This week's Glenn Greenwald revelation
is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools
with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
posted by XMLicious
on Jul 16, 2014 -
Sarah’s abuser gained access to every password she had. He monitored her bank accounts and used her phone to track her location and read her conversations. She endured four years of regular physical and emotional trauma enabled by meticulous digital surveillance and the existing support services, from shelters to police, were almost powerless to help her. “We wish we could just stop the clock because we need to catch up,” said Risa Mednick, director of the Cambridge domestic violence prevention organization Transition House. To fight back, Transition House and others turn to the same methods used by intelligence agencies in order to keep their clients safe.
posted by ChuraChura
on May 9, 2014 -
Today The New Yorker
, a service that allows sources to share information with TNY journalists securely and anonymously. As explained in this infographic
, Strongbox relies on the Tor network, a dedicated server, PGP encryption, VPNs, and multiple laptops and thumb drives to prevent files from being intercepted or traced. The codebase
, which is open source, was designed by the late Aaron Swartz (Previously
). Kevin Poulsen, one of the organizers of the project, chronicles
how Swartz developed the code and how the project managed to carry on after his death. TNY hopes
that Strongbox will help the magazine continue its long tradition of investigative journalism.
posted by Cash4Lead
on May 15, 2013 -
Tor/Forge, the Science Fiction and Fantasy subsidiary of Macmillan, has announced
that it is going DRM free on all of its ebooks. Mefi's own Charles Stross
shares a presentation
he recently made to executives at Macmillan that may have partially influenced this decision. Stross had previously
predicted that publishers would need to go DRM free to prevent Amazon from gaining too much power in the ebook market.
posted by bove
on Apr 24, 2012 -
The "visible web" is what you can find using general web search engines. It's also what you see in almost all subject directories. The "invisible web"
is what you cannot find using these types of tools. It's the internet that Google
doesn't show us; some of it dull, some of it private, some of it deliberately hidden.
More beneath the surface. [more inside]
posted by Stagger Lee
on Feb 13, 2012 -
My mistake, if I can call it that, was trust - to think a smile was a smile and not a show of teeth
. - - - All this week, tor.com is publishing The Situation
, a comic based on a story
by everyone's favorite Jeff VanderMeer, and illustrated by Eric Orchard
. [more inside]
posted by Think_Long
on Jan 25, 2012 -
application aims to use steganography
to hide samizdat
-type data within a larger stream of innocuous network traffic. Thus, civilians in Iran, for example, could more easily evade Iranian censors and provide the world with an unfiltered report
on events within the country. Haystack earned its creator Austin Heap
a great deal of positive coverage from the media during the 2009 Iranian election protests. The BBC described Heap as "on the front lines"
of the protesters' "Twitter revolution", while The Guardian called him an Innovator of the Year
. Despite the laudatory coverage, however, the media were never given a copy of the software to examine. Indeed, not much is known about the software or its inner workings. Specialists in network encryption security were not allowed to perform an independent evaluation of Haystack, despite its distribution to and use by a small number of Iranians, possibly at some risk. As interest in the project widens
and criticisms of the media coverage and software continue to mount
, Heap has currently asked users to cease using Haystack
until a security review can be performed.
posted by Blazecock Pileon
on Sep 13, 2010 -
- "a free remix tape put together by Montreal-based producer Tor, sampling songs from multi-instrumentalist and indie hero, Sufjan Stevens. Tracks are sampled from his 2005 LP Illinoise, as well as 3 of his other albums, 'A Sun Came', 'Seven Swans' and 'Songs for Christmas', blending Sufjan Steven's acoustic guitar, piano and horns with MC's Aesop Rock, Big Daddy Kane, Gift of Gab (Blackalicious), C.L. Smooth, Outkast, Brother Ali, and Grand Puba."
posted by Paragon
on Jan 24, 2010 -
It’s only natural that if you wish to present yourself as a well-read person, a certain degree of complete bullshit is required. There’s no shame in lying about what you’ve read. There’s only shame in getting caught. Then you look like a doofus, and an illiterate one at that... How to lie about books
posted by Artw
on May 28, 2009 -
This is an ironic tale of the consequences of inept application of cryptographic tools. Or is it?
Dan Egerstad, a Swedish hacker, gained access to hundreds of computer network accounts around the world, belonging to various embassies, corporations and other organizations. How did he do it? Very easily:
by sniffing exit traffic on his Tor
nodes. [more inside]
posted by Anything
on Dec 4, 2007 -
"What Do I Put in My Portfolio?"
Irene Gallo, art director for science fiction/fantasy publisher Tor Books (and its mainstream imprint Forge), lays down wisdom on how to impress an art director and maybe get one to hire you for a book cover. Aside from being a practical primer for artists on everything from picturing the human figure to how not
to annoy an art director at a party, for everyone else it's a glimpse into why SF book covers look the way they do.
posted by jscalzi
on Jul 11, 2006 -