Author: admin

TOR users become FBI’s No.1 hacking target after legal power grab

The FBI wants greater authority to hack overseas computers, according to a law professor.

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet.

The Internet as an identity-multiplying technology

What’s at issue in the “nymwars” (or “Real Names Policies”) is not integrity at all, but rather power and control. Namely, that of an authoritarian entity such as a government to have the power to legitimize what your identity is (your “real name”), and to control what you can do with that identity

WikiLeaks posts the software governments use to spy on dissidents

WikiLeaks’ all-or-nothing approach to revealing shady government activity just took a new (if decidedly risky) turn. Julian Assange and crew have posted FinFisher and FinSpy PC, the intrusion software that Australia, Italy, Pakistan and other countries use to break into and spy on people’s devices, no matter what platform they’re running.

Assange: Google should be of concern to people all over the world

In his new book, Wikileaks leader speaks about the politics of web giant executives on personal data. And he warns: They believe they are doing good, but they are now aligned with US foreign policy. This means that Google can intervene on behalf of US interests, for example, it can end up compromising the privacy of billions of people, it can use its advertising power for propaganda. Like Nsa

Newer Posts
Older Posts