Category Archives: NSA

A lot’s of reasons NOT TO use Windows OS anymore

Microsoft is part of NSA’s mass surveillance program “PRISM”:
https://en.wikipedia.org/wiki/PRISM_(surveillance_program)

Microsoft informs the NSA about bugs before fixing them:
https://archive.is/OBGB1

Microsoft openly offeres cloud data to support PRISM:
https://archive.is/tW6fu

Microsoft has backdoored its disk encryption:
https://archive.is/2XIvX · https://archive.is/qLRZx

Windows snoops on the users’ files, text input, voice input,
location, contacts, calendar records and web browsing history,
even after related settings are turned off:
https://archive.is/Zny36 · https://archive.is/sz1nt
https://archive.is/g3QdQ · https://archive.is/ko469
https://www.youtube.com/watch?v=nHA2s04Vtdc

A Traffic Analysis of Windows 10:

Keypoints: Windows 10 has a keylogger and uploads all your
keystrokes every 5 minutes. Everything you type in Edge or
Cortana is sent to Microsoft, along with any media files it
finds. When webcam is enabled, 35MB of data goes to Microsoft.
Even with Cortana disabled/uninstalled, Windows 10 sends all
microphone audio to Microsoft, when the computer is idle.
https://archive.is/QnTTA
https://archive.is/eZKc9

Windows 10 sends desktop screenshots straight to Microsoft:
https://d2.maxfile.ro/rwspylwbwo.webm
https://www.youtube.com/watch?v=xDeHqiydk4A

Windows 10 scans for illegal/pirated software:
https://archive.is/vhjwm
https://archive.is/2jehd

Microsoft proudly presents surveillance statistics:
https://archive.is/MB0Yy

> Over 82 billion photos viewed.
> Gamers spent over 4 billion hours playing PC games.
> 44.5 billion minutes/month spent in Microsoft Edge.
> Over 2.5 billion questions asked of Cortana since launch.
> Windows 10 now active on over 200 million devices.

P.S.: If you want a good, free and safe OS, install a GNU/Linux one. 😉
Look at http://distrowatch.com

Thank you to https://twitter.com/0xUID for the post

New Zealand Launched Mass Surveillance Project While Publicly Denying It

AUCKLAND, New Zealand—The New Zealand spy agency, the Government

Communications Security Bureau (GCSB), worked in 2012 and 2013
to implement a mass metadata surveillance system even as top
government officials publicly insisted no such program was being
planned and would not be legally permitted.

Documents provided by NSA whistleblower Edward Snowden show that
the government worked in secret to exploit a new internet
surveillance law enacted in the wake of revelations of illegal
domestic spying to initiate a new metadata collection program
that appeared designed to collect information about the
communications of New Zealanders. Those actions are in direct
conflict with the assurances given to the public by Prime
Minister John Key (pictured above), who said the law was merely
designed to fix “an ambiguous legal framework” by expressly
allowing the agency to do what it had done for years, that it
“isn’t and will never be wholesale spying on New Zealanders,”
and the law “isn’t a revolution in the way New Zealand conducts
its intelligence operations.”

Snowden, in a post for The Intercept published today, accused
Prime Minster Key of fundamentally misleading the public about
GCSB’s role in mass surveillance. “The Prime Minister’s claim to
the public, that ‘there is no and there never has been any mass
surveillance’, is false,” the former NSA analyst wrote. “The
GCSB, whose operations he is responsible for, is directly
involved in the untargeted, bulk interception and algorithmic
analysis of private communications sent via internet, satellite,
radio, and phone networks.”

Snowden explained that “at the NSA, I routinely came across the
communications of New Zealanders in my work with a mass
surveillance tool we share with GCSB, called ‘X KEYSCORE.”” He
further detailed that “the GCSB provides mass surveillance data
into XKEYSCORE. They also provide access to the communications
of millions of New Zealanders to the NSA at facilities such as
the GCSB facility in Waihopai, and the Prime Minister is
personally aware of this fact.”

Top secret documents provided by the whistleblower demonstrate
that the GCSB, with ongoing NSA cooperation, implemented Phase I
of the mass surveillance program code-named “Speargun” at some
point in 2012 or early 2013. “Speargun” involved the covert
installation of “cable access” equipment, which appears to refer
to surveillance of the country’s main undersea cable link, the
Southern Cross cable. This cable carries the vast majority of
internet traffic between New Zealand and the rest of the world,
and mass collection from it would mark the greatest expansion of
GCSB spying activities in decades.

Upon completion of the first stage, Speargun moved to Phase II,
under which “metadata probes” were to be inserted into those
cables. The NSA documents note that the first such metadata
probe was scheduled for “mid-2013.” Surveillance probes of this
sort are commonly used by NSA and their partners to tap into
huge flows of information from communication cables in real
time, enabling them to extract the dates, times, senders, and
recipients of emails, phone calls, and the like. The technique
is almost by definition a form of mass surveillance; metadata is
relatively useless for intelligence purposes without a massive
amount of similar data to analyze it against and trace
connections through.

The NSA declined to comment for this story. A GCSB spokesperson
would only say: “We don’t comment on matters that may or may not
be operational.”

Over the weekend, in anticipation of this report, Key admitted
for the first time that the GCSB did plan a program of mass
surveillance aimed at his own citizens, but claimed that he
ultimately rejected the program before implementation.
Yesterday, after The Intercept sought comment from the NSA, the
Prime Minister told reporters in Auckland that this reporting
was referring merely to “a proposed widespread cyber protection
programme that never got off the ground.” He vowed to declassify
documents confirming his decision.

But the documents indicate that Speargun was not just an idea
that stalled at the discussion stage. It was a system GCSB
actively worked to implement. One top secret 2012 NSA document
states: “Project Speargun underway.” Another top secret NSA
document discussing the activities of its surveillance partners
reports, under the heading “New Zealand,” that “Partner cable
access program achieves Phase I.”

Critically, the NSA documents note in more than one place that
completion of Speargun was impeded by one obstacle: The need to
enact a new spying law that would allow the GCSB, for the first
time, to spy on its own citizens as well as legal residents of
the country. As one NSA planning document put it, completion of
Speargun was “awaiting new GCSB Act expected July 2013.”

That legislation arose after it was revealed in 2012 that the
GCSB illegally surveilled the communications of Megaupload
founder Kim Dotcom, a legal resident of New Zealand. New Zealand
law at the time forbade the GCSB from using its surveillance
apparatus against citizens or legal residents. That illegal GCSB
surveillance of Dotcom was followed by a massive military-style
police raid by New Zealand authorities on his home in connection
with Dotcom’s criminal prosecution in the United States for
copyright violations.

A subsequent government investigation found that the GCSB not
only illegally spied on Dotcom but also dozens of other citizens
and legal residents. The deputy director of GCSB resigned. The
government’s response to these revelations was to refuse to
prosecute those who ordered the illegal spying and, instead, to
propose a new law that would allow domestic electronic
surveillance.

That proposal was intensely controversial, prompting large
public protests and a concerted campaign against the law. One
news broadcaster called it “one of the most polarizing pieces of
legislation in recent times.” It was of sufficient interest to
the NSA that in March 2013, the director of Prime Minister Key’s
Intelligence Coordination Group traveled to NSA headquarters to
offer an update on the legislation.

To assuage the public, Key and other top officials repeatedly
insisted that the real purpose of the law was merely to provide
oversight and to clarify that targeted domestic surveillance
which had long been carried out by the agency was legal. Key
categorically denied that the law would allow mass metadata
collection on the New Zealand public: “There have been claims
this Bill offers no protection of metadata and allows for
wholesale collection of metadata without a warrant. None of that
is true.”

Key told the public that the new law would not permit mass,
warrantless metadata surveillance: “So when the GCSB wants to
access metadata, it is treated with the same level of
seriousness and protection as if the GCSB was accessing the
actual content of a communication. And there are protections
around that.”

In response to Key’s claims, legal experts extensively
documented that the new law would indeed provide ”a major
increase in the overall role and powers of the GCSB” and would
allow the “very broad ‘wholesale’ powers” which Key denied. Yet
the Key government, and the prime minister himself, steadfastly
insisted that the law permits no mass surveillance. At one
point, Key even promised to resign if it were found that the
GCSB were engaging in mass surveillance.

Based on Key’s assurances, the New Zealand Parliament narrowly
voted to enact the new law on August 21 of last year, by a vote
of 61-59. Immediately prior to passage, Key acknowledged that
the new law has “‘alarmed’ some people but blame[d] the
Government’s opponents for stoking their fears” and again
“rejected that by writing into law what the GCSB had already
been doing meant an extension of its powers.”

But in high-level discussions between the Key government and the
NSA, the new law was clearly viewed as the crucial means to
empower the GCSB to engage in metadata surveillance. On more
than one occasion, the NSA noted internally that Project
Speargun, in the process of being implemented, could not and
would not be completed until the new law was enacted. The NSA
apparently viewed that new law as providing exactly the powers
that Key repeatedly and publicly denied it would vest.

New Zealand’s national election will be held on September 20.
Over the last several weeks, Key has been embroiled in a scandal
that saw a top minister resign, after independent journalist
Nicky Hager published a book, Dirty Politics, documenting ties
between Key officials and a right-wing blogger known for
attacking public figures and showing that Key officials
declassified information for political purposes.

Revelations of illegal GCSB spying prompted the creation of the
anti-surveillance Internet Party, which formed an alliance with
the left-wing, indigenous Mana Party and is predicted to win
several seats in Parliament. The party is funded by Dotcom, and
has organized a “Moment of Truth” event for this Monday to
discuss revelations of surveillance and other secret government
actions. (Disclosure: Glenn Greenwald, one of the authors of
this story, is scheduled to speak at that event pursuant to an
invitation from the Internet Party, which paid his travel
expenses to attend and agreed to donate a speaking fee to a
designated charity.)

The disclosure that the GCSB plotted a program of mass
surveillance based on this new law is likely to raise further
questions about the ethics and credibility of the Key
government. The new surveillance planning took place at high
levels of the government, and expressly intended to use the new
surveillance law as its basis even as Key himself insisted that
the law provided no such authority.

 

PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora

################################################################################

PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora

################################################################################
Credits at the end of the page.

Due to extreme laziness the links are copy and paste.Ta
Warning: Microsoft Windows is affected by PRISM. Using it may compromise your privacy. We strongly recommend replacing Windows with either Linux or BSD.

@@@@@@@@@@@@@
Protect your:
@@@@@@@@@@@@@

I. Computer
II. Network

I. Computer

#####################
Anonymizing Networks:
#####################

——-
Freenet
——-
Decentralized censorship-resistant network.
https://freenetproject.org/

——
GNUnet
——
GNUnet is a fully free P2P network.
https://gnunet.org/


I2P

The invisible internet project.
https://geti2p.net/en/

——
Syndie
——
Distributed, anonymous forum software.
http://syndie.i2p2.de/


Tor

Free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than four thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages, and other communication forms”, back to the user and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored.
https://www.torproject.org/

###############
Disk Encryption
###############

———
BleachBit
———
A free software disk space cleaner, privacy manager, and computer system optimizer.
http://bleachbit.sourceforge.net/

———-
cryptsetup
———-
A convenience and ease-of-use layer for use on top of dm-crypt.
http://code.google.com/p/cryptsetup/

——–
eCryptfs
——–
POSIX-compliant enterprise cryptographic stacked filesystem for GNU/Linux.
http://ecryptfs.org/

—–
encfs
—–
File based encryption tool with support for GNU/Linux, OS X and Windows.
http://www.arg0.net/encfs

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$
Warning: Don’t use Symantec Drive Encryption!
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$

######################
DNS-Domain Name System
######################

Notes
Google Public DNS permanently logs your ISP and location information for analysis. Your ip-address is also stored for 24 hours.

——-
CloudNS
——-
DNS hosting with DNSCrypt, DNSSec, and Namecoin support.
https://cloudns.com.au/

——–
DNSCrypt
——–
Secure communications between a client and a DNS resolver.
http://dnscrypt.org/

——–
Namecoin
——–
Distributed DNS for the .bit TLD based on Bitcoin technology.
http://namecoin.info/

——-
OpenNIC
——-
Open, democratic, and anti-censorship DNS provider.
http://www.opennicproject.org/

——-
Unbound
——-
Validating, recursive, and caching DNS server.
http://www.unbound.net/

##############
Email Accounts
##############

——————-
Autistici/Inventati
——————-
A full range of privacy-aware services including hosting, VPNs, email, IM, and more.
http://www.autistici.org/en/index.html

———
Enigmabox
———
Plug and play cjdns appliance, offering a distributed and end-to-end encrypted telephony and email service.
https://enigmabox.net/en/

_______
MyKolab
——-
Secure Kolab accounts hosted in Switzerland for 8.99 CHF per month or 4.55 CHF for email-only accounts.
https://mykolab.com/

——
Riseup
——
Secure communication tools for people working on liberatory social change.
https://riseup.net/en

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Warning: Don’t use; Facebook, Gmail, Microsoft Outlook.com, Yahoo! Mail
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

##################
Email Alternatives
##################

———-
RetroShare
———-
Secure P2P communications platform offering IM, forums, VoIP, file sharing, and more.
http://retroshare.sourceforge.net/

———-
Bitmessage
———-
Encrypted, decentralized P2P messaging service based on Bitcoin technology.
https://bitmessage.org/wiki/Main_Page

#############
Email Clients
#############

Notes
Switching from a proprietary service like Gmail to one of the more transparently-run email services on PRISM Break is the first step to a secure email account.

The second step is getting you and your contacts to encrypt your plain text messages with PGP encryption. This section contains free email clients that support PGP.

——————-
Mozilla Thunderbird
——————-
Multi-platform email application with mail encryption through the Enigmail add-on.
https://www.mozilla.org/en-US/thunderbird/

——-
Kontact
——-
Email, address books, calendars, and more for the K Desktop Environment (KDE) with PGP support.
http://userbase.kde.org/Kontact

———-
Claws Mail
———-
Fast, lightweight email application for multiple platforms with built-in PGP support.
http://www.claws-mail.org/

################
Email Encryption
################

Notes
“Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”

——–
TorBirdy
——–
Add-on that makes Thunderbird and Icedove connect through Tor.
https://trac.torproject.org/projects/tor/wiki/torbirdy

—————–
GNU Privacy Guard
—————–
OpenPGP implementation for numerous frontends, including Thunderbird/Icedove.
https://www.gnupg.org/

——–
Enigmail
——–
OpenPGP email encryption add-on for Thunderbird and Icedove.
https://www.enigmail.net/home/index.php

###################
File Storage & Sync
###################

——–
ownCloud
——–
Cloud data in your control.
http://owncloud.org/

———
git-annex
———
Synchronize folders on your computers and drives.
https://git-annex.branchable.com/

——-
MyKolab
——-
Secure Kolab accounts hosted in Switzerland for 8.99 CHF per month or 4.55 CHF for email-only accounts.
https://mykolab.com/

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$
Warning: Don’t use; Dropbox, Google Drive, Microsoft OneDrive
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$

#################
Instant Messaging
#################

———
Cryptocat
———
Encrypted instant messaging within your web browser.
https://crypto.cat/

———
dukgo.com
———
Private XMPP service run on the DuckDuckGo Community Platform—guide included.
https://duck.co/blog/using-pidgin-with-xmpp-jabber

——-
TorChat
——-
Anonymous P2P chat built on Tor Hidden Services (not sponsored by the Tor Project).
https://github.com/prof7bit/TorChat/wiki

——
Riseup
——
Secure communication tools for people working on liberatory social change.
https://riseup.net/en

—–
Jitsi
—–
Encrypted text, voice, and video messaging for multiple platforms.
https://jitsi.org/

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Warning: Don’t use; AOL Instant Messenger Apple Messages Facebook Google Hangouts Skype
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

################
Media Publishing
################

——
img.bi
——
Client-side encrypted image hosting
https://img.bi/

——————-
Autistici/Inventati
——————-
A full range of privacy-aware services including hosting, VPNs, email, IM, and more.
http://www.autistici.org/en/index.html

———-
MediaCrush
———-
Fast image, audio, and video hosting
https://mediacru.sh/

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Warning: Don’t use; YouTube Flickr Imgur Instagram Minus Picasa Tumblr Vimeo
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

#################
Operating Systems
#################

Notes
Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA. We have two free alternatives: GNU/Linux and BSD.

——
Whonix
——
VM-friendly OS based on Debian and Tor focused on anonymity, privacy and security.
https://www.whonix.org/

——
Debian
——
Popular ethical GNU/Linux distribution.
http://www.debian.org/

———-
Arch Linux
———-
Elegant, minimal, and flexible GNU/Linux distribution.
https://www.archlinux.org/

——
Fedora
——
Fast, stable and powerful GNU/Linux distribution.
https://fedoraproject.org/

——
Gentoo
——
GNU/Linux distribution about choice, control and security.
https://www.gentoo.org/

—–
Qubes
—–
Fedora/Xen-based OS designed to provide strong security through isolation.
http://qubes-os.org/trac

——–
OpenSUSE
——–
Stable, easy-to-use multi-purpose GNU/Linux distribution.
https://www.opensuse.org/

———
gNewSense
———
Fully free software GNU/Linux distribution based on Debian.
http://www.gnewsense.org/

Warning: Canonical’s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks by default. GNU/Linux distributions based on Ubuntu are also currently not recommended due to several other reasons.

########################
Operating Systems (Live)
########################

Notes
A live distribution like Tails or Liberté Linux is the fastest and easiest way to a secure operating system. All you have to do is create a bootable CD or USB drive with the files provided and you’re set. Everything else will be preconfigured for you.

————-
Liberté Linux
————-
Live CD/USB designed as a communication aid in hostile environments.
http://dee.su/liberte

————-
JonDo Live CD
————-
Live CD/USB based on Debian with pre-configured tools for anonymous surfing and more.
https://anonymous-proxy-servers.net/en/jondo-live-cd.html

—–
Tails
—–
Live CD/USB aimed at preserving your privacy and anonymity.
https://tails.boum.org/

###############
Social Networks
###############

———-
GNU social
———-
Self-hosted, decentralized social network.
http://gnu.io/

——
Syndie
——
Distributed, anonymous forum software.
http://syndie.i2p2.de/

———
diaspora*
———
Community-run, distributed social network.
https://diasporafoundation.org/

—–
Movim
—–
Private, decentralized social network server.
https://movim.eu/

———-
RetroShare
———-
Secure P2P communications platform offering IM, forums, VoIP, file sharing, and more.
http://retroshare.sourceforge.net/

For those of you without your own server, RetroShare is the easiest way to start your own encrypted social network.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$
Warning: Don’t use; Facebook Google+ LinkedIn Twitter
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%$$$$$$$$$$$$$$$$$

##################
Web Browser Addons
##################

Installing your own add-ons into the Tor Browser is not recommended, as they may bypass Tor or otherwise harm your anonymity and privacy. Check the EFF’s Panopticlick to see how trackable your browser configuration is by third parties.

If you’re using a Firefox-based browser, you can safeguard your browsing habits and stop advertising companies from tracking you by installing Adblock Edge, Disconnect, and HTTPS Everywhere.

Install NoScript and enable ‘Forbid scripts globally’ to improve the security of your browser by preventing 0day JavaScript attacks. This is a drastic option as it will render many websites unusable as they rely heavily on JavaScript. NoScript offers a whitelist you can use to selectively enable JavaScript for sites you trust, but this is considered especially bad for your anonymity if you’re using NoScript with the Tor Browser Bundle.

—————-
HTTPS Everywhere
—————-
Encrypts your communications from thousands of websites by enforcing HTTPS everywhere.
https://www.eff.org/https-everywhere

——–
NoScript
——–
Only enable JavaScript, Java, and Flash for sites you trust.
http://noscript.net/

————
Adblock Edge
————
Block advertisements and trackers across the web with filter subscriptions.
https://addons.mozilla.org/en-US/firefox/addon/adblock-edge/

———
Cryptocat
———
Encrypted instant messaging within your web browser.
https://crypto.cat/

————————
Self-Destructing Cookies
————————
Automatically delete cookies and local storage when they are no longer used by open browser tabs.
https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/

———-
Disconnect
———-
Visualize and block invisible tracking of your search and browsing history.
https://disconnect.me/disconnect

————–
Request Policy
————–
Control which cross-site requests are allowed by sites you visit.
https://www.requestpolicy.com/

———-
Mailvelope
———-
OpenPGP email encryption tool for major webmail services.
https://www.mailvelope.com/

############
Web Browsers
############

——————
Tor Browser Bundle
——————
Encrypted, anonymous web browsing powered by the Tor network.
https://www.torproject.org/projects/torbrowser.html.en

—————
Mozilla Firefox
—————
Fast, flexible and secure web browser with a vibrant add-on ecosystem.
https://www.mozilla.org/sl/firefox/new/

——–
JonDoFox
——–
Private browsing with the JonDo IP anonymization service and JonDoFox profile for Firefox.
https://anonymous-proxy-servers.net/en/jondofox.html

%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Warning: Google Chrome Opera
%%%%%%%%%%%%%%%%%%%%%%%%%%%%

##########
Web Search
##########

———-
DuckDuckGo
———-
Anonymous, unlogged web searches.
https://duckduckgo.com/

——-
Ixquick
——-
Metasearch engine based in New York and the Netherlands.
https://ixquick.com/

—————–
Disconnect Search
—————–
Anonymous VPN service for popular search engines like Google, Bing, and Yahoo.
https://disconnect.me/search

——-
MetaGer
——-
Meta search engine that proxies your queries to multiple search providers.
https://metager.de/en/

————-
Seeks Project
————-
Open decentralized platform for collaborative search.
http://www.seeks-project.info/site/

———
Startpage
———
Private, unlogged web searches.
https://startpage.com/

—-
YaCy
—-
Decentralized web search.
http://yacy.de/en/index.html

############
II. Network:
############

########
Firmware
########

——–
LibreWRT
——–
A GNU/Linux-libre distribution for embedded devices.
http://librewrt.org/index.php?title=Main_Page

——-
OpenBSD
——-
A secure BSD operating system.
http://openbsd.org/

——-
OpenWrt
——-
A GNU/Linux distribution for embedded devices.
https://openwrt.org/

——-
pfSense
——-
Firewall and router firmware based on FreeBSD.
https://www.pfsense.org/

#############
Mesh Networks
#############

A meshnet is a decentralized peer-to-peer network, with user-controlled physical links that are usually wireless.

—–
Cjdns
—–
A networking protocol, a system of digital rules for message exchange between computers. “Instead of letting other computers connect to you through a shared IP address which anyone can use, cjdns only lets computers talk to one other after they have verified each other cryptographically.
http://cjdns.info/

———
Byzantium
———
Live Linux distribution that delivers easy-to-use mesh networking.

Home

———
guifi.net
———
Open, free and neutral wireless network for everyone.
https://guifi.net/

——–
Freifunk
——–
A non-commercial open grassroots initiative to support free radio networks around the world.
http://wiki.freifunk.net/Kategorie:English

———
Commotion
———
Uses mobile phones, computers, and wireless routers to create decentralized mesh networks.
https://commotionwireless.net/

—-
tinc
—-
Free software daemon that uses tunnelling and encryption to create a secure private network
http://tinc-vpn.org/

/////////////////////////////////////////////

SHOW SOME LOVE & LIKE/COMMENT:
——————————————–
https://www.facebook.com/AnonymousSlovenia

////////////////////////////////////////////

************************************
By Black-Shadow (Anonymous-Slovenia)
************************************

NSA kills based on metadata

http://beta.slashdot.org/story/201869 – Former NSA director admits to ordering kills based on metadata:
These are the top comments from reddit as of 10 hours after it was posted to reddit.
I’ve read the articles about this program. Essentially the NSA was identifying the SIM cards that suspected militants were using and they were using drones to track the movements of those phones.
When enough of those phones got into the same place they would strike the building and kill everyone in it.
The militants caught wise to this and started handing off their sims to family members and forcing civilians to swap sim cards at gun point. They also started randomizing their sim cards by shaking them in a bag and redistributing them so the NSA couldn’t specifically track one person easily.
The NSA kept striking suspected SIM cards without verifying who was using them. This led to charges that the NSA simply was being careless and was murdering innocent civilians. It’s also charged that the NSA adopted a “we don’t care if a few family members get killed because they’re guilty by association” attitude.
They were no longer targeting militants, they were targeting simcards assumed to be in the possession of suspected militants. this explains the attacks on wedding parties and social gatherings. there was zero on the ground recon just a false positive targeting by a flawed data analytic process.
I work with data analytics and the first rule is to take everything with a grain of salt, never let a computer tell you what to conclude. computers are great at finding coincidences and labeling them as suspicious circumstances, you need to verify suspicion outside of the dataset the computer is using.
The trouble with analytics is that they will tell the user what they want to hear. If the NSA are bidding on a analytical system that can give >90% accuracy, the bidding contractors will adapt their processes to weight their results accordingly.
I work for a company that makes medical software. Our software checks lots of data about patients, allergies, drug interactions, whatever. If a doctor prescribes a drug that the software thinks will negatively impact the patient, like potentially killing him, it will pop up a warning. But it aways gives the final decision to the human. Software is a tool designed to help the human, not make decisions for them.
Jeremy Scahill would have a good response. He was nominated for an Academy award for his documentary, “Dirty Wars”[1] . In it he goes abroad to interview the families and neighbors of innocents that have been killed.
Many people being killed abroad are never identified after they are struck with a drone. In fact, the administration and the military have a policy of posthumously declaring men, militants, if they are killed by a drone and are a certain age. The administration has done a several questionable things in the war on Pakistan, Afghanistan, and Yemen.
>> The administration has done a several questionable things in the war on Pakistan, Afghanistan, and Yemen.
The US has done some pretty questionable things around the world for the past 100 years. 9/11 was the the proverbial chickens coming home to roost (specifically due to arming and training them 20 years earlier, to fight the Russians). What we have done since then has been continuing the same stupid shit of “we can do no wrong”. Labeling all casualties as enemy combatants is a criminal act – but the US remains unaccountable.