background preloader

How to remain secure against NSA surveillance

How to remain secure against NSA surveillance
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting. At this point, I feel I can provide some advice for keeping secure against such an adversary. The primary way the NSA eavesdrops on internet communications is in the network. That's where their capabilities best scale. Leveraging its secret agreements with telecommunications companies – all the US and UK ones, and many other "partners" around the world – the NSA gets access to the communications trunks that move internet traffic. 1) Hide in the network. Related:  Informatique

Do-Not-Track Movement Is Drawing Advertisers’ Fire Do Not Track mechanisms are features on browsers — like Mozilla’s Firefox — that give consumers the option of sending out digital signals asking companies to stop collecting information about their online activities for purposes of targeted advertising. First came a stern letter from nine members of the House of Representatives to the Federal Trade Commission, questioning its involvement with an international group called the World Wide Web Consortium, or W3C, which is trying to work out global standards for the don’t-track-me features. The legislators said they were concerned that these options for consumers might restrict “the flow of data at the heart of the Internet’s success.” Next came an incensed open letter from the board of the Association of National Advertisers to Steve Ballmer, the C.E.O. of , and two other company officials. “Microsoft’s action is wrong. So far, Microsoft has shrugged off advertisers’ complaints. But the two sides seem to have reached an impasse.

The 6 Most Humiliating Public Failures by Celebrity Psychics The frustrating thing about psychics, mediums, and fortune tellers is that they're still able to make a pretty goddamned comfortable living, even in 2013. Their inability to provide empirical evidence that what they do is anything other than a scam to prey on the gullible seems to have had little effect on their bottom line. Still, there have been little victories along the way, and cameras have been there to capture the hilarity. #6. Uri Geller Is Exposed on the Johnny Carson Show Richard Nelson/Photos.com Contrary to what you might assume, the people most hostile to claims of supernatural powers are magicians. Gareth Cattermole/Getty Images"Let the naivete flow through you." If you're too young to remember, Geller found fame with mind-reading tricks and, more famously, mind-powered spoon bending. NBCHe thought it would be a canned, no-sweat interview, like he was on [network you hate]. It just gets harder to watch as it goes. #5. Ferenc Szelepcsenyi/Photos.com #4.

Pack De Portabilisation Framakey Retour à la liste des applications portables Dans le but de pouvoir accélérer la mise en ligne des applications (et bien entendu d’augmenter le nombre d’applications disponibles sur le portail francophone des applications portables libres), l’équipe Framakey vous propose de télécharger le Pack de portabilisation Framakey. Il s’agit d’un ensemble d’outils (libres et portables, évidemment !) qui facilitera la vie des développeurs bidouilleurs souhaitant portabiliser des applications. Depuis la FK 1.12 et l’adoption d’une structure similaire à celle de PA.com, le pack a été proposé en version 9.x et a subi une grande refonte. Suite à la sortie de la version FK 2.0 et dans l’idée d’encore plus automatiser le processus et de vous faciliter la vie, le pack est maintenant proposé en version 10. Il se décompose comme suit. Les outils indispensables : RegshotPortable, pour vérifier la discrétion d’une application comme les traces laissées dans la base de registre et le profil. Les outils accessoires :

Bruce Schneier: Prosecuting Snowden -- "I believe that history will hail Snowden as a hero -- his whistle-blowing exposed a surveillance state and a secrecy machine run amok. I'm less optimistic of how the present day will treat him" via reddit.com A Browser To Keep The NSA From Snooping On You Concern over personal privacy in the era of NSA spying revelations has reached something of a Code Orange. Earlier this summer, the Pew Research Center reported that for the first time since the 9/11 attacks on the World Trade Center, more Americans fear an assault on their civil liberties than terrorism. But where we might have been stocking up on duct tape and canned soup a decade ago, today we’re changing our online habits: The percentage of Americans who are disabling cookies and adjusting browser privacy settings jumped 12% and 7% in the wake of the Edward Snowden leaks. It’s in this climate of guardedness that a group of India-based developers has designed a new kind of browser for the privacy-conscious. Using Chromium, an open source browser project that provides the underpinnings for Google’s Chrome, the Epic browser features protections meant to keep out snooping governments, as well as private companies looking to make a buck off your data. There are some cons.

Recycle a Bicycle Into an Elevator There's repurposing, and then there's repurposing like a BOSS. That pretty much sums up the ecological efforts of treehouse builder and eco-icon Ethan Schlussler. The Sandpoint, Idaho, resident says he's in the process of finishing construction on a treehouse he built 30 feet in the air. Using an old bike, he rigged a system of pulleys to it, effectively turning it into a pedal-powered elevator. The process also required that Schussler modify the old cycle, cutting off the large sprocket in the front and welding it on the rear gear. MakeZine reports Schlussler's one-person treehouse is almost complete, "I will be building walls and insulating it in the next few weeks, and eventually I intend to live (or at least sleep) in it." Though the treehouse is really only built for one, we expect the home's unique entry point will attract lots of drop-in guests.

Cybook Gen3 Tips and Troubleshooting Here is where to go to find help with your Bookeen Cybook Gen3. [edit] Tips [edit] User's Manual Download the User's Manual [edit] Contact Address: Bookeen, 6 rue du Tage, 75013 Paris, France Phone number: 0033 1 45654256 Email: support@bookeen.com [edit] Firmware Versions You can check your firmware build number by going to the library view, opening the menu, click on Advanced, click on About. [edit] 1.0 Build 476 Build 476 was the first 1.0 firmware when the CyBook Gen3 became available for ordering at the end of October 2007. delphidb96 reported testing the 1.00 firmware with his pre-production CyBook Gen3 on 31st October 2007. [edit] 1.0 Build 538 Build 538 was released ca. To get build 538 you had to write to Bookeen and ask for it. [edit] 1.0 Build 674 Build 674 came installed on the new version CyBook Gen3 with 512MB internal memory, which appeared in early May 2008. [edit] 1.0 Build 681 Build 681 also came installed on some of the new version CyBook Gen3s with 512MB internal memory.

Surveillance as a Business Model Google recently announced that it would start including individual users' names and photos in some ads. This means that if you rate some product positively, your friends may see ads for that product with your name and photo attached—without your knowledge or consent. Meanwhile, Facebook is eliminating a feature that allowed people to retain some portions of their anonymity on its website. These changes come on the heels of Google's move to explore replacing tracking cookies with something that users have even less control over. More generally, lots of companies are evading the "Do Not Track" rules, meant to give users a say in whether companies track them. It shouldn't come as a surprise that big technology companies are tracking us on the Internet even more aggressively than before. If these features don't sound particularly beneficial to you, it's because you're not the customer of any of these companies. This is nothing new. Of course, people don't think of it that way.

Related: