current American secretary of State, has threatened the Venezuelan foreign minister with a suspending the sale of gasoline to the Latin American country if Snowden is successfully received and processed for asylum. With such a potentially crippling threat it remains to be seen whether Venezuela will choose to uphold their values in favour of accepting Edward Snowden if that results in economic and political damage to Venezuela and its current government. Source: http://www.eteknix.com/usa-threatening-venezuela-with-political-and-economic-sanctions/ Comment: Wow... Never thought USA would go as far as threatening other countries.
-
https://www.eff.org/deeplinks/2014/04/wild-heart-were-intelligence-agencies-using-heartbleed-november-2013 I bet Intelligence Agencies was getting their hands on this. Maybe there's even bigger conspiracy behind this as the bad code was commited in New Years eve so no one notices... lol
-
An interesting interview with Snowden on the NSA and the government. EDIT: The founder of the World Wide Web also says a few words.
-
Reporters without Boarders is a non-profit organization which fights for the freedom of information and freedom of the press. They are known for their "Press Freedom Index" ranking which tracks how free the press is to spread information in different countries. They have consult status at the United Nations and was formed in 1985. Both the US and the UK appear in their newly published "Enemies of the Internet 2014" list. The full list is: The United States The United Kingdom India China North Korea Russia Syria Iran Hopefully this will be a wake up call for a lot of people. Having the title "world champion of surveillance" (The UK) is not exactly a positive thing... When your country is on the same list as North Korea and China (not to mention the other ones) then you are doing something very very wrong. Sources and further reading: Salon, The Verge, Reporters without borders
-
Google's Search Warrant Video *cough NSA
THE MASTER OF HIS LIFE posted a topic in General Discussion
So Google made a this video, guessing they're on our side ! It's also very fun to watch since they use cartoons because people...like...cartoons . https://www.youtube.com/watch?v=MeKKHxcJfh0 If you want to read more in depth into the matter Google has a post about this: http://googleblog.blogspot.com/2014/03/transparency-report-requests-for-user.html