Internet Curiosities

NSA trove shows 9:1 ratio of innocents to suspicious people in "targeted surveillance"

Boing Boing -

A huge cache of NSA surveillance data found that for every person of suspicion whose communications are caught in the spy-net, nine more people who are not suspected of any wrongdoing are also surveilled. Many of these innocents are Americans, whom the NSA is legally prohibited from spying upon. Cory Doctorow looks at what the NSA means when it says "targeted." Read the rest

miniLock - Open Source File Encryption Tool from CryptoCat Developer

The Hacker News -

It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as well as every individual. But, encryption is not so easy. To solve this problem, a 23-year old Cryptocat developer Nadim Kobeissi is ready to release a simple solution to deliver strong encryption at the HOPE hacker conference in New York later

The Yes song that spawned The Art of Noise

Boing Boing -

In 1983, Trevor Horn, JJ Jeczalik, Gary Langan, and Anne Dudley, who would eventually become The Art of Noise, were applying their production magic (and Fairlight sampler wizardry) to the Yes album 90215. Below, you can clearly hear the birth of Art of Noise's pioneering style in Yes's "Owner of a Lonely Heart (Red And Blue Remix)."

Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

The Hacker News -

Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily to make the whole process very easy, there is a growing market out there for password managers and lockers with extra layers of security. But, if you are using the mobile version of most popular password manager from Password management company

Infosec A-Team to Launch NSA-Proof Invisible Messenger for Whistleblowers

The Hacker News -

If a whistleblower discloses an activity to the public, then there should be a trust-based mechanism that ensure the protection of truth-tellers on an international level by hiding their identities. In an effort to provide this kind of service and security, Security experts grouped together to create a stealthy Internet Messenger (IM) and file transfer client, which is especially designed

Pages

Subscribe to debianHELP aggregator - Internet Curiosities