This week's Glenn Greenwald revelation
is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools
with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
posted by XMLicious
on Jul 16, 2014 -
“The good news is that there are solutions. The weakness of mass surveillance is that it can very easily be made much more expensive through changes in technical standards: pervasive end-to-end encryption can quickly make indiscriminate surveillance impossible on a cost-effective basis. The result is that governments are likely to fall back to traditional, targeted surveillance founded upon an individualized suspicion. Governments cannot risk the discovery of their exploits by simply throwing attacks at every “endpoint,” or computer processor on the end of a network connection, in the world. Mass surveillance, passive surveillance, relies upon unencrypted or weakly encrypted communications at the global network level.
Edward Snowden submits written testimony to an EU committee investigating mass surveillance, and answers questions.
The testimony takes place 3 days ahead of his highly anticipated SXSW appearance, to take place later today. Snowden is expected to speak about privacy, security, mass surveillance programs, free speech and whistle-blowing in a rare remote video appearance before a live audience.
Kansas Congressman Mike Pompeo finds this “deeply troubling” in a letter he's sent to the organizers of the conference.
Meanwhile, people who wish to #asksnowden questions can use the hashtag on Twitter. The talk is to take place at 12pm PT, today.
posted by fantodstic
on Mar 10, 2014 -
"During his civil lawsuit against the People's Republic of China, Brian Milburn
says he never once saw one of the country's lawyers. He read no court documents from China's attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed. That doesn't mean
Milburn's adversary had no contact with him." [China Mafia-Style Hack Attack Drives California Firm to Brink
posted by vidur
on Nov 28, 2012 -
If you've ever worked with the command prompt on a Unix-based computer, you're likely familiar with SSH
(Secure SHell), which is a program and a protocol that allows you (yes, you!) to securely access a remote system. While SSH has certainly earned the "Secure" portion of its namesake over the years, it's functionality as a shell has ironically received very little attention, and has begun to show signs of age and obsolescence: SSH doesn't work very well on mobile connections, and its support for Unicode
is buggy and incomplete. A group of MIT researchers think they've found solutions to these problems, and have created Mosh
as a potential successor to SSH, which fixes many of the old protocol's annoyances and shortcomings, while retaining all of SSH's security features.
posted by schmod
on Apr 12, 2012 -
He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the US and wipes clean the minute he returns . In China, he disables Bluetooth and Wi-Fi , never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery , for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, "Chinese are very good at installing key-logging software on your laptop."
- Travel precautions in the age of digital espionage.
posted by Artw
on Feb 13, 2012 -
This article is about new border crossing security measures that are supposedly in the works.
Cross the U.S. border in a few years, and a hidden camera may zero in on you from 150 metres away, able to recognize you by the shape of your face, perhaps by the telltale markings of your eyeball or even in the way you walk past the border guard.
In milliseconds, a supercomputer would sift through a massive "data warehouse," able to dip into your life: Credit-card purchases, travel patterns, health and banking records would all be scanned. Your old telephone conversations -- in any language -- would be instantly available, along with e-mails that you sent years ago.
Perhaps they'll even be able to read your MetaFilter posts.
posted by orange swan
on Nov 25, 2002 -
Did you install it yet?
You may want to think twice. That new software update for Windows Media Player isn't just a security update, if you read the End User License Agreement carefully, it states:
"In order to protect the integrity of content and software protected by digital rights management 'Secure Content', Microsoft may provide security related updates to the OS Components that will be automatically downloaded onto your computer."
Does anyone know anything more about this? How about recommendations for a suitable replacement for WMP?
posted by Hackworth
on Jul 1, 2002 -
Anti-rip CD system bypassed.
heh. nice try, boyos. i've never understood how people can believe something digitized can possibly be protected in such a manner as to be foolproof. what one process can scramble, another can undo. [via /.
posted by fuzzygeek
on Aug 1, 2001 -
Win XP's Product Activation as a breeze to hack.
Provided that RC1 still ships as is and you keep your RAM locked at a fixed number of sticks, it's simply a matter of keeping a backup of a DBL file. For all the ballyhoo, it's amazing that something this obvious slipped under the cracks. With WPA this sloppy, is this the only half-hearted facet of Windows XP?
posted by ed
on Jul 17, 2001 -
Beyond the bar code:
Tags on retail products will send radio signals to their manufacturers, collecting information about consumer habits -- and raising privacy concerns. Radio tag technology is already here, used in fields such in livestock, freight-train cargo and highway tolls. The only barrier to widespread use is consumer products is price. When they can be made for a penny, expect to see them everywhere. From the March issue of MIT Technology Review
posted by jhiggy
on Feb 20, 2001 -
jon kats on "geek profiling":
"W.A.V.E joins new sofware "security" programs ... being tested in public schools in America to compile and computerize information on students believed to be dangerous or potentially violent. This new rat-on-kids industry is an offshoot of the Geek Profiling anti-Net hysteria that broke out all across the United States after the Columbine High School killings, whose first anniversary is fast approaching. Despite the fact that horrific incidents like Columbine are extremely rare, and that the FBI and Justice Department have both reported that youth violence has dropped to its lowest levels in more than half a century, the belief persists in much of America that technologies like the Internet (and activities like computer gaming) are turning otherwise healthy school children into mass murderers."
posted by palegirl
on Mar 29, 2000 -