
Full story here --> http://bbc.in/1zdzs1f
DeepWeb 101 |
|
![]() The government doesn't have to insist on you wearing a tracking device, we all do it voluntarily already. They just make sure to grab a copy of the data. Our favorite line from the article...“Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.” Full story here --> http://bbc.in/1zdzs1f
0 Comments
![]() As Senate and House voting dates draw nearer, some spy critics are pointing out the lack of financial support from big tech companies for candidates who are anti NSA spying. Our favorite quote of the article..."I would like to see the tech industry make more noise about this issue of surveillance because they are losing money every day these programs are allowed to continue..” Full story here --> http://bit.ly/1rtadAk ![]() New documents released by the NSA show that Former NSA Director Keith Allen had invested thousands of dollars in a number of technology and security companies during his tenure. He now runs his own cyber security firm with (likely) classified information he obtained while working there. Conflict of interest anyone? Full story here --> http://bit.ly/1EYRrKr ![]() Wikileaks head Julian Assange publicly voiced his concern with Australian government statements declaring that other countries such as the United States, Canada and Great Britain have limited access to Australian citizen data. Our favorite quote from the article..."It is absurd that Australian government agencies continue to misrepresent the nature of interception and their access to intercepted data..." Full story here --> http://bit.ly/1qpsmNZ ![]() Following the announcement last summer of breaches of over 70 million accounts at Target, JPMorgan Chase has announced a security compromise of their own resulting in the theft of data from over 76 million households and seven million small business accounts. Our favorite quote from the article..."But unlike retailers[Target], JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers’ credit card details and potentially includes more sensitive data." Full story here --> http://nyti.ms/1rOnQ0m ![]() The TOR browser may finally reach mass usage through the inclusion in a mainstream Web browser. Our favorite line from the article...The Tor anonymity network may soon expand to hundreds of millions of new users around the world as the software’s developers prepare to scale to a 'global population.' Full story here --> http://bit.ly/1wRtdwd ![]() In an open letter of protest sent to Israell Prime Minister Benjamin Netanyahu last week, 43 veteran and reserve of Israel's secret spy organization accuse the Prime Minister of targeting innocent Palestinian civilians for political purposes. Our favorite quote..."If [Palestinian-Americans/Israeli-Americans] talk about confidential things in an email, or in a telephone call, what right does the U.S. government have to give that information to a government that's basically hostile to them?" Full story here --> n.pr/1r0QbS7 ![]() As a result of news-site agendas, Tor seems to be constantly tagged as an 'illegal' part of the internet, which couldn't be further from the truth. It is time people begin to understand the power of using the internet anonymously when you are looking to protect things like your personal information. Our favorite quote..."In reality, what Tor allows you to do is to browse the Internet anonymously, and access parts of the Internet that are protected from prying eyes." Full story here --> http://bit.ly/ZrCXCo ![]() Comcast, in their infinite wisdom, has now decided they have the power to cut users off from their internet service for using the perfectly legal TOR browser. Not only do they operate with impunity as a Monopoly throughout large portions of the U.S., they now think they can play rulers of the 'net. Full story here --> http://yhoo.it/1wlDU9X ![]() The Department of Justice just re-released a lesser-redacted version of a 2004 Bush-era legal memo approving the NSA's 'Stellarwind Program'. "The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails." Full story here --> http://nyti.ms/1ufBgmT ![]() With the continued fallout from the iCloud celebrity photo leak, the researcher who identified the flawed code has admitted that he would have warned Apple if they offered a bounty--like other tech companies including Google, Microsoft, Facebook and Yahoo do. Our favorite quote from the article..."Despite the simplicity and clear benefits of such an initiative, Apple has decided to ignore calls for it to establish one." Full story here --> http://onforb.es/WhbwZS ![]() It's great to see Microsoft standing up against Big Brother aka the U.S. Government as the U.S. claims they have rightful access to stored personal emails on overseas servers. Our favorite quote..."It is a question of control, not a question of the location of that information." Full story here --> http://bit.ly/1q9qM7n ![]() Keep changing your passwords, folks! It's happening everywhere..."South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens." Full story here --> http://bit.ly/1mSg8Nk ![]() The irony of the TOR project is so great. Our favorite quote..."So, to sum: A project to help Internet users be private that the United States has funded in the past, and currently funds today, is being hacked by the NSA, while other actors of state agencies appear to be leaking found vulnerabilities to Tor itself." Full story here --> http://tcrn.ch/1q4THJh ![]() The NSA is building a cyber defense system that has the capabilities to instantly neutralize a foreign cyberattack. But according to Snowden, that would "require the NSA to collect and analyze all network traffic flows in order to design an algorithm that distinguishes normal traffic flow from anomalous, malicious traffic." Full story here --> http://wrd.cm/1lUzy3G |