Tag Archives: NSA
-
France angered by new revelations of NSA surveillance
Leave a commentOctober 21, 2013 by tmyd
France angered by new revelations of NSA surveillance As a former intelligence agency head also told Le Monde earlier this …
Continue readingCategory: Uncategorized | Tags: abuse, arstechnica, authority, autocracy, civilization, deceit, discontents, encroachment, EU, France, government, Le Monde, NSA, power, spying, surveillance, US
-
CryptoSeal VPN shuts down rather than risk NSA demands for crypto keys
Leave a commentOctober 21, 2013 by tmyd
CryptoSeal VPN shuts down rather than risk NSA demands for crypto keys With immediate effect as of this notice, CryptoSeal …
Continue readingCategory: Uncategorized | Tags: crypto, cryptoseal, encryption, government, intrusive, Lavabit, logs, NSA, privacy, security, service, spying, unchecked power, VPN, zerofilled
-
ATT,Verizon,Sprint Are Paid Cash by NSA For Your Private Communications
Leave a commentSeptember 24, 2013 by tmyd
ATT,Verizon,Sprint Are Paid Cash by NSA For Your Private Communications The National Security Agency pays AT&T , Verizon and Sprint …
Continue readingCategory: Uncategorized | Tags: AP, ATT, double deeping, email, encroachment, inspector general, New York Review, NSA, phone, report, spooks, Sprint, spying, Verizon, Washington Post, wireless
-
Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs
Leave a commentSeptember 18, 2013 by tmyd
Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs New technique bakes super stealthy hardware trojans into chip …
Continue readingCategory: Uncategorized | Tags: backdoors, chip silicon, circumvent, cpus, crypto, hardware, intel, ivy bridge, malware, NSA, researchers, snooping, spying, stealthy, trojan, undecteable
-
Box aims for NSA-resistant cloud security with customers holding the keys
Leave a commentSeptember 18, 2013 by tmyd
Box aims for NSA-resistant cloud security with customers holding the keys Cloud storage that really can’t be tapped by the …
Continue readingCategory: Uncategorized | Tags: Box, cloud, cloud security, encryption, keys, NSA, security, snooping, spying, storage
-
Belgian telco says it was hacked, while reports point to NSA or GCHQ as culprit — Tech News and Analysis
Leave a commentSeptember 16, 2013 by tmyd
Category: hack, IT, phone, politek, tek, web | Tags: belgian, clandestine, data, GCHQ, hacked, illegal, NSA, spying, telco, unauthorized
-
Meet Hacking Team, the company that helps the police hack you
Leave a commentSeptember 14, 2013 by tmyd
Meet Hacking Team, the company that helps the police hack you “I think it’s the responsibility of police departments to …
Continue readingCategory: Uncategorized | Tags: abuse, Da Vinci, Free Speech, Hacking Team, Italy, Milan, NSA, overreach, police, spying, state, surveillance, surveillance state, US
-
A Few Thoughts on Cryptographic Engineering
Leave a commentSeptember 10, 2013 by tmyd
A Few Thoughts on Cryptographic Engineering
Category: Uncategorized | Tags: abuse, backdoors, cleartext, conspiracy, crypto, CryptoAPI, deceit, encryption, government, insecure, lies, Microsoft, NIST, NSA, OpenSSL, overreach, ProPublica, SChannel, security, Skype, software, spin, spying, SSL, standards, state, subversion, surveillance, unconstitutional
-
Johns Hopkins Tells Security Researcher To Remove Blog Post About NSA Encryption Attacks From University Server
Leave a commentSeptember 10, 2013 by tmyd
Johns Hopkins Tells Security Researcher To Remove Blog Post About NSA Encryption Attacks From University Server
Category: Uncategorized | Tags: abuse, backdoors, compromise, deceit, Dictatorship, encryption, false security, Free Speech, government, John Hopkins, lies, NSA, oversight, schemes, security, spying, surveillance, unconstitutional, university
-
How to Foil NSA Sabotage: Use a Dead Man’s Switch
Leave a commentSeptember 10, 2013 by tmyd
How to Foil NSA Sabotage: Use a Dead Man’s Switch Registering for nothing-to-see-here deadlines could help to sound the alert …
Continue readingCategory: Uncategorized | Tags: abuse, back doors, compromise, deceit, deliberate, GCHQ, government, guardian, Ladar Levison, Lavabit, lies, NSA, privacy, sabotage, securiy, spying, technology