background preloader

FBI Wants Backdoors in Facebook, Skype and Instant Messaging

FBI Wants Backdoors in Facebook, Skype and Instant Messaging
The FBI has been lobbying top internet companies like Yahoo and Google to support a proposal that would force them to provide backdoors for government surveillance, according to CNET. The Bureau has been quietly meeting with representatives of these companies, as well as Microsoft (which owns Hotmail and Skype), Facebook and others to argue for a legislative proposal, drafted by the FBI, that would require social-networking sites and VoIP, instant messaging and e-mail providers to alter their code to make their products wiretap-friendly. The FBI has previously complained to Congress about the so-called “Going Dark” problem – the difficulty of doing effective wiretap surveillance as more communications have moved from traditional telephone services to internet service companies. Under the Communications Assistance for Law Enforcement Act, or CALEA, passed in 1994, telecommunications providers are required to make their systems wiretap-friendly.

Issa Releases the Trans Pacific Partnership Intellectual Property Rights Chapter on KeepTheWebOPEN.com Washington, D.C. – By a vote of 233-181, the House of Representatives today approved the Executive Needs to Faithfully Observe and Respect Congressional Enactments of the Law (ENFORCE the Law) Act (H.R. 4138), a carefully crafted bill to rein in the growing problem of executive overreach and restore balance to the separation of powers enshrined in our Constitution. The ENFORCE the Law Act, introduced by Representatives Trey Gowdy (R-S.C.), Darrell Issa (R-Calif.), House Judiciary Committee Chairman Bob Goodlatte (R-Va.), and Representative Jim Gerlach (R-Pa.), puts a procedure in place to permit the House, or the Senate, to authorize a lawsuit against the Executive Branch for failure to faithfully execute the laws. Read Congressman Issa’s Statement and the Committee’s Full Press Release (more…)

Volunteer computing Volunteer computing is a type of distributed computing in which computer owners donate their computing resources (such as processing power and storage) to one or more "projects". History[edit] The first volunteer computing project was the Great Internet Mersenne Prime Search, which was started in January 1996.[1] It was followed in 1997 by distributed.net. In 1997 and 1998, several academic research projects developed Java-based systems for volunteer computing; examples include Bayanihan,[2] Popcorn,[3] Superweb,[4] and Charlotte.[5] The term "volunteer computing" was coined by Luis F. G. In 1999, the SETI@home and Folding@home projects were launched. In 2002, the Berkeley Open Infrastructure for Network Computing (BOINC) project was founded at University of California, Berkeley Space Sciences Laboratory, funded by the National Science Foundation. Middleware for volunteer computing[edit] In addition, volunteer computing systems must deal with problems related to correctness: See also[edit]

Doyle's Tutorials Virus removal tools: FixMeStick USB key plugs into your computer and deletes malware By Eddie Wrenn Published: 13:02 GMT, 18 June 2012 | Updated: 17:11 GMT, 18 June 2012 Getting a virus cleaned off your computer can be a burden at the best of times. But now a new USB stick aims to make it far easier by giving you the same tools as the professionals - and all you have to do is plug it in. The FixMeStick supposedly finds the files which other anti-virus programmes miss by using powerful anti-virus software normally used by computer technicians. All users have to do is put it into a USB slot on their PC and it will do the rest. Fix Me: Stick the USB key into your PC and it will stop Windows from loading - and scan your computer for errors The FixMeStick’s advantages are that it works as an automatic safe disk that means you can boot your computer from the drive, and it cleans up the damage. Rather than scanning it starts your machine again then interrupts Windows so that it can carry out a full check before it loads. ‘All it can do is toss that file into quarantine.

Anon_Central : "We support the #student p... Cómo pasar de Hotmail a Outlook, paso a paso Madrid. (Portaltic/EP).- Microsoft ha querido facilitar una guía con los pasos a seguir para migrar de su servicio Hotmail a su nueva plataforma de correo Outlook. La compañía ha detallado que el proceso para empezar a utilizar Outlook es muy sencillo y solo requiere acceder a la versión de prueba del servicio con cualquier cuenta de Hotmail. La semana pasada Microsoft sorprendía con el anuncio del estreno de Outlook, una evolución de su cliente de correo electrónico que supone un rediseño completo a Hotmail. Microsoft ha explicado que parte del éxito de su nueva plataforma es que es muy sencillo comenzar a utilizarla. Usando la misma información El aspecto positivo de utilizar las credenciales de Hotmail es que los usuarios encontrarán toda su información en el nuevo servicio. Para ello, existen dos vías. El segundo método para conseguir un dominio @outlook.com es cambiar el nombre de la cuenta.

Flame's Bluetooth Functionality Could Help Spies Extract Data Locally, Researchers Say The Bluetooth functionality of the Flame cyberespionage malware could potentially be used to pinpoint the physical location of infected devices and allow local attackers to extract data if they get in close proximity to the victims, according to security researchers from antivirus vendors Symantec and Kaspersky Lab. Flame can leverage an infected computer's Bluetooth capability, to scan for other nearby Bluetooth-enabled devices like mobile phones, Kaspersky Lab researchers said in their initial Flame report published on Monday. This functionality is present in a Flame module called BeetleJuice, security researchers from Symantec said in a blog post on Thursday. "When a device is found, its status is queried and the details of the device recorded--including its ID--presumably to be uploaded to the attacker at some point." Flame-infected computers can also act as Bluetooth beacons, allowing other Bluetooth devices to discover them.

Tecnomundo | El mundo de la Tecnología Researchers To Release an Anonymous BitTorrent Client Researchers at Delft University of Technology have taken up the ambitious challenge of creating a BitTorrent client which secures the privacy of its users. Their Tribler client is already completely decentralized, meaning it will still work even in the event that all BitTorrent sites are shut down. Anonymity is the next big step in its evolution. BitTorrent users are increasingly looking for more anonymity but right now their options are limited. For a monthly fee they can sign up with a VPN or proxy to hide their IP-address. This lack of fast, unlimited and free anonymous BitTorrent options is what the Tribler team at Delft University of Technology are hoping to change. Unlike traditional BitTorrent clients, Tribler does not rely on central servers or third-party sites. During a talk at the Stanford University this week, Dr. Talking to TorrentFreak, Pouwelse explained that the idea is to add a proxy layer where proxies act as “caches” of content. BitTorrent With a Proxy Layer

Cómo elegir smartphone entre los que ‘regalan’ las operadoras,Digitech Los móviles a cero euros son uno de los mejores ganchos que emplean algunas operadoras para atraer y mantener a sus clientes. Movistar se desenganchó de esta práctica a comienzos de este año, pero tanto Orange como Vodafone siguen ofreciendo terminales gratuitos a cambio de determinados meses de permanencia y una tarifa mínima al mes. Aunque la cartera de smartphones es amplia y muy variada, los teléfonos con menos exigencias que ofertan ambas operadoras, suelen coincidir. 1. Pantalla. Procesador. Memoria interna. Sistema Operativo. Cámara de fotos. 2. Si realmente busca un smartphone a cero euros con las tarifas más bajas, las opciones se limitan bastante. Vota la noticia Accede a tu cuenta

Does reported U.S. cyberattack on Iran justify CISPA? Maybe this is what the Cyber Intelligence Sharing and Protection Act is really about. According to a new report, President Obama, in an attempt to halt Iran’s nuclear research, ordered sustained and repeated cyberattacks on that country’s computer systems. At one point the worm, called Stuxnet, knocked out a fifth of the centrifuges Iran uses to purify uranium. The revelations that the White House sponsored massive cyberattacks on Iran could shed light on why some government officials are so eager to pass the CISPA, a controversial bill in Congress created by the House Intelligence Committee to counter cyberattacks on American systems. Critics contend that CISPA would allow government agencies far too much power to spy on its own citizens. An HIC advisor, who asked not to be named, stressed in a previous conversation with the Daily Dot that in the past few years, the U.S. has seen a drastic rise in cyberattacks from abroad, largely from China and believed to be state-sponsored.

Related: