asterisk2a + truecrypt   8

NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
Die offizielle Linie der Bundesregierung zur Verschlüsselung | netzpolitik.org
In der Bundespressekonferenz ging es heute um die Frage, inwiefern die Bundesregierung sich an den Cryptowars beteiligt und Hintertüren in Verschlüsselungsfragen und beim Staatstrojaner vorantreibt. Die offizielle Linie der Bundesregierung ist, dass sie da nichts vorantreibt. Unser Informationen sind da andere. Aber hier ist das Transcribt aus der Bundespressekonferenz. &! https://netzpolitik.org/2015/wegen-snowden-eu-beauftragter-will-it-anbieter-zu-hintertueren-fuer-verschluesselte-kommunikation-verpflichten/ &! &! The UK and USA have same line - http://blogs.wsj.com/digits/2015/01/16/obama-sides-with-cameron-in-encryption-fight/ Obama about Google, Facebook, Apple & Co “They’re patriots.” thus have to build in backdoors. &! http://techcrunch.com/2015/01/16/political-crypto-decrypted/ &! http://techcrunch.com/2015/01/13/clearly-an-idiot/ &! http://tcrn.ch/1z4vw19
encryption  Five  Eyes  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  Internet  Privacy  Privacy  oversight  Political  Governance  cryptography  TrueCrypt  NSA  USA  presidency  barackobama  Justice  System  Law  &  Justice  Angela  Merkel  GCHQ  BND  torture  Patriot  Act  cyber  attack  cyber  security  cyber  espionage  corporate  espionage  China  Germany  Europe  Act  espionage  foreign  affairs  foreign  relations  diplomacy  cablegate  cyber  cyber  crime  organised  crime  Career  Politicians  Leadership  investigative  journalism  journalismus  journalism  backdoor  backdoors  Apple  Google  Microsoft  Twitter  Facebook  TOS  Secret  Courts  FISA  Court  UK  Vorratsdatenspeicherung  Snoopers  Charter  Draft  Communications  Data  Bill  Europol  Interpol  Edward  Snowden  Wikileaks  accountability  No  Representation  trust  trustagent  confidence 
january 2015 by asterisk2a
Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian
[ NSA & Co. served them with an order to comply, in order to watch over employees. Spotting potential Whistleblowers and leaks. Period. ] The technology, for example, enables the company to monitor all the geolocated messages sent from the Pentagon and National Security Agency. It also allows Whisper to track an individual user’s movements over time. When users have turned off their geolocation services, the company also, on a targeted, case-by-case basis, extracts their rough location from IP data emitted by their smartphone. & http://techcrunch.com/2014/10/16/whisper-suspected-of-tracking-user-info-and-sharing-it-with-the-u-s-government/ & http://pando.com/2014/10/08/twitter-sues-the-justice-department-for-the-right-to-be-honest-with-consumers/ & http://www.theguardian.com/media/2014/oct/17/-sp-whisper-tracking-location-users-facts-response
Whisper  TOS  FISA  Court  NSA  CIA  FBI  surveillance  state  Orwellian  Stasi  Internet  Privacy  Privacy  anonymity  anonym  geolocation  Whistleblower  Secret  Courts  TrueCrypt  Lavabit  backdoor  backdoors  transparency  MI5  MI6  Silicon  Valley  Principle  corporate  values  personal  values  corporate  culture 
october 2014 by asterisk2a
Personal Privacy Is Only One of the Costs of NSA Surveillance | Threat Level | WIRED
The Foundation’s report, released today, outlines some of the collateral damage of NSA surveillance in several areas, including: Economic losses to US businesses due to lost sales and declining customer trust. The deterioration of internet security as a result of the NSA stockpiling zero-day vulnerabilities, undermining encryption and installing backdoors in software and hardware products. Undermining the government’s credibility and leadership on “internet freedom” and governance issues such as censorship. -->> its like trade sanctions - but on the internet among other things. +++ http://youtu.be/DU_1yoUzKs8
USA  NSA  surveillance  state  Orwellian  unintended  consequences  complexity  unknown  unknowns  presidency  barackobama  foreign  policy  foreign  affairs  diplomacy  GCHQ  BND  globalisation  globalization  sanctions  Europe  Germany  War  on  Terror  War  on  Drugs  China  Internet  Privacy  cyberespionage  cybersecurity  cyber  security  cyber  attack  cyberwar  cyberattack  cybercrime  Industrial  Espionage  trust  trustagent  Career  Politicians  policy  folly  policy  error  accountability  oversight  Political  Governance  Democratic  Process  democracy  freedom  of  press  Pressefreiheit  Whistleblower  free  speech  self-censorship  Wikileaks  Edward  Snowden  Julian  Assange  TOR  TrueCrypt 
july 2014 by asterisk2a
Bad news for whistleblowers. Secret is far less secret than you think | PandoDaily
Only DAU thinks Secret or Whisper or any other consumer grade app, on a consumer grade tablet or phone, promising keeping them anonymity, uses these apps to 'blow the whistle.' ahhm troll, hate and gossip or even leak stuff. I thought Silicon Valley ppl are smart. No they just know how to code & design ... "to make the world better" ... sort of. “A court order without probable cause or even a subpoena may be enough for law enforcement or for a civil litigant to demand records.“ Conley went on to say that anonymous app companies need to make sure their backend data practices line up with the advertised purpose of their product: “They need to think through their own process. If you are offering a service that is about providing anonymous communication, then if you are retaining their identity and tying it to their communication, then you are kind of undermining the whole purpose of your service.”
Secret  Whisper  anonymity  Internet  Privacy  DAU  Whistleblower  Troll  Trolls  Haters  Hater  culture  VPN  Tor  cryptography  encryption  PGP  TrueCrypt  Smartphone  mobilephone  Silicon  Valley  lowest  common  denominator  social  science  social  study  civic  society  civil  society  Zivilgesellschaft  gossip  culture  gossip  social  society 
june 2014 by asterisk2a
Exclusive: Security enthusiasts may revive encryption tool after mystery shutdown | Reuters
Speculation has mounted over the cause of the reversal, with some suggesting that the developers had tired of the decade-long project and others guessing that U.S. authorities had demanded a back-door key from the programmers, as happened with anonymous email provider Lavabit.
Lavabit  TrueCrypt  NSA  backdoor  backdoors  cryptography  Edward  Snowden  Whistleblower  encryption  Privacy  Internet  Privacy 
may 2014 by asterisk2a

related tags

&  2.0  accountability  Act  affairs  Agency  Angela  anonym  anonymity  Antivirus  Appelbaum  Apple  Assange  attack  backdoor  backdoors  barackobama  Bill  BND  cablegate  Career  Charter  China  CIA  civic  civil  Cold  common  Communications  complex  complexity  confidence  consequences  corporate  Court  Courts  crime  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cybercrime  cyberespionage  cybersecurity  cyberwar  Data  DAU  democracy  Democratic  denominator  Despotism  diplomacy  Draft  Drugs  Edward  Empire  encryption  Engineering  error  espionage  Europe  Europol  Eyes  Facebook  False  FBI  FISA  Five  Flag  folly  foreign  free  freedom  GCHQ  geolocation  Germany  Glenn  globalisation  globalization  Google  gossip  Governance  Greenwald  groups  Hater  Haters  Imperialism  industrial  Intelligence  interest  Internet  Interpol  investigative  IT  Jacob  journalism  journalismus  Julian  Justice  Lavabit  Law  Leadership  lowest  Merkel  MI5  MI6  Microsoft  military–industrial  mobilephone  national  No  NSA  of  oligarchy  on  organised  Orwellian  oversight  Patriot  personal  PGP  policy  Political  Politicians  presidency  press  Pressefreiheit  Principle  Privacy  Process  relations  Representation  Reverse  sanctions  science  Secret  security  self-censorship  Silicon  Smartphone  Snoopers  Snowden  social  society  speech  Stasi  state  study  surveillance  System  Terror  Tor  TOR  torture  TOS  Totalitarian  transparency  Troll  Trolls  TrueCrypt  trust  trustagent  Twitter  UK  unintended  unknown  unknowns  USA  Valley  values  vested  Vorratsdatenspeicherung  VPN  war  Washington  Whisper  Whistleblower  Wikileaks  Zivilgesellschaft 

Copy this bookmark:



description:


tags: