SURVEILLANCE

The Correct Way to Use DuckDuckGo Search Engine


Use DuckDuckGo for their bang searches, i.e. if you type !g followed by your query it will search google. This works for most any search engine or wiki. !reddit, !wikipedia, !gnews, !gh for github... it's great. Vanilla DuckDuckGo results are certainly lacking but that's not the main use for it.
MORE: https://www.reddit.com/r/conspiracy/comments/4xu7wg/avoid_feeding_the_be...

WikiLeaks to release 'pristine copy' of NSA cyberweapons hack data

As the dust settles, following the suspected breach of an elite NSA-linked hacking unit dubbed the Equation Group, which potentially exposed a number of cyberweapons used by US spooks, whistleblowing outfit WikiLeaks has claimed it will publish a 'pristine' version of the data online for the world to see.

The cyber-espionage toolset, which was first teased online by a mysterious group calling itself The Shadow Brokers, contains what purports to be NSA exploits previously used by the agency to target computers, firewalls and routers. After releasing one file as proof of legitimacy, the hackers opened an auction and demanded one million bitcoin — the equivalent of at least $550m – to hand over the rest.
READ MORE: http://www.ibtimes.co.uk/wikileaks-release-pristine-copy-nsa-cyberweapon...

The NSA Hacking Team Known as the "Equation Group" Appears to Have Been Hacked and Their Advanced Hacking Tools Have Been Leaked Online

The leak over the weekend of advanced hacking tools contains digital signatures that are almost identical to those in software used by the state-sponsored Equation Group, according to a just-published report from security firm Kaspersky Lab.

Group claims to hack NSA-tied hackers, posts exploits as proof "While we cannot surmise the attacker's identity or motivation nor where or how this pilfered trove came to be, we can state that several hundred tools from the leak share a strong connection with our previous findings from the Equation group," Kaspersky researchers wrote in a blog post published Tuesday afternoon.
READ MORE: http://arstechnica.com/security/2016/08/code-dumped-online-came-from-omn...

The "Totalitarian Tip-Toe" Dance of John Key and his Gang of Thugs and Liars Continues. Spy Agency to Get New Powers

During the run-up to the 2013 election Edward Snowden alleged that New Zealand had asked the US National Security Agency to use its PRISM technology to spy on New Zealanders on the government’s behalf. Prime Minister (and then GCSB Minister) John Key had strongly denied doing so:

[Key] replied, “Well we do exchange – and it’s well known – information with our partners – so that’s the first thing, we do do that. How they gather that information and whether they use techniques and systems like PRISM I can’t comment on that…..The Prime Minister continued: “I can’t tell you how the United States gathers all of their information and what techniques they use. I simply don’t know that.” He added, “If the question is, ‘Do we use the United States or one of our other partners to circumvent New Zealand law?’ then the answer is categorically no we don’t.”

The Tor Social Contract

At The Tor Project, we make tools that help promote and protect the essential human rights of people everywhere. We have a set of guiding principles that make that possible, but for a long time, those principles were more or less unspoken. In order to ensure that project members build a Tor that reflects the commitment to our ideals, we've taken a cue from our friends at Debian and written the Tor Social Contract -- the set of principles that show who we are and why we make Tor.

Our social contract is a set of behaviors and goals: not just the promised results we want for our community, but the ways we seek to achieve them. We want to grow Tor by supporting and advancing these guidelines in the time we are working on Tor, while taking care not to undermine them in the rest of our time.

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

Early in the fight against al Qaeda in Afghanistan and insurgents in Iraq, the National Security Agency was blindsided by enemy fighters’ frequent use of rudimentary wireless communications devices known as “high–powered cordless phones,” according to documents among 263 published today by The Intercept.

The documents, drawn from the agency’s internal news site, SIDtoday, and provided by NSA whistleblower Edward Snowden, date mostly to the latter half of 2003, and show the NSA was at the time rapidly expanding its internet monitoring. But even as its digital surveillance grew more sophisticated, the agency saw its targets increasingly adopting crude forms of communications like shortwave radio, SMS cellphone messaging and, most vexingly, high-powered cordless phones.
READ MORE: https://theintercept.com/2016/08/10/iraqi-insurgents-stymied-the-nsa-and...

Microsoft Pitches Technology That Can Read Facial Expressions at Political Rallies

“Realtime Crowd Insights” is an Application Programming Interface (API), or a software tool that connects web applications to Microsoft’s cloud computing services. Through Microsoft’s emotional analysis API — a component of Realtime Crowd Insights — applications send an image to Microsoft’s servers. Microsoft’s servers then analyze the faces and return emotional profiles for each one.

In a November blog post, Microsoft said that the emotional analysis could detect “anger, contempt, fear, disgust, happiness, neutral, sadness or surprise.”
READ MORE: https://theintercept.com/2016/08/04/microsoft-pitches-technology-that-ca...

New attack bypasses HTTPS protection on Macs, Windows, and Linux

The attack can be carried out by operators of just about any type of network, including public Wi-Fi networks, which arguably are the places where Web surfers need HTTPS the most. It works by abusing a feature known as WPAD—short for Web Proxy Autodisovery—in a way that exposes certain browser requests to attacker-controlled code. The attacker then gets to see the entire URL of every site the target visits. The exploit works against virtually all browsers and operating systems. It will be demonstrated for the first time at next week's Black Hat security conference in Las Vegas in a talk titled Crippling HTTPS with Unholy PAC.
READ MORE: http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-c...

France issues formal notice to Microsoft about Windows 10: “stop collecting excessive data and tracking browsing by users without their consent.”

The French National Data Protection Commission (CNIL) has issued a formal notice to Microsoft regarding Windows 10 privacy and security concerns. The agency, along with the other European countries in the Article 29 working group on data privacy, have been investigating Microsoft since the release of Windows 10 last year. The CNIL has been responsible for data privacy law in France since 1978. Yesterday, CNIL Chairwoman Isabelle Falque-Pierrotin publicly served Microsoft Corporation formal notice telling them to “stop collecting excessive data and tracking browsing by users without their consent.”
READ MORE: https://www.privateinternetaccess.com/blog/2016/07/france-issues-formal-...

Retired FSB general suspects Pokemon Go of spying for foreign special services

A retired major general of Russia’s domestic security service, the FSB, has told reporters that the extremely popular augmented reality game Pokemon Go and similar mobile applications could be used by special services to collect intelligence data.

“Just imagine that these ‘creatures’ appear not in some city park, but at secret installations where a conscript soldier or any other military serviceman photographs it with his camera, strictly of their own free will, without any pressure or coercion. This is an ideal scheme with which special services can collect information. And no one would even pay attention, because it’s such a trendy hobby,” retired Major General Aleksandr Mikhailov said in comments with RIA Novosti.
READ MORE: https://www.rt.com/politics/351286-retired-fsb-general-suspects-pokemon/...

Syndicate content