background preloader

The Day We Fight Back - February 11th 2014

The Day We Fight Back - February 11th 2014
Take part By signing the Principles, you will show that you're part of a movement that knows mass surveillance is a violation of international human rights law. We'll use your signature, with thousands of others, to pressure governments and international institutions to forbid mass surveillance anywhere in the world. Add the banner to your site Or simply copy the code below and add it just before the closing tag in your site's HTML. <!

Related:  Vie privée - Empreinte numériquePRIVACYLibertés

Google Removes Vital Privacy Feature From Android, Claiming Its Release Was Accidental Yesterday, we published a blog post lauding an extremely important app privacy feature that was added in Android 4.3. That feature allows users to install apps while preventing the app from collecting sensitive data like the user's location or address book. The App Ops interface removed in Android 4.4.2 After we published the post, several people contacted us to say that the feature had actually been removed in Android 4.4.2, which was released earlier this week.

BREAKING: Maryland Legislators Move To Kill NSA Headquarters NSA National Headquarters ANNAPOLIS, Md., February 10, 2014– It’s lights out for the National Security Agency (NSA). State lawmakers in Maryland have filed emergency status legislation that seeks to cut the NSA’s Ft.

Between you and me vs Between you and I Between you and me, the phrase "between you and I" grates on my ears like nails on a chalkboard. I hear the wrong version about 3 times as often as I hear it said the right way, so let’s get this straightened out once and for all. Between is a preposition, and in English, a preposition must be followed by an indirect object pronoun. Me is an indirect object pronoun, while I is a subject pronoun. Therefore, between has to be followed by me, not I. The Bottom Line

Twitter and Facebook drop privacy bombshells Home » News, Social Media News Just days apart, Twitter and Facebook have announced privacy changes that have left users less than impressed. Twitter has announced that it’s opening up DMs to everyone, regardless of their following status. So where previously two users had to be following one another to communicate via DM (or one user had to publicly ask the other to follow them in order to do so – awkward), it will now be possible to send a DM to anyone, whether they’re following you or not. Great news for social connectivity, and even better news for trolls, who will now be able to bombard anyone they choose with direct messages.

The NSA's Secret Role in the U.S. Assassination Program Credit: Kirsty Wigglesworth/Associated Press. The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S.

The Magic of Metaphor: What Children’s Minds Teach Us about the Evolution of the Imagination by Maria Popova “Metaphorical thinking … is essential to how we communicate, learn, discover, and invent.” “Children help us to mediate between the ideal and the real,” MoMA’s Juliet Kinchin wrote in her fascinating design history of childhood . Indeed, children have a penchant for disarming clarity and experience reality in ways profoundly different from adults , in the process illuminating the workings of our own minds. But among the most curious of these mediations of reality is children’s understanding of abstraction in language, which is precisely what James Geary explores in a chapter of his altogether enthralling I Is an Other: The Secret Life of Metaphor and How It Shapes the Way We See the World ( public library ).

On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago: 1. We saw an example of the court orders that authorize the NSA to collect virtually every phone call record in the United States—that’s who you call, who calls you, when, for how long, and sometimes where. 2.

Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus.

How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer There has been a lot of news lately about nefarious-sounding backdoors being inserted into cryptographic standards and toolkits. One algorithm, a pseudo-random bit generator, Dual_EC_DRBG, was ratified by the National Institute of Standards and Technology (NIST) in 2007 and is attracting a lot of attention for having a potential backdoor. This is the algorithm into which the NSA allegedly inserted a backdoor and then paid RSA to use. Faculty, students offer mixed opinions on Coursera For Susan Alcock, professor of archaeology and classics, archaeology does not need to be practiced amidst dusty ruins in an exotic country. Her students explore the field from behind their computer screens in Alcock’s massive open online course, “Archaeology’s Dirty Little Secrets,” on Coursera. Alcock’s second iteration of the course begins today after an initial debut last summer.

Related:  webmdGovernment