background preloader

The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA

The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA
BitTorrent Sync. Photo: Ariel Zambelich/WIRED BitTorrent was best known as an internet protocol that let people swap pirated movies and music at the expense of big Hollywood studios and record labels. But then came a Belarusian engineer named Konstantin Lissounov. About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family. The tool won first prize at the hackathon, and within a few more months, after Lissounov honed the tool alongside various other engineers, the company delivered BitTorrent Sync, a Dropbox-like service that lets you seamlessly synchronize files across computers and mobile devices. BitTorrent Inc.

http://www.wired.com/2014/02/bittorrent-sync/

Related:  Torrent P2P /StreamingAbout Net-Neutrality...

Technozeast.com - General News With so many online functions that require password protection these days, it can be difficult to keep track of them all. And yet, if you fail to create passwords that are strong and secure enough to protect your online accounts and your sensitive data, you could wind up in hot water. For one thing, your email could get hacked and used to send out malicious spyware to your list of contacts.

» The Plan to Kill the Internet Uncovered Alex Jones' Infowars: There's a war on for your mind! The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform. This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form. 1) The Death of Net Neutrality The Federal Communications Commission (FCC) recently gave the green light for large Internet Service Providers to create a two-tier Internet system which would allow large corporations to buy up dedicated faster bandwidth, ending net neutrality and potentially leaving smaller websites in the dust. “[S]maller companies that can’t afford to pay for faster delivery would likely face additional obstacles against bigger rivals.

550 Free Audio Books: Download Great Books for Free Get FREE Audio Books from Audible.com and Audiobooks.com Download hundreds of free audio books, mostly classics, to your MP3 player or computer. Below, you'll find great works of fiction, poetry and non-fiction, by such authors as Twain, Tolstoy, Hemingway, Orwell, Vonnegut, Nietzsche, Austen, Shakespeare, Asimov, HG Wells & more.

Vole is a P2P social network that uses Bittorrent Sync - BitTorrent Sync - BitTorrent Forums Vole is like Google+ or Twitter, but there is no server, all the stuff you share is transmitted to others using Bittorrent Sync. Vole runs in your web browser and looks just like any other web app, but instead of connecting over the internet to a central server, it connects to a server running on your local machine. When you create a post, Vole saves it as a text file in a folder on your hard drive. People who follow you have their own copy of your posts folder and it's synchronized instantly using Bittorrent Sync. Since they have read-only keys, they can't write back to your folder or interfere in any way with your data. The posts from all the people you follow form a stream of information that is updated live in your browser.

Springo - Top of the Web <div style="font: 16px; font-family: Arial; font-weight: bold; text-align: center"> Unfortunately Springo doesn't support JavaScript-disabled browsers. <br /> To use Springo, please update your preferences to enable JavaScript. </div> Follow Springo on : Find top sites My top sites About freenode: IRC Servers Our main server rotation is chat.freenode.net. Pointers to freenode currently include irc.ghostscript.com, irc.gnu.org, irc.handhelds.org, and irc.kde.org. Please see our acknowledgements page for the generous groups and organizations who have helped us to provide this service. Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff "Think of it it like leaving your doors and windows open and complaining when someone looks inside." I find this to be an iffy comparison. I understand what you guys are trying to explain but it misrepresents the problem. I'm entitled to leave my windows and doors of my house open, if someone steps onto my property to have a look without my permission than in most countries that's trespassing.

Social Identity Theory This classic social psychology experiment shows how little excuse people need to form into groups and start discriminating against others. People’s behaviour in groups is fascinating and frequently disturbing. As soon as humans are bunched together in groups we start to do odd things: copy other members of our group, favour members of own group over others, look for a leader to worship and fight other groups. Just glance at Sherif’s Robbers Cave experiment for proof of how easy it is to provoke war between groups. But think about the types of groups you belong to, and you’ll realise they differ dramatically.

eDonkey network The eDonkey Network (also known as the eDonkey2000 network or eD2k) is a decentralized, mostly server-based, peer-to-peer file sharing network best suited to share big files among users, and to provide long term availability of files. Like most sharing networks, it is decentralized, as there is not any central hub for the network; also, files are not stored on a central server but are exchanged directly between users based on the peer-to-peer principle. Currently, the eD2k network is not supported by any organization (in the past it was supported by the MetaMachine Corporation, its creator, which now is out of business) and development and maintenance is being fully provided by its community and client developers. There are many programs that act as the client part of the network. The original eD2k protocol has been extended by subsequent releases of both eserver and eMule programs, generally working together to decide what new features the eD2k protocol should support.

Federal Judge Rules You May Be Forced To Provide Decryption Password In July, we wrote about an ongoing case wherein a woman accused of fraud was being asked by the prosecution to provide the password to access her computer’s data, which otherwise would remain encrypted and unreadable, weakening their case. They got permission to compel her to reveal the password, but the defense said that it was unconstitutional to do so, as providing that information was essentially self-incriminating testimony. The defense and the prosecution disagree, there is no single compelling precedent, and even the Supreme Court, which has weighed in on a similar topic, isn’t quite sure what to make of the situation. So, doing what Judges are made to do, Judge Robert Blackburn made a decision: “the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer.” The question everybody is asking is not whether Ramona Fricosu will be convicted of fraud, but how access to data should be considered in a courtroom.

Related: