Friday, 3. June 2016

Jacob Appelbaum leaves the Tor Project


Long time digital advocate, security researcher, and developer Jacob Appelbaum stepped down from his position at The Tor Project on May 25, 2016.

torproject.org

... Link (0 comments) ... Comment



Google pulls Chrome extension used to target Jewish people


Following a detailed investigation by Mic, Google has pulled a Chrome extension that was used by racists to identify and track Jewish people online. The plugin, called "Coincidence Detector," added a series of triple parentheses around the surnames of Jewish writers and celebrities. For instance, visiting the page of Mic writer Cooper Fleishman, you'd see his surname presented as (((Fleishman))) -- turning the symbol into the digital equivalent of the gold star badge used to identify Jews in Nazi Germany. Until Google banned it for violating its policy on hate speech, the plugin had just under 2,500 users and had a list of 8,768 names that were considered worthy of tracking.

The plugin was created by altrightmedia, with no one person yet coming forward to claim authorship of the program.

engadget.com

... Link (0 comments) ... Comment



I live in the Central African bush. We pay for slow satellite internet (per MB d/l).


Just ONE of our computers has secretly d/l'ed 6GB for Windows 10. We track & coordinate anti-poaching rangers in the field with these PC's + GPS. F* You Microsoft!

.reddit.com

... Link (0 comments) ... Comment



Streisand-Effekt


Als Streisand-Effekt wird ein Phänomen bezeichnet, wonach der Versuch, eine unliebsame Information zu unterdrücken oder entfernen zu lassen, öffentliche Aufmerksamkeit nach sich zieht und dadurch das Gegenteil erreicht wird, dass nämlich die Information einem noch größeren Personenkreis bekannt wird. Seinen Namen verdankt das Phänomen Barbra Streisand, die den Fotografen Kenneth Adelman und die Website Pictopia.com 2003 erfolglos auf 50 Millionen US-Dollar verklagte, weil eine Luftaufnahme ihres Hauses zwischen 12.000 anderen Fotos von der Küste Kaliforniens auf besagter Website zu finden war. Damit stellte sie aber erst die Verbindung zwischen sich und dem abgebildeten Gebäude her, woraufhin sich das Foto nach dem Schneeballprinzip im Internet verbreitete. Adelman argumentierte, er habe den Strand fotografiert, um die Küstenerosion für das California Coastal Records Project zu dokumentieren.

wikipedia.org

Streisand Silence censorship. Automate the effect. The Internet can be a little unfair. It's way too easy for ISPs, telecoms, politicians, and corporations to block access to the sites and information that you care about. But breaking through these restrictions is tough. Or is it?

Streisand

Introducing Streisand A single command sets up a brand new server running a wide variety of anti-censorship software that can completely mask and encrypt all of your Internet traffic.

Streisand natively supports the creation of new servers at Amazon EC2, DigitalOcean, Google Compute Engine, Linode, and Rackspace—with more providers coming soon! It also runs on any Ubuntu 14.04 server regardless of provider, and hundreds of instances can be configured simultaneously using this method. The process is completely automated and only takes about ten minutes, which is pretty awesome when you consider that it would require the average system administrator several days of frustration to set up even a small subset of what Streisand offers in its out-of-the-box configuration. Once your Streisand server is running, you can give the custom connection instructions to friends, family members, and fellow activists. The connection instructions contain an embedded copy of the server's unique SSL certificate, so you only have to send them a single file. Each server is entirely self-contained and comes with absolutely everything that users need to get started, including cryptographically verified mirrors of all common clients. This renders any attempted censorship of default download locations completely ineffective.

github.com

The impossible task of creating a “Best VPNs” list today

From a technical point of view, I think the most underrated vulnerabilities are network leaks in the client-side VPN software,” said Campbell. Even after a user has connected to a VPN server, a few outgoing packets may not be using the VPN tunnel, which could compromise their privacy. “That could be life threatening. VPNs have been rightly criticized about this vulnerability by many in the security/anonymity community.

arstechnica.com

... Link (0 comments) ... Comment



Chrome-Plugin zeigt Neonazis "jüdisch klingende" Namen an


Markiert mit antisemitischer Liste abgeglichene Namen mit drei Klammern, um "Muster aufzuzeigen" Neonazis haben begonnen, jüdisch klingende Namen im Netz mit drei Klammern hervorzuheben. Das Symbol geht laut OpenMic auf den rechtsextremen Podcast "The Daily Shoah" zurück, der es als "Echo" bezeichnete. Es wird sowohl benutzt, um Nutzer zu beleidigen als auch "ernsthaft": Manche Antisemiten wollen so eine angebliche "jüdische Weltverschwörung" aufdecken.

derstandard.at

... Link (0 comments) ... Comment



(((Echoes))), Exposed: The Secret Symbol Neo-Nazis Use to Target Jews Online


In the early days of the social web, putting someone's name in multiple parentheses was meant to give that person a cute virtual hug. Today, it's something far more sinister. Neo-Nazis, anti-Semites and white nationalists have begun using three sets of parentheses encasing a Jewish surname — for instance, (((Fleishman))) — to identify and target Jews for harassment on blogs and major social media sites like Twitter. As one white supremacist tweeted, "It's closed captioning for the Jew-blind."

mic.com via "Coincidence Detector": The Google Chrome Extension White Supremacists Use to Track Jews

... Link (0 comments) ... Comment



European Commission's Hate Speech Deal With Companies Will Chill Speech


A new agreement between the European Commission and four major U.S. companies—Facebook, Google, Twitter, and Microsoft—went into effect yesterday. The agreement will require companies to “review the majority of valid notifications for removal of hate speech in less than 24 hours and remove or disable access to such content,” as well as “educate and raise awareness” with their users about the companies’ guidelines. The deal was made under the Commission’s “EU Internet Forum,” launched last year as a means to counter what EDRi calls “vaguely-defined ‘terrorist activity and hate speech online.’” While some members of civil society were able to participate in discussions, they were excluded from the negotiations that led to the agreement, says EDRi.

eff.org

... Link (0 comments) ... Comment



Software for the marijuana industry set to yield high returns


Is there software in the burgeoning legal marijuana industry? Just a dab. With four states offering legal marijuana, and more than 20 with medical or decriminalized cannabis laws, the business of selling the plant and its derivatives is growing every year. Naturally, software developers, vendors and startups alike are all looking to cash in on the boom. Silicon Valley, itself located in a state with legalized medical marijuana, has even produced a few pot startups.

sdtimes.com

... Link (0 comments) ... Comment



Lies, damned lies and ad blocking statistics


Spoiler alert: Ad blocking is a serious problem; it’s just a little unclear exactly how big of one. Take Britain. If you look at the IAB’s figures, which it conducted with YouGov, 22 percent of U.K. adults are blocking ads. Wait a minute, market research company GlobalWebIndex says the figure is 37 percent. According to Pagefair and Adobe’s 2015 report, it was already at 20 percent in the second quarter last year. U.S. ad blocking firm Optimal puts U.K. ad-block rates at 16 percent.

digiday.com

... Link (0 comments) ... Comment



How a good night's sleep became the ultimate status symbol


Arianna Huffington espouses the virtues of eight hours and luxury products promise rejuvenating rest, but who can really afford to sleep safe and sound?

theguardian.com

... Link (0 comments) ... Comment



The ECHO IV Home Computer: 50 Years Later


This year we celebrate the 50th anniversary of a home computer built and operated more than a decade before ‘official’ home computers arrived on the scene. Yes, before the ‘trinity’ of the Apple II, the Commodore PET and the Radio Shack TRS-80–all introduced in 1977—Jim Sutherland, a quiet engineer and family man in Pittsburgh, was building a computer system on his own for his family. Sutherland configured this new computer system to control many aspects of his home with his wife and children as active users. It truly was a home computer—that is, the house itself was part of the computer and its use was integrated into the family’s daily routines.

The System

Sutherland’s computer was called the ECHO IV – the Electronic Computing Home Operator. ECHO IV comprised four large (6’ x 2’ x 6’) cabinets weighing approximately 800 lbs and included a central processing unit (CPU) constructed from surplus circuit modules from a Westinghouse Prodac-IV industrial process control computer; magnetic core memory, I/O circuitry and power supplies. With the permission of his employer, Westinghouse, Sutherland took these modules home and designed and built the ECHO IV in less than a year.

computerhistory.org

... Link (0 comments) ... Comment