Bookmark
How to remain secure against NSA surveillance | Bruce Schneier
www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance, posted 2013 by peter in fascism howto networking security toread
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
Bookmark
VPN Services That Take Your Anonymity Seriously, 2013 Edition | TorrentFreak
torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/, posted 2013 by peter in business list networking privacy security
It’s taken a long time but today we bring the first installment in a series of posts highlighting VPN providers that take privacy seriously. Our first article focuses on anonymity and a later installment will highlight file-sharing aspects and possible limitations.
Bookmark
cortesi - How mitmproxy works
corte.si/posts/code/mitmproxy/howitworks/index.html, posted 2013 by peter in communication development free hack networking reference security software
The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.
Bookmark
3G and 4G USB modems are a security threat, researcher says - Network World
https://www.networkworld.com/news/2013/031513-3g-and-4g-usb-modems-267763.html, posted 2013 by peter in mobile networking security
The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia.
Bookmark
Sakis3G - All-in-one script
www.sakis3g.org/, posted 2012 by peter in communication linux mobile networking
Sakis3G is a tweaked shell script which is supposed to work out-of-the-box for establishing a 3G connection with any combination of modem or operator. It automagically setups your USB or Bluetooth™ modem, and may even detect operator settings. You should try it when anything else fails!
If you are lucky enough, you may be connected 30 seconds after downloading script.
Bookmark
Diktatorernas nätvapen smids i demokratierna - DN.SE
www.dn.se/nyheter/varlden/overvakning-i-vast, posted 2012 by peter in fascism inswedish networking privacy
När politiker i Sverige och andra västländer stiftar övervakningslagar skapas en marknad för teknik som sedan blir farliga vapen i händerna på diktatorer. Det menar Evgeny Morozov, ett av de tyngsta namnen i den internationella debatten om politiken kring internet. DN.se har träffat honom.
...
– Varför finns det en marknad för de här teknikerna? Jo för att USA och Europa anser att man behöver dem och beställer dem till sina underrättelsetjänster och polis. Diktaturerna är en slags andrahandsmarknad för verktyg som kommit till i väst, säger Evgeny Morozov till DN.se.
Bookmark
STOP SOPA, SAVE THE INTERNET - Boing Boing
boingboing.net/2011/11/11/stop-sopa-save-the-internet.html, posted 2011 by peter in copyright fascism networking politics security toread usa
Google knows it. Viacom knows it. The Chamber of Commerce knows it. Internet democracy groups know it. BoingBoing knows it. But, the Internet hasn't been told yet -- we're going to get blown away by the end of the year. The worst bill in Internet history is about to become law. Law is very real here in the United States and legal language is often different than stated intentions -- this law would give government and corporations the power to block sites like BoingBoing over infringing links on at least one webpage posted by their users. Believe the EFF, Public Knowledge, Google when they say this bill is about much more than copyright, it's about the Internet and free speech everywhere.
Bookmark
The Serval Project | The Serval Project making commnications available anywhere, anytime
www.servalproject.org/, posted 2011 by peter in communication free mobile networking opensource privacy wireless
Serval enables mobile communications no matter what your circumstance: mobile communications in the face of disaster, in the face of poverty, in the face of isolation, in the face of civil unrest, or in the face of network black-spots. In short, Serval provides resilient mobile communications for all people, anywhere in the universe.
Serval technology bridges the digital divide. We have proved that it is possible, using open source technology to create a mobile communications platform that benefits everyone, for all time, and changes the nature of telecommunications forever.
Bookmark
ownCloud web services under your control
owncloud.org/, posted 2011 by peter in distributed kde networking online storage
ownCloud gives you universal access to your files through a web interface or WebDAV. It also provides a platform to easily view & sync your contacts, calendars and bookmarks across all your devices and enables basic editing right on the web.
Bookmark
Hackers break SSL encryption used by millions of sites • The Register
www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/, posted 2011 by peter in communication networking security toread
At the moment, BEAST requires about two seconds to decrypt each byte of an encrypted cookie. That means authentication cookies of 1,000 to 2,000 characters long will still take a minimum of a half hour for their PayPal attack to work. Nonetheless, the technique poses a threat to millions of websites that use earlier versions of TLS, particularly in light of Duong and Rizzo's claim that this time can be drastically shortened.
|< First < Previous 21–30 (89) Next > Last >|