-
January 12, 2014 by tmyd
Microsoft’s Having a Rough Day Thanks to the Syrian Electronic Army The Syrian Electronic Army is taking credit for the …
Continue reading
Category: Uncategorized
| Tags: backdoors, breach, gizmodo, hack, holes, Microsoft, security, Syrian Electronic Army, weak encryptions
-
October 21, 2013 by tmyd
CryptoSeal VPN shuts down rather than risk NSA demands for crypto keys With immediate effect as of this notice, CryptoSeal …
Continue reading
Category: Uncategorized
| Tags: crypto, cryptoseal, encryption, government, intrusive, Lavabit, logs, NSA, privacy, security, service, spying, unchecked power, VPN, zerofilled
-
September 18, 2013 by tmyd
Security of Java takes a dangerous turn for the worse, experts say Beware of increasingly advanced exploits targeting flaws that …
Continue reading
Category: Uncategorized
| Tags: dangerous, experts, exploits, flaws, holes, java, java 6 compromised, mitigate, reverse engineer, security, update
-
September 18, 2013 by tmyd
Box aims for NSA-resistant cloud security with customers holding the keys Cloud storage that really can’t be tapped by the …
Continue reading
Category: Uncategorized
| Tags: Box, cloud, cloud security, encryption, keys, NSA, security, snooping, spying, storage
-
September 10, 2013 by tmyd
A Few Thoughts on Cryptographic Engineering
Category: Uncategorized
| Tags: abuse, backdoors, cleartext, conspiracy, crypto, CryptoAPI, deceit, encryption, government, insecure, lies, Microsoft, NIST, NSA, OpenSSL, overreach, ProPublica, SChannel, security, Skype, software, spin, spying, SSL, standards, state, subversion, surveillance, unconstitutional
-
September 10, 2013 by tmyd
Johns Hopkins Tells Security Researcher To Remove Blog Post About NSA Encryption Attacks From University Server
Category: Uncategorized
| Tags: abuse, backdoors, compromise, deceit, Dictatorship, encryption, false security, Free Speech, government, John Hopkins, lies, NSA, oversight, schemes, security, spying, surveillance, unconstitutional, university
-
June 17, 2013 by tmyd
Snowden Defends NSA Leaks, Stands By Claims | News & Opinion | PCMag.com – Mozilla Firefox. It seems that …
Continue reading
Category: Uncategorized
| Tags: analyst, China, citizens, data, data collection, executive, feds, feudalism, FISA, government, guardian, Hong Kong, illegal, incidental, international, investigation, judicial, leak, legal, Legislative, NSA, officials, post, PRISM, records, secret, security, snowden, spying, tech, U.S., warrant, warrantless, whistle-blower, wiretap
-
June 14, 2013 by tmyd
Category: hack, IT, Microsoft, politek, tek
| Tags: claims, disclose, firms, flaws, government, holes, Micrsoft, security, software, spying, tech
-
March 24, 2013 by tmyd
Category: tek, web
| Tags: apple, apple ID, password, security