background preloader

About Net-Neutrality...

Facebook Twitter

The Truth About 'Net Neutrality' FCC to Seize Entire Internet, Cable Spectrum Under 400-Page “Rules” FCC cherry picking existing laws for cable, radio & broadband to regulate Internet Kit Daniels Prison Planet.com March 13, 2015 The FCC is combining several separate sections of telecommunications law developed for radio, cable TV and broadband access for a regulatory takeover of the Internet and is enforcing it with the same rules and methods as the Justice Department, according to its 400-page report released Thursday.

FCC to Seize Entire Internet, Cable Spectrum Under 400-Page “Rules”

Federal Judge Rules You May Be Forced To Provide Decryption Password. News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une... Atlantico Thursday, March 20, 2014 12:39 PM GMT Selon un document interne des services secrets techniques britanniques (GCHQ), les services secrets français, la Direction générale de la sécurité extérieure (DGSE), entretiennent une coopération étroite avec "un opérateur de télécommunication français".

News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une...

Selon le Monde, il s'agit de France Télécom-Orange. Selon le GCHQ, la DGSE et l'opérateur historique français travaillent ensemble pour améliorer les capacités nationales d'interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. Ainsi, France Télécom est un acteur important du système de surveillance en France. Cette collecte portant sur des données massives, touche aussi bien des Français que des étrangers.

Your WhatsApp messages may not be private: Here’s how to secure them Tech2 Mobile. By Nikhil Subramaniam / 13 Mar 2014, 18:18 Thought your WhatsApp messages cannot be accessed remotely?

Your WhatsApp messages may not be private: Here’s how to secure them Tech2 Mobile

Think again as one security expert has discovered a way to read WhatsApp messages off Android devices. Security consultant Bas Bosschert said that it was possible for others to access users’ private WhatsApp chats through downloaded Android apps. Bosschert insists his method works even on the latest WhatsApp update for Android which adds privacy settings. Souriez, vous êtes cybersurveillés ! Dans le langage courant, Internet et la Toile, autrement dit le World Wide Web (WWW), sont souvent utilisés comme des synonymes : Internet s’apparente au réseau mondial et le réseau mondial, c’est Internet.

Souriez, vous êtes cybersurveillés !

Or, il existe une considérable différence d’ordre technique entre Internet et le Web. FCC Chairman Sold Out The Internet. Creating a Two-Speed Internet. Net Neutrality. Dangers of a World Without Net Neutrality. Last month the FCC released its proposal for America’s new network neutrality rules.

Dangers of a World Without Net Neutrality

Unfortunately, the agency’s proposal included rules that would permit Internet providers to prioritize certain websites, e.g., make deals with some services for a faster and better path to subscribers. While the FCC claims it is not endorsing such deals, the proposed rules will inevitably be read as exactly that. Network Neutrality Overview. OpenSSL: The Open Source toolkit for SSL/TLS. Your Interest in Privacy Will Ensure You're Targeted By The NSA.

Facebook, trop c’est trop… “Si vous avez l’impression que vous êtes trop petit pour changer quelque chose, essayez donc de dormir avec un moustique.

Facebook, trop c’est trop…

Vous verrez lequel des deux empêche l’autre de dormir” – Dalaï Lama Ce n’est peut-être pas encore votre cas, mais soyez patients, cela ne va pas tarder à vous arriver aussi. Voici mon amère expérience de ce matin sur Facebook. » The Plan to Kill the Internet Uncovered Alex Jones' Infowars: There's a war on for your mind! The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform.

» The Plan to Kill the Internet Uncovered Alex Jones' Infowars: There's a war on for your mind!

This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form. 1) The Death of Net Neutrality The Federal Communications Commission (FCC) recently gave the green light for large Internet Service Providers to create a two-tier Internet system which would allow large corporations to buy up dedicated faster bandwidth, ending net neutrality and potentially leaving smaller websites in the dust. “[S]maller companies that can’t afford to pay for faster delivery would likely face additional obstacles against bigger rivals. The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA.

BitTorrent Sync.

The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA

Photo: Ariel Zambelich/WIRED BitTorrent was best known as an internet protocol that let people swap pirated movies and music at the expense of big Hollywood studios and record labels. But then came a Belarusian engineer named Konstantin Lissounov. About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family.

Comment se rendre invisible du réseau PRISM? La révélation par Edward Snowden des programmes américains de surveillance de l’internet et des communications a semé l’inquiétude chez certains internautes, y compris ceux qui n’ont pas de projets d’attentats ou de complots contre les Etats.

Comment se rendre invisible du réseau PRISM?

On connaît une liste de 9 firmes qui ont confirmé avoir collaboré avec la NSA dans le cadre de PRISM: Apple, Microsoft, Yahoo, Google, YouTube, Facebook, Skype, PalTalk et AOL. Sur cette base, un designer nommé Peng Zhong propose sur un site internet une série d’outils qui devraient aider les internautes soucieux de protéger leur vie privée à ne pas être espionné par les autorités américaines. Ces outils ne peuvent pas avoir été développés par les 9 firmes qui collaborent avec la NSA. Selon Peng Zhong, si l’on veut échapper totalement à PRISM, il faut tout changer dans sa façon d’utiliser internet. Seven People Hold the Keys to Global Internet Security. The Guardian’s James Ball describes a Masonic-like meeting of the lords of the Internet in Los Angeles.

Seven People Hold the Keys to Global Internet Security

 SQRL Secure Quick Reliable Login. Proposing a comprehensive, easy-to-use, high security replacement for usernames,passwords, reminders, one-time-code authenticators . . . and everything else. How the ‘John Oliver Effect’ Is Having a Real-Life Impact. Save the Internet! Cell Storming - Media driven Mind Mapping, Brainstorming, and Idea Generation for the iPhone, iPod Touch and iPad. Cell Storming is a Brainstorming, Idea Generating, Mind Mapping App for your iPhone, iPod Touch, and iPad. Use Cell Storming to develop your ideas by creating a network of cells to represent your thoughts as they come to you. Capture photos from your device camera or select from the camera roll to attach images to cells, or record a voice memo that can be played back simply when viewing your Cell Storming map. There is even a freehand drawing canvas if you want to quickly sketch a thought down. Crypto prof asked to remove NSA-related blog post.

Matthew Green is a well-known cryptography professor, currently teaching in the computer science department of Johns Hopkins University in Baltimore. Last week, Green authored a long and interesting blog post about the recent revelations that the National Security Agency (NSA) has, among much else, subverted crypto standards. Is It the Dawn of the Encryption App? We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They're watching us; technology has turned against its users. Amidst prying eyes, a small but growing group of hackers and programmers is working on applications that use cryptography — the science of creating techniques to hide data and render it readable only to intended recipients — to fight surveillance and give regular citizens access to what was once only reserved to computer experts.

The Day We Fought Back By The Numbers. Thanks to everyone who participated on Tuesday. Together we demonstrated that activists, organizations, and companies can work in unison to fight mass surveillance, and laid a foundation for escalation over months to come. Below are some numbers that quantify how we did* on Tuesday. * The figures below represent a lower bound - at least tens of thousands of people took action independently and using tools on other sites. The Day We Fight Back: The Video. Websites so far. days hours minutes seconds left. Open Mesh Project - Don't let governments shut down the Internet.

Statement on Mozilla and the Importance of the Open Internetu. Republicans Look to Kill Net Neutrality, Hand the Web to Corporations. In 2012, United States House of Representatives member Lamar S. Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff. Commotion : un nouvel Internet libre ? Une équipe de chercheurs américains vient de mettre au point un Internet libre. Baptisé Commotion, la solution logicielle permet de créer des réseaux WiFi autonomes, qui ne passent par aucune infrastructure actuelle.

Une révolution dans le monde de l’Internet ! Je n'ai rien à cacher. Why Privacy Matters Even if You Have 'Nothing to Hide' By Daniel J. Souriez, vous êtes cybersurveillés !