background preloader

Slashdot (15)

Peter Diamandis With immense respect to Bill Gates and Warren Buffett, I’d like to suggest an alternative to the giving pledge… an “impact pledge.” Specifically, a pledge where philanthropists actually pledge to solve (i.e. eradicate, eliminate, exterminate) a specific problem, rather than just agree to give their money to philanthropy. What if today’s billionaires actually “call their shots” and commit to fixing something big? And with $7 trillion in assets held by the wealthiest 1,000 people in the world, the potential for global impact is huge. This blog was inspired by two different news blurbs last week. [ Click to Tweet about this (you can edit before sending): ] First, news that Saudi Arabian billionaire Prince Alwaleed bin Talal announced his decision to donate his entire $32 billion fortune to philanthropy. What is the Giving Pledge? He continues, “So while philanthropists like to talk about impact, they seldom have the tools to measure it. An Alternative: Calling Your Shot P.S.

'Squeaky Dolphin' for sale: How surveillance companies are targeting social networks The latest Snowden document revelation, which shows how GCHQ and the NSA are conducting broad, real-time monitoring of YouTube, Facebook, and Blogger using a program called "Squeaky Dolphin," is the most recent demonstration of the immense interception capabilities of intelligence services. Despite the program's cute name, "Squeaky Dolphin" is shocking in its ability to intercept raw data, which includes sensitive personal and location information, and keep tabs on people across the world who are simply uploading videos or 'liking' the links on their friends' Facebook walls. Such massive, unrestrained capabilities are no way consistent with international law, as their capabilities and execution are clearly neither necessary nor proportionate. Analysing and intercepting Shortly after news broke about the Squeaky Dolphin program, surveillance researcher Dr Ben Hayes drew attention to Wire-X's "Content-based Social Network Analysis" and its similarities to GCHQ's Squeaky Dolphin.

Groklaw O'Reilly Radar - Insight, analysis, and research about emerging technologies Fraud, Phishing and Financial Misdeeds TechCrunch Android - Platforms Try to use Tor Browser for all of your web surfing. It will offer you far better anonymity than any other browser. Make sure to learn the basics of Tor before using it. Tor Browser notes: Using Tor Browser to sign into websites that contain your real ID is counterproductive, and may trip the site’s fraud protection. Firefox notes: This browser uses Google search by default: replace it with a more private alternative. Why are Chromium, SRWare Iron, et al. not recommended on PRISM Break? Warning for mobile devices & Tor: Websites using HTML5 <video> tags will leak <video>-related DNS queries and data transfer outside of Tor.

Security 23 | Internet security for everyone Building a Better Anonymous By Josh Corman & Brian Martin This multi-part article, with original artwork by Mar, is a follow-up to a one hour panel discussion at DEF CON 19 titled "'Whoever Fights Monsters...' Confronting Aaron Barr, Anonymous and Ourselves" moderated by Paul Roberts, discussed by Josh Corman, Brian Martin and Scot Terban. When we say "building a better Anonymous", we seek to explore the ideas of making such a group truly better. Introduction & Abstract A brief introduction to this article series and Anonymous. Fact vs Fiction Figuring out the fact versus fiction of Anonymous. How We Got it All Wrong How the media and professionals got it wrong. How Anonymous Has Failed in Theory & Practice Anonymous, as they are today, and various shortcomings. Building a Better Anonymous - Philosophy A different framework and philosophy. Building a Better Anonymous - Details Detailed improvement ideas for Anonymous, or the next group like them. Abstract Ideas Other considerations relevant to this topic.

Privacy C. S. Lewis wrote some pretty good sci-fi, some excellent kids books (which Disney managed to ruin), and my favourite satire on the commercialization of Christmas. Most people, though, would know him as a writer on Christianity. Bill C-30 (sometimes known as the Investigating and Preventing Criminal Electronic Communications Act, sometimes known as the Protecting Children from Internet Predators Act, and sometimes just known as “the online spy bill”) is heading for Committee of the Whole. It’s got interesting provisions. (Speaking of PIPEDA, there is this guy who is being tracked by who-knows-who. It doesn’t have to be law enforcement, either. Then there is good old Section 14, which allows the government to make ISPs install any kind of surveillance equipment the government wants, impose confidentiality on anything (like telling people they are being surveilled), or impose any other operational requirements they want. But, hey, maybe I’m biased. How do I know this?

SecureGossip: Bringing Intelligence & Security under one roof. Surveillance The U.S. Government: Paying to Undermine Internet Security, Not to Fix It by Julia Angwin ProPublica, April 15, 12:50 p.m. One lesson of the Heartbleed bug is that the U.S. needs to stop running Internet security like a Wikipedia volunteer project. What the Proposed NSA Reforms Wouldn’t Do by Kara Brandeisky ProPublica, April 3, 3:20 p.m. All the plans purport to end the bulk phone records collection program, but there are big differences. Stasi Social Network Analysis by Julia Angwin ProPublica, Feb. 11, 4:06 p.m. This hand-drawn graphic, which is undated, was made by the East German secret police and appears to show the social connections the Stasi gleaned about a poet they were spying on. You Know Who Else Collected Metadata? by Julia Angwin ProPublica, Feb. 11, 4:02 p.m. Files obtained from the archives of the East German secret police show how far technology of spycraft has come. Podcast: What Your Smartphone Might Be Telling the NSA About You by Minhee Cho ProPublica, Feb. 6, 10:08 a.m.

Cryptome

Related: