Guest Post: Is Snowden Obliged to Accept Punishment?
This is Secretary of State John Kerry’s answer, given May 28 on CBS This Morning: “He should man up, come back to the United States. If he has a complaint about what’s wrong with American surveillance, come back here and stand in our system of justice and make his case. But instead, he’s just sitting […]
The Five Dumbest Ways That People Defend NSA Spying
Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying
N.S.A. Collecting Millions of Faces From Web Images
The National Security Agency’s reliance on facial recognition technology has grown as it has used new software to exploit images in emails, text messages, social media, videoconferences and other communications.
PirateBox Delivers Brand New Anonymous Sharing Release
In 2012 a device called PirateBox excited users with the prospect of anonymous wireless file-sharing anywhere, no Internet required, and at a cost of just a few dollars. Now the project has released PirateBox 1.0 and a brand new website. TorrentFreak caught up with PirateBox founder David Darts for the lowdown.
When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability, availability, reliability, cost, and ease of management. Here is a list of commonly used server setups, with a short description of each, including pros and cons. Keep in mind that all of the concepts covered here can be used in various combinations with one another, and there is no single, correct configuration.
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
San Francisco - The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying – the government itself has admitted to it in recent court filings. In a brief filed today in response to this illegal...
Outlook’s Encryption Issues – Who is Responsible for Your Data?
NowSecure automated software & professional services make mobile app security testing easier to scale than ever before. Ready to scale growth in a mobile-first world?
Everyone should know just how much the government lied to defend the NSA
Trevor Timm: A web of deception has finally been untangled: the Justice Department got the US supreme court to dismiss a case that could have curtailed the NSA's dragnet. Why?
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
I remember fondly two years ago, when 2-Factor-Authentication (2FA) became popular and well used across major web applications (Google, Facebook, Yahoo and others). I found, my naive sixteen year old self unable to come to terms for why the genius idea had not been thought of before. At the time, I felt that 2FA was that golden shield you could cover yourself with and defend against some of the most sophisticated phishing attacks calmly.
Whilst 2FA can still be that golden shield to the critica
Emory Accidentally Sends Reformat Request to All Windows PCs
Have you ever reformatted a computer and then immediately realized you shouldn't have? Well, an "accident" at Emory University this week will make your mistake look like a ...
Glenn Greenwald: how the NSA tampers with US-made internet routers
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide