Microsoft Online Surveillance Guide - Cryptome Leak
Cryptome, a whistleblower site that regularly leaks sensitive documents from governments and corporations, is in hot water again: this time, for publishing Microsoft’s “Global Criminal Compliance Handbook,” a comprehensive, 22-page guide running down the surveillance services Microsoft will perform for law enforcement agencies on its various online platforms, which includes detailed instructions for IP address extraction. You can find the guide here (warning: PDF). not anymore. Microsoft has demanded that Cryptome take down the guide — on the grounds that it constitutes a “copyrighted [work] published by Microsoft.” Yesterday, at 5pm, Cryptome editor John Young received a notice from his site’s host, Network Solutions, bearing a stiff ultimatum: citing the Digital Millenium Copyright Act (DMCA), Network Solutions told him that unless he takes the “copyrighted material” down, they will “disable [his] website” on Thursday, February 25, 2010. So far, Young refuses to budge. So, briefly: 1.
google.swf (application/x-shockwave-flash Object)
Dying Digitally
Anonymouse.org
AnonWWW Many mice surf the web under the illusion that their actions are private and anonymous. Unfortunately, this is not the way it is. Every time you visit a site for a piece of cheese, you leave a calling card that reveals where you are coming from, what kind of computer you use, and other details. And many cats keep logs of all your visits, so that they can catch you! Adverts Members | Terms of Service | Privacy Policy | Help / FAQ | Contact Info
Can the NSA and CIA use your phone to track your location?
July 26, 2011, 12:43 PM — There's no need to panic, or start shopping for aluminum-foil headwear, but the super-secret National Security Agency has apparently been thinking frequently enough about whether the NSA is allowed to intercept location data from cell phones to track U.S. citizens that the agency's chief lawyer was able to speak intelligently about it off the cuff while interviewing for a different job. "There are certain circumstances where that authority may exist," even if the NSA has no warrant to investigate a the person whose privacy it is invading or global permission to eavesdrop on everyone, according to Matthew Olsen, the NSA's general counsel. He didn't come to talk about that particularly; he said it yesterday in response to a question from the Senate Select Committee on Intelligence, which was considering whether he'd be a good choice to run the National Counterterrorism Center. So far, though, no law.
9 Implants that make human healthy body even more useful
Here’s a list of 9 ways you can modify your body to be even more useful, from bionic implants to portable power generators. 1. RFID Chips – A nice and easy way to start out with body hacking is to implant an RFID chip into you. 2. 3. 4. 5. 6. 7. 8. 9. Source
Please note - this is a real diary website
Become Web Dead: Erase Your Online Identity in 10 Steps: | SMASHgods ~ breaking down the best bits of propriety ~ [www.smashgods.com]
The Scenario So you went a little nuts on your MySpace profile - you posted your age, your interests, some of your funniest home movies and the secret spots you like to frequent on Saturday following your morning dog walk. It felt freeing and liberating to tout your spot in this world and advertise your status to your online “friends”. And it exploded from there: you started posting in public forums without hesitating to include your full, given name (so you can get credit for your impassioned responses), then proceeded to open numerous accounts on the Facebooks, Friendsters, LinkedIns and Meebos of the world. But as your friends began to accumulate and as your forum posts became popular (and distributed), your online presence began to balloon to uncontrollable (and uncomfortable) proportions. But what can we do? Not exactly. There are some practical steps a savvy surfer can take to prevent (and reverse) the “morning after” effects associated with putting TMI on the web. Custom Search 1.
‘MegaSearch’ Aims to Index Fraud Site Wares
A new service aims to be the Google search of underground Web sites, connecting buyers to a vast sea of shops that offer an array of dodgy goods and services, from stolen credit card numbers to identity information and anonymity tools. MegaSearch results for BIN #423953 A glut of data breaches and stolen card numbers has spawned dozens of stores that sell the information. The trouble is that each shop requires users to create accounts and sign in before they can search for cards. Enter MegaSearch.cc, which lets potential buyers discover which fraud shops hold the cards they’re looking for without having to first create accounts at each store. This free search engine aggregates data about compromised payment cards, and points searchers to various fraud shops selling them. According to its creator, the search engine does not store the compromised card numbers or any information about the card holders. I first read about this offering in a blog post by RSA Fraud Action Research Labs.
Digital Death and Afterlife Online Services List | The Digital Beyond
The Digital Beyond maintains this list of online services that are designed to help you plan for your digital death and afterlife or memorialize loved ones. These services come in all flavors including digital estate services, posthumous email services and online memorials. If your service is not listed here, don’t feel left out. Let us know and we’ll add it to the list. 1000Memories 1000memories.com Founded: July, 2010 1000memories provides memorial websites that allows users to invite other friends of the deceased to submit photos and stories. Afternote www.afternote.com Founded: 2013 Afternote is a new free secure online platform aimed at helping people store everything that matters to them the most in life and in death. AfterSteps www.aftersteps.com Founded: 2010 AfterSteps is an all-in-one end-of-life planning service. Afterwords.cc afterwords.cc Founded: 2012 Afterwords.cc is a secure online tool for leaving posthumous messages. Bcelebrated www.bcelebrated.com Founded: July, 2009 Capsoole Deadman
Privnote - Send notes that will self-destruct after being read
untitled
Operator Operator YAPO is a new incarnation of an award-winning portable Opera package. You can run Operator on any computer you want (company, library, your friend's computer) and without administration privileges as long as it's a Windows PC. Plus, unless you choose otherwise, no data will be stored at the host computer. Changes in the current release This initial release includes Opera 10.52. Subscribe to updates via the Operator RSS feed. Download Operator YAPO 1.0 Operator weights 10 MB and is Windows only. Please do not link directly to the files. Troubleshooting and bugs If you seek support or want to report a bug, please use the Troubleshooting forum. Looking for the old OperaTor? Here is an archive page.
Web 2.0 Suicide Machine - Meet your Real Neighbours again! - Sign out forever!