Skip to main content

Privacy

The Pirate Bay releases censorship-thwarting browser

posted onAugust 13, 2013
by l33tdawg

The operators of The Pirate Bay, one of the most (in)famous piracy sites on the Internet, have decided to celebrate the site's 10th anniversary by releasing a web browser that allows users to access TPB or other sites censored in their country.

"PirateBrowser is a bundle package of the Tor client (Vidalia), Firefox Portable browser (with foxyproxy addon) and some custom configs," they explained on the browser's official website.

NSA to world: we're only watching 1.6% of internet

posted onAugust 12, 2013
by l33tdawg

The USA's National Security Agency (NSA) has issued a document titled ( The National Security Agency: Missions, Authorities, Oversight and Partnerships(PDF) that explains some of its operations and includes a claim it “... touches about 1.6%... “ of daily Internet traffic and “...only 0.025% is actually selected for review.”

How should you protect yourself from cyber surveillance?

posted onAugust 12, 2013
by l33tdawg

What are your risks in this era of surveillance, hacking and sloppy software coding? It depends. So what precautions should you be taking? Same answer: it depends.

That's a pretty unsatisfying bit of advice, isn't it? Yet it's a core truth of digital security. You should be concerned, very concerned, but in order to make decisions about your own security measures you should first figure out which threats you're likely to face.

Ed Snowden's e-mail service shuts down, leaving cryptic message

posted onAugust 9, 2013
by l33tdawg

Once it became clear that he was going to be trapped in Moscow's Sheremetyevo Airport for a while, National Security Agency (NSA) leaker Edward Snowden chose to end his isolation by inviting several human rights activists to meet with him in July. The e-mails Snowden sent out to organize that meeting reportedly came from the e-mail address "edsnowden@lavabit.com."

Questions over Tor exploit link to US Govt

posted onAugust 8, 2013
by l33tdawg

Links between a exploit targeting users of the Tor network and US spy and law enforcement agencies should now be consider tenuous, researchers say.

The attack involved a JavaScript exploit targeting an old version of Firefox then commonly used in the Tor Browser Bundle. It served to identify the IP addresses of vulnerable users and tie them to the Freedom Hosting Tor Hidden Services they were visiting.

TOR Project: Stop using Windows, disable JavaScript

posted onAugust 6, 2013
by l33tdawg

The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.

The zero-day vulnerability allowed as-yet-unknown interlopers to use a malicious piece of JavaScript to collect crucial identifying information on computers visiting some websites using The Onion Router (TOR) network.

FBI Taps Hacker Tactics to Spy on Suspects

posted onAugust 1, 2013
by l33tdawg

Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.

Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links—techniques more commonly associated with attacks by criminals.

Snowden's "I had the authorities to wiretap anyone" wasn't a lie

posted onAugust 1, 2013
by l33tdawg

While I think the outrage at the NSA's snooping is more than just a little late (most of the broad strokes of the NSA's signals intelligence programs were public over four years ago) it's fascinating how new details keep emerging most notably from UK's The Guardian newspaper, the paper that Edward Snowden leaked the NSA documents to in the first place.

One of the most interesting os these new details is a system the NSA apparently calls "XKeyscore" and its revelation supports one of Snowden's claims that most people found hard to believe: