DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

“The deceptive_news domain blacklist is going to be used by many search features to filter problematic sites that violate the good neighbor and misrepresentation policies,” the policy document says.

Updates to our Terms of Service and Privacy Policy

Updates to our Terms of Service and Privacy Policy

FamilyTreeDNA’s Terms of Service and Privacy Statement have been updated to require law enforcement, as well as any authorized representative working on behalf of law enforcement, to register all genetic files through a separate process prior to uploading to the database.

Open Source Hardware Could Defend Against Next Generation Hacking

Open Source Hardware Could Defend Against Next Generation Hacking

Shane Oberloier and Joshua Pearce , CC BY-ND The future of distributed manufacturing Making open-source hardware systems more available increases regular people’s security by giving them verifiably secure options.

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

The Timeline feature of Windows 10 makes it easier to work on multiple computers by synchronizing activity so you can move between machines and pick up from where you left off -- although it can also prove useful on a single computer.

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

More than 7,000 vulnerable temperature controlled systems , manufactured by U.K.-based firm Resource Data Management, are accessible from the internet and can be controlled by simply plugging in its default password found in documentation on the company’s website, according to Noam Rotem, one of the security researchers who found the vulnerable systems.

Dozens of Cities Have Secretly Experimented With Predictive Policing Software

Dozens of Cities Have Secretly Experimented With Predictive Policing Software

The documents obtained by Motherboard—which include PredPol contract documents, instructional manuals and slide presentations for using the software, and PredPol contract negotiation emails with government officials—were obtained from the police departments of South Jordan, UT; Mountain View, CA; Atlanta, GA; Haverhill, GA; Palo Alto, CA; Modesto, CA; Merced, CA; Livermore, CA; Tacoma, WA; and the University of California, Berkeley using public records requests.

Why Security Expectations Matter: Hidden Content is Readable in Shared Google Sheets

Why Security Expectations Matter: Hidden Content is Readable in Shared Google Sheets

In summary: contrary to the expectation set by the UI, both hidden columns and hidden sheets in shared Google Sheets documents can be viewed by anyone who can access the document, even by read-only users when exports are disabled.

Defining the tracking practices that will be blocked in Firefox

Defining the tracking practices that will be blocked in Firefox

In support of this effort, today we are releasing an anti-tracking policy that outlines the tracking practices that Firefox will block by default. With the release of our new policy, we’ve defined the set of tracking practices that we think users need to be protected against.

The National Security Agency Is A Criminal Organization

The National Security Agency Is A Criminal Organization

They just aren’t getting violent yet that we know of — internally in the US, outside is another story.” “Everybody’s afraid because all this data that’s about them, the central agencies — the intelligence agencies — they have it.” As Binney had no documents to give to the media, blowing the whistle had no consequence for NSA.

How to Sign and Verify a Document or File using PGP

How to Sign and Verify a Document or File using PGP

To verify a document that has been signed with PGP, run this in the command line: gpg --output document.pdf --decrypt document.sig This will output the decrypted “document.pdf” into C:\Users\YourPCName if you have the person who signed the document’s public key.

DeepL Translator

DeepL Translator

Additional characters billed at €0.01 per 500 characters. Cost control available to limit your monthly charge. Full flexibility Translating less than 1000000 characters per month? No risk Activate cost control to set a limit on your maximum character count and monthly charge.

Metadata

Metadata

Only upload files which were either created or downloaded inside the Whonix-Workstation and personally stripped of metadata. Anonymous photo sharing requires the user to consider both metadata and fingerprintable camera anomalies. MAT - Metadata Anonymisation Toolkit [ edit ]

Border agents are copying travelers’ data, leaving it on USB drives

Border agents are copying travelers’ data, leaving it on USB drives

CBP agents are allowed to carry out warrantless device searches at all 328 ports of entries in the US: they’re allowed to manually – i.e., visually – inspect travelers’ phones, laptops, tablets, thumb drives or other electronic devices as they look for content related to terrorism, child abuse imagery, or other material that smells of the criminal.

Was your phone imaged by border agents? They may still have the data

Was your phone imaged by border agents? They may still have the data

According to a new 24-page document released Tuesday by DHS’ Office of Inspector General, investigators found that some USB sticks, containing data copied from electronic devices searched at the border, "had not been deleted after the searches were completed."

Transparency, Openness, and Our 2016 and 2017 Financials

Transparency, Openness, and Our 2016 and 2017 Financials

And the layer above that is publishing design documents and research papers to explain why we chose to build it that way, including analyzing the security implications and the trade-offs of alternate designs.

Secret Service to test facial recognition tech around White House

Secret Service to test facial recognition tech around White House

In its post, the ACLU said the test raises privacy concerns because people on the street may be captured by the pilot system and it's unclear how the Secret Service determines who is a "subject of interest."

Uncle Sam Wants to Snoop on Your Monero Transactions

Uncle Sam Wants to Snoop on Your Monero Transactions

According to the document, blockchain monitoring frameworks geared toward Zcash and Monero are of special interest to the DHS because its existing Bitcoin-focused analytics capabilities “cover only a limited scope within the realm of cryptocurrencies.” The expansion into the privacy cryptocurrency area is intended to keep pace with newer blockchain implementations and demonstrate that the DHS possesses sufficient extensibility to deal with the threat posed by illegal hidden transactions.

5 Best Raspberry Projects that will provide you online security

5 Best Raspberry Projects that will provide you online security

Everyone needs an online security due to high eminence hacking and different malicious malware attacks. So, today in this lesson, we’ll discuss the best 5 Raspberry Pi projects that will provide you a strong online security from hackers.

The Snowden Legacy, part one: What’s changed, really?

The Snowden Legacy, part one: What’s changed, really?

In the five years since documents provided by Edward Snowden became the basis for a series of revelations that tore away a veil of secrecy around broad surveillance programs run by the National Security Agency, there have been shifts in both technology and policy that have changed the center of gravity for personal electronic privacy in the United States and around the world.

Dutch government report says Microsoft Office telemetry collection breaks GDPR

Dutch government report says Microsoft Office telemetry collection breaks GDPR

Investigators said that Microsoft collects up to 25,000 types of Office events, data which is made available to up to 30 engineering teams.

In a court filing, Edward Snowden says a report critical to an NSA lawsuit is authentic

In a court filing, Edward Snowden says a report critical to an NSA lawsuit is authentic

Snowden’s signed declaration, filed on October 31, confirms that one of the documents he leaked, which the EFF relied heavily on for its case, is an authentic draft document written by the then-NSA inspector general in 2009, which exposed concerns about the legality of the Bush’s warrantless surveillance program — Stellar Wind — particularly the collection of bulk email records on Americans.

Snowden Files Declaration in NSA Spying Case Confirming Authenticity of Draft Inspector General Report Discussing Unprecedented Surveillance of Americans, Which He Helped Expose

Snowden Files Declaration in NSA Spying Case Confirming Authenticity of Draft Inspector General Report Discussing Unprecedented Surveillance of Americans, Which He Helped Expose

Mr. Snowden’s short declaration confirms that a document relied upon in the case, a draft NSA Inspector General Report from 2009 discussing the mass surveillance program known as Stellar Wind, is actually the same document that he came upon during the course of his employment at NSA contractor.

Industry Group Representing Apple, Google, Amazon and Others Releases User Privacy Framework to Guide Policymakers

Industry Group Representing Apple, Google, Amazon and Others Releases User Privacy Framework to Guide Policymakers

The purpose of this framework is to inform the development of legislation or the promulgation of rules that enhance personal data protection, further the trust relationship between companies and their customers, and enable innovation while also avoiding regulatory fragmentation that undermines all three goals.

‘THE GOOD CENSOR’: Leaked Google Briefing Admits Abandonment of Free Speech for ‘Safety And Civility’

‘THE GOOD CENSOR’: Leaked Google Briefing Admits Abandonment of Free Speech for ‘Safety And Civility’

An internal company briefing produced by Google and leaked exclusively to Breitbart News argues that due to a variety of factors, including the election of President Trump, the “American tradition” of free speech on the internet is no longer viable.

THE GOOD CENSOR – Google Growth Strategy: ‘Shift Towards Censorship’ to Appease Authoritarian Governments

THE GOOD CENSOR – Google Growth Strategy: ‘Shift Towards Censorship’ to Appease Authoritarian Governments

An 85-page briefing entitled “The Good Censor”, exclusively leaked to Breitbart News from within Google reveals that government requests for Google to censor content have nearly tripled since 2016, although it does not say that Google shouldn’t cooperate.

Google's DeepMind gains access to wide swath of British healthcare data

Google's DeepMind gains access to wide swath of British healthcare data

Under an agreement with the UK's National Health Service (NHS), Google's AI unit DeepMind has gained access to health care data on patients from three London hospitals, New Scientist reports.

Windows is recording every keystroke on devices with handwriting recognition enabled

Windows is recording every keystroke on devices with handwriting recognition enabled

"On my PC, and in my many test cases, WaitList.dat contained a text extract of every document or email file on the system, even if the source file had since been deleted," Skeggs revealed in an interview with ZDnet.com.

Customize Firefox for privacy and security with a custom user.js – Own your bits

Customize Firefox for privacy and security with a custom user.js – Own your bits

You absolutely must read the official documentation because there are several things to look out for, but as an overview you have to copy user.js to your profile folder while Firefox is not running and that’s it.

Inside the NSA's War on Internet Security

Inside the NSA's War on Internet Security

The presentation states that the NSA encounters "major" problems in its attempts to decrypt messages sent through heavily encrypted email service providers like Zoho or in monitoring users of the Tor network*, which was developed for surfing the web anonymously.

More