background preloader

Personal Liberty, Freedom

Facebook Twitter

Creepy handwritten notes of CIA psychologist who helped design US torture techniques for terror detainees. Anonymous makes a laughing stock of HBGary. Google Image Result for. 302 Moved. The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon.

302 Moved

These enable a DoS from a web browser.[4] Use LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5] Countermeasures LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used at the attack.[8] Notable uses Project Chanology and Operation Payback Operation Megaupload Origin of name The LOIC application is named after the Ion cannon, a fictional weapon from many sci-fi works.[14] Other implementations Another implementation of LOIC named LOIC++[15] has been made to run natively on Linux.

References External links. Low orbit ion cannon. 1337. Corporate Hacker Tries to Take Down WikiLeaks - The Colbert Report - 2/24/11. Schneier on Security. ‘Nude’ Airport Scanners: Are They Safe? Chilling Effects Clearinghouse. Thoughts on the DOJ wikileaks/twitter court order.

The world's media has jumped on the news that the US Department of Justice has sought, and obtained a court order seeking to compel Twitter to reveal account information associated with several of its users who are associated with Wikileaks.

Thoughts on the DOJ wikileaks/twitter court order

What Does the "Track" in "Do Not Track" Mean? There is a lot of discussion about Do Not Track at the moment.

What Does the "Track" in "Do Not Track" Mean?

The FTC has announced support for the idea; Mozilla has added a Do Not Track header option into Firefox betas, and Congresswoman Jackie Speier has introduced a Do Not Track bill. Other proposed privacy legislation, such as Rep. Bobby Rush's bill, could also achieve similar objectives. And yesterday, EFF submitted comments urging the Federal Trade Commission to defend online privacy by supporting the header-based Do Not Track feature. Do Not Track is important because it creates a policy mechanism to augment the privacy enhancing technologies that we currently have.

Some other anti-tracking technologies have also been discussed a lot recently, including Microsoft's IE 9 Tracking Protection Lists, and AdBlock Plus with EasyPrivacy. HTTPS Everywhere Rulesets. **Important note**: We will not be merging any new rulesets until April 2014 in order to prepare for the stable release of HTTPS Everywhere 4.0.

HTTPS Everywhere Rulesets

Bug reports and ruleset changes are still welcome, however. For more details, see this email. This page describes how to write rulesets for HTTPS Everywhere, the Firefox plugin that switches sites over from http to https automatically. HTTPS Everywhere comes with thousands of rulesets, but you might want to edit them, or write new ones. [We believe this information is correct as of version 3.0 of HTTPS Everywhere.] Rulesets are simple xml files. Rights and Freedom. Web & Totalitarism. Electoral dysfunction: Why democracy is always unfair - science-in-society - 28 April 2010. Read full article Continue reading page |1|2 Editorial: Giving democracy a shot in the arm IN AN ideal world, elections should be two things: free and fair.

Electoral dysfunction: Why democracy is always unfair - science-in-society - 28 April 2010

Every adult, with a few sensible exceptions, should be able to vote for a candidate of their choice, and each single vote should be worth the same. Ensuring a free vote is a matter for the law. The many democratic electoral systems in use around the world attempt to strike a balance between mathematical fairness and political considerations such as accountability and the need for strong, stable government.

American Footprints. Learn about nonviolent conflict and civil resistance. Secret China war plan: trillions in U.S. debt Paul B. Farrell. By Paul B.

Secret China war plan: trillions in U.S. debt Paul B. Farrell

Farrell, MarketWatch Warning: That toxic thinking may well happen again when new neocons, a future Rumsfeld/Cheney team, gets the same paranoid itchings at the same time as China’s generals, all driven by inflated egos, irrational obsessions and a propensity to make the same kind of misjudgments that launched the Iraq War. Warrior mindset sabotages our economy and superpower status ”Right now the Chinese seem to have taken the lead in this new arms race,” warns Sofge: “When Rand released a report in 2000 describing the potential outcome of a Sino-American conflict over Taiwan, the United States won the war handily. Nine years later, the nonpartisan think tank revised its analysis, accounting for Beijing’s updated air force, its focus on cyber warfare and its ability to use ballistic missiles to take out American satellites. Fed dictator Bernanke needs to be toppled Paul B. Farrell. By Paul B.

Fed dictator Bernanke needs to be toppled Paul B. Farrell

Farrell, MarketWatch ARROYO GRANDE, Calif. (MarketWatch) — Fed boss Ben Bernanke is the most dangerous human on earth, far more dangerous than Hosni Mubarak, Egypt’s 30-year dictator, ever was. Bernanke rules a monetary dictatorship that will trigger the coming third meltdown of the 21st century. But this reign of economic terror will end. Secret China war plan: trillions in U.S. debt Paul B. Farrell. By Paul B.

Secret China war plan: trillions in U.S. debt Paul B. Farrell

Farrell, MarketWatch SAN LUIS OBISPO, Calif. (MarketWatch) — Yes, Americans love war. Yes, wars cost money. Bees Who Work For the Police : Krulwich Wonders… Defending Freedom in the Digital World.