background preloader

Global Encrypted Communications Service

Anonymous Helps Researchers Link Hackers To Chinese Army An American computer security company released an explosive report Tuesday linking a Chinese military unit to a growing number of cyber attacks against American companies, organizations and government agencies. But some of those connections -- including profiles of the individual hackers in China -- could not have been made without the work of the hacker group Anonymous, according to the report by the security firm Mandiant. Security researchers and government officials have long claimed that China is behind a growing number of cyber attacks against American computer networks, a charge that China has repeatedly denied. But Mandiant's 73-page report was unusual in its level of detail, going so far as to profile the identities of three hackers who are believed to be working for the Chinese military. Mandiant said it was able to find connections between two of those hackers and China's People’s Liberation Army by relying on public data first revealed by the hacker group Anonymous.

The internet is our social network | friendica Anonymous Hacked Bank of America You’ve probably already heard of Anonymous, the world’s most infamous group of cybertrolling hacktivists. They frequently make headlines for crashing websites and looting corporate and government servers. Usually these hacktivists come together in defense of others, such as Julian Assange, the people of Gaza, victims of police brutality, or even victims of rape. But now, Anonymous has turned its eyes on a personal rival. On February 25 @AnonymousIRC, an Anonymous Twitter account with over 280,000 followers, began posting “teasers” about a massive Bank of America data leak. Having a team on staff to protect a corporation from potential cyberthreats is nothing new. In one email, TEKsystems reveals that IRC chat users were discussing a document on the US House of Representatives website, house.gov, which listed companies that had officially given their support to the Stop Online Piracy Act (SOPA). More on hacktivists: Why Is Barrett Brown Facing 100 Years in Prison? The Gaza Strip Cyber War

RetroShare Killing hackers is justified in cyber warfare, says NATO-commissioned report A landmark document created at the request of NATO has proposed a set of rules for how international cyberwarfare should be conducted. Written by 20 experts in conjunction with the International Committee of the Red Cross and the US Cyber Command, the Tallinn Manual on the International Law Applicable to Cyber Warfare analyzes the rules of conventional war and applies them to state-sponsored cyberattacks. Unsurprisingly, the manual advises that attacks must avoid targets such as hospitals, dams, and nuclear power stations in order to minimize civilian casualties, but also makes some bold statements regarding retaliatory conduct. According to the manual's authors, it's acceptable to retaliate against cyberattacks with traditional weapons when a state can prove the attack lead to death or severe property damage. It also says that hackers who perpetrate attacks are legitimate targets for a counterstrike. "There's plenty of law that applies to cyberspace."

The Freenet Project - /index “Stop the Cyborgs” launches public campaign against Google Glass Less than two weeks ago, Seattle’s 5 Point Cafe became the first known establishment in the United States (and possibly the world) to publicly ban Google Glass, the highly anticipated augmented reality device set to be released later this year. The “No Glass” logo that the café published on its website was developed and released (under a Creative Commons license) by a new London-based group called “Stop the Cyborgs.” The group is composed of three young Londoners who decided to make a public case against Google Glass and other similar devices. “If it's just a few geeks wearing it, it's a niche tool [and] I don't think it's a problem,” said Adam, 27, who prefers only to be identified by his first name. He communicated with Ars via Skype and an encrypted Hushmail e-mail account. “But if suddenly everyone is wearing it and this becomes as prevalent as smartphones—you can see it becomes very intrusive very quickly. “Most people [have] no idea what they were looking at”

Tails 1.1.2 is out Tails, The Amnesic Incognito Live System, version 1.1.2, is out. This release fixes numerous security issues and all users must upgrade as soon as possible. We prepared this release mainly to fix a serious flaw in the Network Security Services (NSS) library used by Firefox and other products allows attackers to create forged RSA certificates. Before this release, users on a compromised network could be directed to sites using a fraudulent certificate and mistake them for legitimate sites. This could deceive them into revealing personal information such as usernames and passwords. It may also deceive users into downloading malware if they believe it’s coming from a trusted site. Notable user-visible changes include: Security fixes Upgrade the web browser to 24.8.0esr-0+tails3~bpo70+1Install Linux 3.16-1Numerous other software upgrades that fix security issues: GnuPG, APT, DBus, Bash, and packages built from the bind9 and libav source packages See the online Changelog for technical details.

RedPhone :: Secure Calls ★ Best Phone Call App on Google Play ★★ Calling App,cheap phone calls★★ Call anyone, anytime, from anywhere in a cheaper way★Cheap calls to India.Cheap calls to China.Cheap calls to USA.Cheap calls to Nigeria.Cheap calls to Mexico.Cheap calls to UK.★ Best Call Recorder - record phone calls for free★★ Absolutely Ads Free! ★ ★ Turn your pad to phone★ ★ NO NEED to apply for account ★ ★ Can display the Caller ID ★ ★ Great voice quality at very LOW VoIP call rates for US and international calls★ ★ Free gift credit to start★ ★ Pay As You Go with Google Wallet ★ ★ Buy More Get More ★ ************************************* buy $20 get $1 gift credit buy $50 get $5 gift credit buy $100 get $15 gift credit************************************* -----Customer REVIEWS----- "Great phone. I use lots of phone ups and this one works wonderful. "This app is the best. "awesome!! With WePhone on your device , you can make worldwide cheap calls with CRYSTAL CLEAR SOUND QUALITY. ★ VERY VERY EASY TO USE!!

anonabox user.riseup.net home mail lists help status donate about us Request an email account This form will step you through the process of creating a riseup.net account. There are two ways to have your account approved: you can either get invite codes from existing users you know or wait for us to approve your request. It is sometimes difficult for us to keep up with the volume of requests, so it may take us up to a few weeks to get back to you. You must have cookies enabled to use this form.

A simple VPN guide for the beginning Anonymous and online activist This document is part of our Guides for the Anonymous collective. Be sure to check it out. This guide is dedicated to all new online activists who need guidance with VPNs (virtual private networks). We’re going to help you with your first setup choice. If you only want to know what VPN/Proxy we recommend skip to the list. Never use the any suggested setup for anything related to your personal life. Before we start You need to understand the following topic so read each page carefully : VPN, Proxy, VM, Bitcoin. Choose your setup Dedicated Device + VPN This is the most effective, easy and secure setup. Install a new OS (operating system) on your machine. This can work with iPods, iPads, computer and any device that supports VPNs. Dedicated VM + VPN Bit more technical but very effective. Install your virtual machine software. Using TOR Browser bundle with a paid proxy Simple, secure and effective. Install TOR Browser bundle.Choose a proxy. Don’t download files, don’t upload files. VPN/Proxy list

Related: