Skip to main content

Snowden

Edward Snowden's preferred OS has a major security flaw

posted onJuly 23, 2014
by l33tdawg

Think you're safe from spies because you're using Tails, the same Linux distribution that Edward Snowden uses to remain anonymous?

Unfortunately, you'll still have to be on your guard. Security firm Exodus Intelligence has revealed that the latest version of the OS, 1.1, is vulnerable to attacks that could be used to unmask your identity. The researchers say they won't publish details of the exploit until there's a patch, but the Tails team will have to wait up to a week before it gets a report it can use to whip up an emergency fix.

Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets

posted onJuly 21, 2014
by l33tdawg

Edward Snowden made an impassioned call on Saturday for hackers and technologists to help would-be whistleblowers spill more government secrets.

Speaking via remote Google Hangouts video feed from Russia, Snowden addressed his comments to an audience at this weekend's Hackers on Planet Earth (HOPE) conference at the Pennsylvania Hotel in New York.

General Alexander accused of selling secrets

posted onJune 30, 2014
by l33tdawg

There is concern over the pond that former top spook General Keith Alexander might be making a fortune selling state secrets to private companies.

If the allegations are true, then it throws into question why it is appropriate for an American to sell state secrets to private enterprise, but lock up those who reveal them as a whistleblower.

Alexander was the number one enemy of Edward Snowden who blew the whistle on his organisations spying efforts. After he quit as the head of the NSA and U.S. Cyber Command, Alexander has launched the consulting firm IronNet Cybersecurity.

Global Mobile Roaming Hub Accessible From the Internet and Vulnerable, Researchers Find

posted onJune 4, 2014
by l33tdawg

The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.

The scans were performed over a period of several months by Stephen Kho and Rob Kuiters, a penetration tester and an incident response handler from KPN, the largest telecommunications provider in the Netherlands.

Edward Snowden had a 'crypto party' before he blew his NSA whistle

posted onMay 22, 2014
by l33tdawg

It was December 11, 2012, and in a small art space behind a furniture store in Honolulu, NSA contractor Edward Snowden was working to subvert the machinery of global surveillance.

Snowden was not yet famous. His blockbuster leaks were still six months away, but the man destined to confront world leaders on a global stage was addressing a much smaller audience that Sunday evening. He was leading a local “Crypto Party,” teaching less than two dozen Hawaii residents how to encrypt their hard drives and use the internet anonymously.

Edward Snowden sent Glenn Greenwald this video guide about encryption for journalists

posted onMay 14, 2014
by l33tdawg

Before Laura Poitras brought Glenn Greenwald into the story about former National Security Agency contractor Edward Snowden, Greenwald received messages from a mysterious contact calling himself Cincinnatus. The source urged Greenwald to learn how to protect his e-mail with encryption so he could receive sensitive information.

Snowden-inspired crypto-email service Lavaboom launches

posted onApril 16, 2014
by l33tdawg

Lavaboom, a new German-based and supposeldyNSA-proof email service, will go into private beta this week with a mission spread the gospel according to Edward Snowden by making encrypted email accessible to all.

Although it has been referred to in various parts of the interwebs as an heir to Lavabit, the now-defunct encrypted email service used by Snowden, the new service's name is a tribute to its predecessor and nothing more.