s | SQRL Secure Quick Reliable Login The user experience: Wishing to login to an online service where an “SQRL” code appears nearby: Even though it is THAT simple, it is FARmore secure than any other login solution. What happened behind the scenes? Summarizing this for your next cocktail party: “The website's login presents a QR code containing the URL of its authentication service, plus a nonce. This simple and straightforward SQRL protocolyields a surprising array of features and benefits: Anonymous Identification & Authentication: SQRL ID: Visitors to a website are uniquely identified by an absolutely anonymous SQRL ID. SQRL IDs are both user AND site specific: Although the same user always presents the same ID to the same site, they present an entirely different ID to every other site they visit. No annoying account creation: Suppose you wish to simply comment on a blog posting. An important note about anonymity: To be clear, virtually nothing else about the use of the Internet is securely anonymous. Hold on a second . . .
The Day We Fought Back By The Numbers Thanks to everyone who participated on Tuesday. Together we demonstrated that activists, organizations, and companies can work in unison to fight mass surveillance, and laid a foundation for escalation over months to come. Below are some numbers that quantify how we did* on Tuesday. * The figures below represent a lower bound - at least tens of thousands of people took action independently and using tools on other sites. The Day We Fight Back: The Video websites so far. days hours minutes seconds left. Statement on Mozilla and the Importance of the Open Internetu We support the Mozilla community and the vital work they've done—and must keep doing—for the open Internet. EFF has been following the discussions around the choice of Brendan Eich as Mozilla’s CEO, including the announcement that he is stepping down. As partners to Mozilla in campaigns that have included the fight against SOPA/PIPA, the StopWatching.US Coalition against mass surveillance, the effort to Encrypt the Web, the battle to prevent non-consensual online tracking, and ongoing work to make Firefox a more secure browser, we appreciate the frank and honest discussion that the community has undergone over this issue and respect the openness of the process. We believe that what Mozilla stands for—building and supporting an open Internet that gives users freedom to communicate, innovate, and stay safe and secure—is a job that few other institutions are in a place to pursue. As David Clark said long ago, the Internet runs best on "rough consensus and running code."
News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une... Atlantico Thursday, March 20, 2014 12:39 PM GMT Selon un document interne des services secrets techniques britanniques (GCHQ), les services secrets français, la Direction générale de la sécurité extérieure (DGSE), entretiennent une coopération étroite avec "un opérateur de télécommunication français". Selon le Monde, il s'agit de France Télécom-Orange. Selon le GCHQ, la DGSE et l'opérateur historique français travaillent ensemble pour améliorer les capacités nationales d'interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. Cette collecte portant sur des données massives, touche aussi bien des Français que des étrangers. "Le rapport entre France Télécom et la DGSE n'est pas de même nature que celui révélé dans le programme Prism de la NSA, qui a des liens contractuels avec les géants d'Internet, a expliqué un ancien chef de service de renseignement français.
Federal Judge Rules You May Be Forced To Provide Decryption Password In July, we wrote about an ongoing case wherein a woman accused of fraud was being asked by the prosecution to provide the password to access her computer’s data, which otherwise would remain encrypted and unreadable, weakening their case. They got permission to compel her to reveal the password, but the defense said that it was unconstitutional to do so, as providing that information was essentially self-incriminating testimony. The defense and the prosecution disagree, there is no single compelling precedent, and even the Supreme Court, which has weighed in on a similar topic, isn’t quite sure what to make of the situation. His opinion, which is embedded at the end of the post, is not a poorly informed or foolish one (like some inevitably are in tech), though it isn’t very transparent. The question everybody is asking is not whether Ramona Fricosu will be convicted of fraud, but how access to data should be considered in a courtroom.
Your WhatsApp messages may not be private: Here’s how to secure them Tech2 Mobile By Nikhil Subramaniam / 13 Mar 2014, 18:18 Thought your WhatsApp messages cannot be accessed remotely? Think again as one security expert has discovered a way to read WhatsApp messages off Android devices. Security consultant Bas Bosschert said that it was possible for others to access users’ private WhatsApp chats through downloaded Android apps. Bosschert published a proof of concept on his blog and explained the workings in detail. Despite WhatsApp using encryption to secure the message database, it’s possible to extract messages using easily-available online tools. “The WhatsAppp database is a SQLite3 database which can be converted to Excel for easier access. Related: #WhatsApp for Android #WhatsApp loophole #WhatsApp Messenger #WhatsApp security #WhatsApp vulnerability
Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff "Think of it it like leaving your doors and windows open and complaining when someone looks inside." I find this to be an iffy comparison. I understand what you guys are trying to explain but it misrepresents the problem. I'm entitled to leave my windows and doors of my house open, if someone steps onto my property to have a look without my permission than in most countries that's trespassing. If they were trying to take a peek from the sidewalk then sure, by all means, go ahead. It largely depends on what the guy accessed or not. If he saw it was open and decided to take a look and didn't delve into any emails, send any or whatever then sure, I can live with that, if he merely just looked at the page that was already being displayed. But if he went inside individual emails, started reading them etc, I find that should be comparable to going into someone's mailbox and opening up the letters, which is a federal crime.
Seven People Hold the Keys to Global Internet Security The Guardian’s James Ball describes a Masonic-like meeting of the lords of the Internet in Los Angeles. But “the reality is rather closer to ‘The Office’ than ‘The Matrix,’ ” he says. In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs. There is a strange mix of accents – predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75-cent vending machine soda. In the corner, an Asteroids arcade machine blares out tinny music and flashing lights. If you have trouble leaving a comment, review this help page.
Republicans Look to Kill Net Neutrality, Hand the Web to Corporations In 2012, United States House of Representatives member Lamar S. Smith (R-TX) introduced the Stop Online Piracy Act, or SOPA. While the main goal of the bill was to deter piracy, the language was very broad and far reaching. As a result, public outrage hit a fever pitch. More than 100,000 people signed an online petition asking President Obama to oppose the legislation. Net neutrality is a topic that many are unfamiliar with, but if the neutrality is infringed upon, it will have serious ramifications for everybody connected to the internet. What exactly is net neutrality? Network neutrality is the principle that Internet users should be able to access any web content they choose and use any applications they choose, without restrictions or limitations imposed by their Internet service provider. As you can see, net neutrality is important in a country that values freedom. According to a recent study, Netflix uses more than 30% of all North American nightly traffic of the internet. Video
The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA | Wired Business BitTorrent was best known as an internet protocol that let people swap pirated movies and music at the expense of big Hollywood studios and record labels. But then came a Belarusian engineer named Konstantin Lissounov. About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family. The tool won first prize at the hackathon, and within a few more months, after Lissounov honed the tool alongside various other engineers, the company delivered BitTorrent Sync, a Dropbox-like service that lets you seamlessly synchronize files across computers and mobile devices.
» The Plan to Kill the Internet Uncovered Alex Jones' Infowars: There's a war on for your mind! The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform. This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form. 1) The Death of Net Neutrality The Federal Communications Commission (FCC) recently gave the green light for large Internet Service Providers to create a two-tier Internet system which would allow large corporations to buy up dedicated faster bandwidth, ending net neutrality and potentially leaving smaller websites in the dust. “[S]maller companies that can’t afford to pay for faster delivery would likely face additional obstacles against bigger rivals.
Facebook, trop c’est trop… “Si vous avez l’impression que vous êtes trop petit pour changer quelque chose, essayez donc de dormir avec un moustique. Vous verrez lequel des deux empêche l’autre de dormir” – Dalaï Lama Ce n’est peut-être pas encore votre cas, mais soyez patients, cela ne va pas tarder à vous arriver aussi. Voici mon amère expérience de ce matin sur Facebook. J’envoie un lien vidéo à un ami, facebook le considérant comme un spam a bloqué immédiatement mon compte car selon eux, un logiciel malveillant s’était installé sur mon ordinateur (en réalité, j’ai un bon antivirus, firewall et tout le package de sécurité à jour). Ma seule façon de revenir sur facebook était dès lors d’installer leur logiciel de protection. Dans les conditions d’utilisation de cette extension Google Chrome, il est mentionné que le logiciel en question a le droit d’accéder à mes informations facebook, et surveiller ma navigation sur internet. M. M. Tous les sites et pages qui veulent participer à cette action sont les bienvenus.
Your Interest in Privacy Will Ensure You're Targeted By The NSA Have you ever wondered if you’re on an NSA observation list? Turns out that if you’ve even thought about it (or online privacy in general), you’re probably more likely to be on one. A few concerning news updates regarding mass surveillance by the NSA within the past week, including revelations from an analysis of the XKeyscore data collection system, have given us an idea of who might be among the NSA’s “targeted” individuals. Are You on the List? In previous documents, interviews, and other now-public materials, the NSA has stated that, while they can collect data from nearly anyone, they only target a small number of people who could be engaged in suspicious activity. Turns out that a lot of things can get you on the list, including visiting a number of privacy-related websites, or even running searching for privacy-related tools. Unsurprisingly, searches for Tor also land people on the targeted surveillance list. How Do We Know About XKeyscore? What Does This Mean For You?