background preloader

Petit manuel de contre-espionnage informatique

Petit manuel de contre-espionnage informatique

http://owni.fr/2010/05/24/petit-manuel-de-contre-espionnage-informatique/

Low-Tech Solutions To High-Tech Tyranny Submitted by Brandon Smith from Alt-Market Low-Tech Solutions To High-Tech Tyranny Disclaimer: The following is a series of fictional accounts of theoretical situations. However, the information contained within was taken from established scientific journals on covered technology and military studies of real life combat scenarios. Alt-Market does not condone the use of any of the tactics described within for “illegal” purposes. Obviously, the totalitarian subject matter portrayed here is “pure fantasy”, and would never be encountered in the U.S. where politicians and corporate bankers are forthright, honest, and honorable, wishing only the sweetest sugar coated chili-dog best for all of mankind…

Privacy 101: privacy, anonymity and you This is a double guest post, incorporating two separate presentations from the recent Melbourne Crytoparty event. Cryptoparties are grass-roots data security education activism – CryptoParties are free to attend, public, and are commercially non-aligned. Some of the information provided below is specific to Australian law; find a Cryptoparty MeetUp local to you if you want to check your specific legalities (follow the proceedings online if you can’t get to the MeetUp itself).

I-BlockList Register | Recover Account HomeSoftwareListsSubscribeContact PhantomPeer VPN Service I-Blocklist has launched a VPN and proxy service named PhantomPeer. To find out more please visit the site at www.phantompeer.com Cryptoparties, danger, and why you (the hacker) should help. Recently, cryptoparties have “gone viral” the world over. In short, they are gatherings where people with knowledge of crypto take the opportunity to spread that knowledge to others who has a need and/or interest, such as journalists, activists etc. However, I hear from one of the originators, Asher Wolf, that the wiki has been changed by “experts”, who claim that “crypto is dangerous” in various ways. I will attempt to address these concerns quickly: Crypto, done wrong, leads to a false sense of security

Huge Security Flaw Makes VPNs Useless for BitTorrent Millions of BitTorrent users who have chosen to hide their identities through a VPN service may not be as anonymous as they would like to be. Due to a huge security flaw, those who use IPv6 in combination with a PPTP-based VPN such as Ipredator are broadcasting information linking to their real IP-address on BitTorrent. As pressure from anti-piracy outfits on governments to implement stricter copyright laws increases, millions of file-sharers have decided to protect their privacy by going anonymous. In Sweden alone an estimated 500,000 Internet subscribers are hiding their identities.

An App Keeps Spies Away from Your iPhone Anytime you use your phone to make a call or send an e-mail or text message, there’s a chance it will be intercepted by someone who has access—legal or otherwise—to your providers’ servers. A new app called Silent Circle tries to change that by encrypting calls, e-mails, and texts. It’s aimed at activists, companies, and individuals who fear they’re being spied on. CRYPTO 2012 : Day One The annual return of cryptographers to sunny Santa Barbara started today. The morning was dominated by an excellent invited talk by Jonathan Zittrain entitled "The End of Crypto". The talk gave an interesting initial presentation of the history of computers and networks. In terms of computers before the advent of the PC there was essentially two models. Reprogrammable computers which were essentially mainframes and kept out of the hands of the public; and non-programmable computers which the public could use but had limited functionality (think of the old pong video consoles). With the advent of the Apple-2 people could produce their own softare, and one such piece of software (Visicalc) was so successful that (apparently) initially Apple had no clue why the Apple-2 devices were flying off the shelves.

Skype hands 16-year-old's personal information to IT company AMSTERDAM - Skype illegally distributed a user's personal information to a private company during a police investigation into Anonymous-sanctioned cyberattacks on PayPal. Foto: AFP Dit artikel is oorspronkelijk verschenen in het Nederlands. It and several other payment companies were attacked out of retribution for blocking donations to Wikileaks in 2011.

Apple zombie malware ‘NetWeird’ rummages for browser and email passwords When we write Naked Security articles about Mac malware, we often end up creating a bit of a stir. Usually that's not on account of the malware itself, but on account of us writing about it in the first place. Here's how it goes down. We write the article.

Why passwords have never been weaker—and crackers have never been stronger In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. You Are Not Anonymous, Nothing Is Secure We’ve had the opportunity to have a chat with a former member of the infamous TeaMp0ison collective who has been recently raided by authorities. Although he has asked us not to reveal his true identity because the case is sealed, he wants to get his message out to all the black hats who are still active on the hacking scene. “I got raided on June 26 by 16 FBI agents, 2 special agents and 2 helicopters at 6AM. On the same day, 30 other, including Cosmo and JoshTheGod were raided. They had search warrants for electronics pertaining to TeaMp0isoN, Anonymous, Guy Fawkes and a hacking forum,” he started his story.

Destroy Internet Tracking Files With PrivacyScan Editor’s note: The following review is part of Macworld’s GemFest 2012 series. Every weekday from mid June through mid August, the Macworld staff will use the Mac Gems blog to briefly cover a favorite free or low-cost program. Visit the Mac Gems homepage for a list of past Mac Gems. All Web surfers know—or should know—that even though they often use the Internet in the privacy of their homes, they are not alone. Skype makes chats and user data more available to police The changes to online chats, which are written messages conveyed almost instantaneously between users, result in part from technical upgrades to Skype that were instituted to address outages and other stability issues since Microsoft bought the company last year. Officials of the United States and other countries have long pushed to expand their access to newer forms of communications to resolve an issue that the FBI calls the “going dark” problem. Microsoft has approached the issue with “tremendous sensitivity and a canny awareness of what the issues would be,” said an industry official familiar with Microsoft’s plans, who like several people interviewed for this story spoke on the condition of anonymity because they weren’t authorized to discuss the issue publicly.

Tcx Blue cabinet From We Re-Build The is a working wiki project to document vendors and manufacturers of surveillance equipment that are used in dictatorships and democracies around the internets. Blue Cabinet Wiki is . This means that may add truthful data with sources i.e. urls to where you found it online. You can make an to login with -- by using a fake name/nick and being responsible of your password. In doing so you will not have to provide an email address.

Related: