Monday, May 30, 2016
Sunday, May 29, 2016
#invention #futuristic #technology
Originally shared by Freze HD
#invention #futuristic #technology
https://youtu.be/A_SLGe34cq0?list=PL2ojy_uyDeR1L_kmHZmibHpMcAAvtNijB
#invention #futuristic #technology
https://youtu.be/A_SLGe34cq0?list=PL2ojy_uyDeR1L_kmHZmibHpMcAAvtNijB
Saturday, May 28, 2016
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
Originally shared by Paweł Płocki
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
http://www.hackinsight.org/news,612.html
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
http://www.hackinsight.org/news,612.html
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option.
Originally shared by Dave S.
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option. Otherwise only knock I have with Win 10 is lack of control of updates (I upgraded to WIn 10 voluntarily from Win 7 and Win 8.1)
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option. Otherwise only knock I have with Win 10 is lack of control of updates (I upgraded to WIn 10 voluntarily from Win 7 and Win 8.1)
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html
Will your computer still be able to run Windows 10?
Originally shared by PCMag
Will your computer still be able to run Windows 10?
http://www.extremetech.com/computing/229101-new-windows-10-update-will-change-hardware-requirements-for-the-first-time-since-2009
Will your computer still be able to run Windows 10?
http://www.extremetech.com/computing/229101-new-windows-10-update-will-change-hardware-requirements-for-the-first-time-since-2009
What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb...

Originally shared by IamChattyCathy
What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb drive) around the University of Illinois Urbana-Champaign campus. They wanted to see just how many, and how soon after dropping them off, they’d be collected by people.
Turns out that 48 percent of the drives were taken and inserted into computers. The report at theregister.co.uk says that in some cases, this was done minutes after the drives were left in the public spots.
Picking up a USB drive off the streets and plugging it into your computer is akin to picking up discarded food off a sidewalk and eating it. You just never know what kind of infection you’re going to get.
And what you might get is a virus crashing your computer or stealing your data. That USB stick could contain malware—either left in public as a prank, or innocently lost or discarded without the original owner knowing it’s infected.
Or…it might have been left in a public spot by a hacker with full intent of gaining control of your computer to collect your personal data and committing fraud, such as opening lines of credit in your name or emptying out your bank account.
The USB sticks for the study contained HTML files with embedded img tags. The tags allowed the researchers to track the USB activity, which is how they new that, for instance, one of them was plugged into a computer only six minutes after it was left to be “found.”
http://us-ads.openx.net/w/1.0/afr?auid=538280559&cb=0ba0b4249a&c.apdid=fiInstance_100920_3_9588698&r0=http://cdn.firstimpression.io/delivery/ck.php?oaparams=2__bannerid=4604__zoneid=100920__cb=0ba0b4249a__oadest=
Only 16 percent of the people who picked up the sticks actually scanned them to check for viruses before plugging them into their computers. And 68 percent simply inserted them without any regards to what they could get transferred into their computers.
Some users trusted that there was no harm.
Some plugged in the drive to seek out the owner.
Some intended to keep the stick.
Conclusion: A cybercriminal could easily take control of a business’s system by leaving a rigged USB drive in the parking lot, let alone get control of a personal computer by leaving the stick in any public place frequented by lots of people.
Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.
Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen.
http://beforeitsnews.com/scandals/2016/05/dont-pick-up-that-usb-drive-2436279.html?utm_content=bufferc1928&utm_medium=social&utm_source=plus.google.com&utm_campaign=buffer
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
Originally shared by Government GangStalking and Electronic Harassment
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
Originally shared by Government GangStalking and Electronic Harassment
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
How To: Configure Windows 10 Privacy Settings - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-configure-windows-10-privacy-settings/
https://greycoder.com/how-to-configure-windows-10-privacy-settings/
Freya is a fast and open replacement for Windows and OS X.
Freya is a fast and open replacement for Windows and OS X. It is Ubuntu Linux based. I’ve been using it for about a year now and I’ve found it to be fast and stable operating system.
A company like ThinkPenguin will pre-install Freya on a computer for you. This is the easiest way to switch to Linux.
To complete Freya, I recommend using Elementary Tweaks, and installing Numix Circle Icons.
If you need more privacy in your Operating System I suggest trying Tails or Knoppix.
https://greycoder.com/coming-soon-freya-elementary-os/
A company like ThinkPenguin will pre-install Freya on a computer for you. This is the easiest way to switch to Linux.
To complete Freya, I recommend using Elementary Tweaks, and installing Numix Circle Icons.
If you need more privacy in your Operating System I suggest trying Tails or Knoppix.
https://greycoder.com/coming-soon-freya-elementary-os/
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER
WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER
Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability.
SAVING WEB PAGES BECAME EASIER
https://greycoder.com/wallabag-free-open-source-replacement-instapaper/
Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability.
SAVING WEB PAGES BECAME EASIER
https://greycoder.com/wallabag-free-open-source-replacement-instapaper/
AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes.
AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes. This well-organized site allows people to vote on the software choices.
https://alternativeto.net/
https://alternativeto.net/
Best Self Hosted Alternatives
Best Self Hosted Alternatives
Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.
https://n0where.net/best-self-hosted-alternatives/
https://n0where.net/best-self-hosted-alternatives/
Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.
https://n0where.net/best-self-hosted-alternatives/
https://n0where.net/best-self-hosted-alternatives/
Bruce Schneier - Wikipedia, the free encyclopedia
The book Data and Goliath (by Bruce Schneier) provides a great overview of the companies and organization tracking you.
https://www.schneier.com/books/data_and_goliath/
Data and Goliath
The Hidden Battles to Collect Your Data and Control Your World
A Book by Bruce Schneier
A New York Times Best Seller
You are under surveillance right now.
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Praise for Data and Goliath
“A thought-provoking, absorbing, and comprehensive guide to our new big data world.”
—Gil Press, Forbes
“Schneier paints a picture of the big-data revolution that is dark, but compelling; one in which the conveniences of our digitized world have devalued privacy.”
—Charles Seife, Nature
“The public conversation about surveillance in the digital age would be a good deal more intelligent if we all read Bruce Schneier first.”
—Malcolm Gladwell, author of David and Goliath
“Schneier exposes the many and surprising ways governments and corporations monitor all of us, providing a must-read User’s Guide to Life in the Data Age. His recommendations for change should be part of a much-needed public debate.”
—Richard A. Clarke, former chief counterterrorism adviser on the National Security Council under Presidents Bill Clinton and George W. Bush, and author of Cyber War
“Schneier did not need the Snowden revelations, as important as they are, to understand the growing threat to personal privacy worldwide from government and corporate surveillance—he’s been raising the alarm for nearly two decades. But this important book does more than detail the threat; it tells the average low-tech citizen what steps he or she can take to limit surveillance and thus fight those who are seeking to strip privacy from all of us.”
—Seymour M. Hersh, Pulitzer Prize–winning journalist
“A pithy, pointed, and highly readable explanation of what we know in the wake of the Snowden revelations, with practical steps that ordinary people can take if they want to do something about the threats to privacy and liberty posed not only by the government but by the Big Data industry.”
—Neal Stephenson, author of Reamde
“A judicious and incisive analysis of one of the most pressing new issues of our time, written by a true expert.”
—Steven Pinker, Johnstone Professor of Psychology, Harvard University, and author of The Better Angels of Our Nature
“As it becomes increasingly clear that surveillance has surpassed anything that Orwell imagined, we need a guide to how and why we’re being snooped and what we can do about it. Bruce Schneier is that guide—step by step he outlines the various ways we are being monitored, and after scaring the pants off us, he tells us how to fight back.”
—Steven Levy, editor-in-chief of Backchannel and author of Crypto and Hackers
“A noted security researcher and author of many books on cryptography and digital security, Schneier's been on this beat a long time, and Data and Goliath is a lucid, sophisticated overview of how corporate and governmental surveillance works, how it doesn't, and what we can do about it. His book is finely constructed, free of cant, and practical in its conclusions—marks of an engineer. As one of a limited number of experts given access to the Edward Snowden documents, he is also in a special position to explain complicated, highly secret surveillance programs to the American public.”
—Jacob Silverman, LA Times
Excerpts
Table of Contents
Introduction
Endnotes
Excerpts from:
Introduction (Scientific American)
Introduction (Gizmodo)
Chapter 2 (Wired)
Chapter 3 (The Christian Science Monitor)
Chapter 5 (The Atlantic)
Chapter 6 (The Blaze)
Chapter 8 (Ars Technica)
Chapter 10 (Science Friday)
Chapter 11 (Digg)
Chapter 15 (Huffington Post)
Chapter 15 (Slate)
Chapter 16 (Motherboard)
Other Editions
Available Now:
German (MVG Verlag)
Upcoming:
Arabic (Forum for Arab and International Relations)
Chinese complex (As If Publishing)
Chinese simplified (Gold Wall Press)
Japanese (Soshisha)
Korean (Minumsa)
Swedish (Daidalos)
Related Essays
The Guardian
Whatever
Related Interviews
Fortinet Blog
Mic
Reviews
Boing Boing | Booklist | The Boston Globe | The Economist | EFF Deeplinks Blog | Federation of American Scientists | Forbes | InfoWorld | Kirkus Reviews | LA Times | Nature | New Scientist | The New York Times—DealBook | Reuters | Slashdot | Times Higher Education | The Wall Street Journal | Washington Post
More Reviews
Audio and Video
Bruce Schneier Presents Data and Goliath
Book Talk at Harvard Book Store
Book Talk at Town Hall Seattle
Book Talk at Google
Book Talk at NYU
Book Roundtable on MPR News
Panel Discussion at Harvard
Interview on Science Friday
Interview on Democracy Now (Part 2)
Interview with Paul Harris
Other
GetAbstract Summary
Dust Jacket of Data and Goliath by Bruce Schneier
up to Books
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient, an IBM Company.
About Bruce Schneier
Bruce Schneier
I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I write books, articles, and academic papers. Currently, I'm the Chief Technology Officer of Resilient Systems, a fellow at Harvard's Berkman Center, and a board member of EFF.
Featured Essays
It's Time to Break Up the NSA
How the NSA Threatens National Security
Terrorists May Use Google Earth, but Fear is No Reason to Ban It
In Praise of Security Theater
The Eternal Value of Privacy
Terrorists Don't Do Movie Plots
more essays
Latest Book
Data and Goliath
more books
Support Bloggers' Rights! Defend Privacy--Support Epic
Resilient Systems
BlogNewsletterBooksEssaysNewsSpeakingAcademicAbout Me
https://en.wikipedia.org/wiki/Bruce_Schneier
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Originally shared by Government GangStalking and Electronic Harassment
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
The Best Privacy-Friendly Apps & Services For 2016 - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/essential-privacy-services/
https://greycoder.com/essential-privacy-services/
How To Make Windows 10 More Private - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-make-windows-10-more-private/
https://greycoder.com/how-to-make-windows-10-more-private/
FBI Used U.S. University to Attack Tor Privacy - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/fbi-tor/
https://greycoder.com/fbi-tor/
Mouse Movements Could Identify Tor Users' Real IP Address - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/
https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/
Two Useful Guides To Software Alternatives - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/useful-lists-privacy-friendly-software/
https://greycoder.com/useful-lists-privacy-friendly-software/
Monday, May 23, 2016
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Originally shared by Danie van der Merwe
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Data plans can be exceptionally expensive and carriers will often bar messaging and call services from being used over them. You know you can’t use your carrier’s data plan to FaceTime mom and will instead have to pay the carrier a different call rate. Your carrier’s data plan will let you browse the internet, Tweet, post to Facebook, or find a place on a map. If you’re using a small data plan and trying to conserve bandwidth, the maps app is one place you can cut back. If you use either Google Maps or Apple Maps, here’s a little trick to using it offline.
This may be obvious to many people, but believe me there are many I still see that think you must be connected to the Internet to use these maps. Newer features now also include voice navigation so that you do not have to keep glancing at the phone. A data connection though will in addition give you real-time traffic routing, but many will be grateful to just have good basic free offline GPS functionality.
See http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection/
http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Data plans can be exceptionally expensive and carriers will often bar messaging and call services from being used over them. You know you can’t use your carrier’s data plan to FaceTime mom and will instead have to pay the carrier a different call rate. Your carrier’s data plan will let you browse the internet, Tweet, post to Facebook, or find a place on a map. If you’re using a small data plan and trying to conserve bandwidth, the maps app is one place you can cut back. If you use either Google Maps or Apple Maps, here’s a little trick to using it offline.
This may be obvious to many people, but believe me there are many I still see that think you must be connected to the Internet to use these maps. Newer features now also include voice navigation so that you do not have to keep glancing at the phone. A data connection though will in addition give you real-time traffic routing, but many will be grateful to just have good basic free offline GPS functionality.
See http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection/
http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection
Sunday, May 22, 2016
“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”
“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”
Originally shared by Government GangStalking and Electronic Harassment
WTF...!!
https://www.youtube.com/watch?v=JV2yMlMz7ks
Originally shared by Government GangStalking and Electronic Harassment
WTF...!!
https://www.youtube.com/watch?v=JV2yMlMz7ks
Sunday, May 8, 2016
Brain–computer interface - Wikipedia, the free encyclopedia
Originally shared by Government GangStalking and Electronic Harassment
https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
The REAL X-Ray spex: New 'terahertz' scanner lets mobile phones see through walls - and even inside the human body
Originally shared by Government GangStalking and Electronic Harassment
http://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex--new-terahertz-scanner-lets-mobile-phones-walls.html
http://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex--new-terahertz-scanner-lets-mobile-phones-walls.html
Wednesday, May 4, 2016
This Surveillance Drone Never Needs to Land
Originally shared by Government GangStalking and Electronic Harassment
https://www.technologyreview.com/s/543196/this-surveillance-drone-never-needs-to-land/
https://www.technologyreview.com/s/543196/this-surveillance-drone-never-needs-to-land/
Subscribe to:
Posts (Atom)