Ron Deibert’s Lab Is the 'Robin Hood' of Cyber Securityat - Motherboard Last year, a well-known human rights activist from Dubai received a suspicious text on his iPhone. The message promised to reveal secrets about how the government tortured fellow dissidents and activists. But the message wasn't what it looked like. The problem with nerd politics In the aftermath of the Sopa fight, as top Eurocrats are declaring the imminent demise of Acta, as the Trans-Pacific Partnership begins to founder, as the German Pirate party takes seats in a third German regional election, it's worth taking stock of "nerd politics" and see where we've been and where we're headed. Since the earliest days of the information wars, people who care about freedom and technology have struggled with two ideological traps: nerd determinism and nerd fatalism. Both are dangerously attractive to people who love technology. In "nerd determinism," technologists dismiss dangerous and stupid political, legal and regulatory proposals on the grounds that they are technologically infeasible. Geeks who care about privacy dismiss broad wiretapping laws, easy lawful interception standards, and other networked surveillance on the grounds that they themselves can evade this surveillance.
OpenCryptoChip – Open Crypto Project The Layer Cake Architecture Picture ¶ Use Cases ¶ RPKI/DNSSEC Signing Transport VPNs Routers and TCP/AO Email Federations, Identity Systems, SSO etc Password Stretching & HMAC:ing PGP and SSH Keys on a Stick High Quality Entropy Randomness A Communications Terminal Doing One Thing Well, Like Jabber w/o X11 HSM for Pond, OTR identity keys, ssh private keys, etc. The National Security Archive December 9, 2014 Torture Report Finally Released Senate Intelligence Committee Summary of CIA's Detention and Interrogation Program Concludes CIA Misled Itself, Congress, the President about Lack of Effectiveness. September 28, 2014 THE YELLOW BOOK Secret Salvadoran military document from the civil war era catalogued "enemies," many killed or disappeared. More recent items The National Security Archive is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C.
How to Use SSH Tunneling to Access Restricted Servers and Browse Securely An SSH client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer. But an SSH client also allows you to “tunnel” a port between your local system and a remote SSH server. There are three different types of SSH tunneling, and they’re all used for different purposes. Each involves using an SSH server to redirect traffic from one network port to another. The traffic is sent over the encrypted SSH connection, so it can’t be monitored or modified in transit.
Syria – Traffic Graph – Google Transparency Report People have been unable to access certain Google products and services at some point in more than 30 countries. Causes for these disruptions vary, and include network outages and government-mandated blocks. Review current disruptions below or browse all documented disruptions. This list is not comprehensive. Learn more. YouTube Rick Falkvinge, Author at TorrentFreak For teenagers today, the copyright monopoly is something that the establishment uses to punish them for enjoying culture and science, to censor their protests and voices, and to prevent their art from reaching an audience. As these people grow older and come into policymaking positions, at what point will they… Throughout the debate on sharing culture and knowledge in violation of the copyright monopoly, one question keeps popping up. But it's not a question as much as an insult to all artists. Copyright monopolists insist on the idea of controlling the fruits of other people's labor, such as when other people copy a particular file.
Scientists Scientists who have tackled the challenging world of bioelectronics have not only found themselves grappling with the complex interactions of biology, chemistry, physics and electronics but in the crosshairs of government, industry and military. Against all odds, these scientists have not only had to unravel the mysteries of the science but have had to withstand censure, personal attack and lack of funding whenever their scientific directions challenged the safety of wireless technologies. (story) We salute these intrepid scientists, who have been heroically trying to warn us of the insidious harm from the fields of microwave radiation that invisibly surround us now 24 hours per day.
How to Choose the Best VPN Service for Your Needs Virtual Private Networks (VPNs) are veritable Swiss Army Knives when it comes to privacy enhancement, censorship avoidance, anonymous file sharing, and more. But not all VPNs are created equal, and there’s no sense paying for features you don’t need. Read on as we explore the ins and outs of picking a perfect VPN service. Busting Egypt's web blackout An Egyptian protester flashes Egypt's flag as anti-riot policemen use water canon against protesters in Cairo on Jan. 28, 2011. Such resilience on the part of protesters has enabled them to find creative ways to circumvent the internet blackout the government imposed Friday. ((Lefteris Pitarakis/Associated Press))