Posted: Thu Dec 15, 2016 12:33 pm (GMT 0)
Internet Privacy (encryption in next post)
One problem is that the servers are within the territories of NWO countries and the CIA, GCHQ and other intelligence services are able to easily access the flow of online information. A possible solution to this is to decentralise the internet so that it is not dependent on their servers. Various ideas are being discussed including Kim Dotcoms mega net which would use peoples mobile phones to create a network. However Kim is now fighting extradition to the US which could disrupt his plans. More info here:
Kim Dotcom’s MegaNet Preps Jan 2016 Crowdfunding Campaign
By Andy on June 10, 2015
Kim Dotcom's dream of a people-powered, censorship-resistant Internet will rely on the goodwill of supporters to get off the ground. In an announcement this morning, the entrepreneur confirmed that his MegaNet project will seek equity via a crowd-funding campaign set to launch on the January 2016 anniversary of the raid on Megaupload.
The Brazilian government is creating its own servers in response to revelations of the NSA spying on foreign governments as well as citizens one option to avoid servers would be the creation of a mesh net (decentralised) internet https://projectmeshnet.org/
WikiLeaks' Julian Assange Calls on Computer Hackers to Unite Against NSA Surveillance
WikiLeaks founder Julian Assange addressed a major gathering of computer experts Monday at the Chaos Communication Congress in Hamburg, Germany, calling on them to join forces in resisting government intrusions on Internet freedom and privacy. We play highlights from Assange’s speech, as well as the one given by Sarah Harrison, the WikiLeaks member who accompanied Edward Snowden to Russia. We also hear from independent journalist and security expert Jacob Appelbaum, who reveals a spying tool used by the National Security Agency known as a "portable continuous wave generator." The remote-controlled device works in tandem with tiny electronic implants to bounce invisible waves of energy off keyboards and monitors to see what is being typed. It works even if the target computer is not connected to the Internet.
Information Asymmetry and Power in a Surveillance Society:
This paper fuses Lukes’ (1974) three-dimensional view of power with the economic concept of informational asymmetry to explicate how access to information is organized and how power relationships arise from this organization. We argue that many observed asymmetries are deliberate and, drawing from the economics and finance literature, we posit that their outcomes are inevitably detrimental. The paper examines the techniques that foster information imbalances, such as media and propaganda, knowledge production, educational systems, legal and organizational structures, exclusive information networks, and surveillance. We conclude that in the absence of greater transparency, the deleterious effects of unequal access to information will continue and deepen. We further suggest that the analysis of the complexities of the issues warrants a broad, multidisciplinary approach and we suggest what this might include.
Protect your privacy: http://www.alternet.org/human-rights/how-protect-your-privacy-president-donald-trump
Here’s the Newest Tool to Help You Fight the Surveillance State
By Derrick Broze
Earlier this month, the Electronic Frontier Foundation launched a new project designed to help educate communities about the growing list of surveillance tools deployed against the unsuspecting public. The EFF calls the new project the Street-Level Surveillance Project (SLS), which it describes as “a Web portal loaded with comprehensive, easy-to-access information on police spying tools like license plate readers, biometric collection devices, and ‘Stingrays.’”
The SLS project hopes to educate users about the dangers of spying from law enforcement agencies at the federal, state, and local level. The privacy invasions include tracking cell phone calls, photographing our vehicles and following our driving patterns, taking our pictures in public places, and collecting our fingerprints and DNA.
How to DISAPPEAR from the internet: Nine-step guide helps people vanish without a trace and then surf anonymously
1. Close your Facebook, Twitter, Google+ and LinkedIn accounts.
2. Search for yourself online and close any accounts you'd forgotten about.
3. Falsify information on accounts that can't be closed or deleted.
4. Unsubscribe from mailing lists.
5. Delete search engine results.
6. Contact websites directly and ask them to remove details about yourself.
7. Ask data clearing houses - companies that collect and sell data to other firms - to remove your records.
8. Ask to be unlisted in phone books and online directories.
9. Delete your email accounts.
The Privacy International Network
Through it's global advocacy, Privacy International is building a global network of advocates to fight for privacy, uncovering surveillance practices around the world, and advocating for strong privacy protections on the domestic and regional level
Privacy International and its partners collaborate together to fight back against unlawful surveillance wherever it may occur. Building the understanding of organisations, activists, journalists, and researchers around the world helps these groups to identify and respond to surveillance techniques and technologies proliferating across these regions.
Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human rights defenders and journalists around the world https://resistsurveillance.org/
Avoid google surveillance www.naturalnews.com/049881_Google_privacy_Gmail.html
Ashley Madison hacked: How to keep your personal information safe on the internet
Protect your computer: http://www.backtrack-linux.org/
It’s not just Windows 10, Windows 7 and 8 are also tracking you – here’s how to stop them
A newspaper article on what info of yours big brother is watching: http://online.wsj.com/public/page/wh...l-privacy.html
Firefox hello https://hello.firefox.com/fiNWZ3EPoBc
About firefox hello https://www.firefox.com/hello/
Get outside prism http://www.youtube.com/watch?feature=player_embedded&v=MEiNbbU8vvQ#t=97
Tool to see whose watching you online http://www.independent.co.uk/life-style/gadgets-and-tech/news/mozillas-lightbeam-tool-will-expose-who-is-looking-over-your-shoulder-on-the-web-8902269.html
Article about people fighting back against NSA online spying for example by grouping together into 'crypto parties' http://www.theepochtimes.com/n3/3167...nal-community/
Stop ads and other things following you around on the internet http://fixtracking.com/
Madesafe decentralised internet
Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth
Find out if someone is stealing your internet http://www.usatoday.com/story/tech/columnist/komando/2015/11/20/stop-neighbors-stealing-your-internet/76097152/
PirateBox Takes File-Sharing Off The Radar and Offline, For Next To Nothing. When confronted with a doomsday scenario where mainstream online file-sharing becomes a thing of the past, it’s not uncommon for people to refer to days gone by, when files were swapped freely offline using discs and other mediums. Now, an interesting and compact system can deliver the [g]olden days of data swapping with a modern twist, by turning any open space into a wireless and anonymous file-sharing system at a rock-bottom price.
Users wirelessly accessing the device are presented with a web interface which allows them not only to download files but upload them too. No logs or other identifying information is stored in the device. Although great for anyone to share files within its range, considering the pressure currently being applied to university students by record labels and their anti-piracy partners, the chances of music-stuffed PirateBoxes popping up on campuses all around the world increases every day.
And considering that The Pirate Bay can now fit on the smallest of USB sticks, every PirateBox could also contain a copy of the world’s most famous torrent site.
Duck Duck Go
Google store every search you do through their search engine and have a direct interface with the secret service. DuckDuckgo offers an alternative search engine: https://duckduckgo.com/
It aims at preserving your privacy and anonymity, and helps you to:
• use the Internet anonymously and circumvent censorship;
all connections to the Internet are forced to go through the Tor network;
• leave no trace on the computer you are using unless you ask it explicitly;
• use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
Debian is a free operating system (OS) for your computer. An operating system is the set of basic programs and utilities that make your computer run http://www.debian.org/
GNU is an operating system which is 100% free software. It was launched in 1983 by Richard Stallman (rms) and has been developed by many people working together for the sake of freedom of all software users to control their computing. Technically, GNU is generally like Unix. But unlike Unix, GNU gives its users freedom https://www.gnu.org/software/
The GNU Privacy Guard https://gnupg.org/
GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME and Secure Shell (ssh).
GnuPG is Free Software (meaning that it respects your freedom). It can be freely used, modified and distributed under the terms of the GNU General Public License .
Ubuntu is an open source software platform that runs from the cloud, to the smartphone, to all your things http://www.ubuntu.com/
Mobile phones linked to cancer in groundbreaking study
'Where people were saying there's no risk, I think this ends that kind of statement'
Siobhan Fenton, @siobhanfenton, 2 hours ago
A major study has suggested there is a link between mobile phones and cancer. The report is an in-depth peer reviewed study conducted by the US government and represents a significant development in long-running controversy over how mobile phones impact on users' health.
Researchers from the National Toxicology Program exposed male rats to the type of radio frequencies which are commonly emitted by mobile phones. Following this exposure, "low incidences" of two types of tumours were found in the animals in both the brain and the heart. Tumours were not found in rats not exposed to the frequencies.
There's a potentially very easy way to get around the proposed Snooper's Charter measures
Posted 3 hours ago by Louis Doré in tech
How can I stop that happening?
By using a Virtual Private Networks (or VPN). The use of VPNs is not mentioned in the bill, which seems a little irregular as it is an easy-to-use tool that shields a user’s geographic location and metadata from an internet provider. If you use one, companies would be unable to comply with the bill's proposals.
So what are VPNs?
Virtual Private Networks are software, usually paid for by a cheap subscription (around £15-20 a year), which basically act as a tunnel which scrambles and encrypts your use data and traffic.
All anyone trying to look at your browsing records will see is that it came from a server owned by the provider.
The also mask your location - meaning you can access the American version of Netflix, or BBC iPlayer from outside the UK, for example - and are used to secure connections at public wi-fi hotspots.
How can I use them?
They are typically subscription services, which vary in quality.
Torguard, Private Internet Access, Tunnelbear, IPVanish and IPVN are among the more popular pieces of software and are easily available for download.
They can make your internet connection slow, though, and are not 100 per cent immune to having their data intercepted - but it is a lot more difficult.
Why were VPNs not mentioned in the bill?
read on here: http://indy100.independent.co.uk/art..._campaign=i100
One of world's first kite-driven power stations to open in Scotland
How to see if the government is spying on your android phone https://www.youtube.com/watch?v=CP1j04_X4Oo
Solutions to psychotronic weapons http://www.rense.com/general96/psychotronictech.htm