“Only the paranoid survive.” — Andy Grove
Since January, police have been testing an aerial surveillance system adapted from the surge in Iraq. And they neglected to tell the public.
It turns out Apple CEO Tim Cook is pretty much vindicated when he argued that the government can't keep a backdoor safe.
Vous n’avez pas protégé vos objets connectés ? Dommage. Le moteur de recherche Shodan nous a permis d’en prendre les commandes.
Simple encrypted web chat.
On May 6th, 2008, a package containing $68,000 in cash arrived at a FedEx store in Palo Alto, California. The bills had been washed in lantern fuel, as per instruction, then double-vacuum-sealed...
Emails obtained by Motherboard show that off-the-books support from an FBI agent and dozens of supportive comments from regular people empowered a public library to keep its Tor node running.
“I grew up in the police state of South Africa during the Apartheid era, and am thoroughly disillusioned with the direction America is taking. This sort of intimidation tactic is something you would see in a totalitarian state like the one I am from, where books were banned, people's actions were monitored, and where we feared the government at every turn,”
Many don’t understand why they should be concerned about surveillance if they have nothing to hide. It’s even less clear in the world of 'oblique' surveillance, given that apologists will always frame our use of information-gathering services like a mobile phone plan or Gmail as a choice. if everyone’s every action were being monitored, and everyone technically violates some obscure law at some time, then punishment becomes purely selective.
Cyborg Unplug is a privacy appliance for the home, hotel and workplace. It detects and optionally disconnects (outside US only) selected devices known to pose a risk to personal privacy, stopping streams of image, video and audio data to the Internet (or the car outside).
Security researchers believe they have finally solved the mystery around how a sophisticated backdoor embedded in Juniper firewalls works.
Last week, we wrote about how Juniper Networks had uncovered some unauthorized code in its firewall operating system, allowing knowledgeable attackers to get in and decrypt VPN traffic. While the leading suspect still remains the NSA, it's been...
Terence Eden proposed a code and Bray ran with it, using “451” in reference to Ray Bradbury’s censorship dystopia Farhenheit 451.
The blog post that inspired IETF: 'There is no HTTP code for censorship (but perhaps there should be)' [http://shkspr.mobi/blog/2012/06/there-is-no-http-code-for-censorship-but-perhaps-there-should-be/]
Concerned about the militarization of law enforcement, a source within the intelligence community has provided The Intercept with a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies.
Remember CISA? The "Cybersecurity Information Sharing Act"? It's getting much, much worse, with Congress and the administration looking to ram it through -- in the process, dropping any pretense that it's not a surveillance...