In a court filing, Edward Snowden says a report critical to an NSA lawsuit is authentic

In a court filing, Edward Snowden says a report critical to an NSA lawsuit is authentic

Snowden’s signed declaration, filed on October 31, confirms that one of the documents he leaked, which the EFF relied heavily on for its case, is an authentic draft document written by the then-NSA inspector general in 2009, which exposed concerns about the legality of the Bush’s warrantless surveillance program — Stellar Wind — particularly the collection of bulk email records on Americans.

Snowden Files Declaration in NSA Spying Case Confirming Authenticity of Draft Inspector General Report Discussing Unprecedented Surveillance of Americans, Which He Helped Expose

Snowden Files Declaration in NSA Spying Case Confirming Authenticity of Draft Inspector General Report Discussing Unprecedented Surveillance of Americans, Which He Helped Expose

Mr. Snowden’s short declaration confirms that a document relied upon in the case, a draft NSA Inspector General Report from 2009 discussing the mass surveillance program known as Stellar Wind, is actually the same document that he came upon during the course of his employment at NSA contractor.

Industry Group Representing Apple, Google, Amazon and Others Releases User Privacy Framework to Guide Policymakers

The purpose of this framework is to inform the development of legislation or the promulgation of rules that enhance personal data protection, further the trust relationship between companies and their customers, and enable innovation while also avoiding regulatory fragmentation that undermines all three goals.

‘THE GOOD CENSOR’: Leaked Google Briefing Admits Abandonment of Free Speech for ‘Safety And Civility’

‘THE GOOD CENSOR’: Leaked Google Briefing Admits Abandonment of Free Speech for ‘Safety And Civility’

An internal company briefing produced by Google and leaked exclusively to Breitbart News argues that due to a variety of factors, including the election of President Trump, the “American tradition” of free speech on the internet is no longer viable.

THE GOOD CENSOR – Google Growth Strategy: ‘Shift Towards Censorship’ to Appease Authoritarian Governments

THE GOOD CENSOR – Google Growth Strategy: ‘Shift Towards Censorship’ to Appease Authoritarian Governments

An 85-page briefing entitled “The Good Censor”, exclusively leaked to Breitbart News from within Google reveals that government requests for Google to censor content have nearly tripled since 2016, although it does not say that Google shouldn’t cooperate.

Google's DeepMind gains access to wide swath of British healthcare data

Under an agreement with the UK's National Health Service (NHS), Google's AI unit DeepMind has gained access to health care data on patients from three London hospitals, New Scientist reports.

Windows is recording every keystroke on devices with handwriting recognition enabled

Windows is recording every keystroke on devices with handwriting recognition enabled

"On my PC, and in my many test cases, WaitList.dat contained a text extract of every document or email file on the system, even if the source file had since been deleted," Skeggs revealed in an interview with ZDnet.com.

Customize Firefox for privacy and security with a custom user.js – Own your bits

Customize Firefox for privacy and security with a custom user.js – Own your bits

You absolutely must read the official documentation because there are several things to look out for, but as an overview you have to copy user.js to your profile folder while Firefox is not running and that’s it.

Inside the NSA's War on Internet Security

Inside the NSA's War on Internet Security

The presentation states that the NSA encounters "major" problems in its attempts to decrypt messages sent through heavily encrypted email service providers like Zoho or in monitoring users of the Tor network*, which was developed for surfing the web anonymously.

Congress Moves Forward with Dangerous Attack on Private Drones

Congress Moves Forward with Dangerous Attack on Private Drones

And worst of all, we expect these powers to come in a routine Federal Aviation Administration (FAA) reauthorization bill, with no chance for meaningful debate on how best to limit the government’s authority to intercept or destroy drones.

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Per Wikileaks: In 2007, #Brennan praised Iran’s “positive engagement” & “important contributions” in Afghanistan pic.twitter.com/QBTsCYf0el — marina portnaya (@portnayanyc) Sour grapes: Brennan’s TAC complains over CIA snub During his time in the private sector, Brennan established an intelligence firm called The Analysis Corporation (TAC) that competed for government contracts, including one related to terrorist watch lists.

Tails 3.9 is out

Tails 3.9 is out

You can now install additional software automatically when starting Tails. When installing an additional Debian package from Tails, you can decide to install it automatically every time: Read our documentation on installing additional software. Update Tor Browser to 8.0, based on Firefox 60 ESR.

That Time Telco Lobbyists Sent Me All Their Talking Points About Trying To Shift The Blame To Internet Companies

That Time Telco Lobbyists Sent Me All Their Talking Points About Trying To Shift The Blame To Internet Companies

There's a brief section later in the document, suggesting that they play up Trump now fighting with Google, and suggest that's a good point to drop in the "same rules for edge" providers meaningless argument:

WebScan of thepiratebay.org

High-Tech Bridge provides you with a free API to test your web server for security related configuration. $ curl -XPOST -d 'job_id=2a9e1f1bc92dc0c7a4bde930dff488771eea6d36988208d34163c5496227b8dc' 'https://www.htbridge.com/websec/api/v1/get_result/1451425590.html' $ curl -XPOST -d 'tested_url=twitter.com&choosen_ip=any&dnsr=off&recheck=false&follow_redirects=true&verbosity=1' 'https://www.htbridge.com/websec/api/v1/chsec/1451425590.html' $ curl -XPOST -d 'tested_url=twitter.com&choosen_ip=any&dnsr=off&recheck=false&follow_redirects=true&verbosity=1' 'https://www.htbridge.com/websec/api/v1/chsec/1451425590.html' $ curl -XPOST -d 'tested_url=0.0.0.0&choosen_ip=any&dnsr=off&recheck=false&follow_redirects=true&verbosity=1' 'https://www.htbridge.com/websec/api/v1/chsec/1451425590.html'

How encrypted communications apps failed to protect Michael Cohen

How encrypted communications apps failed to protect Michael Cohen

Those logs, judging by the charging document, appear to have helped document at least Cohen’s communications with officials at the National Enquirer about allegations from porn actress Stormy Daniels—whom Cohen allegedly paid on behalf of Trump, violating campaign finance law.

Leaker of secret report on Russian hacking faces sentencing

— A Georgia woman who leaked a secret report on Russian hacking of U.S. voting systems could get a tough sentence. The 26-year-old former National Security Agency contractor pleaded guilty in June to copying a classified U.S. report and mailing it to an unidentified news organization.

Google confirms it tracks users even when 'Location History' setting is disabled

Google confirms it tracks users even when 'Location History' setting is disabled

Leaving Web and App Activity enabled while turning Location History off only prevents additions to the Google Maps timeline, and does not stop data collection.Google's help center update is not likely to appease users who have scrutinized the search giant and other tech companies for their user privacy policies.