How to Setup A Hastebin Server Hastebin is a beautiful simple pastebin used for sharing little pieces of code or information between friends/coworkers. A friend introduced me to it about a month ago when we were trying to collaborate on a piece of batch script we were working through. After utilizing it for a couple of weeks and realizing its usability, I had the epiphany of hosting my own Hastebin! And a plus is, all collaboration is stored on one of my own machines and not out there in the wild somewhere (it helps me sleep better at night). Enjoy! Steps for installing a Hastebin Server Why Nico Sell, CEO of Wickr, Demands Privacy and Resists Social-Media Business There's a lot you won't learn about Nico Sell in the course of this story. You won't learn how to follow her on Twitter or Instagram or Vine. You won't learn her age, or where she lives, exactly, or the year she graduated from Dartmouth. You won't find out the names of her two girls or her husband's name or whether hers is Nico Sell at all.
Information Security for Journalists By Silkie Carlo and Arjen Kamphuis We're very glad to be able to provide this handbook as a free download, and we really want to keep it that way. If you've found the handbook useful, or you want to help ensure it remains available to those who couldn't afford to buy a copy, please consider making a donation here. Many thanks from the Centre for Investigative Journalism. Download the book: PDF, ePub, MOBI, AWZ3, LIT and FB2 formats or view it online. Mobile/Janus Overview Janus is a compression and privacy proxy with the goal to provide more secure and efficient mobile browsing. The goals section gives some details on our objectives and the ways we want to achieve them. The Janus Proxy is currently using the experimental SPDY protocol but will use the upcoming new HTTP/2 standard when it is finalized. The proxy does compress and re-encode media files using techniques described in the features section.
Tor Browser Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Click Install (3) Wait until the installer finishes. A directory of direct links to delete your account from web services. Can't find what you're looking for? Help make justdelete.me better. easy
Revealed: 'Collect It All' NSA Targets Those Seeking Web Privacy (Image: via Boing Boing)Internet users who use online privacy tools or read certain websites may themselves become targets of NSA surveillance, according to a new investigation by public broadcasting outlets in Germany published on Thursday. Citing documents that refer to "deep packet inspection" rules used by the NSA for its so-called "XKeyscore" program to determine what targets are selected for surveillance and how, the investigation (versions: German | English) reveals that people who seek out or use online privacy tools—including things like TOR, a network tool that provides digital anonymity and minimizes exposure to possible surveillance—may be targeted simply for making those efforts. Other platforms targeted by the program include the LINUX open source operating system as well as privacy and encryption services such as HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion.
Encrypting Your Laptop Like You Mean It Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.” But how can ordinary people get started using encryption? Encryption comes in many forms and is used at many different stages in the handling of digital information (you’re using it right now, perhaps without even realizing it, because your connection to this website is encrypted).
Sandcat Browser - The Pen Tester's Browser Sandcat Browser 5 brings unique features that are useful for pen-testers and web developers. Sandcat is built on top of Chromium and uses the Lua programming language to provide extensions and scripting support. See what's new in Sandcat 5 Five ways to delete yourself from the Internet If you're reading this, it's highly likely that your personal information is available to the public. And while you can never remove yourself completely from the Internet, there are ways to minimize your online footprint. Here are five ways to do so. Be warned however; removing your information from the Internet as I've laid it out below, may adversely affect your ability to communicate with potential employers. 1. Delete or deactivate your shopping, social network, and Web services accounts.