background preloader

NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things'

NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things'
Related:  Snowden / AssangeInternet : Freedom in danger ?

Tails: the operating system that blew open the NSA When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally. "The installation and verification has a learning curve to make sure it is installed correctly," Poitras told Wired by e-mail. An operating system for anonymity Originally developed as a research project by the U.S. Tails makes it much easier to use Tor and other privacy tools. The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. Would you like to know more?

Voilà ce que le gouvernement récupère sur vos téléphones ! Certains documents judiciaires révèlent à quel point la notion de vie privée est subjective pour nos gouvernements. Certes il est possible de confisquer, de prendre physiquement votre téléphone et de le fouiller... Mais vous n'imaginez pas la masse de données récupérable sans votre consentement. Le « extraction report » (PDF) décrit en détail les données que le Department of Homeland Security a réussi à soutirer à un téléphone saisi lors d’un raid. Certaines ne sont guère surprenantes, citons en vrac le journal d’appels, vos textos et liste de contacts. Les premières sueurs froides arrivent puisque les éléments supprimés reviennent de parmi les morts… En plus de ces informations dont vous parlez ouvertement (vous avez ajouté untel, répondu à X et appelé volontairement chose), le DHS peut sonder votre téléphone pour assembler un dossier scandaleusement invasif des endroits où vous avez transité.

Phoenixmasonry, Inc Edward Snowden In 2013, Snowden was hired by an NSA contractor, Booz Allen Hamilton, after previous employment with Dell and the CIA.[4] On May 20, 2013, Snowden flew to Hong Kong after leaving his job at an NSA facility in Hawaii and in early June he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras and Ewen MacAskill. Snowden came to international attention after stories based on the material appeared in The Guardian and The Washington Post. Further disclosures were made by other newspapers including Der Spiegel and The New York Times. On June 21, 2013, the U.S. A subject of controversy, Snowden has been variously called a hero, a whistleblower, a dissident, a patriot and a traitor. Background Childhood, family, and education Edward Joseph Snowden was born on June 21, 1983,[7] in Elizabeth City, North Carolina.[8] His maternal grandfather, Edward J. Political views Career Employment at CIA NSA sub-contractee as an employee for Dell Global surveillance disclosures

L'internet illimité Valérie Schafer Th©Radio France « L'Internet illimité », apparemment, c’est une question qui relève de la consommation. « L’Internet illimité », c’est l’offre que vous font les opérateurs et fournisseurs d’accès quand vous payez votre abonnement à Internet chez vous. Vous payez une somme contre la possibilité d’avoir accès à l’Internet, sans condition de temps passé devant son écran ou de quantité de bande passante utilisée. Or, cet été, on a appris que certains grands opérateurs français (Orange et Bouygues notamment) réfléchissaient à mettre fin à l’Internet illimité en instaurant des plafonds (en termes de quantité de bits ou de temps passé sur Internet). En fait, derrière cela, ce sont des questions essentielles, et historiques qui se posent : la lutte entre les opérateurs de télécommunications (ceux qui fournissent le réseau, à qui l’on s’abonne) et les fournisseurs de contenu qui occupent la bande passante, l’égalité dans l’accès au réseau, la neutralité du Net etc. (Billy Guidoni)

The Hidden Records - Historical lost symbol of the Solomon Key parchme (...) Pourquoi Edward Snowden a utilisé Tails Linux pour organiser sa fuite 01net le 16/04/14 à 18h15 Outre sa messagerie chiffrée avec PGP, Edward Snowden utilisait également un autre outil informatique pour assurer la confidentialité de ses communications: le système d’exploitation Tails Linux. Edward Snowden se tourne alors vers la documentariste Laura Poitras, qui s’y connaît déjà plus. Une épine dans le pied de la NSA Si Snowden, ex-consultant de la NSA, a choisi Tails Linux, c’est parce qu’il était certain que ce système était l’un des plus sécurisés. Pourquoi Tails Linux est-il si efficace ? Les développeurs préfèrent rester dans l’ombre Le nouveau logo de Tails Linux Par ailleurs, Tails Linux intègre toute une série d’outils pour communiquer en toute tranquillité : Tor, le célèbre protocole de communication anonyme ; OpenPGP, une version open source de PGP ; OTR, une messagerie instantanée chiffrée ; HTTPS Everywhere, pour crypter toutes les connexions avec les sites web. Lire aussi: Ce qu'il vous faut Niveau : Débutant / Temps : Logiciels : Tails (Linux)

Dégooglisons Internet Hiram Abiff, the True King of Egypt,1554BC The Nag Hammidi Scrolls and The Dead Sea Scrolls are another example of a treasure trove of the writings of the disciples in the 1st century AD. Dismissed by the church as heresy, they reveal a great deal of the 'spiritual' insight of the early Christians. We also have documentation of when rulers like Alexander changed history and tried to preserve everything he found in Egypt instead of trying to destroy it like the Romans did. He found what we now call the 'Emerald Tablets of Thoth' . In addition to this, there is a record stating that the Great Pyramid was never meant to be a burial chamber for any pharaoh but current Egyptian Authorities who are Muslim will not concede that the Egyptian culture is far older that any other culture on Earth except one. The Turin Papyrus is a another important record of the half-god, half-men who were kings before recorded history began. The emphasis of this site is to explore the origins of Masonry. It Begins with Knowledge: Free Masonry

Statement by Julian Assange after One Year in Ecuadorian Embassy (on 2013-06-22) It has now been a year since I entered this embassy and sought refuge from persecution. As a result of that decision, I have been able to work in relative safety from a US espionage investigation. But today, Edward Snowden’s ordeal is just beginning. Two dangerous runaway processes have taken root in the last decade, with fatal consequences for democracy. Government secrecy has been expanding on a terrific scale. Simultaneously, human privacy has been secretly eradicated. A few weeks ago, Edward Snowden blew the whistle on an ongoing program - involving the Obama administration, the intelligence community and the internet services giants - to spy on everyone in the world. As if by clockwork, he has been charged with espionage by the Obama administration. The US government is spying on each and every one of us, but it is Edward Snowden who is charged with espionage for tipping us off. Edward Snowden is the eighth leaker to be charged with espionage under this president. Print

Korben - Upgrade your mind

Related: