background preloader

A Declaration of the Independence of Cyberspace

by John Perry Barlow <barlow@eff.org> Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. Governments derive their just powers from the consent of the governed. You have not engaged in our great and gathering conversation, nor did you create the wealth of our marketplaces. You claim there are problems among us that you need to solve. Cyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications. We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. Davos, Switzerland Related:  Security

A/I :: Home The Tin Hat | Simple Online Privacy Guides and Tutorials JStylo-Anonymouth - PSAL From PSAL The JStylo and Anonymouth integrated open-source project (JSAN) resides on GitHub. What is JSAN? JSAN is a writing style analysis and anonymization framework. It consists of two parts: JStylo - authorship attribution framework Anonymouth - authorship evasion (anonymization) framework JStylo is used as an underlying feature extraction and authorship attribution engine for Anonymouth, which uses the extracted stylometric features and classification results obtained through JStylo and suggests users changes to anonymize their writing style. Details about JSAN: Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. Tutorial JSAN tutorial: Presented at 28c3 video Download Downloads: If you use JStylo and/or Anonymouth in your research, please cite: Andrew McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman and Rachel Greenstadt. If you use the corpus in your research, please cite: Michael Brennan and Rachel Greenstadt. Developers

The 20 Coolest Jobs in Information Security #1 Information Security Crime Investigator/Forensics Expert#2 System, Network, and/or Web Penetration Tester#3 Forensic Analyst#4 Incident Responder#5 Security Architect#6 Malware Analyst#7 Network Security Engineer#8 Security Analyst#9 Computer Crime Investigator#10 CISO/ISO or Director of Security#11 Application Penetration Tester#12 Security Operations Center Analyst#13 Prosecutor Specializing in Information Security Crime#14 Technical Director and Deputy CISO#15 Intrusion Analyst#16 Vulnerability Researcher/ Exploit Developer#17 Security Auditor#18 Security-savvy Software Developer#19 Security Maven in an Application Developer Organization#20 Disaster Recovery/Business Continuity Analyst/Manager #1 - Information Security Crime Investigator/Forensics Expert - Top Gun Job The thrill of the hunt! You never encounter the same crime twice! Job Description SANS Courses Recommended Why It's Cool How It Makes a Difference How to Be Successful - Stay abreast of the latest attack methodologies.

Let them Find us <div class='message error'><strong>Javascript Disabled Detected</strong><p>You currently have javascript disabled. Several functions may not work. Please re-enable javascript to access full functionality.</p></div><br /> Advertisement 61,677 Total Posts 21,764 Total Members amarantou Newest Member 1,007 Most Online 78 users are online now 6 members, 71 guests, 1 anonymous users (See full list) INSTANITY, Illusionist, Google, DemonicSmokingJacket, Bing, cache, amarantou, ɱםҭםӾ root | management | maintenance | honored | vip | disabled

Cryptome Erik Voorhees response to NYDFS Bitcoin Proposal Today, as human society progresses onward, Coinmap broke 5,000 global business listings, South African payment processor Payfast enabled their 30,000 merchants to accept Bitcoin, and the NY Dept. of Financial Services made financial privacy a crime, supported (at least superficially) by some leaders in the Bitcoin industry. Let’s review… The proposed digital currency regulation from Benjamin Lawsky, the Superintendent of 20 million/6 billion people’s financial decisions, has been on the horizon for months. New York is known for dictating how people live, and so as more people are incorporating Bitcoin into their lives, New York bureaucrats would inevitably attempt to place it under surveillance and control (with the best intentions, naturally). Ironically, one of the most highlighted pretences for NY’s new regulations is “consumer protection.” Let’s be truthful, this exposes the consumer. The information you expose, to anyone, does not remain solely with the recipient of that exposure.

ProtonMail Is A Swiss Secure Mail Provider That Won’t Give You Up To The NSA In the wake of the Lavabit’s demise and increased interest in secure mail services, Switzerland-based ProtonMail is looking to zap a little life into the old PGP mail server market. Currently crowdfunded far past its goal of $100,000, the service wants to make it cheap and easy to get a secure email account with just enough paranoia built in to keep you safe. I asked one of the creators, co-founder Andy Yen, why we should trust them. “One of our goals is actually to build a system that does not require trusting us,” he said. The service works by encrypting all the messages in the user’s web browser before it even reaches the ProtonMail servers. The co-founders envisioned the service over dinners at CERN’s Restaurant 1 last summer. “The CERN scientific community has always been very attuned to Internet-related issues so when the NSA spying story broke, many of us were outraged that mass surveillance was also so prevalent in the U.S. and Europe,” said Yen.

Free encrypted webmail service Tutanota Tutanota, meaning secure message in Latin, is a German based free webmail service with end to end encryption. Your email messages, attachments and subject are all encrypted in your browser using Javascript with a cipher combination of RSA 2048-bit and AES-128-bit before uploading data to Tutanota mail servers in Germany. The encryption keys remain in your power at all times, the company can’t see anything in plain text, they can’t restore your password or reset your account, anybody forgetting their password loses access to the messages. If German authorities ever serve Tutanota with a court order to hand over a customer’s email inbox content, the company will of course comply with the warrant but all they will be able to deliver will be ciphered files with no decryption key. Encryped webmail Tutanota You can open a Tutanota email account with minimal details, choose a username and password and that is it. Tutanota encrypted email exchange Visit Tutanota homepage

Securely wipe Android phone data with SHREDroid As smarthphones become a more essential part of hour lives so does the risk of holding important data on an Android phone that can go missing or get stolen, online banking details, account passwords and email messages all can be recovered from a smarthphone without too much effort, SHREDroid is a free Android app to securely erase data, deleting files the usual way is not secure enough, SHREDroid thwarts data recovery software forcing an overwrite of the data using a random pattern, once you wipe a file with it, it will be gone for ever without possibility of recovery. SHREDroid Android data wiper Visit SHREDroid GooglePlay

Mobile phone private messaging with Schmoose App Schmoose is a privacy messaging app for your mobile phone with end to end encryption, the ciphers used to secure your data are well known standards like AES256-bit, SHA-256 and RSA-2048-bits. Schmoose itself is not able to read what you send, a public/private encryption key is created in your phone during installation and data is encrypted before it leaves it, only the person you are sending the message to can decrypt it. When the sender and receiver both have the app installed they can chat like they would do in the popular WhatsApp and Kik without any messaging costs,the main difference is the strong privacy added to Schmoose. You will be asked to verify your mobile phone number or email during installation and after that you are able to sync your contacts online, to keep contacts private, only hash values are sent to Schmoose servers in Germany, they don’t see names and addresses. Schmoose encrypted messaging app Visit Schmoose homepage

Related: