Advocate data breach due to lack of encryption, a widespread issue
Encrypt and decrypt files of any type using AES encryption.
Create And Manage Encrypted Folders in Linux With encfs
In this tutorial I'll show how to use encfs from the command line to create and manage an encrypted folder on Linux.
No more sources
Revelations by Edward Snowden, National Security Agency dissident, have grave implications for the role of journalists in the ‘Fourth Estate’ and the primary duty of source protection in the era of mass-surveillance.
Close the NSA’s back doors
Tomgram: Calabrese and Harwood, Privacy Down the Drain
For at least the last six years, government agents have been exploiting an AT&T database filled with the records of billions of American phone calls from as far back as 1987. The rationale
How To Make Your Entire Internet Life More Secure In One Day
Yahoo! Calendar has a nifty little reminder feature that will send a message to your phone, instant messenger or email address a given time period before an event.Thanks to Catholic school, I can still conjugate certain Latin verbs by heart. But remembering my brother's birthday? Always a challenge.
Be Very Afraid
What we should have known about government spying before Edward Snowden's leak, why even innocent people have plenty to fear, and what you can do about it
a-fcaa9d0c-0001-0001-0000-000000921161
The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.
How the N.S.A. Cracked the Web : The New Yorker
The most damning aspect of the new disclosures is that the N.S.A. has worked to make widely used technology less secure.
Portable Tor Browser Bundle v2.4.17 B1
Article: Article: Snowden's Latest: The NSA Has Effectively Destroyed Inter
The latest Snowden revelations demonstrate that the intent of government spying has been not only to assault privacy but to make it impossible to achieve.
Snowden files : NSA can crack almost any Encryption including Tor anonymity
The End of Internet Privacy? Glenn Greenwald On Secret NSA Program to Crack
http://www.democracynow.org - A new exposé based on the leaks of Edward Snowden have revealed the National Security Agency has developed methods to crack onl...
NSA Has Cracked Much Of The World's Computer Encryption
Documents revealed by former government contractor Edward Snowden show the National Security Agency has the ability to crack encryption that is supposed to keep communications and data private. The NSA has also worked with companies to insert vulnerabilities into their products to make them hackable by the NSA. Robert Siegel talks with Stuart Millar, U.S. deputy editor for The Guardian.
Here's how to best secure your data now that the NSA can crack almost any e
NSA's (and GCHQ) Decryption Capabilities: Truth and Lies
Why the Latest NSA Leak Is the Scariest of All
How the spy agency infected every corner of the Internet.
How to remain secure against surveillance
First I want you to read Bruce Schneier’s excellent article How to remain secure against NSA surveillance. Done? Ok. It’s most important to understand that it’s not simple at all …
On the NSA
Let me tell you the story of my tiny brush with the biggest crypto story of the year. A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryptio…
NSA surveillance: how to stay secure | Bruce Schneier | World news | thegua
Bruce Schneier: The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways we can protect ourselves
Pew: 86% Of U.S. Adults Make Efforts To Hide Digital Footprints Online; Fea
In one of the latest developments in the fallout of the PRISM story, the ACLU is currently suing four officials in the Obama Administration to try to get federal courts to put a stop to the NSA's metadata program and delete all existing records. But if you ask the general U.S. population, as surveyed by the Pew Research Center, the average U.S. citizen appears to be more concerned about the data-collecting abilities of advertising networks like those of Google and Facebook, faceless malicious hackers, and even friends and family, than they are the government.
School surveillance: how big brother spies on pupils | World news | The Gua
Cameras in the toilets; CCTV in the classroom; pupils' fingerprints kept in a database . . . Can't happen here? Think again, because the surveillance state is quietly invading our schools
Did you know Montana was a leader on privacy laws? Neither did Montana.
How it and five other states are beating Congress to ECPA reform.
NSA has 'commandeered' the internet, says Bruce Schneier
Computing is the leading information resource for UK technology decision makers, providing the latest market news and hard-hitting opinions.
Ben Wittes: Much of What We Think about Privacy, Liberty, Security and Thre
U.K. Spies Trying to Crack Guardian Reporter's Passwords in NSA Leaks Case
Earlier this month, British police seized a trove of leaked secret surveillance documents from the partner of Guardian journalist Glenn Greenwald at a...
A face in a billion: Facebook to include profile pix in facial recognition
Facebook says it will expand its facial recognition database to include over 1 billion extra faces as it incorporates users’ profile pictures into its database, thereby increasing the scope of its existing, highly controversial technology.
Encrypted Email for Everyone
Mailelf brings encrypted email to your existing email accounts. Stop companies and governments from spying on your messages.
Scott Adams Blog: The Cost of Privacy 08/30/2013