Frontrunner + privacy   183

The Multibillion-Dollar U.S. Spy Agency You Haven’t Heard of
On a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. Even Barack Obama, five months into his presidency, seemed not to have recognized its name. While shaking hands at a Five Guys hamburger restaurant in Washington in May 2009, he asked a customer seated at a table about his job. “What do you [do]?” the president inquired. “I work at NGA, National Geospatial-Intelligence Agency,” the man answered. Obama appeared dumbfounded. “So, explain to me exactly what this National Geospatial…” he said, unable to finish the name. Eight years after that videotape aired, the NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency.

Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area, bigger than the CIA headquarters and the U.S. Capitol.

Completed in 2011 at a cost of $1.4 billion, the main building measures four football fields long and covers as much ground as two aircraft carriers. In 2016, the agency purchased 99 acres in St. Louis to construct additional buildings at a cost of $1.75 billion to accommodate the growing workforce, with 3,000 employees already in the city.
surveillance  usa  privacy  nga  2017 
april 2017 by Frontrunner
Whistleblower Uncovers London Police Hacking of Journalists and Protestors
The existence of a secretive unit within London’s Metropolitan Police that uses hacking to illegally access the emails of hundreds of political campaigners and journalists has been revealed. At least two of the journalists work for the Guardian .

Green Party representative in the British House of Lords, Jenny Jones, exposed the unit’s existence in an opinion piece in the Guardian. The facts she revealed are based on a letter written to her by a whistleblower.

The letter reveals that through the hacking, Scotland Yard has illegally accessed the email accounts of activists for many years, and this was possible due to help from “counterparts in India.” The letter alleged that the Metropolitan Police had asked police in India to obtain passwords on their behalf—a job that the Indian police subcontracted out to groups of hackers in India.
surveillance  privacy  security  greatbritain  india  scotlandyard  2017 
april 2017 by Frontrunner
Open Whisper Systems
Open Whisper Systems is both a large community of volunteer Open Source contributors, as well as a small team of dedicated grant-funded developers. Together, we're working to advance the state of the art for secure communication, while simultaneously making it easy for everyone to use.
security  privacy  mobilephones  encryption  opensource  chat  messaging  talk 
december 2016 by Frontrunner
Everyone Who Can Now See Your Entire Internet History, Including the Taxman, DWP and Food Standards Agency
* British Transport Police
* City of London Police
* Common Services Agency for the Scottish Health Service
* Competition and Markets Authority
* Criminal Cases Review Commission
* Department for Communities in Northern Ireland
* Department for the Economy in Northern Ireland
* Department for Transport
* Department for Work and Pensions
* Department of Health
* Department of Justice in Northern Ireland
* Financial Conduct Authority
* Fire and rescue authorities under the Fire and Rescue Services Act 2004
* Food Standards Agency
* Food Standards Scotland
* Gambling Commission
* Gangmasters and Labour Abuse Authority
* Health and Safety Executive
* HM Revenue & Customs
* Home Office
* Independent Police Complaints Commissioner
* Information Commissioner
* Metropolitan Police Service
* Ministry of Defence
* Ministry of Defence Police
* Ministry of Justice
* National Crime Agency
* NHS Business Services Authority
* NHS trusts and foundation trusts in England that provide ambulance services
* Northern Ireland Ambulance Service Health and Social Care Trust
* Northern Ireland Fire and Rescue Service Board
* Northern Ireland Health and Social Care Regional Business Services Organisation
* Office of Communications
* Office of the Police Ombudsman for Northern Ireland
* Police forces maintained under section 2 of the Police Act 1996
* Police Investigations and Review Commissioner
* Police Service of Northern Ireland
* Police Service of Scotland
* Royal Air Force Police
* Royal Military Police
* Royal Navy Police
* Scottish Ambulance Service Board
* Scottish Criminal Cases Review Commission
* Secret Intelligence Service
* Security Service
* Serious Fraud Office
* Welsh Ambulance Services National Health Service Trust
greatbritain  surveillance  government  agencies  lawenforcement  privacy  security  2016 
november 2016 by Frontrunner
How Can I Protect Myself from Government Snoopers?
The UK has just passed the Investigatory Powers Act 2016, at the third attempt, and it will become law by the end of the year. The bill was instigated by the then home secretary, Theresa May, in 2012. It is better known as the snooper’s charter.

Jim Killock, the director of Open Rights Group, described it as the “most extreme surveillance law ever passed in a democracy”. It more or less removes your right to online privacy.

The law forces internet service providers to keep a record of all the websites – not the actual pages – you visit for up to a year. It also obliges companies to decrypt data on demand and gives government security services the power to hack your computers, tablets, mobile phones and other devices.
greatbritain  surveillance  privacy  tools  countermeasures  2016 
november 2016 by Frontrunner
Privacy Experts Fear Donald Trump Running Global Surveillance Network
Privacy activists, human rights campaigners and former US security officials have expressed fears over the prospect of Donald Trump controlling the vast global US and UK surveillance network.

They criticised Barack Obama’s administration for being too complacent after the 2013 revelations by the NSA whistleblower, Edward Snowden, and making only modest concessions to privacy concerns rather than carrying out major legislative changes.

The concern comes after Snowden dismissed fears for his safety if Trump, who called him “a spy who has caused great damage in the US”, was to strike a deal with Vladimir Putin to have him extradited.

Snowden, in a video link-up from Moscow with a Netherlands-based tech company on Thursday, said it would be “crazy to dismiss” the prospect of Trump doing a deal but if personal safety was a major concern for him, he would not have leaked the top-secret documents in the first place.
donaldtrump  nsa  surveillance  snowden  vladimirputin  privacy  security  2016 
november 2016 by Frontrunner
Linux Security Distros Compared: Tails vs. Kali vs. Qubes
If you're interested in security, you've probably already heard of security-focused Linux distros like Tails, Kali, and Qubes. They're really useful for browsing anonymously, penetration testing, and tightening down your system so it's secure from would-be hackers. Here are the strengths and weaknesses of all three.

It seems like every other day we hear about another hack, browser exploit, or nasty bit of malware. If you do a lot of your browsing on public Wi-Fi networks, you're a lot more susceptible to these types of hacks. A security-focused distribution of Linux can help. For most of us, the use cases here are pretty simple.
security  privacy  linux  tails  kali  qubes  os  2014 
november 2016 by Frontrunner
Surveillance Self-Defense Against the Trump Administration
Trump has repeatedly shown utter disrespect for the rule of law. He doesn’t believe in freedom of religion. He advocates torture. He has said he’ll instruct his Justice Department to investigate Black Lives Matter activists, and it’s likely he’ll appoint Rudy Giuliani, of New York City’s racist and unconstitutional “stop-and-frisk” fame, as his attorney general to do the investigating. The New York Times also reports that “Mr. Trump still privately muses about all the ways he will punish his enemies after Election Day.”

With Trump eager to misuse his power and get revenge on his perceived enemies, it’s reasonable to conclude there will be a parallel increase in abuse of power in law enforcement and the intelligence community. Activists who put their bodies on the line trying to protect basic rights — freedom of religion, freedom of speech, civil rights, reproductive rights, voting rights, privacy rights — will face the brunt of it.

Thanks to 16 years of relentless and illegal expansion of executive power under Presidents Bush and Obama, Trump is about to have more tools of surveillance at his disposal than any tyrant ever has. Those preparing for the long fight ahead must protect themselves, even if doing so can be technically complicated.

The best approach varies from situation to situation, but here are some first steps that activists and other concerned citizens should take.
donaldtrump  surveillance  protection  encryption  privacy  security  howto  2016 
november 2016 by Frontrunner
How Much Surveillance Can Democracy Withstand?
Thanks to Edward Snowden's disclosures, we know that the current level of general surveillance in society is incompatible with human rights. The repeated harassment and prosecution of dissidents, sources, and journalists in the US and elsewhere provides confirmation. We need to reduce the level of general surveillance, but how far? Where exactly is the maximum tolerable level of surveillance, which we must ensure is not exceeded? It is the level beyond which surveillance starts to interfere with the functioning of democracy, in that whistleblowers (such as Snowden) are likely to be caught.
richardstallman  surveillance  privacy  security  foss  2013 
november 2016 by Frontrunner
Britain has Passed the 'Most Extreme Surveillance Law Ever Passed in a Democracy'
The law forces UK internet providers to store browsing histories - including domains visited - for one year, in case of police investigations.
surveillance  greatbritain  law  privacy  security  isp  2016 
november 2016 by Frontrunner
Despite Trump Fears, Snowden Sees a Hopeful Future
While we’re still two months away from an actual Trump presidency, tech companies and civil liberties advocates are already grappling with the question of what his ascendency means for privacy and surveillance. Among those weighing in? NSA whistleblower Edward Snowden.

“We are never farther than a single election away from a change in government, from a change in policy, from a change in the way the powers that we have constructed into a system are used,” Snowden said today in a moderated question-and-answer session sponsored by the UK-based search engine Start Page. That’s always been true but perhaps feels more vital now than ever.
snowden  donaldtrump  nsa  surveillance  usa  privacy  impact  2016 
november 2016 by Frontrunner
President Obama Should Shut Down the NSA’s Mass Spying Before It’s Too Late
President Obama has just 71 days until Donald Trump is inaugurated as our next commander-in-chief. That means he has a matter of weeks to do one thing that could help prevent the United States from veering into fascism: declassifying and dismantling as much of the federal government’s unaccountable, secretive, mass surveillance state as he can — before Trump is the one running it.
barackobama  donaldtrump  nsa  surveillance  security  privacy  usa  2016 
november 2016 by Frontrunner
Sexual Secrets for Hundreds of Millions Exposed in Largest Hack of 2016
Friend Finder Network Inc is a company that operates a wide range of 18+ services and was hacked in October of 2016 for over 400 million accounts representing 20 years of customer data which makes it by far the largest breach we have ever seen -- MySpace gets 2nd place at 360 million. This event also marks the second time Friend Finder has been breached in two years, the first being around May of 2015.
hacking  passwords  usernames  adultfriendfinder  security  privacy  2016 
november 2016 by Frontrunner
How to Encrypt Your Entire Life in Less Than an Hour
Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately lead the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease.

When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams.

But you obey the law. What do you have to worry about? As the motto of the United Kingdom’s surveillance program reminds us, “If you’ve got nothing to hide, you’ve got nothing to fear.”

Well, law-abiding citizens do have reason to fear. They do have reasons to secure their devices, their files, and their communications with loved ones.

“If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641

In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. In a single sitting, you can make great strides toward securing your privacy.
encryption  tools  tor  signal  privacy  security  2016 
november 2016 by Frontrunner
Reasons Not To Use Uber
We should not accept the promotional term "sharing economy" for companies like Uber. That is spin. A more accurate term is "piecework subcontractor economy".

Because I reject technology that mistreats me, I will never order or pay for an Uber car. I hope there will always be taxis I can use. But what about you?
uber  richardstallman  avoidusing  list  privacy 
november 2016 by Frontrunner
Surveillance Self-Defense
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
eff  surveillance  privacy  security  tips  tools  howto  communication  website 
november 2016 by Frontrunner
Stealth Cell Tower
Stealth Cell Tower is an antagonistic GSM base station in the form of an innocuous office printer. It brings the covert design practice of disguising cellular infrastructure as other things - like trees and lamp-posts - indoors, while mimicking technology used by police and intelligence agencies to surveil mobile phone users.
surveillance  imsicatcher  diy  raspberrypi  gsm  privacy  security  2016 
november 2016 by Frontrunner
In Scathing Ruling, Federal Court Says CSIS Bulk Data Collection Illegal
The Federal Court of Canada has faulted Canada’s domestic spy agency for unlawfully retaining data and for not being truthful with judges who authorize its intelligence programs. Separately, the court also revealed that the spy agency no longer needs warrants to collect Canadians’ tax records.

All this has been exposed in a rare ruling about the growing scope of Canadian intelligence collection disclosed by the court on Thursday. At issue is how the federal domestic spy service has been pushing past its legal boundaries in the name of collecting data, in hopes of rounding out the holdings of a little-known Canadian intelligence facility dubbed the “operational data analysis centre.”

Many corporations and government agencies are now gravitating toward so-called big data computer analytics that can predict patterns of future behaviour based upon records about what has happened in the past. Spy agencies are no different, and the centre in question appears to be the Canadian Security Intelligence Service’s equivalent of a crystal ball – a place where intelligence analysts attempt to deduce future threats by examining, and re-examining, volumes of data.
canada  csis  surveillance  law  ruling  federalcourtofcanada  privacy  security  2016 
november 2016 by Frontrunner
The Little-Known Company That Enables Worldwide Mass Surveillance
It was a powerful piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead of hair, had one main purpose: to vacuum up vast quantities of internet data at an astonishing speed.

The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.

Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm’s key role helping governments across the world harvest vast amounts of information on people’s private emails, online chats, social media conversations, and internet browsing histories.
surveillance  security  privacy  gchq  endace  medusa  newzealand  greatbritain  morocco  usa  israel  denmark  australia  canada  spain  india  morganstanley  reuters  bankofamerica  att  aol  verizon  sprint  cogentcommunications  telstra  belgacom  swisscom  deutschetelekom  telenaitaly  vastechsouthafrica  francetelecom  2016 
october 2016 by Frontrunner
China’s Plan to Organize Its Society Relies on ‘Big Data’ to Rate Everyone
Imagine a world where an authoritarian government monitors everything you do, amasses huge amounts of data on almost every interaction you make, and awards you a single score that measures how “trustworthy” you are.

In this world, anything from defaulting on a loan to criticizing the ruling party, from running a red light to failing to care for your parents properly, could cause you to lose points.
china  surveillance  privacy  minorityreport  society  totalitarianstate  profiling  bigdata  2016 
october 2016 by Frontrunner
LinkedIn Accesses Gmail Contacts Via ‘Auto-authorization’
LinkedIn users are showing concern today as it comes to light that the business network will access a user’s Gmail contacts if the user has a Gmail session and a LinkedIn session open in the same browser – and LinkedIn has confirmed that there is currently no way to turn off what it refers to as the ‘auto-authorization’ that lets this poaching occur.
linkedin  gmail  privacy  hacking  2016 
october 2016 by Frontrunner
NSA Could Put Undetectable “Trapdoors” in Millions of Crypto Keys
As with all public key encryption, the security of the Diffie-Hellman protocol is based on number-theoretic computations involving prime numbers so large that the problems are prohibitively hard for attackers to solve. The parties are able to conceal secrets within the results of these computations. A special prime devised by the researchers, however, contains certain invisible properties that make the secret parameters unusually susceptible to discovery. The researchers were able to break one of these weakened 1,024-bit primes in slightly more than two months using an academic computing cluster of 2,000 to 3,000 CPUs.
nsa  encryption  hacking  backdoor  trapdoor  security  privacy  2016 
october 2016 by Frontrunner
Surveillance in the Post-Obama Era
During his 2008 campaign, President Obama vowed to assert greater oversight of the massive surveillance apparatus built in the wake of the Sept. 11 attacks, arguing that the United States needed to strike a better balance between privacy and security and that all intelligence programs should be lawful.

“I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom,” Mr. Obama said in 2007.

Once in office, however, the Obama White House failed to meaningfully scale back surveillance practices established by Mr. Obama’s predecessor, including the unlawful bulk collection of Americans’ domestic phone call records.
surveillance  privacy  barackobama  legacy  lawenforcement  intelligencecommunity  nsa  donaldtrump  hillaryclinton  encryption  2016 
october 2016 by Frontrunner
Yahoo Secretly Scanned Customer Emails for US Intelligence-sources
Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events.
yahoo  nsa  fbi  surveillance  privacy  2016 
october 2016 by Frontrunner
MasterCard launches its 'Selfie Pay' Biometric Authentication App in Europe
MasterCard is moving from trials of facial biometrics for payment authentication, including one in the U.S. and Canada launched earlier this year, to its first proper rollout of what is colloquially referred to as ‘selfie pay’ (aka MasterCard Identity Check). So basically enabling app users to confirm an online payment by showing their face to their smartphone’s camera.

The biometric authentication app is being rolled out in Europe in the following markets: Austria, Belgium, the Czech Republic, Denmark, Finland, Germany, Hungary, the Netherlands, Norway, Spain, Sweden and the UK. The company said it plans to make the tech available to MasterCard users worldwide beginning next year, according to Engadget, which reported the European rollout earlier.
mastercard  creditcard  biometrics  privacy  security  2016 
october 2016 by Frontrunner
This Secret Tool Tracks Everything You Do at Restaurants and Nightclubs
It’s not uncommon for Joel Montaniel to schedule a business meeting for 1 a.m. In his world, work happens during the day, but business happens at night.

Montaniel, 32, is the co-founder and CEO of SevenRooms, a customer relationship management (CRM) platform that gives nightclubs and restaurants a detailed view of who they’re serving. Through the tool, businesses can see a customer’s photo, as well as his or her zip code, birthday, allergy information, previous food and drink orders, and spending. Popular hot spots like Bagatelle, Tao, and Marquee use the software to personalize their interactions with customers in hopes of turning them into regulars.
crm  surveillance  privacy  sevenrooms  restaurant  vip  2016 
october 2016 by Frontrunner
Google's New Messaging App is So Useful I Don't Care That It's Creepy
People use their phones for messaging more than almost anything else. That’s why companies like Apple, Facebook, and Snapchat are dumping truckloads into making it easier and more fun to send messages. In May at I/O, Google announced Allo, its latest foray into the brave new world of messaging. Now, the app is finally available on Android and iOS.
mobile  chat  google  allo  spying  ai  privacy  2016 
september 2016 by Frontrunner
The Trouble With Intel’s Management Engine
Something is rotten in the state of Intel. Over the last decade or so, Intel has dedicated enormous efforts to the security of their microcontrollers. For Intel, this is the only logical thing to do; you really, really want to know if the firmware running on a device is the firmware you want to run on a device. Anything else, and the device is wide open to balaclava-wearing hackers.
intel  managementengine  microcontrollers  hacking  backdoor  spying  privacy  security  2016 
september 2016 by Frontrunner
The Feds Will Soon Be Able to Legally Hack Almost Anyone
Digital devices and software programs are complicated. Behind the pointing and clicking on screen are thousands of processes and routines that make everything work. So when malicious software—malware—invades a system, even seemingly small changes to the system can have unpredictable impacts.

That’s why it’s so concerning that the Justice Department is planning a vast expansion of government hacking. Under a new set of rules, the FBI would have the authority to secretly use malware to hack into thousands or hundreds of thousands of computers that belong to innocent third parties and even crime victims. The unintended consequences could be staggering.
fbi  hacking  privacy  security  law  2016 
september 2016 by Frontrunner
Long-Secret Stingray Manuals Detail How Police Can Spy on Phones
Harris Corp.’s Stingray surveillance device has been one of the most closely guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.
harriscorp  stingray  mobilephones  spying  privacy  intercept  imsicatcher  manual  surveillance  lawenforcement  2016 
september 2016 by Frontrunner
GCHQ Planning UK-wide DNS ‘Firewall’
UK surveillance agency GCHQ is exploring the use of a national ‘firewall’ in its fight against cybercrime, according to the organisation’s head of cybersecurity.

Alongside BT, Talk Talk and Virgin Media, GCHQ will work to filter out websites and email campaigns which are known to contain malicious content. The intelligence organisation believes that the best to way to set up such a blockade would be to build a national domain name system (DNS).
gchq  mi5  malware  spying  privacy  security  2016 
september 2016 by Frontrunner
Police forces across the United States are stockpiling massive databases with personal information from millions of Americans who crossed paths with officers but were not charged with a crime.

A person can end up in one of these databases by doing nothing more than sitting on a public park bench or chatting with an officer on the street. Once there, these records can linger forever and be used by police agencies to track movements, habits, acquaintances and associations – even a person’s marital and job status, The Post and Courier found in an investigation of police practices around the nation.
usa  lawenforcement  databases  suspects  surveillance  privacy  2016 
september 2016 by Frontrunner
Privacy and Control Need to be Put Back into the Hands of the Individual
Corruption and oppression go hand in hand. Nothing exemplifies this more than the recent news from China that their corrupt and oppressive government has recently shut down several online news operations. These include political and social news sites together with social network accounts. The harsh rhetoric used by the Department of Mind Control shows how much the Chinese government despises those entities and individuals whose only goal is to distribute news and information and give all people a voice. State controlled media is the name of the game in China and the single-party state is not content to just ban Facebook and Twitter but it is going after homegrown networks also.

We see this trend worldwide where governments want to stifle dissent in order to stay in power and, in the worst of cases, wanting to cover up human rights abuses.
privacy  mindcontrol  government  china  germany  france  venezuela  facebook  twitter  whatsapp  vpn  bitcoin  visa  mastercard  gold  encryption  cryptowars  2016 
september 2016 by Frontrunner
Technical Analysis of Client Identification Mechanisms
1 Explicitly assigned client-side identifiers

1.1 HTTP cookies
1.2 Flash LSOs
1.3 Silverlight Isolated Storage
1.4 HTML5 client-side storage mechanisms
1.5 Cached objects
1.6 Cache metadata: ETag and Last-Modified
1.7 HTML5 AppCache
1.8 Flash resource cache
1.9 SDCH dictionaries
1.10 Other script-accessible storage mechanisms
1.11 Lower-level protocol identifiers

2 Machine-specific characteristics

2.1 Browser-level fingerprints
2.2 Network configuration fingerprints

3 User-dependent behaviors and preferences
4 Fingerprinting prevention and detection challenges
5 Potential directions for future work
browsers  tracking  methods  cookies  lso  isolatedstorage  html5  flash  fingerprint  security  privacy  chrome 
september 2016 by Frontrunner
How Tor Works
01. Introduction
02. Threat Model and Goals
03. Onion Routing 101
04. Circuits and Connection Pooling
05. Directory System
06. How does a relay join the Tor cluster?
07. Conclusion
08. Resources
tor  howstuffworks  security  privacy  cryptography  network  learning  2016 
september 2016 by Frontrunner
How Spy Tech Firms Let Governments See Everything on a Smartphone
Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location? That will cost you $650,000, plus a $500,000 setup fee with an Israeli outfit called the NSO Group. You can spy on more people if you would like — just check out the company’s price list.

The NSO Group is one of a number of companies that sell surveillance tools that can capture all the activity on a smartphone, like a user’s location and personal contacts. These tools can even turn the phone into a secret recording device.
security  privacy  mobilephones  hacking  spying  surveillance  unitedarabemirates  israel  mexico  iphone  blackberry  android  symbian  2016 
september 2016 by Frontrunner
This Employee ID Badge Monitors and Listens to You at Work — Except in the Bathroom
A new product by Humanyze aims to increase productivity in the office using analytics.

Do you hog office conversations? Or not talk enough? Does your voice squeal? Do you sit very still at your desk all day? Or do you fidget under stress? Where do you go in the office? How much time do you spend there? To whom do you talk?

An employee badge can now measure all this and more, all with the goal of giving employers better information to evaluate performance. Think of it as biometrics meets the boss.
business  workplace  spying  privacy  humanyze  employees  employers  analytics  2016 
september 2016 by Frontrunner
Internet Tracking Has Moved Beyond Cookies
A new survey from a group of Princeton researchers of one million websites sheds some light on the cutting-edge tricks being used to follow your digital trail. Rather than placing a tracker on your browser, many sites are now “fingerprinting” — using information about your computer such as battery status or browser window size to identify your presence.
browsers  fingerprint  tracking  surveillance  privacy  2016 
september 2016 by Frontrunner
NSA Hacked French President’s House
French newspaper “Le Monde” just published an article confirming that the US/NSA indeed hacked the Élysée Palace in 2012.

‘Quantum Insert’ has been used to hack the machines. This type of attacks was used in the GCHQ/NSA operation against employees of the Belgian telecom Belgacom (renamed Proximus today).
nsa  hacking  quantuminsert  france  security  privacy  2016 
september 2016 by Frontrunner
All the Ways Your Wi-Fi Router Can Spy on You
When those devices connect to a router, they send requests for information—a weather forecast, the latest sports scores, a news article—and, in turn, receive that data, all over the air. As it communicates with the devices, the router is also gathering information about how its signals are traveling through the air, and whether they’re being disrupted by obstacles or interference. With that data, the router can make small adjustments to communicate more reliably with the devices it’s connected to.

But it can also be used to monitor humans—and in surprisingly detailed ways.

As people move through a space with a Wi-Fi signal, their bodies affect it, absorbing some waves and reflecting others in various directions. By analyzing the exact ways that a Wi-Fi signal is altered when a human moves through it, researchers can “see” what someone writes with their finger in the air, identify a particular person by the way that they walk, and even read a person’s lips with startling accuracy—in some cases even if a router isn’t in the same room as the person performing the actions.
wifi  routers  wireless  privacy  surveillance  spying  lipreading  proofofconcept  2016 
september 2016 by Frontrunner
Report Claims Intel CPUs Contain Enormous Security Flaw
For the last ten years, Intel has built remote management technology into various motherboards and processors. The Intel Active Management Technology (AMT) system provides system administrators with a method of remotely controlling and securing PCs that functions independently of the operating system, hard drive, or boot state. It’s even capable of running when the system is off, provided the computer is still connected to line power and a network card. AMT doesn’t depend on the x86 processor directly — instead, it’s implemented through a 32-bit Argonaut RISC Core (ARC) CPU that’s integrated into all Intel processors. This microcontroller is part of the Intel Management Engine and is implemented on all Intel CPUs with vPro technology.

A new article on BoingBoing argues that Intel’s implementation of the IME and the microcontroller that runs it are fundamentally insecure, cannot be trusted, and could be used to perform potentially devastating exploits. Intel has publicly revealed very little about the precise function of its onboard microprocessor and the security system that guards it — and that, in turn, means that the company is essentially relying on security through obscurity to secure its own standard.
intel  amd  systemmanagement  managementengine  q35  q45  backdoor  malware  security  privacy  hacking  2016 
august 2016 by Frontrunner
FBI Chief Calls for National Talk Over Encryption vs. Safety
The FBI's director said Friday the agency is collecting data to present next year in hopes of sparking a national conversation about law enforcement's increasing inability to access encrypted electronic devices.

Speaking Friday at the American Bar Association annual conference in San Francisco, James Comey said the agency was unable to access 650 of 5,000 electronic devices investigators attempted to search over the last 10 months. He said the problem is only going to get worse without a discussion about the technology.
fbi  encryption  security  privacy  jamescomey  2016 
august 2016 by Frontrunner
Analyzing Privacy Aspects of the W3C Vibration API
Even such supposedly innocuous mechanisms like vibration can bring unexpected consequences to web privacy. Making web standards correct from a privacy perspective is important. It is my privilege to be able to directly contribute to this effort when working on sensor privacy.

Implementers, be that of browsers or Internet of Things devices, may want to keep in mind that vibration is a potential privacy risk.
privacy  vibrationapi  html5  w3c  identification  2016 
august 2016 by Frontrunner
How Foreign Governments Spy Using PowerPoint and Twitter
Targeted digital attacks on civil society are widespread, a silent epidemic plaguing journalists, NGOs, political opposition and human rights groups. In May 2016, we uncovered a Twitter-based digital malware campaign seemingly orchestrated by the United Arab Emirates, which resulted in the arrest and torture of numerous activists and journalists there. Over several years and a dozen reports, we have seen numerous autocratic regimes, like Ethiopia and Sudan, purchase sophisticated spyware made by Italian and British firms and use it to monitor and infiltrate human rights groups and journalists in their countries and abroad.

In 2013, we discovered that the same attacks China uses to compromise governments and industry are used to compromise human rights, ethnic, religious groups and pro-democracy movements. In 2015, we uncovered a Latin American malware campaign targeting journalists, activists and political opposition groups in several countries, including special Argentinian prosecutor Alberto Nisman, who was found dead of a gunshot under suspicious circumstances.
government  spying  spyware  malware  phishing  privacy  security  journalists  dissidents  civilrightsorganizations  2016 
august 2016 by Frontrunner
Does your web browser have a unique fingerprint? If so your web browser could be tracked across websites without techniques such as tracking cookies. Additionally the anonymisation aspects of services such as Tor or VPNs could be negated if websites you visit track you using your browser fingerprint. This service is designed to test how unique your web browser's fingerprint is, and hence how identifiable your browser is.
browsers  identification  fingerprint  privacy  testing  tool 
august 2016 by Frontrunner
Privacy Tools
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. provides knowledge and tools to protect your privacy against global mass surveillance.
privacy  security  tools  learning  website 
august 2016 by Frontrunner
Your Battery Status is Being Used to Track You Online
The battery status API was introduced in HTML5, the fifth version of the code used to lay out the majority of the web, and had already shipped in Firefox, Opera and Chrome by August 2015. It allows site owners to see the percentage of battery life left in a device, as well as the time it will take to discharge or the time it will take to charge, if connected to a power source.

Intended to allow site owners to serve low-power versions of sites and web apps to users with little battery capacity left, soon after it was introduced, privacy researchers pointed out that it could also be used to spy on users. The combination of battery life as a percentage and battery life in seconds provides offers 14m combinations, providing a pseudo-unique identifier for each device.
surveillance  tracking  html5  batterystatusapi  privacy  security  2016 
august 2016 by Frontrunner
British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents
A now-defunct free URL shortening service — — was set up by GCHQ that enabled social media signals intelligence. was used on Twitter and other social media platforms for the dissemination of pro-revolution messages in the Middle East.

These messages were intended to attract people who were protesting against their government in order to manipulate them and collect intelligence that would help the agency further its aims around the world. The URL shortener made it easy to track them.
surveillance  spying  arabspring  gchq  urlshorteners  privacy  security  deadpool  jtrig  moltenmagma  husk  longshot  nightcrawler  snowden  2016 
august 2016 by Frontrunner
Edward Snowden Designs Phone Case to Show When Data is Being Monitored
Edward Snowden has helped design a mobile phone case called the “introspection engine” that, he claims, will show when a smartphone is transmitting information that could be monitored.

Presenting via video link to event at the MIT Media Lab in Cambridge, Massachusetts, Snowden and co-designer Andrew “Bunnie” Huang showed how the device connects to a phone’s different radio transmitters, showing its owner knows when a cellular, Wi-Fi or Bluetooth connection is being used to share or receive data.
mobilephones  surveillance  snowden  andrewhuang  privacy  security  2016 
july 2016 by Frontrunner
Chinese Satellite is One Giant Step for the Quantum Internet
China is poised to launch the world’s first satellite designed to do quantum experiments. A fleet of quantum-enabled craft is likely to follow.

First up could be more Chinese satellites, which will together create a super-secure communications network, potentially linking people anywhere in the world. But groups from Canada, Japan, Italy and Singapore also have plans for quantum space experiments.
quantumcommunication  security  privacy  satellites  technology  communication  china  canada  japan  italy  singapore  2016 
july 2016 by Frontrunner
China Will Start Prohibiting Ad Blocking on September 1st
The ad blocking industry is facing a stark challenge from the Chinese government. China’s new Internet Advertising laws includes wording that explicitly prohibits “tampering with or blocking other businesses’ advertisements.” The “Internet Advertising Interim Rules” were drafted after the tragic death of Wei Zixi, a cancer patient that underwent an unsuccessful experimental cancer treatment, earlier this year. Wei only chose the experimental treatment because it showed up as a top advertised suggestion on Baidu, the leading search engine behind the Great Firewall. Before his death, Wei publicly accused Baidu of having a monopoly on the online Chinese advertising industry that allows misleading or false ads to fool unwitting customers. The resulting public outcry prompted the government to hurriedly investigate internet advertising and draft a new set of rules. China’s new Internet Advertising Interim Rules will go into effect on September 1st, 2016.
china  browsers  adblock  ban  privacy  security  surveillance  law  2016 
july 2016 by Frontrunner
U.S. to Allow Foreigners to Serve Warrants on U.S. Internet Firms
The Obama administration is working on a series of agreements with foreign governments that would allow them for the first time to serve U.S. technology companies with warrants for email searches and wiretaps—a move that is already stirring debates over privacy, security, crime and terrorism.

Brad Wiegmann, a senior official at the Justice Department, discussed the administration’s efforts during a public forum on Friday at a congressional office building in Washington, D.C. The first such agreement is being assembled with the U.K., he said.
government  surveillance  privacy  security  technology  corporations  data  sharing  usa  greatbritain  2016 
july 2016 by Frontrunner
Russia Asks for the Impossible With its New Surveillance Laws
It’s been a rough month for Internet freedom in Russia. After it breezed through the Duma, President Putin signed the “Yarovaya package" into law—a set of radical “anti-terrorism” provisions drafted by ultra-conservative United Russia politician Irina Yarovaya, together with a set of instructions on how to implement the new rules. Russia’s new surveillance laws include some of Bad Internet Legislation’s greatest hits, such as mandatory data retention and government backdoors for encrypted communications—policies that EFF has opposed in every country where they’ve been proposed.

As if that wasn’t scary enough, under the revisions to the criminal code, Russians can now be prosecuted for “failing to report a crime.” Citizens now risk a year in jail for simply not telling the police about suspicions they might have about future terrorist acts.
internet  russia  surveillance  privacy  security  law  terrorism  encryption  holland  france  usa  2016 
july 2016 by Frontrunner
HTTPS Adoption *Doubled* This Year
Despite being around for over 20 years, HTTPS has always remained very lightly adopted - until now. Data from 2 independent sources show HTTPS adoption has more than doubled in the last year, an unprecedented massive spike in adoption of this security control.
internet  ssl  https  adoptionrate  security  privacy  2016 
july 2016 by Frontrunner
Anbefalet brev afleveret til en forkert modtager
Datatilsynet vender hermed tilbage til sagen, hvor Danmarks Statistisk den 18. februar 2015 orienterede Datatilsynet om, at en anbefalet postforsendelse fra Statens Serum Institut (SSI) til Danmarks Statistik ved en fejl var blevet afleveret til Chinese Visa Application Centre. Brevet, som indeholdt to cd’er med data, var åbent, da Danmarks Statistik modtog det.

Efter anmodning fra Datatilsynet er SSI fremkommet med udtalelser den 20. marts og 10. september 2015.

De to cd’er indeholdt data om 5.282.616 personer bosat i danske kommuner mellem 2010 og 2012. Cd’erne indeholdt oplysninger om personnumre og helbredsoplysninger, men ikke navn og adresse. Cd’erne var IKKE krypterede.
databreach  privacy  security  denmark  china  2015 
july 2016 by Frontrunner
The Scary Way Pokémon Go is Making Money Off You
In just one week, Nintendo’s augmented reality game Pokémon Go has become the most successful mobile app in history. The game uses geolocation to place Pokémon characters in the physical world for you to collect. It has been downloaded a reported 15 million times in the U.S, with the user base already overtaking longtime social media stalwarts like Twitter. The average Apple iPhone user is spending more time on the game than Facebook or Snapchat.
games  pokemongo  augmentedreality  business  privacy  2016 
july 2016 by Frontrunner
NSA Tracking Cellphone Locations Worldwide
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.

The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.
nsa  mobilephones  tracking  usa  world  surveillance  privacy  2013 
july 2016 by Frontrunner
HTTPS and the Illusion of Privacy
Basic information on HTTPS and what it protects and what it doesn't protect.
https  beginner  articles  privacy  security  2016 
july 2016 by Frontrunner
Defective by Design
We are a participatory and grassroots campaign exposing DRM-encumbered devices and media for what they really are: Defective by Design. We are working together to eliminate DRM as a threat to innovation in media, the privacy of readers, and freedom for computer users.
drm  privacy  learning  media  security  freedom  music  movies  data 
july 2016 by Frontrunner
NSA Classifies Linux Journal Readers, Tor and Tails Linux Users as "Extremists"
Are you a Linux Journal reader or use software such as Tor and Tails Linux? If so, you've probably been flagged as an "extremist" by the NSA. Leaked documents related to the XKeyscore snooping program reveal that the agency is targeting anyone who is interested in online privacy, specifically those who use the aforementioned software and visit the Linux user community website.
nsa  xkeyscore  linux  tor  tails  extremists  surveillance  privacy  2014 
july 2016 by Frontrunner
UK’s Secret, Ongoing Mass Surveillance Rigorously Frisked by Watchdog
Details of secret warrants used for mass surveillance in the UK and abroad have been revealed for the first time in an official new report.

The Interception of Communications Commissioner’s Office (IOCCO) has published an unprecedented review of mass surveillance carried out via Section 94 of the Telecommunications Act 1984.
greatbritain  surveillance  iocco  gchq  mi5  mi6  privacy  2016 
july 2016 by Frontrunner
Signal is an encrypted instant messaging and voice calling application for Android and iOS. It uses end-to-end encryption to secure all communications to other Signal users. Signal can be used to send and receive encrypted instant messages, group messages, attachments and media messages. Users can independently verify the identity of their messaging correspondents by comparing key fingerprints out-of-band. During calls, users can check the integrity of the data channel by checking if two words match on both ends of the call.
endtoendencryption  encryption  foss  free  opensource  messaging  privacy  security  wikipedia 
july 2016 by Frontrunner
He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen.
When most of us think of hackers, we probably don’t think of government hackers. It might even seem odd that hackers would want to work for the NSA — and that the NSA would want to employ them. But the NSA employs legions of hackers, as do other agencies, including the FBI, CIA, DEA, DHS, and Department of Defense. Additionally, there are large numbers of hackers in the corporate world, working for military contractors like Booz Allen, SAIC, and Palantir. The reason is elegantly simple: You cannot hack the world without hackers.
hacking  nsa  fbi  cia  dea  dhs  dod  boozallen  saic  palantir  surveillance  privacy  security  2016 
july 2016 by Frontrunner
Japan's Top Court has Approved Blanket Surveillance of the Country's Muslims
Japan's Supreme Court has upheld the government's blanket surveillance of the country's Muslim community.

The court struck down the second appeal by Japanese Muslim plaintiffs against what they perceive as an unconstitutional invasion of their privacy and freedom of religion.

A 2010 leak of 114 police files revealed nationwide surveillance of Japanese Muslims. The files revealed that Muslim places of worship, halal restaurants and Islam-related organisations across the capital, Tokyo, were being monitored.
surveillance  japan  muslims  lawenforcement  law  privacy  2016 
july 2016 by Frontrunner
Hacked: Private Messages From Dating Site ‘Muslim Match’
Specialty dating site "Muslim Match" has been hacked. Nearly 150,000 user credentials and profiles have been posted online, as well as over half a million private messages between users.
databreach  security  privacy  datingwebsites  muslims  2016 
july 2016 by Frontrunner
Reasons Not to Use Facebook
Why you should not "use" (i.e., be used by) Facebook.
facebook  spying  privacy  socialmedia  richardstallman 
june 2016 by Frontrunner
Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too.
Mark Zuckerberg is one of the most powerful men in the world because billions of people give Facebook, which he founded, free access to their personal data. In return, users receive carefully curated snapshots of his life: baby photos, mundane office tours and the occasional 5K.

On Tuesday, observers were reminded that Mr. Zuckerberg, 32, is not just a normal guy who enjoys running and quiet dinners with friends. In a photo posted to his Facebook account, he celebrated the growing user base of Instagram, which is owned by Facebook. An eagle-eyed Twitter user named Chris Olson noticed that in the image’s background, his laptop camera and microphone jack appeared to be covered with tape.
markzuckerberg  facebook  privacy  cameras  microphones  2016 
june 2016 by Frontrunner
Progress Towards 100% HTTPS, June 2016
Our goal with Let’s Encrypt is to get the Web to 100% HTTPS. We’d like to give a quick progress update.

Let’s Encrypt has issued more than 5 million certificates in total since we launched to the general public on December 3, 2015. Approximately 3.8 million of those are active, meaning unexpired and unrevoked. Our active certificates cover more than 7 million unique domains.
https  letsencrypt  progressreport  privacy  security  2016 
june 2016 by Frontrunner
Invoking Orlando, Senate Republicans Set Up Vote to Expand FBI Spying
U.S. Senate Majority Leader Mitch McConnell set up a vote late on Monday to expand the Federal Bureau of Investigation's authority to use a secretive surveillance order without a warrant to include email metadata and some browsing history information.
usa  surveillance  fbi  spying  privacy  orlando  florida  shooting  massmurder  massshooting  2016 
june 2016 by Frontrunner
Intel x86s Hide Another CPU That Can Take Over Your Machine (You Can't Audit It)
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. I've made it my mission to open up this system and make free, open replacements, before it's too late.

The Intel Management Engine (ME) is a subsystem composed of a special 32-bit ARC microprocessor that's physically located inside the chipset. It is an extra general purpose computer running a firmware blob that is sold as a management system for big enterprise deployments.
intel  systemmanagement  managementengine  q35  q45  backdoor  malware  security  privacy  hacking  2016 
june 2016 by Frontrunner
Dropbox Smeared in Week of Megabreaches
Last week, LifeLock and several other identity theft protection firms erroneously alerted their customers to a breach at cloud storage giant — an incident that reportedly exposed some 73 million usernames and passwords. The only problem with that notification was that Dropbox didn’t have a breach; the data appears instead to have come from another breach revealed this week at social network Tumblr.
security  privacy  databreach  tumblr  dropbox  misinformation  2016 
june 2016 by Frontrunner
65 Million Tumblr Passwords for Sale on TheRealDeal
In the last few weeks there have been releases of some very high profile database breaches, LinkedIn, MySpace and now Tumblr.

All of these sites have been hit with hacks, and resulted in massive data breaches, yet these hacks are only now coming to the surface.
security  privacy  databreach  tumblr  linkedin  myspace  2016 
june 2016 by Frontrunner
The Web We Want
- Privacy
- Opportunity
- Accessibility
- Freedom
- Learning
- User Control
mozilla  firefox  browser  privacy  opportunity  accessibility  freedom  learning  usercontrol  users  map 
june 2016 by Frontrunner
US Whistleblower Snowden Reveals GCHQ Spy Programme with Secret Link to Scottish Police
Secret reports leaked by US whistleblower Edward Snowden have revealed how UK mass surveillance of phone and internet activity was accessed by Scottish police forces.

The documents confirm that a little-known policing body called the Scottish Recording Centre (SRC) was given access to information logs that include millions of communications data, including phone activity, internet histories and social media behaviour on Facebook.
snowden  greatbritain  scotland  milkwhite  tempora  muscular  stateroom  surveillance  spying  lawenforcement  metadata  privacy  2016 
june 2016 by Frontrunner
MPs' Private Emails are Routinely Accessed by GCHQ
GCHQ and the US National Security Agency (NSA) have access to intercepted emails sent and received by all members of the UK Parliament and peers, including with their constituents, a Computer Weekly investigation has established.
internet  surveillance  intelligence  privacy  gchq  nsa  membersofparliament  2016 
june 2016 by Frontrunner
Snowden Tried to Tell NSA About Surveillance Concerns, Documents Reveal
On the morning of May 29, 2014, an overcast Thursday in Washington, DC, the general counsel of the Office of the Director of National Intelligence (ODNI), Robert Litt, wrote an email to high-level officials at the National Security Agency and the White House.

The topic: what to do about Edward Snowden.
snowden  nsa  surveillance  privacy  whistleblowers  2016 
june 2016 by Frontrunner
Group project to catalog and list domain names that people may want to block.

Current focus on corporations, for which there are no other maintained lists.

Files in this project list the domain names of servers, one per line that can be added to your local hosts file to tell your computer to never talk to servers on that domain name.
domainname  blocklist  adblock  privacy  security  surveillance  tracking  corporations 
june 2016 by Frontrunner
Why You Should Bet Big on Privacy
The whole idea behind privacy by design is to provide protection now and in the future, regardless of governance, corruption and security breaches. When done right, privacy can vastly reduce the impact of attacks on your business and reputation, since there would be no sensitive data to leak.

Ideally though, we shouldn’t care about privacy. Not because it’s unimportant, but rather because it would be by default in everything, offering an ethical baseline that makes us feel safe. We shouldn’t have to worry about our privacy, just as we shouldn’t have to worry about war, discrimination, hunger, disease or money.

If you are a CEO, you have two choices: be in denial, ignore privacy and risk your company disappearing if the market turns; or, be a forward-thinking leader who embraces it as a strategic advantage, thereby building a future-proof organization that is both ethical and beneficial to society.
surveillance  privacy  privacybydesign  internet  webdev  business  businesspractice  tracking  advertisement  capitalism  2016 
may 2016 by Frontrunner
Going Dark: Online Privacy and Anonymity for Normal People
Last week we got news of the Rosebutt data breach. This is a very particular class of site and like many others we've recently seen compromised, it's highly likely that members would have preferred to keep their identities secret. It doesn't matter if you don't agree with the lifestyle choice of those on the site and certainly I myself am not one to look around the house at everyday items and think "I wonder if that could...". That's entirely beside the point though which is that a bunch of consenting adults now have their identities in the hands of an untold number of people who are willingly sharing the data around web. But it didn't have to be that way.
privacy  security  anonymize  internet  scams  tor  email  bestpractices  2016 
may 2016 by Frontrunner
Developer of Anonymous Tor Software Dodges FBI, Leaves US
The FBI's attempts to break into Tor are starting to manifest in strange ways.

FBI agents are currently trying to subpoena one of Tor's core software developers to testify in a criminal hacking investigation, CNNMoney has learned.

But the developer, who goes by the name Isis Agora Lovecruft, fears that federal agents will coerce her to undermine the Tor system -- and expose Tor users around the world to potential spying.

That's why, when FBI agents approached her and her family over Thanksgiving break last year, she immediately packed her suitcase and left the United States for Germany.
tor  fbi  developer  lawenforcement  privacy  security  2016 
may 2016 by Frontrunner
« earlier      
per page:    204080120160

related tags

accessibility  adblock  addons  adoptionrate  ads  adultfriendfinder  advertisement  advocate  agencies  ai  allo  amazon  amd  analytics  andrewhuang  android  animalwelfare  anonymize  anonymous  antispam  aol  apple  arabspring  articles  ashkansoltani  att  augmentedreality  australia  avoiding  avoidusing  backdoor  ban  bankofamerica  barackobama  batterystatusapi  beginner  belgacom  bestpractices  bigbrother  bigdata  biography  biometrics  bitcoin  bitly  blackberry  blocklist  blog  boozallen  browser  browsers  bullrun  business  businesspractice  cameras  canada  capitalism  cars  cashless  censorship  chat  chile  china  christophersoghoian  chrome  cia  civilrightsorganizations  cloud  cloudstorage  cnn  cogentcommunications  collection  commercial  communication  company  compartmentalization  configurations  control  cookies  corporations  countermail  countermeasures  countries  creditcard  creditcards  crime  crm  cryptography  crypton  cryptowars  cse  csis  data  databases  databreach  datasharing  datingwebsites  dea  deadpool  decentralize  deception  denmark  design  desktop  deutschetelekom  developer  dhs  director  disposable  dissidents  diy  dji  dna  documents  dod  domainname  donaldtrump  drm  drones  dropbox  economics  economy  ecuador  eff  effects  efficiency  email  employees  employers  encryption  endace  endtoendencryption  enterprise  environment  evidence  extensions  extremists  facebook  facialrecognition  fbi  federalcourtofcanada  filesharing  filters  fingerprint  firefox  fisa  flash  flaw  florida  foss  framework  france  francetelecom  free  freedom  ga  gamedev  games  gchq  germany  gmail  gnu  gnunet  gold  google  googleanalytics  googlemaps  googlestreetview  government  gpg  greatbritain  greenpeace  gsm  hacking  hackingteam  hardware  harriscorp  hillaryclinton  holland  homebrew  hosts  houseofrepresentatives  howstuffworks  howto  html5  https  humanyze  husk  hypocrisy  identification  impact  imsicatcher  imsicatchers  independent  india  intel  intelligence  intelligencecommunity  intercept  interface  internet  interview  intrusive  iocco  iot  iphone  iran  isolatedstorage  isp  israel  italy  jamescomey  japan  javascript  journalists  js  jtrig  julianassange  kali  labourrights  law  lawenforcement  learning  legacy  letsencrypt  licenseplates  linkedin  linux  linuxmint  lipreading  list  logging  longshot  lso  macaddress  macintosh  malware  managementengine  manual  map  markzuckerberg  massmurder  massshooting  mastercard  media  medusa  membersofparliament  messaging  metadata  methods  mexico  mi5  mi6  microcontrollers  microphones  microsoft  milkwhite  mindcontrol  minorityreport  misinformation  mobile  mobilephones  moltenmagma  monetization  monitoring  morganstanley  morocco  movies  mozilla  muscular  music  muslims  myspace  network  networkcard  newzealand  nga  nightcrawler  norway  nsa  oculus  onedrive  online  opendata  opensource  opera  operationchokepoint  opportunity  orlando  os  otr  ottawa  p2p  packagemanager  packets  palantir  panama  passphrases  passwordmanager  passwords  payment  paypal  pdf  performance  philadelphia  phishing  pokemongo  police  port  prism  privacy  privacybydesign  productivity  profiling  progressreport  proofofconcept  proprietary  protection  providers  publications  publicopinion  q35  q45  quality  quantumcommunication  quantuminsert  qubes  raspberrypi  rcmp  rcs  reading  remotecontrolsystem  research  restaurant  reuters  richardstallman  rogers  routers  routing  ruling  russia  saic  satellites  scams  scanning  school  scotland  scotlandyard  searchwarrant  security  sevenrooms  sharing  shooting  sigint  signal  singapore  smartcity  snailmail  snaptrends  snowden  social  socialmedia  society  software  spain  spideroak  sprint  spying  spyware  ssl  stateroom  stingray  students  surfeasy  surveillance  suspects  sweden  swisscom  switzerland  symantec  symbian  systemmanagement  tails  talk  technology  telenaitaly  telstra  tempora  terrorism  testing  threema  tips  tls  tool  tools  tor  totalitarianstate  tracking  tradeagreement  transparencyreport  transportation  trapdoor  truecrypt  ttip  tumblr  twitter  uber  udp  undercover  unitedarabemirates  urbanplanning  urlshorteners  usa  usercontrol  usernames  users  uspostalservice  vastechsouthafrica  venezuela  venmo  verizon  vibrationapi  vip  viruses  visa  vladimirputin  vote  vpn  vr  w3c  webcam  webdev  website  wepay  whatsapp  whistleblowers  wifi  wikileaks  wikipedia  windows  wireless  workplace  world  x86  xkeyscore  yahoo  zeroknowledge 

Copy this bookmark: