From News

ISP Modem

Things You Ought to Know About Your ISP

The government is at it again, Congress repealed the FCC Privacy Rules that protected your personal data from your ISP and Trump rubber-stamped it… If you haven’t read those rules, and I don’t blame you if you haven’t, you probably don’t know what all this nonsense is about? The rules adopted on October 27th, 2016…

Is VPN Legal

Wait…is it legal for you to use a VPN?

If you could hide your identity online, say whatever you wanted, look at whatever you wanted, download whatever you wanted, with no way of it ever getting back to you, would you do it? Well, there is a way to do that and it is called Virtual Private Network or VPN for short. It is…

darkhotel

DarkHotel – Hacking High Value Target at Expensive Hotels

This week DarkHotel is on everyone’s mind, and for good reasons. For those who slept under a rock the last few days, DarkHotel is an insidious malware infection targeting high profile travelers staying at higher end hotels in mostly Asia and the US. The bug was detected by Kaspersky Lab. Kaspersky Lab is a security…

Email Security

How to Encrypt Your Email – What You Need to Know

This is the second part of a post about email security. If you haven’t read part one ‘Why is it so difficult to secure your email?’ you should check it out. We also published a primer on the differences between ‘Privacy and Anonymity’ that is worth reading. Achieving perfect security of your email is difficult,…

IP Address 127.0.01

What is an IP Address?

We live in a world of networks. Networks are literally everywhere, from power grids, roads, cell towers, financial and legal networks to social networks, and, of course, the Internet. Networks lay over each other and touch all over the place. We navigate them daily, often without even noticing they are there, but have you ever…

Tor Hacked

Tor Has Been Compromised. Now What?

The disturbing news that Tor, the online community’s most secure and effective anonymizing tool has been compromised was officially confirmed July 30, 2014 in an advisory published by the Tor Project. The sophisticated two-pronged attack – thought to have begun in early February 2014 and continued until July 4, a period of about 5 months – raises many questions.

Privacy Versus Security: The New Equation

Privacy Versus Security: The New Equation

In Defense of Privacy A recent unanimous decision by the U.S. Supreme Court has been called “a sweeping victory for privacy rights in the digital age” by The New York Times. At the same time a unanimous decision by the Supreme Court of Canada has been reported by The Globe and Mail as “a privacy…

Google Drive

Google Drive – Storage is Cheap, Privacy Costs Money

The price for cloud storage is dropping. Recently Google cut its prices for Google Drive from USD 4.99 to USD 1.99 for 100GB and from USD 49.99 to USD 9.99 for 1TB, making it even cheaper to store your content in their cloud. But considering the privacy and security implications the real question here is…

what is tor

Is Tor Safe?

On August 5th, 2013 NBC News reports that “Tor users compromised in child porn takedown.” The Independent reports that Eric Eoin Marques, a 28-year old man from Dublin, appeared before a judge regarding charges of distributing child pornography originating from the FBI. Interestingly at the same time Freedom Hosting, a web host that allows users…

NSA top secret domestic pying program Stellar Wind

Video Revealed the NSA’s Top-Secret Efforts to Spy on U.S. Citizens

Documentary filmmaker Laura Poitras interviewed William Binney, a 32-year veteran of the National Security Agency (NSA) turned whistle-blower about domestic spying. This mind-blowing, short clip reveals details of the NSA’s top-secret “domestic” spying program, Stellar Wind, which began under Bush/Cheney/Tennet/Hayden shortly after 9/11. Benney estimates that a facility being build in UT will be able…

Hot Coals

Messaging and Phone App Viber Blocked in Saudi Arabia

Various news sources, including the Shia International News Association, report that Saudi Arabia has blocked access to the popular encrypted messaging service Viber. Viber CEO, Talmon Marco told the BBC that he didn’t know why Viber was blocked and they expect to restore the service within a few days. Viber, a free messaging and VoIP…

Privacy Settings

Privacy Settings – Careful Using US-Based Companies

The EU considers US surveillance a “grave threat” to EU sovereignty. Rightfully so, as all data stored in public US clouds is subject to mass surveillance by US authorities. The EU considers personal privacy a fundamental right of any European citizen, which is obviously incompatible with warrantless mass-surveillance (FISA), as recently reauthorized for another 5…

Occupy Wall Street Protester

Occupy – It Was Always Meant to be About You!

A friend told me “Paranoia is a good thing, especially if you are being followed.” Apparently Americans, and very likely the rest of the world’s population, have good reason to be paranoid. In 2011/2012 the empire struck back, showed its teeth and the surveillance state was dragged out into the open. US mainstream media was…

Facebook HQ

Facebook – The End of Privacy?

When it comes to privacy, Facebook is on a mission to eliminate it at all cost. The now publicly traded company is every marketing company’s and spy agency’s wildest dream come true, gathering information about social relationship and intimate details of more than a billion active monthly users. Knowing Facebook, Google and cohorts are collecting…

Protect Your Privacy

Privacy? NSA Storing All Communications in Massive Database

All emails from anyone within the United States are stored by the NSA and other US government spy agencies for later retrieval if you “somehow” become a person of interest, says William Binney, former NSA crypto-mathematician. This blanket surveillance will allow government agencies to construct a scaringly accurate picture of your life from around 2002…

Privacy

US Government May Soon Read Your Emails at Will

Senator Patrick Leahy, who previously introduced a bill that would have actually granted greater protection of your privacy, is re-introducing said bill for discussion on the senate floor next week. The new version however, would allow 22 government agencies access to your email without requiring a judge or informing the owner of accessed email accounts.…

Toronto G20 Protester holding flower

Canadians May Soon Be Monitored in Their Bedrooms

Canadians may soon have surveillance right in their bedrooms if the Chiefs of Police Association gets their way in parliament… No quite yet, but it would be easy to imagine…. The Chief’s of Police Association of Canada is resurrecting a Internet Surveillance bill that would allow law enforcement to intercept Internet communication of anyone in…

George Orwell 1984

Interesting Tidbits From The Web Today

George Orwell was right and the attack on our freedom comes from within! The UN calls for “Anti Terror” Internet surveillance and in the UK the British Phonographic Industry (BPI) succeeds in forcing ISPs to block access to torrent sites CNet reports. Independently viewed these news snippets don’t mean much, but in the context of the global…

Privacy News

HideMyAss didn’t hide his…

In October 2012 Raynaldo Rivera entered a plea bargain with the US Attorney’s Office (USAO), pleading guilty to having hacked Sony Pictures in 2011 as part of LulzSec, a subgroup of Anonymous. He will be sentenced early 2013. Raynaldo is the second member of LulzSec to plead guilty, after Cody Kretsinger, both identified via their…

Java Security Flaw

New Java Zero-Day Security Flaw Discovered

Adam Gowdiak provided Oracle with a technical description of a new zero-day security flaw along with sources and binery codes of his team’s proof of concept sandbox bypass in Java 5, 6 and 7, based on Oracle’s figures about 1 Billion PC and Mac users. For more information go to: Critical security issue affecting Java SE…