background preloader

Open Mesh Project - Don't let governments shut down the Internet

Open Mesh Project - Don't let governments shut down the Internet

s | SQRL Secure Quick Reliable Login The user experience: Wishing to login to an online service where an “SQRL” code appears nearby: Even though it is THAT simple, it is FARmore secure than any other login solution. What happened behind the scenes? Summarizing this for your next cocktail party: “The website's login presents a QR code containing the URL of its authentication service, plus a nonce. This simple and straightforward SQRL protocolyields a surprising array of features and benefits: Anonymous Identification & Authentication: SQRL ID: Visitors to a website are uniquely identified by an absolutely anonymous SQRL ID. SQRL IDs are both user AND site specific: Although the same user always presents the same ID to the same site, they present an entirely different ID to every other site they visit. No annoying account creation: Suppose you wish to simply comment on a blog posting. An important note about anonymity: To be clear, virtually nothing else about the use of the Internet is securely anonymous. Hold on a second . . .

Le blog de Pierre Rabhi Un arbre unique et solitaire fait offrande de ses ramures au ciel incandescent. Nul ne sait par quel stratagème il a, dès son enfance, échappé à la main prédatrice de l’homme armé de fer, à la dent avide de l’animal famélique, à la rareté de l’eau et au dard du soleil plus que nulle part au sommet de son ardeur. Alentour est le désert infini submergé de silence séculaire parfois troublé par la rumeur lointaine de troupeaux évanescents allant sur les dunes et les immenses plateaux ensemencés de rocailles. Ici, l’espace et le temps sont confondus l’un par l’autre tenus, et n’ont d’autre mesure que la démesure de l’éternité. Dans cette vastitude lunaire librement parcourue de bise en février ou de vent en ouragan de sable, rugissant d’une fureur dont on ne sait la raison, l’arbre demeure en patience témoin superbe et pathétique d’un temps révolu. En m’approchant de la colline où il se tient en vigile de silence, il grandit à mes yeux. Des battements sourds se font entendre.

The Day We Fought Back By The Numbers Thanks to everyone who participated on Tuesday. Together we demonstrated that activists, organizations, and companies can work in unison to fight mass surveillance, and laid a foundation for escalation over months to come. Below are some numbers that quantify how we did* on Tuesday. * The figures below represent a lower bound - at least tens of thousands of people took action independently and using tools on other sites. Révolte Numérique The Day We Fight Back: The Video websites so far. days hours minutes seconds left.

Une armée de justiciers :: Pièces et Main d'Oeuvre-Mozilla Firefox Pendant plus de deux siècles, la révolte des ouvriers luddites a été diffamée, enfouie, refoulée par les historiens de toutes les écoles. En 1963, Edward P. Thompson, historien communiste – mais libre d’esprit – produit dans son livre The Making of the English Working Class (1) un chapitre d’épopée, « Une armée de justiciers », qui fait mieux que réhabiliter les luddites. Trente ans avant Marx et le Manifeste du Parti Communiste (1847), ces derniers critiquent en actes la dissociation entre moyens de production et rapports de production. Depuis ce livre pionnier, des études sur les luddites se multiplient. Le voici. Pièces et Main d’œuvre & Black Star (s)éditions Pour découvrir l’histoire des luddites en France, on se reportera au livre paru aux éditions L’Echappée en novembre 2010 : Les luddites en France - Résistances à l’industrialisation et à l’informatisation (collectif, coordonné par Cédric Biagini et Guillaume Carnino). (1) Editions Victor Gollancz.

Statement on Mozilla and the Importance of the Open Internetu We support the Mozilla community and the vital work they've done—and must keep doing—for the open Internet. EFF has been following the discussions around the choice of Brendan Eich as Mozilla’s CEO, including the announcement that he is stepping down. As partners to Mozilla in campaigns that have included the fight against SOPA/PIPA, the StopWatching.US Coalition against mass surveillance, the effort to Encrypt the Web, the battle to prevent non-consensual online tracking, and ongoing work to make Firefox a more secure browser, we appreciate the frank and honest discussion that the community has undergone over this issue and respect the openness of the process. We believe that what Mozilla stands for—building and supporting an open Internet that gives users freedom to communicate, innovate, and stay safe and secure—is a job that few other institutions are in a place to pursue. As David Clark said long ago, the Internet runs best on "rough consensus and running code."

L?art de la fuite. La philosophie politique de Julian Assange par lui-m?me. A titre de document et de contribution au débat, publie un texte écrit par Julien Assange en 2006, au moment de la fondation de Wikileaks. Ce texte théorique éclaire rétrospectivement sa visée stratégique. Contrairement à ce qu’une lecture hâtive peut laisser penser, ce qui est proposé ici n’est pas tant une théorie du complot - du moins pas sous la forme classique de la dénonciation paranoïaque - qu’un usage heuristique du modèle organisationnel de la conspiration : un réseau de pouvoir dont on peut tracer la carte. Assange est un hacker. S’il modélise la structure d’un pouvoir, c’est pour en découvrir les failles. Il se peut que vous lisiez ou , un texte d’orientation obscur, à peu près inutile tiré de son contexte, et peut-être même dès le départ. Plus une organisation est secrète ou injuste, plus des fuites vont entraîner de la peur et de la paranoïa dans son leadership et dans la coterie qui le dirige. {*style:<b> « La sécurité cède le pas à la conspiration ». ( , acte 2, sc. 3.

News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une... Atlantico Thursday, March 20, 2014 12:39 PM GMT Selon un document interne des services secrets techniques britanniques (GCHQ), les services secrets français, la Direction générale de la sécurité extérieure (DGSE), entretiennent une coopération étroite avec "un opérateur de télécommunication français". Selon le Monde, il s'agit de France Télécom-Orange. Selon le GCHQ, la DGSE et l'opérateur historique français travaillent ensemble pour améliorer les capacités nationales d'interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. Cette collecte portant sur des données massives, touche aussi bien des Français que des étrangers. "Le rapport entre France Télécom et la DGSE n'est pas de même nature que celui révélé dans le programme Prism de la NSA, qui a des liens contractuels avec les géants d'Internet, a expliqué un ancien chef de service de renseignement français.

Federal Judge Rules You May Be Forced To Provide Decryption Password In July, we wrote about an ongoing case wherein a woman accused of fraud was being asked by the prosecution to provide the password to access her computer’s data, which otherwise would remain encrypted and unreadable, weakening their case. They got permission to compel her to reveal the password, but the defense said that it was unconstitutional to do so, as providing that information was essentially self-incriminating testimony. The defense and the prosecution disagree, there is no single compelling precedent, and even the Supreme Court, which has weighed in on a similar topic, isn’t quite sure what to make of the situation. His opinion, which is embedded at the end of the post, is not a poorly informed or foolish one (like some inevitably are in tech), though it isn’t very transparent. The question everybody is asking is not whether Ramona Fricosu will be convicted of fraud, but how access to data should be considered in a courtroom.

Your WhatsApp messages may not be private: Here’s how to secure them Tech2 Mobile By Nikhil Subramaniam / 13 Mar 2014, 18:18 Thought your WhatsApp messages cannot be accessed remotely? Think again as one security expert has discovered a way to read WhatsApp messages off Android devices. Security consultant Bas Bosschert said that it was possible for others to access users’ private WhatsApp chats through downloaded Android apps. Bosschert published a proof of concept on his blog and explained the workings in detail. Despite WhatsApp using encryption to secure the message database, it’s possible to extract messages using easily-available online tools. “The WhatsAppp database is a SQLite3 database which can be converted to Excel for easier access. Related: #WhatsApp for Android #WhatsApp loophole #WhatsApp Messenger #WhatsApp security #WhatsApp vulnerability

Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff "Think of it it like leaving your doors and windows open and complaining when someone looks inside." I find this to be an iffy comparison. I understand what you guys are trying to explain but it misrepresents the problem. I'm entitled to leave my windows and doors of my house open, if someone steps onto my property to have a look without my permission than in most countries that's trespassing. If they were trying to take a peek from the sidewalk then sure, by all means, go ahead. It largely depends on what the guy accessed or not. If he saw it was open and decided to take a look and didn't delve into any emails, send any or whatever then sure, I can live with that, if he merely just looked at the page that was already being displayed. But if he went inside individual emails, started reading them etc, I find that should be comparable to going into someone's mailbox and opening up the letters, which is a federal crime.

Seven People Hold the Keys to Global Internet Security The Guardian’s James Ball describes a Masonic-like meeting of the lords of the Internet in Los Angeles. But “the reality is rather closer to ‘The Office’ than ‘The Matrix,’ ” he says. In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs. There is a strange mix of accents – predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75-cent vending machine soda. In the corner, an Asteroids arcade machine blares out tinny music and flashing lights. If you have trouble leaving a comment, review this help page.

Republicans Look to Kill Net Neutrality, Hand the Web to Corporations In 2012, United States House of Representatives member Lamar S. Smith (R-TX) introduced the Stop Online Piracy Act, or SOPA. While the main goal of the bill was to deter piracy, the language was very broad and far reaching. As a result, public outrage hit a fever pitch. More than 100,000 people signed an online petition asking President Obama to oppose the legislation. Net neutrality is a topic that many are unfamiliar with, but if the neutrality is infringed upon, it will have serious ramifications for everybody connected to the internet. What exactly is net neutrality? Network neutrality is the principle that Internet users should be able to access any web content they choose and use any applications they choose, without restrictions or limitations imposed by their Internet service provider. As you can see, net neutrality is important in a country that values freedom. According to a recent study, Netflix uses more than 30% of all North American nightly traffic of the internet. Video

Related: