Google Nazis Aim to Create Biometric Surveillance Databases
COMMENT Google Big Brother is poised to collect biometric data. Biometrics is used "to identify individuals in groups that are under surveillance" and is "considered also instrumental to the development of state authority" (source). This amounts to Google Big Brother creating identity surveillance databases, which is not that far removed from collecting user DNA for storage in data banks. South African case study here. Unable to skim this right now, but it looks like it might be interesting. |
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts
May 25, 2016
Google Nazis Aim to Create Biometric Surveillance Databases
April 01, 2016
TOR vs VPN | WHICH TO USE
Source
The Tin Hat ... lol https://thetinhat.com/tutorials/darknets/tor-vpn.html TOR vs VPN | WHICH TO USE Tor & VPN described as often conflated -- but Tor & VPN are different -- which is more suitable depends on context Essentially:
Tor: for activists & 'secret squirrels' / not for video downloads
[caution: not bullet-proof]
vs
VPN: for (not vital) everyday anonymity / good for downloads
VPNs -- take connection -- encrypt connection -- pass connection through server -- contact goes via VPN server to connection site sought -- ie: it provides encryption & diversion of your online traffic
A.
-- what you are doing & who you are connecting with not visible-- eg. public wifi: those watching get jumbled info sent to random server -- same applies to Internet Service Provider (ISP) B. -- site visited does not know your geolocation (privacy enhanced) -- this permits by-passing geographic restrictions on services Note: * what you do through VPN is know by operator of the VPN * VPN services claim not to log activity but this is only a representation that may be dishonoured * eg. if VPN provider is issued with a court order for info on your activities * VPN provider would likely find some way to link your activity back to you * So: VPN = good for low risk situations * BUT not so good for anonymity against a state actor Tor Browser -- works differently -- instead of connecting directly to server -- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes') -- before being decrypted & sent to destination -- FIRST SERVER - knows your location -- SECOND SERVER - only knows data from FIRST SERVER -- THIRD SERVER - only knows that data from SECOND SERVER -- anonymity is provided as the third server cannot know origin of data -- majority of Tor servers not 'malicious' (do not log activity) -- nearly impossible to associate end-data of chain to origin -- very effective / takes significant state actor effort to de-anonymise -- bonus: encryption by Tor to prevent - eg. ISP from seeing your traffic -- caution: decryption at last server ('exit relay') = point of vulnerability -- it is at this point your data can be spied upon -- therefore regular HTTP unencrypted connection relay of data (a no-no) -- can be read in its entirety at the exit relay by the operator of the exit relay -- however, using an add-on like HTTPS-Everywhere -- equals safely encrypted data -- with HTTPS even malicious server could not de-anonymise * unless content contains personal info (email, name, address, etc) COMMENT: I'm confused. If HTTPS is supposed to be an encryption add-on -- how can a malicious server de-anonymise if personal data is included -- if encryption is supposed to be in place? -- makes no sense to me: that's not encryption TOR - HIGHER SECURITY PRIVACY BROWSING ANONYMITY vs SPEED -- much slower than VPN -- but far better re anonymity -- avoid watching videos or downloading torrents -- bad for entire network & extremely slow -- best for high level anonymity needs -- eg. high threat levels = law enforcement scenarios -- journalists dealing w. sensitive sources, whistleblowers, political activists -- those living under oppressive state surveillance etc [comment: all of us under US empire mass surveillance oppression ... LOL] -- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright) -- promises provided by VPN companies = not enough. Use Tor. -- *do not treat Tor as if it were bullet-proof -- with enough time, de-anonymization is possible by agencies such eg. NSA -- using Tor = best bet, unless you are an NSA high-value target -- using tor for low bandwidth static sites helps 'populate' the Tor traffic -- & providing cover for those who need Tor for vital reasons -- note: Tor is only an ANONYMITY TOOL -- without operational security (see OPSEC), anonymity tools rendered useless -- watch bad habits - can reveal ID to the motivated adversary -- keep torrenting to VPN -- VPN - EVERYDAY BROWSING PRIVACY -- VPN good for low-risk/bandwidth-heavy purposes -- VPN's are good for VIDEOS & TORRENTS task OPSEC -- operational security https://grugq.github.io/ The Grugq -- teach operational security (OPSEC) -- ie good security habits http://grugq.tumblr.com/ Source: The Tin Hat https://thetinhat.com/tutorials/darknets/tor-vpn.html |
January 06, 2016
One Man War on Tor
ꕤ
Unofficial / 'Civvies'
FBI Support for Tor?
[ CLICK image to enlarge / for clarity]
One Man War on Tor
[ CLICK image to enlarge / for clarity]
[ CLICK image to enlarge / for clarity]
[ CLICK image to enlarge / for clarity]
---------------------- ꕤ ----------------------
US Politics | Koch Industries
---------------------- ꕤ ----------------------
[Tor's a privacy browser]
ꕤ
|
January 01, 2016
Weev - 'Ian's death and antifa at CCC: why hackers must become nationalists'
ꕤArticle SOURCE http://weev.livejournal.com/415737.html
---------------------- ꕤ ----------------------
The prison canteen tray imagery was funny. Not sure if he meant it to be, as he really did do prison.
ꕤ
|
Subscribe to:
Posts (Atom)