Tails: the operating system that blew open the NSA When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. BleachBit Portable cache, temp file and history cleaner BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files. Version 1.10 for Windows, Multilingual 6MB download / 8MB installed (Details) - Support BleachBit development - Support PortableApps.com's development and hosting
Information Security for Journalists By Silkie Carlo and Arjen Kamphuis We're very glad to be able to provide this handbook as a free download, and we really want to keep it that way. If you've found the handbook useful, or you want to help ensure it remains available to those who couldn't afford to buy a copy, please consider making a donation here. Many thanks from the Centre for Investigative Journalism. Scientists detect “spoiled onions” trying to sabotage Tor privacy network Computer scientists have identified almost two dozen computers that were actively working to sabotage the Tor privacy network by carrying out attacks that can degrade encrypted connections between end users and the websites or servers they visit. The "spoiled onions," as the researchers from Karlstad University in Sweden dubbed the bad actors, were among the 1,000 or so volunteer computers that typically made up the final nodes that exited the Tor—short for The Onion Router—network at any given time in recent months. Because these exit relays act as a bridge between the encrypted Tor network and the open Internet, the egressing traffic is decrypted as it leaves. That means operators of these servers can see traffic as it was sent by the end user. Any data the end user sent unencrypted, as well as the destinations of servers receiving or responding to data passed between an end user and server, can be monitored—and potentially modified—by malicious volunteers.
LibreOffice upgrade targets Windows integration and power users LibreOffice 4.2 is now out, featuring improved integration with Windows and new features for power users and the enterprise. "LibreOffice 4.2 offers two Windows-specific improvements for business users: a simplified custom install dialog to avoid potential mistakes, and the ability to centrally manage and lock-down the configuration with Group Policy Objects via Active Directory," the Document Foundation wrote in an announcement today. "All users benefit from better integration with Windows 7 and 8, with thumbnails of open documents now grouped by application and a list of recent documents, both showing on the task bar." Windows users aren't the only ones to benefit from the latest release of the open source office suite, which is also available on OS X and Linux. In addition to improving the desktop applications, LibreOffice is about to get an Impress Remote Control for iOS, letting iPhone users control presentations from their mobile devices.
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it. IO Ninja Scriptable/Programmable The word "programmable" speaks for itself. Now you can turn IO Ninja into your personal IO debugger and tune it to your liking with Jancy scripting. Whether you need a non-standard protocol analyzer, a network device emulator or an IO testing utility, IO Ninja can be programmed to do the job. Encrypting Your Laptop Like You Mean It Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
Speech recognition hack turns Google Chrome into advanced bugging device Users of Google's Chrome browser are vulnerable to attacks that allow malicious websites to use a computer microphone to surreptitiously eavesdrop on private conversations for extended periods of time, an expert in speech recognition said. The attack requires an end user to click on a button giving the website permission to access the microphone. Most of the time, Chrome will respond by placing a blinking red light in the corresponding browser tab and putting a camera icon in the address bar—both indicating that the website is receiving a live audio feed from the visitor.
clumsy, an utility for simulating broken network for Windows Vista / Windows 7 and above Releases Notice: clumsy only support Windows Vista, Windows 7 and above. 64bit Windows users are strongly recommanded to download the 64bit build. 32bit: clumsy-0.1-win32.zip (MD5:b8eb28c399f15f02112f5461f6465153) 64bit: clumsy-0.1-win64.zip (MD5:e75419e28321cdc2cb4ca6f9e4044fd0) Install Extract downloaded zip file to arbitrary directory and execute clumsy.exe. clumsy is alpha quality software and does have some gotchas. Be sure to read the manual page before using it.