What people don’t get is that the #FBI, #NSA, CIA, Government already have backdoors.
If FBI gets it’s way with it’s paid of judges, over Apples strong stance to add another #backdoor to their services, some news media says the next step is the Government invading your home devices, TV, home phone, anything connected to the internet.
What nobody get’s is that the Government already has a backdoor to your home TV, Computer, Tablet, #Apple device.
The only thing that differs here is, they are making it public knowledge, instead of hiding behind the shadows of leaked documents from spy and leakers like Edward Snowden.
Microsoft handed the NSA access #10 years [...]
Sandboxing is an important security technique that isolates programs, preventing malicious or malfunctioning programs from damaging or snooping on the rest of your computer. The software you use is already sandboxing much of the code you run every day.
You can also create sandboxes of your own to test or analyze software in a protected environment where it won’t be able to do any damage to the rest of your system.
We use 360 total security for Windows and for Linux there is an app too , there are even apps for your Smartphone.
Facebook is the biggest culprit besides the NSA in keylogging and data tracking. You need to protect yourself. For Android we use [...]
≡ Curated Content from: The Intercept_ by Glenn Greenwald
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on fourclassifiedGCHQdocuments presented to the NSA and the [...]
The Justice Department came out with a new policy on Thursday that will require its law enforcement agencies to obtain warrants to use cellphone tracking technology in criminal investigations. While civil liberties advocates praise the new rules as an acknowledgement of privacy concerns and a positive first step, they also take issue with what appear to be some substantial loopholes.
These cellphone tracking devices, often referred to as stingrays, mimic cellphone towers in connecting to phones and sucking up data. The devices help investigators [...]