CyberTechTips

782 bookmarks
Custom sorting
EFF unveils secure, sharing-friendly, privacy-minded router OS
EFF unveils secure, sharing-friendly, privacy-minded router OS
As promised, the Open Wireless Movement's new sharing-friendly, privacy-minded router operating system was unveiled at HOPE X in New York last weekend. The OS, a joint project of Electronic Frontier…
·boingboing.net·
EFF unveils secure, sharing-friendly, privacy-minded router OS
Suing File-Sharers Doesn't Work, Lawyers Warn
Suing File-Sharers Doesn't Work, Lawyers Warn
The American Bar Association has released a detailed white paper advising the Government on how to tackle online piracy. The lawyers recommend several SOPA-like anti-piracy measures including injunctions against companies hosting pirate sites. At the same time, however, they advise against suing file-sharers as that would be ineffective or even counterproductive.
·torrentfreak.com·
Suing File-Sharers Doesn't Work, Lawyers Warn
C.D.C. Closes Anthrax and Flu Labs After Accidents
C.D.C. Closes Anthrax and Flu Labs After Accidents
After potentially serious accidents involving bird flu and live anthrax, the Centers for Disease Control and Prevention shut the Atlanta labs and halted shipments of infectious agents.
·mobile.nytimes.com·
C.D.C. Closes Anthrax and Flu Labs After Accidents
NSA Claims That Linux Journal Is A Forum for Radical Extremists. They May B
NSA Claims That Linux Journal Is A Forum for Radical Extremists. They May B
When I first became a regular user of Linux, several years ago, I tried out different text editors and quickly discovered that emacs was my best choice. By coincidence, about that time I ran into an old emacs manual written by Richard Stallman in the dollar section of a used booksore. In that edition, near the end of the book, was a section on “Mail Amusements.” This documented the command “M-x spook” which adds “a line of randomly chosen keywords to an outgoing mail message.
·scienceblogs.com·
NSA Claims That Linux Journal Is A Forum for Radical Extremists. They May B
Officials Defend N.S.A. After New Privacy Details Are Reported
Officials Defend N.S.A. After New Privacy Details Are Reported
A report by The Washington Post, which included information from Edward J. Snowden, suggested that roughly nine out of 10 communications involved people who were not the direct targets of surveillance.
·mobile.nytimes.com·
Officials Defend N.S.A. After New Privacy Details Are Reported
Who Watches The Watchmen? | TechCrunch
Who Watches The Watchmen? | TechCrunch
In honor of the Fourth of July, let's talk a little about how horrifically paranoid and counterproductive the US government has become. And I'm not even talking about Congress! Instead I mean our old friend the No Such Agency, who, it turns out, have been singling out for special treatment anyone who displays any interest in tools which might make the NSA's life more difficult.
·techcrunch.com·
Who Watches The Watchmen? | TechCrunch
Hollywood Fails to Add Torrent Sites to Child Abuse Filter
Hollywood Fails to Add Torrent Sites to Child Abuse Filter
It's been revealed that major Hollywood movie studios including Disney, Paramount, Fox, Sony and Universal attempted to have torrent sites added to New Zealand's already controversial Internet child protection filter. Alongside ISPs' objections to the proposal, the Kiwi government rejected the request.
·torrentfreak.com·
Hollywood Fails to Add Torrent Sites to Child Abuse Filter
NSA Targets the Privacy-Conscious for Surveillance - Schneier on Security
NSA Targets the Privacy-Conscious for Surveillance - Schneier on Security
Jake Appelbaum et al., are reporting on XKEYSCORE selection rules that target users—and people who just visit the websites of—Tor, Tails, and other sites. This isn’t just metadata; this is “full take” content that’s stored forever. This code demonstrates the ease with which an XKeyscore rule can analyze the full content of intercepted connections. The fingerprint first checks every message using the “email_address” function to see if the message is to or from “bridges@torproject.org”. Next, if the address matched, it uses the “email_body” function to search the full content of the email for a particular piece of text – in this case, “https://bridges.torproject.org/”. If the “email_body” function finds what it is looking for, it passes the full email text to a C++ program which extracts the bridge addresses and stores them in a database. ...
·schneier.com·
NSA Targets the Privacy-Conscious for Surveillance - Schneier on Security
The Ultra-Simple App That Lets Anyone Encrypt Anything
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video. Nadim Kobeissi wants to bulldoze that steep learning curve.
·wired.com·
The Ultra-Simple App That Lets Anyone Encrypt Anything