
Full story here --> http://bit.ly/1wRtdwd
DeepWeb 101 |
|
![]() The TOR browser may finally reach mass usage through the inclusion in a mainstream Web browser. Our favorite line from the article...The Tor anonymity network may soon expand to hundreds of millions of new users around the world as the software’s developers prepare to scale to a 'global population.' Full story here --> http://bit.ly/1wRtdwd
0 Comments
![]() In an open letter of protest sent to Israell Prime Minister Benjamin Netanyahu last week, 43 veteran and reserve of Israel's secret spy organization accuse the Prime Minister of targeting innocent Palestinian civilians for political purposes. Our favorite quote..."If [Palestinian-Americans/Israeli-Americans] talk about confidential things in an email, or in a telephone call, what right does the U.S. government have to give that information to a government that's basically hostile to them?" Full story here --> n.pr/1r0QbS7 ![]() As a result of news-site agendas, Tor seems to be constantly tagged as an 'illegal' part of the internet, which couldn't be further from the truth. It is time people begin to understand the power of using the internet anonymously when you are looking to protect things like your personal information. Our favorite quote..."In reality, what Tor allows you to do is to browse the Internet anonymously, and access parts of the Internet that are protected from prying eyes." Full story here --> http://bit.ly/ZrCXCo ![]() Comcast, in their infinite wisdom, has now decided they have the power to cut users off from their internet service for using the perfectly legal TOR browser. Not only do they operate with impunity as a Monopoly throughout large portions of the U.S., they now think they can play rulers of the 'net. Full story here --> http://yhoo.it/1wlDU9X ![]() The Department of Justice just re-released a lesser-redacted version of a 2004 Bush-era legal memo approving the NSA's 'Stellarwind Program'. "The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails." Full story here --> http://nyti.ms/1ufBgmT ![]() With the continued fallout from the iCloud celebrity photo leak, the researcher who identified the flawed code has admitted that he would have warned Apple if they offered a bounty--like other tech companies including Google, Microsoft, Facebook and Yahoo do. Our favorite quote from the article..."Despite the simplicity and clear benefits of such an initiative, Apple has decided to ignore calls for it to establish one." Full story here --> http://onforb.es/WhbwZS ![]() It's great to see Microsoft standing up against Big Brother aka the U.S. Government as the U.S. claims they have rightful access to stored personal emails on overseas servers. Our favorite quote..."It is a question of control, not a question of the location of that information." Full story here --> http://bit.ly/1q9qM7n ![]() Keep changing your passwords, folks! It's happening everywhere..."South Korean authorities have revealed a massive data breach that has affected well over half of the country's 50 million citizens." Full story here --> http://bit.ly/1mSg8Nk ![]() The irony of the TOR project is so great. Our favorite quote..."So, to sum: A project to help Internet users be private that the United States has funded in the past, and currently funds today, is being hacked by the NSA, while other actors of state agencies appear to be leaking found vulnerabilities to Tor itself." Full story here --> http://tcrn.ch/1q4THJh ![]() The NSA is building a cyber defense system that has the capabilities to instantly neutralize a foreign cyberattack. But according to Snowden, that would "require the NSA to collect and analyze all network traffic flows in order to design an algorithm that distinguishes normal traffic flow from anomalous, malicious traffic." Full story here --> http://wrd.cm/1lUzy3G ![]() "An elite hacking unit in the National Security Agency had reportedly been attempting to install malware on a central router within Syria — a feat that would have allowed the agency to access a good amount of the country's internet traffic. Instead, it ended up accidentally rendered the router unusable, causing Syria's internet connection to go dark" Full story here --> http://bit.ly/1sTl0W0 ![]() An older article covering the Lavabit (email service) that was shut down and the owners response. Our favorite quote...“This is about protecting all of our users, not just one in particular. It’s not my place to decide whether an investigation is just, but the government has the legal authority to force you to do things you’re uncomfortable with...” Full story here --> http://bit.ly/1pp0sFu ![]() After a public hearing challenging the NSA', lawyers for the NSA requested parts of the public transcript be 'removed'. Our favorite quote..."..the incident speaks volumes about the dangers of allowing the government free rein to claim secrecy in court proceedings and otherwise." Full story here --> http://yhoo.it/1sItTDG ![]() A russian-based group of hackers known as CyberVor has managed to amass a ton of stolen data. Our favorite quote..."Vulnerable sites were then plundered for any data they could be tricked into leaking, which was added to the gang's epic cache." Full story here --> http://bit.ly/1zTMpLE ![]() An interesting technique being used by the FBI, drive-by downloading is basically driving by a location and hacking the wireless network to identify users of the TOR network. In some cases it seems a very useful tool but as always...how do we define the line of too much privacy invasion? Full story here --> http://wrd.cm/1lvOrZT |