background preloader

Heml.is - The Beautiful & Secure Messenger

Heml.is - The Beautiful & Secure Messenger
Related:  Online Privacy

Mailpile: Let’s take email back! Immersion: a people-centric view of your email life Who are the world's 10 most dangerous terrorists? Ayman al-Zawahiri is the leader of al Qaeda. A reward up to $25 million has been offered by the U.S. government. Click through to see men allegedly plotting, directing and, in some cases, carrying out acts of terror around the world. Nasir al Wuhayshi is leader of al Qaeda in the Arabian Peninsula, known as AQAP. Ibrahim al Asiri is thought to be the chief bomb-maker for AQAP. Ahmed Abdi Godane, also known as Mukhtar Abu Zubayr, is the leader of Al-Shabaab. Moktar Belmoktar was the leading figure of al Qaeda in the Islamic Maghreb. Abu Muhammad al Julani is the leader of al-Nusra Front in Syria. Abu Bakr al-Baghdadi is the leader of Islamic State in Iraq. Sirajudin Haqqani is the leader of the Haqqani Network in Afghanistan. Most-wanted terrorists Al Qaeda's leader, Ayman al-Zawahiri, tops the listOther names include figures from Yemen, Somalia and IraqMany groups pledge allegiance to al Qaeda If you live in Moscow, Chechen Islamist leader Doku Umarov would feature prominently. 1. 2. 3. 4.

Facebook privacy and kids: Don’t post photos of your kids online Photo by Hemera/Thinkstock I vividly remember the Facebook post. It was my friend’s 5-year-old daughter “Kate,” (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door. The picture had been uploaded to a Facebook album, and there were 114 shots just of Kate: freshly cleaned and swaddled on the day of her birth … giving her Labradoodle a kiss … playing on a swing set. I completely understood her parents’ desire to capture Kate’s everyday moments, because early childhood is so ephemeral. Last week, Facebook updated its privacy policy again. Six thousand respondents to Slate’s survey show a clear trend. The problem is that Facebook is only one site. That poses some obvious challenges for Kate’s future self. There’s a more insidious problem, though, which will haunt Kate well into the adulthood. The easiest way to opt-out is to not create that digital content in the first place, especially for kids.

Prism : à quel endroit vos données sont-elles le plus protégées ? Des photos sur Flickr. Des vidéos sur Youtube. Des échanges privés sur Gmail, Skype et Facebook. Rien de ce qui est privé ne semble pouvoir échapper aux indiscrétions de la NSA? Paranoïa ou besoin de discrétion, la question se pose de savoir si les données sont plus sûres de l’un ou l’autre côté de l’Atlantique. Dans un épisode de la série « Person of Interest », le personnage Finch déclare que le gouvernement américain a créé Facebook pour que les utilisateurs alimentent eux-mêmes de gigantesques bases de données sur leur vie privée. Edward Snowden, par qui le scandale est arrivé, a travaillé durant quatre ans pour la NSA, l’Agence de Sécurité Nationale américaine. Résumé de la situation par Olivier Ertzscheid, sur le blog Affordance.info: « La NSA surveille Google, Facebook et les autres. A Radio Canada, Martin Lessard nous rappelle qu’à chaque check in, like, envoi de photo via les réseaux sociaux, nous façonnons de plus en plus précisément notre « ombre virtuelle ». Time to move?

Social network analysis and object attribution with Maltego 3 | The Security Diaries Social Network Analysis (SNA) is getting more and more widespread now that online social networks like LinkedIn and Facebook are getting more popular12. This kind of analysis has traditionally been a manual task where investigators are connecting individuals and events more or less by hand. However, the wast amount of data available calls for tools that automate detection, recognizion and visualization of these connections on a large scale. In this work we are using the community edition of Maltego 3.0. A. There has only been publish a few scientific articles specifically about Maltego. Background A. The term digital evidence has by Carrier and Spafford been defined as any digital data that contain reliable information that supports or refutes a hypothesis about the incident. 7They define electronic evidence as probative information stored or transmitted in digital form. How these types of evidence is handled, it is often referred to as the chain of custody. B. C. Figure 3: Group graph

How to foil NSA sabotage: use a dead man's switch | Technology The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy. It doesn't really matter if you trust the "good" spies of America and the UK not to abuse their powers (though even the NSA now admits to routine abuse), you should still be wary of deliberately weakened security. It is laughable to suppose that the back doors that the NSA has secretly inserted into common technologies will only be exploited by the NSA. One important check against the NSA's war on security is transparency.

Ne pas lâcher le PRISM pour l'ombre. Bradley Manning est un soldat américain. Qui encourt actuellement la prison à vie pour avoir mis à disposition de Wikileaks, plus de 700 000 documents classés "confidentiel défense". Le code militaire de la grande muette ne permet hélas pas d'être très optimiste sur son sort. Et même s'il a merdé, même si certains des documents ont pu un temps rendre certains dîners diplomatiques assez rock'n roll, même s'il n'est pas avéré que lesdites fuites ensuite rendues publiques par Wikileaks aient compromis ou menacé des vies de soldats américains en opération, il y a de grandes chances pour que l'on ne dispose jamais de la réponse à la seule vraie question de toute cette histoire : comment un soldat lambda, même pas informaticien de génie, peut accéder à 700 000 documents classifiés "secret défense" ??? Edward Snowden est un civil. Il a 29 ans, est expert informatique et travaillait pour la NSA puis pour divers de ses "sous-traitants". Tout oppose Bradley Maning et Edward Snowden.

Related: