ꕤArticle SOURCE as indicated Universal Music of 14 financial instutions
/ hinder regulators + prosecutors to investigate misconduct? ie ... if not rummaging, knows where to go & where to get it, deception software ineffective Deception software
---------------------- ꕤ ----------------------
COMMENT Bunch of random stuff I looked at.
ꕤ
|
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
Showing posts with label Tor. Show all posts
Showing posts with label Tor. Show all posts
September 15, 2015
Latest CyberSec News & Related
August 04, 2015
HORNET Onion Routing - Tor Rival?
--------------------- COMMENT Potential vulnerability points mean nothing to me. Tor anonymity network - here. |
July 31, 2015
Tor Vulnerability - Traffic Analysis Identifies Guard Servers
SOURCE http://fusion.net/story/175068/sorry-the-way-you-type-is-exposing-your-identity-online-even-if-youre-browsing-anonymously/--------------------- COMMENT
So:
Imagine the Tor people are adapting to the fake packet fix, whatever that is.My reference to 'server' should probably read 'node' in the Tor network, I would think.
------- ------- -------
Data transferred by computer is sent via 'packets'. Due to size constraints, data sent out is broken up and reassembled at the destination.These are just notes for my benefit. Hoping I have the info. straight. LOL --------------------- MORE MIT researchers figure out how to break Tor anonymity without cracking encryption |
April 01, 2015
Don't Get Angry: Encrypt
AUSTRALIAN DIGITAL RAPE BY BRADIS & CO Why people ignore data retentions many perils REMEDY
Encryption https://www.gnupg.org/ http://en.wikipedia.org/wiki/GNU_Privacy_Guard
Anonymising https://www.torproject.org/ Tor - Explained
..........................................................................
...........................................................................
Photo: Alex Ellinghausen COPYRIGHT DISCLAIMER Regarding the SMH article, 'rape by Bradis & Co' is my take rather than SMH's ... just so there's no confusion. ;) The snail-mail version of this would have been going on back in the 50s and 60s, when the Australian govt was in full surveillance and political suppression and sabotage mode, to blot out the 'evil' of communism. But it isn't Russians and communists looking evil now; it's the totalitarian West. Instead of getting angry but then just accepting the inevitable prison population living conditions: Intend to keep at it until I get some kind of feel and overview for privacy tech basics, from a consumer perspective. Only I'm rather lazy ... VIDEO GPG for Journalists - Windows edition | Encryption for Journalists | Anonymous 2013 from anon108 on Vimeo. |
January 06, 2015
Online Privacy
Privacy Shielding against Mass Surveillance
..............................................................................
Looks uncomplicated & worth checking out. |
September 20, 2014
Hacker, Cybersecurity, Internet, Surveillance, Cryptography
CYBER-SECURITY
COMMENT
|
Julian Assange - Political Prisoner on Google / Assange Media Distortion
ASSANGE
GOOGLE & NSA
POLITICAL PRISONER
MEDIA DISTORTION - BBC
COMMENT
|
September 05, 2014
Holes in NATO’s Cyber Defense Pledge
The Holes in NATO’s Cyber Defense Pledge by William A. Blunden / September 4th, 2014 [ ...] Folks, it’s anarchy. Until we mobilize and get our political leaders to outlaw covert ops the government and corporate spies show no sign of letting up. In all probability, as things progress the whole clandestine scene is just going to get worse. This past April Obama openly bragged to China’s leadership that the U.S would be devoting $26 billion to the Pentagon’s cyber trough and expanding the U.S. force to 6,000 so-called “cyberwarriors”.15 Guess where all of that funding goes to? The moral of the story is this: when high-level Pentagon types and think tank pundits start yammering about cyberattacks from Russia or China keep in mind that our security services are neck deep in deception ops directed against their alleged allies. History shows that the American Deep State is constantly in search of new enemies, even if it has to fabricate them,16 and our corporate rulers have no scruples about launching attacks that kill untold thousands of innocent people so that they can boost quarterly profits. [... EXTRACT - FULL @ SOURCE ]
|
This article is a wealth of information. Everyone gets a mention:
Tor, Ntrepid, WikiLeaks, TAO, GCHQ
Check it out.
August 07, 2014
USA - NATIONAL SECURITY AGENCY - Leaker #2
http://goo.gl/l9SCsG
Another NSA leaker.
Snowden was first. This is Leaker #2.
#2 Leaker is allegedly passing information to journalists.
Bloomberg View (link above) reports:
Hey, Tor gets a mention.
Was going to use Tor the other day when I couldn't access Twitter for some reason ... but I couldn't even get Tor up. Kinda odd. Is Tor blacklisted these days?
Anyway, this is a bit of interesting news on the NSA front. I've not followed the links but anyone who wants more info can.
Another NSA leaker.
Snowden was first. This is Leaker #2.
#2 Leaker is allegedly passing information to journalists.
Bloomberg View (link above) reports:
The blogger Cory Doctorow was the first to suggest there's a second NSA leaker. Last month, one of his sources told him that a story on the German site Tagesschau was not based on documents from Snowden's trove. The article dealt with the NSA's spying on the anonymous Tor network, the backbone of the "Dark Web" that intrigues the intelligence services of many countries.
Hey, Tor gets a mention.
Was going to use Tor the other day when I couldn't access Twitter for some reason ... but I couldn't even get Tor up. Kinda odd. Is Tor blacklisted these days?
Anyway, this is a bit of interesting news on the NSA front. I've not followed the links but anyone who wants more info can.
Subscribe to:
Posts (Atom)