Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'privacy'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 486 results

  1. VPN Searches Soar as Congress Votes to Repeal Broadband Privacy Rules Last week the US Senate voted to do away with broadband privacy rules that prevent ISPs from selling subscribers' internet browsing histories to third parties. Congress followed suit yesterday, with a 215-205 vote in favor of repeal. But as the news sinks in, US citizens are apparently considering counter-measures, with searches for VPNs quickly going skywards. In a blow to privacy advocates across the United States, the House of Representatives voted Tuesday to grant Internet service providers permission to sell subscribers’ browsing histories to third parties. The bill repeals broadband privacy rules adopted last year by the Federal Communications Commission under the Obama administration, which required ISPs to obtain consumer consent before using their data for advertising or marketing purposes. The House of Representatives voted 215-205 in favor of overturning the regulations after the Senate voted to revoke the rules last week. President Donald Trump’s signature is needed before it can go into law but with the White House giving its full support, that’s a given. “The Administration strongly supports House passage of S.J.Res. 34, which would nullify the Federal Communications Commission’s final rule titled ‘Protecting the Privacy of Customers of Broadband and Other Telecommunication Services’,” the White House said in a statement yesterday. “If S.J.Res. 34 were presented to the President, his advisors would recommend that he sign the bill into law.” If that happens, the US will free up the country’s Internet service providers to compete in the online advertising market with platform giants such as Google and Facebook. Of course, that will come at the expense of subscribers’ privacy, whose every browsing move online can be subjected to some level of scrutiny. While supporters say that scrapping the regulations will mean that all Internet companies will operate on a level playing field when it comes to privacy protection, critics say that ISPs should be held to a higher level of accountability. Whereas consumers have a choice over which information can be shared with websites, browsing history via an ISP is total, potentially exposing sensitive issues concerning health, finances, or even sexual preferences. With this in mind, it’s no surprise that US Internet users are beginning to realize that everything they do online could soon be exposed to third-parties intent on invading their privacy in the interests of commerce. Predictably, questions are being raised over what can be done to mitigate the threat. Aside from cutting the cord entirely, there’s only one practical way to hinder ISPs, and that’s through the use of some form of encryption. Importantly, visitors to basic HTTP websites will have no browsing protection whatsoever. Those using HTTPS can assume that although ISPs will still know which URLs they’ve visited, content exchanged will be cloaked. Of course, for those looking for a more workable solution, VPNs – Virtual Private Networks – can provide a much greater level of encrypted protection, especially among providers who promise to keep no logs. As a result, various providers, including blackVPN, ExpressVPN, LiquidVPN, StrongVPN and Torguard, have weighed in on the debate via social media. NordVPN have also spoken out against the bill in the press, and Private Internet Access even took out a full page ad in the New York Times this week. It’s now becoming clear that while it was once a somewhat niche activity, VPN use could now be about to hit the mainstream. Taking a look at Google Trends results for the search term ‘VPN’, we can see that interest across the United States is now double what it was back in 2012. The significant surge to the right of the chart is likely attributable to the past few weeks of debate surrounding the repeal of broadband privacy rules. While most VPN providers have been campaigning against the changes, there can be no doubt that the signing of the bill into law will be extremely good for business. As seen from the above, record numbers of people are learning about VPNs and there’s even encouragement coming in from people at the very top of Internet commerce. Following the vote yesterday, Twitter general counsel Vijaya Gadde took to her company’s platform to‏ suggest that citizens should take steps to protect their privacy. Her tweet, which was later attributed to her own opinion and not company policy, was retweeted by Twitter Chief Executive Jack Dorsey. It will be interesting to see how the new rules will affect VPN uptake longer term when the fuss around the debate this month has died down. Nevertheless, there seems little doubt that VPN use will rise to some extent and that could be bad news for copyright holders seeking to enforce their rights online. In addition to stopping ISPs from spying on users’ browsing histories, a good VPN also prevents users being monitored online when using BitTorrent. A further handy side-effect is that they also render site-blocking efforts useless. Source
  2. Google, which has accused Symantec and its partners of misissuing tens of thousands of certificates for encrypted web connections, quietly announced Thursday that it’s downgrading the level and length of trust Chrome will place in certificates issued by Symantec. Encrypted web connections — HTTPS connections like those on banking sites, login pages or news sites like this one — are enabled by Certificate Authorities, which verify the identity of the website owner and issue them a certificate authenticating that they are who they say they are. Think of a Certificate Authority like a passport agency and the certificates they issue like passports. Without the CA’s authentication of a website owner’s identity, users can’t trust that the site on the other end of their HTTPS connection is really their bank. Symantec is a giant in the world of CAs — its certificates vouched for about 30 percent of the web in 2015. But Google claims that Symantec hasn’t been taking its responsibilities seriously and has issued at least 30,000 certificates without properly verifying the websites that received them. It’s a serious allegation that undermines the trust users can place in the encrypted web, and Google says it will begin the process of distrusting Symantec certificates in its Chrome browser. Symantec lashed out at Google’s claims, calling them “irresponsible” and “exaggerated and misleading.” “Since January 19, the Google Chrome team has been investigating a series of failures by Symantec Corporation to properly validate certificates. Over the course of this investigation, the explanations provided by Symantec have revealed a continually increasing scope of misissuance with each set of questions from members of the Google Chrome team; an initial set of reportedly 127 certificates has expanded to include at least 30,000 certificates, issued over a period spanning several years,” Google software engineer Ryan Sleevi wrote in a forum post outlining the case against Symantec. “This is also coupled with a series of failures following the previous set of misissued certificates from Symantec, causing us to no longer have confidence in the certificate issuance policies and practices of Symantec over the past several years.” To remedy the situation, Sleevi said that Chrome would reduce the length of time the browser trusts a Symantec-issued certificate and, over time, would require sites to replace old Symantec certificates with newer, trusted ones. Sleevi said that Symantec’s behavior failed to meet the baseline requirements for a Certificate Authority, creating what he called “significant risk for Google Chrome users.” He added: Chrome’s spat with Symantec stretches back over more than a year. In October 2015, Google discovered that Symantec has misissued certificates for Google itself and for Opera Software. Symantec investigated the issue and claimed that all of the misissued certificates had been issued as part of routine testing. “Our investigation uncovered no evidence of malicious intent, nor harm to anyone,” Symantec said at the time. Symantec pushed back on Google’s current allegations Friday, saying that Google had singled out Symantec and had exaggerated the number of misissued certificates leading to the problem in the first place. “Google’s statements about our issuance practices and the scope of our past mis-issuances are exaggerated and misleading. For example, Google’s claim that we have mis-issued 30,000 SSL/TLS certificates is not true. In the event Google is referring to, 127 certificates — not 30,000 — were identified as mis-issued, and they resulted in no consumer harm,” Symantec wrote in a blog post. “While all major CAs have experienced SSL/TLS certificate mis-issuance events, Google has singled out the Symantec Certificate Authority in its proposal even though the mis-issuance event identified in Google’s blog post involved several CAs.” Google’s Sleevi said in another post that Symantec partnered with other CAs — CrossCert (Korea Electronic Certificate Authority), Certisign Certificatadora Digital, Certsuperior S. de R. L. de C.V., and Certisur S.A. — that did not follow proper verification procedures, which led to the misissuance of 30,000 certificates. “Symantec has acknowledged they were actively aware of this for at least one party, failed to disclose this to root programs, and did not sever the relationship with this party,” he wrote. “At least 30,000 certificates were issued by these parties, with no independent way to assess the compliance of these parties to the expected standards. Further, these certificates cannot be technically identified or distinguished from certificates where Symantec performed the validation role.” While Google and Symantec continue their fight — Symantec said it is “open to discussing the matter with Google in an effort to resolve the situation” — website owners that use Symantec to verify their HTTPS connections will need to start taking steps to ensure Chrome users can access their sites without getting hit with security warnings. Symantec has severed ties with the four firms associated with the misissued certificates, so Chrome will trust new Symantec certificates going forward — site owners just need to swap out their old certificates for new ones. Here’s the schedule, according to Sleevi: Symantec, for its part, seems hopeful that Google will back off and not require any changes at all. “We want to reassure our customers and all consumers that they can continue to trust Symantec SSL/TLS certificates. Symantec will vigorously defend the safe and productive use of the Internet, including minimizing any potential disruption caused by the proposal in Google’s blog post,” the company said. Source
  3. Dear friends, Nowadays our privacy is very important. I am interested to know which VPN service do you use and which is the best according to your opinion. Not to all vpn services are enough secure. Recently, has been discovered that HotSpot Shield in some cases could show your real ip. Have a look here : 1.Android 2. Windows Thanks for your time spent with this poll ! :)
  4. Nokia To Smartphone Owners: Malware Infections Are Far Higher Than You Think Nokia warns that mobile malware infections grew dramatically in the second half of 2016. Overall, the monthly smartphone infection rate averaged 0.90 percent, an 83 percent increase over the first half of 2016. Nokia no longer makes mobile devices but it's carving out a new business in mobile and Internet of Things security. Now new research from the unit is reporting a 83 percent rise in monthly smartphone infections in the second half of 2016. Two years ago Verizon challenged assumptions about the spread of mobile malware, reporting that just 0.03 percent of smartphones on its network were infected with 'higher-grade' malware. It was much lower than the 0.68 percent infection rate estimated in Kindsight Security Labs' biannual report. But a new report from Nokia, based on data from mobile networks that have deployed its NetGuard Endpoint Security, suggests infections are actually far higher. According to Nokia, the monthly rate of infections in mobile networks peaked at 1.35 percent in October, and averaged 1.08 percent in the second half of 2016. The average infection rate in the first half was 0.66 percent, translating to a 63 percent rise between the periods. It also measured monthly infections on smartphones and says the average rate was 0.9 percent in the second half, up 83 percent from 0.49 percent in the first half. Over the entire year, it says smartphone infections rose a whopping 400 percent. Nokia's data included around 100 million devices across Europe, North America, Asia Pacific and the Middle East. It says that 81 percent of infections were on Android devices, 15 percent on Windows devices, and four percent on iPhones and other mobile devices. It notes that Windows share of infections it counted shrank from 22 percent in the first half of 2016. Although Nokia's report doesn't exclusively deal with Android, it offers a contrast to Google's assessment of malware infections in its Android Security 2016 Year in Review report, released earlier this month. Google reported Android device infections at 0.64 percent in the first quarter of 2016 growing to 0.77 percent in the second quarter, and then moving to 0.67 percent and 0.71 percent in the third and fourth quarters, respectively. Google's measure is based on the frequency it finds PHAs or potentially harmful applications during a "routine full-device scan" with its Verify Apps Android anti-malware service. Google said since 2014 infections on Android have been less than one percent. It also noted that users were 10 times more likely to download malware from outside Google Play than inside its store in 2016. While Nokia reports that infections on mobile networks are increasing, infections on fixed-line residential networks have been falling since the beginning of 2015, despite a bump in early 2016 due to a surge in adware. Source
  5. uBlock Origin 1.11.5rc2 Changes New static network filter option: badfilter. Using this option will prevent another filter to be loaded in memory. See uBlockOrigin/uAssets#192 for rationale for having such a filter option. Chromium/Firefox WebExtension Ability to support more request types from webRequest API: csp-report, font, media, websocket, and actually whatever is part of webRequest.ResourceType. This means uBO will be able to natively filter websocket connection attempts starting with Chromium 58. Firefox The webext version for Firefox has been converted into a hybrid version, to allow seamless migration of uBO's settings/data from a legacy extension to webext extension. Update: due to auto-update snafu, the webext version of uBO has been given a different id than the official one, this will guarantee that auto-update won't cause issue (you will have to update manually if using the webext version). Important: If you install the webext version of uBO (you need the most recent build of Nightly), this is what will happen: When you launch uBO/webext for the first time, it will read all your settings/data from the old storage and migrate them to the new webext storage. This happens only if uBO/webext can find a file named ublock0.sqlite. This will happens only once, the first time you install uBO/webext. Depending of how much data there is to migrate, this may cause your browser to work hard during that first launch and delay readiness. Once the data from the uBO/legacy has been migrated to uBO/webext, each version of uBO will only see its own data, meaning no change in settings in one version will be seen by the other version. If you remove uBO/webext, this also removes the storage associated to it, meaning re-installing uBO/webext following removal will cause the storage migration code to kick in again. Closed as fixed: Chromium Use the strictest setting for preventing the leakage of private IP addresses throgh WebRTC. It turns out the use of the strictest setting has (currently) the unforeseen virtuous side-effect of preventing WebRTC-delivered ads on some sites. See uBlockOrigin/uAssets#333 (comment). Edge Clicking element that doesn't load due to size restriction doesn't work Firefox jpm sign fails (fixed by @andreicristianpetcu through pull request #2434) Core Cosmetic filters containing pseudo-elements like ::before and ::after are ignored Unable to remove/modify dynamic filter when using wildcard Dynamic URL Filtering fails to take precedence over Dynamic Filtering for worker requests Enable users to create their own custom scriptlets See "Advanced settings"/userResourcesLocation. Downloads 1.58 MB uBlock0.chromium.zip 1.47 MB uBlock0.firefox.xpi 1.58 MB uBlock0.webext.zip Source code (zip) Source code (tar.gz) https://github.com/gorhill/uBlock/releases/tag/1.11.5rc2
  6. ‘We shouldn't have to buy trust as an add-on service’ Earlier this week, the Senate voted to repeal privacy measures that would stop internet service providers from sharing their users’ internet activity with third parties. Those rules were passed in October, but not only does this vote undo them, it prevents the FCC from reinstating similar rules in the future. This is great for broadband companies, but if you’re one of these companies’ users, what are you supposed to do? One popular recommendation you might have heard is to use a virtual private network, or VPN. You can find a lot of comprehensive online explanations of what VPNs are, but in the simplest terms, they create a secure, encrypted connection between your computer (or phone, tablet, &c.) and a private server somewhere else, preventing anyone else from seeing or modifying that traffic. When you browse the internet, data goes to the server, which passes it securely back to you. When you send data out, it appears to come from the server, not your computer. While it doesn’t make you anonymous — the VPN can see your traffic, and law enforcement can request information from VPN companies — it obscures what you’re doing online. The right VPN can protect against lots of things, including government surveillance and malware. But the tool isn’t a magic privacy bullet — in fact, experts can’t even agree on a great VPN service, beyond one you make yourself. While a huge number of companies provide VPNs, many have potential security flaws or could put your data at risk. It’s also difficult to tell how secure a VPN actually is, and what it’s doing with your data. So what are you supposed to do if you want to use one? The short answer is to avoid free services, and if you consider yourself tech-savvy, look into setting up your own. Otherwise, make sure a paid VPN has a privacy policy you’re okay with, and can handle the threats you’re relying on it to protect you from. And on a larger scale, remember that the best solution is still policies that would tackle the problem at the source: ISPs’ ability to sell your data. If you want some more background on all of this, read on. What do I need out of a VPN? It depends on who “you” are. Here are some of the many uses for VPNs: Avoiding government surveillance or censorship Remotely connecting to your company’s private network Protecting your data on public Wi-Fi Hiding BitTorrent piracy Watching movies from another country’s Netflix library All of these things present different challenges and security risks, and a VPN isn’t even a good choice for some of them, since it doesn’t make you anonymous. “VPNs are essentially a way of moving your trust.” But here, we’re talking about a very specific problem: how to stop internet service providers from mass-collecting information about perfectly legal things you do online. This is actually one of the simpler scenarios. You’re not worried about an oppressive government targeting you for a sophisticated hack, or the VPN giving up information to law enforcement. You’re not connecting to an unfamiliar Wi-Fi network that somebody could be siphoning data from. You’re just trying to make your browsing history hard enough to see that an ISP won’t automatically scoop it up and sell it to advertisers. For this particular use, the central question is who will keep your data safer: an internet service provider, or a VPN company. “VPNs are essentially a way of moving your trust,” says Jacob Hoffman-Andrews, senior staff technologist at EFF. “Normally, you trust your ISP not to snoop on you, but if you can't trust your ISP anymore, you can pay somebody else.” An untrustworthy VPN could turn around and sell your data, just like an ISP. In fact, it could do much worse things, like use your bandwidth as part of a botnet. Many of them don’t have a reputation to protect the way that ISPs do, and they’re under significantly less scrutiny. Which VPNs can I trust? “It’s very, very hard to make recommendations about VPNs,” says Joseph Lorenzo Hall, chief technologist at the Center for Democracy and Technology. Journalist Yael Grauer has a great, detailed rundown of the problems at Ars Technica, but one of the biggest issues is simply that VPN companies can be vague and non-transparent. They might oversell what their service does, obscure how their security works, or hide nefarious caveats in the terms of service. In the Ars Technica piece, security expert Kenneth White calls it “Pinky-Promise-as-a-Service,” because there’s often no outside evaluation. “It's really hard to know how to trust a given VPN provider,” says Hoffman-Andrews. “Some of them say that they don't log data or snoop on you in various ways, but it's hard for individuals to verify that.” “It’s very, very hard to make recommendations.” A good VPN will also protect you from malware on public networks, but not every service is up to the task. White has also complained that many VPNs — including relatively well-known services like NordVPN, IPVanish, and PureVPN — connect their users using a single pre-shared key, which someone who controls a Wi-Fi network could use to decrypt their traffic. But if you’re only planning to use it at home, Hall says the pre-shared key issue might be moot, since it’s highly unlikely your ISP will outright try to hack you. (He’s a fan of the service Astrill, which appears on White’s list.) A free VPN should always raise a big red flag. “If it doesn’t cost you anything, wow, how are they making money off of routing your bandwidth?” asks Hall. Evidence of external audits is also a good sign, although that’s rare. VPN service Cloak — which costs around $10 a month for one person — is one of the rare examples of this. It announced an audit in early 2016, although the results weren’t publicly released. Co-founder Dave Peck says that’s because the audit applied to system architecture that has since been rewritten, and that it found the old system safe from their highest-priority threats, like the theft of customer data. He says a new audit will be conducted in the future. The safest option is to set up your own VPN server and connect to it. “We recommend that if you have any technical capability whatsoever, you look into like Streisand and Algo,” says Hall, listing two systems that let you “roll your own” VPN. You’ll pay for the nominal cost of a server, and have complete control over what happens to your data. But that’s still a lot more trouble than just paying a monthly fee. What else can I do? If you’re really committed to total privacy but don’t want to set up a server, you could always use something like Tor, which has the added benefit of anonymizing you. But it can be a much slower, less convenient browsing experience than most people are used to. Much more conveniently, you can make sure to use encrypted apps for individual services like chat — which is good practice for preventing all kinds of surveillance. While it isn’t a perfect solution, sites that use HTTPS also limit the amount of information that ISPs can see — they can collect the general domain name and when you’re visiting it, but not which individual pages you’re on or what information you’re sending. Additionally, if you’re worried about ISPs gathering data, you should also take steps to minimize what actual websites and advertising platforms can track. But there’s no totally safe and super-simple technical way to have the same internet service you’re used to while keeping ISPs in the dark. “We shouldn't have to buy trust as an add-on service,” says Hoffman-Andrews. “That should be a default part of internet service just as it's a default part of phone service.” Article source
  7. If you're looking to switch things up on your PC, these alternative browsers could have you saying farewell to Chrome, Firefox, Internet Explorer, and Edge in no time. The big boys—Chrome, Firefox, and IE/Edge—aren't the only browsers out there. If you dig deep, you'll find a whole world of unusual web-surfing tools that are designed to fill different needs. From intense privacy to media streaming, torrent tracking to text-only displays, there's a browser for just about everything. Come with us on a download tour through the world of niche web browsers. Who knows? Maybe you'll find a new favorite to use. Comodo IceDragon Malware is a big issue in web browsing, as it's all too easy to click a bad link or open a suspicious download and find your whole system compromised. Instead of wiping your hard drive every few weeks, why not give Comodo's IceDragon browser a shot? It has malware scanning in the browser window with SiteInspector and runs through the company's SecureDNS service, which utilizes a constantly updated blocklist to bar unsafe sites. IceDragon also features one-click social sharing buttons and other user-friendly features. If you've got a relative who consistently clicks on stuff they shouldn't, set them up with this. Epic Privacy Browser Another security browser option is Epic. With Epic Privacy Browser, privacy isn't an option—it's the default. From an active Do Not Track feature to a built-in Web proxy, this browser focuses on security and privacy at every level. See PCMag's full review. Lunascape Most web browsers are built on one of a few basic frameworks—Chromium, WebKit, or Trident. Lunascape lets you switch between them at will. Why would you want to do that, exactly? Well, pages render with subtle differences in the different engines, so if you're testing a design, it's nice to be able to do it all in one window. This is a beefy browser with lots of bells and whistles, so don't expect it to run particularly quickly or smoothly. In addition to multiple rendering frameworks, Lunascape also offers a bunch of unusual tab options, including the ability to show all tabs at once side by side, along with a raft of keyboard shortcut and mouse customization settings. Maxthon Cloud Browser Maxthon has been a refreshing addition to the web browser landscape since its launch in 2008. Where others have been paring down their features for a speedier, minimalist experience, Maxthon takes the opposite approach—adding as many browsing helpers as possible. The latest of these is a built-in ad blocker, which joins its media downloader, screen-capture tool, Reader mode, and several other distinctive features. See PCMag's full review. Opera Neon Opera Neon is a radical rethink of the web browser, with a unique interface and some clever tools. The browser's desktop looks more like a PC desktop, with free floating circular bookmarks. In fact, it seems like you're looking at your desktop, rather than at a browser, since it takes over the whole screen. It's not yet a fully released product; think of it as a technology preview. It also doesn't replace the standard browser (which offers unique features like Turbo cached browsing, Speed Dial start pages, and built-in ad blocking) but anyone can download Neon to try it out. See PCMag's hands on. Torch People use the web for more than just static pages; streaming video and music is a big part of the experience now. Why not use a browser that's specifically designed for that stuff? Torch includes a torrent manager so you can download video through peer-to-peer sharing right in the browser. You can even play them right in the same browser window as they download. Torch also incorporates one-click media downloading, so you can easily save YouTube videos and other stuff. Throw in a collection of Flash games, a streaming music service, and Facebook theme designs for some reason, and you've got a browser that's great for casual users who live in a media-saturated environment and love it. Vivaldi The makers of this internet underdog claim that its software offers customization "beyond what has ever been offered in a web browser." Hyperbolic as that may be, Vivaldi does bring customizability and geekiness back to the browser. It lacks some basic features offered by its more mature competition, but it's fast and fun to use. See PCMag's full review. WebbIE The history of web browsers is one of steadily increasing complexity. First they gained the ability to handle images, and then scripting, video, and lots of other stuff followed until they turned into massive, bloated beasts. For some people, that's just not worth the trouble. That's why there's a market for browsers like WebbIE, which strips out all the cruft to render web pages as plain and simple text. You can tab and cursor around the content without ever clicking a mouse, and special functions let you list all the links in a page for easy navigation. It even works with forms, so you can buy stuff on Amazon sight unseen—literally. Source
  8. AppFalcon - Lifetime + 1 Year[365 Days] Database Updates - Unlimited PC License Promo by Chip.de & Orman Kuza Overview: UNINSTALL STUBBORN PROGRAMS! FORCE DELETE ANY FILE! Get rid of all installed CrApps See better alternatives with AppFalcon® Get rid of all installed CrApps, see alternatives, remove malware, update your apps to stay secure online! Features: Uninstall Any Program - Can remove any leftovers created by programs “Deletes what other tools can’t” - FORCIBLY DELETE ANY FILE, “UNINSTALLS AND DELETES PROGRAMS LIKE NO OTHER TOOL” Get better alternatives - Save Money on Software: GET HAND-PICKED ALTERNATIVES, REMOVE CRAPPS Detect and Remove CrApps Force Removal Improve PC Security 24/7 e-mail support More Info: Product Homepage, FAQ, Privacy Policy Supported OS: 32-bit and 64-bit versions of Windows Vista; Windows 7; Windows 8; Windows 8.1, and Windows 10. AppFalcon not only supports 32-bit and 64-bit operating systems but it supports them natively. This means that it uses the full potential of 64-bit on Windows x64 and 32-bit on Windows x86. Links: Offer: https://www.ormankuza.com/AppFalcon/chip-special/ Note: Limited Period Offer. Current Status: Open. Terms: Unlimited PC License - Can be installed in any number of devices. Personal Use Only. You'll receive lifetime free updates and 1 year database updates during the term of the license. 24/7 e-mail support. Steps: Visit the above promotional page and scroll-down to locate the request form. Enter your name and email and Click on "Submit". After receiving a registration email, you'll get another email with the license key details within 24 hours. FYI: Mostly within 2-3 or 5 hours. Install and Activate ASAP. To enter license and activate, just go to the upright corner of the application and click on the “?” (question mark). Downloads: AppFalcon v2.4.0.0 - Size: 7.02 MB: https://www.ormankuza.com/instantdelivery/afsetup.exe AppFalcon v2.4.0.0 Portable[Unofficial] - Size: 6.4 MB:
  9. The publication by WikiLeaks of documents it says are from the CIA's secret hacking program describe tools that can turn a world of increasingly networked, camera- and microphone-equipped devices into eavesdroppers. Smart televisions and automobiles now have on-board computers and microphones, joining the ubiquitous smartphones, laptops and tablets that have had microphones and cameras as standard equipment for a decade. That the CIA has created tools to turn them into listening posts surprises no one in the security community. Q: How Worried Should Consumers Be Who Have Surrounded Themselves with These Devices? A: Importantly, the intrusion tools highlighted by the leak do not appear to be instruments of mass surveillance. So, it's not as if everyone's TV or high-tech vehicle is at risk. "It's unsurprising, and also somewhat reassuring, that these are tools that appear to be targeted at specific people's (devices) by compromising the software on them -- as opposed to tools that decrypt the encrypted traffic over the internet," said Matt Blaze, University of Pennsylvania computer scientist. The exploits appear to emphasize targeted attacks, such as collecting keystrokes or silently activating a Samsung TV's microphone while the set is turned off. In fact, many of the intrusion tools described in the documents are for delivery via "removable device." Q: Once Devices Are Compromised They Need To Be Internet-Connected in Order To Share Collected Intelligence with Spies. What Can Be Done To Stop That? A: Not much if you don't want to sacrifice the benefits of the device. "Anything that is voice-activated or that has voice- and internet-connected functionality is susceptible to these types of attacks," said Robert M. Lee, a former U.S. cyberwar operations officer and CEO of the cybersecurity company Dragos. That includes smart TVs and voice-controlled information devices like the Amazon Echo, which can read news, play music, close the garage door and turn up the thermostat. An Amazon Echo was enlisted as a potential witness in an Arkansas murder case. To ensure a connected device can't spy on you, unplug it from the grid and the internet and remove the batteries, if that's possible. Or perhaps don't buy it, especially if you don't especially require the networked features and the manufacturer hasn't proven careful on security. Security experts have found flaws in devices -- like WiFi-enabled dolls -- with embedded microphones and cameras. Q: I Recently Began Using WhatsApp and Signal on my Smartphone for Voice and Text Communication Because of Their Strong Encryption. Can the Exploits Described in the WikiLeaks Documents Break Them? A: No. But exploits designed to infiltrate the operating system on your Android smartphone, iPhone, iPad or Windows-based computer can read your messages or listen in on conversations on the compromised device itself, though communications are encrypted in transit. "The bad news is that platform exploits are very powerful," Blaze tweeted. "The good news is that they have to target you in order to read your messages." He and other experts say reliably defending against a state-level adversary is all but impossible. And the CIA was planting microphones long before we became networked. Q: I'm Not a High-Value Target for Intelligence Agencies. But I Still Want To Protect Myself. How? A: It may sound boring, but it's vital: Keep all your operating systems patched and up-to-date, and don't click links or open email attachments unless you are sure they are safe. There will always be exploits of which antivirus companies are not aware until it's too late. These are known as zero-day exploits because no patches are available and victims have zero time to prepare. The CIA, National Security Agency and plenty of other intelligence agencies purchase and develop them. But they don't come cheap. And most of us are hardly worth it. Source
  10. Zemana Antimalware Ultimate Is Coming Soon! Go beyond the standard antimalware protection with exclusive new features: Powerful: Stronger defense system than before Fast: It surpasses standard security tools Efficient: Advanced malware removal and privacy protection More Info: Product Homepage - For Release Details: Subscribe to be among the first ones to try exclusive new features with Zemana AntiMalware Ultimate! Discussion - Wilders Security: Zemana Antimalware Ultimate is coming soon. Any information about this? The Benefits of Beta Testing: You will get a free LIFETIME LICENSE! Get your name on beta testers page Enjoy the product's features before the rest of the world Provide us with your suggestions, ideas and opinions about our products, its features and influence further development. FYI: Lifetime License is provided only during the initial release of ZAM beta testers received one. Update: Zemana AntiMalware lifetime licenses will work on Zemana AntiMalware Ultimate! - Source
  11. New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices A new trove of documents belonging to Wikileak’s Vault 7 leaks, dubbed “Dark Matter” reveal that Apple devices including Macs and iPhones have been compromised by the CIA. They are affected by firmware malware meaning that even a re-installation of the operating system will not fix the device. The CIA’s Embedded Development Branch (EDB) have created several tools for exploiting Apple devices, these include: Sonic Screwdriver – allows an attacker to boot its malware from peripheral devices such as a USB stick. DarkSeaSkies – is an “implant” that persists in the EFI firmware of MacBook Air computers. It consists of “DarkMatter”, “SeaPea” and “NightSkies” which affect EFI, kernel-space, and user-space respectively. Triton – macOS malware. Dark Mallet – Triton infector. DerStake – EFI-persistent version of Triton. The documents show that DerStake was at version 1.4 as of 2013, but other documents show that as of 2016, the CIA was working on DerStake 2.0. According to Wikileaks, NightSkies can infect Apple iPhones, the organisation said what’s noteworthy is that NightSkies has been able to infect iPhones since 2008. The CIA documents say NightSkies is a “beacon/loader/implant tool”. It is “expressly designed” to be physically installed onto factory fresh iPhones meaning the CIA has been intercepting the iPhone supply chain of its targets since at least 2008. "Dark Matter" is just the latest release of documents from the wider Vault 7 leaks, more CIA documents are expected in the future. Main Source: Wikileaks Source
  12. Republican Senators led by Arizona’s Jeff Flake proposed a resolution earlier this month that would roll back privacy rules adopted by the FCC last year that prevented ISPs from collecting personal data without asking permission first. Today the Senate was alive with oratory as people spoke for and against the proposal. Now, there is a lot of room for debate on how we should regulate ISPs and who should do it, and a healthy opposition is essential for good governance, but this here is just plain a bad idea, and several Senators said so, in a great many more words than that. You can review the whole debate over at C-SPAN. Senator Ed Markey of Massachusetts, who has been a strong supporter of net neutrality and the FCC’s most recent internet regulations, gave a long and passionate speech about the proposal (quotes were taken live and may not be word for word): “How much privacy are people in this country entitled to?” he asked. “Are we going to allow the broadband companies to determine that?” “Yes, there are two sides to this,” he said. “You want the entrepreneurial spirit to thrive, but you have to be able to say no, I don’t want you in my living room. Yes, we’re capitalists, but we’re capitalists with a conscience.” This is the guy who led the creation of the 1996 Telecommunications Act, by the way, so he knows what he’s talking about. Florida Senator Bill Nelson said: “Passing this Senate resolution will take consumers out of the driver’s seat and place the collection and use of their information behind a veil of secrecy, depsite rhetoric surrounding our debate today suggesting that eliminating these common snse rules will better protect consumers’ privacy online or will eliminate consumer confusion. Hawaii’s Senator Brian Schatz said the repeal would be “the single biggest step backwards in online privacy in many years.” The broadband privacy rule, among other things, expanded an existing rule by defining a few extra items as personal information, such as browsing history. This information joins medical records, credit card numbers and so on as information that your ISP is obligated to handle differently, asking if it can collect it and use it. You can see the utility of the rule right away; browsing records are very personal indeed, and ISPs are in a unique position to collect pretty much all of it if you’re not actively obscuring it. That means every product you look up, every malady you search for, and every site you visit. Facebook and Google see a lot, sure, but ISPs see a lot too, and a very different set of data. Should they be able to aggregate it and sell it without your permission, perhaps to other aggregators, in order to better target ads or add to a profile of you and your demographic? The FCC thought not, and proposed the rule, part of which was rescinded by the new FCC leadership before it took effect. This resolution would not only rescind it all the way, but because it is an official disapproval under the Congressional Review Act, it would prevent the FCC from enacting similar rules in the future. Even if Congress doesn’t like these rules, should the requisite agency be forbidden from creating any like them at all? Flake’s announcement of the resolution, by the way, is very misleading. First, this “midnight regulation” was discussed for years and there was a lengthy public comment and review period. Whether it’s necessary is arguable, but it isn’t confusing. It really is very simple, especially the data protection rules; anyway, it’s just an expansion of earlier rules companies were already subject to. It wouldn’t be “restoring” the FTC’s approach, first of all because the FCC rules are in line with the FTC’s already, as one of the latter agency’s commissioners already stated. Second, the FTC’s authority over privacy rules is questionable since a very recent court decision that removed that authority in many states. The Republican Senators speaking in support of the resolution, by the way, made a big show of the technical and statutory jurisdiction of the FCC being lacking, which is far from established and the subject of considerable controversy right now. Senator Thune, hilariously, suggested the FCC’s role was “gradually diminishing” as people used the internet more than phones. The exact opposite is true, in fact, and the FCC’s role has become far more important over the last two decades. That the resolution “will not change or lessen existing consumer privacy protections” is true — because they’re repealing it before it takes effect. It’s like saying they’re not stealing something from you because you haven’t picked it up yet. It does not empower consumers to make informed choices; it removes the ability to make informed choices. Broadband providers do have to provide some information on what they collect, but the choice consumers would have would be choices between providers. And as some have pointed out, with no regulations like this one, no provider will voluntarily provide anything more than the minimal possible level of privacy for this data. “Let the marketplace sort it out, they say,” Markey said. “What marketplace? Most places there are only two companies to choose from. And they’re both going to say, privacy protection is voluntary! it’s take the broadband service or leave it, and if you take it, you have no privacy. Asking ISPs to write their own privacy rules is like asking a burglar to program your security system.” Amazingly, this dangerous proposal garnered 34 co-sponsors — and support for it is definitely not bipartisan. Today was the first time the opposition in the Senate had a chance to speak their piece on the floor, and the vote on the joint resolution will take place tomorrow evening. Source
  13. Seed4.Me VPN - 6 Months[180 Days] Promo by SharewareOnSale Overview: Surf the web anonymously, mask your location, making the geo-IP address different from the real one, so no one can trace you. Seed4.Me VPN for Windows, Mac OS, Android, iPhone and iPad also unblocks sites that are normally restricted in the area of your current location. All Features: Really simple setup 17 countries to choose from Unlimited traffic Connecting directly from the application Single account is valid for all your Android, iOS devices and computer Multiple languages support: English, Arabic, Chinese, Spanish, Russian and Portuguese Automatic and manual connection switch in iOS iOS 10, Android 4, 5, 6 and 7 compatible Windows XP 64-bit, 7, 8, 8.1, 10 compatible Mac OS compatible More Info: Product Homepage, About, Support, Setup Guides, Blog. TorrentFreak 2017 Anonymity Review: https://torrentfreak.com/vpn-services-anonymous-review-2017-170304/#seed4me Links: Offer: https://sharewareonsale.com/s/free-seed4-me-vpn-100-discount Note: Limited Period Offer. Expires by 23 March 2017. Current Status: Open. If you are getting 64bit only installer, please contact sos discussion page. Downloads: Windows - Size: 11.5 MB: https://www.seed4.me/files/seed4me-vpn-1.0.5.exe
  14. Anonymous browsing tools to protect your data and your identity online Online privacy is a hot topic, with even world leaders weighing in on the subject. Many of the big-name websites and companies will track your activities to deliver targeted advertising, and can build up an astonishingly detailed profile including your interests, spending habits, age, location and more. If you would prefer to keep your personal details private, a VPN or proxy tool will help. As well as preventing third parties building up a profile of you, the best free privacy software can open up the web, granting you access to sites blocked in your country, to access region-locked content when you're travelling away from home, and to add a layer of protection when you use a public Wi-Fi network. 1. Tor Browser A whole browser dedicated to your privacy, Tor Browser is the cornerstone of any privacy toolkit Tor Browser is probably the best-known anonymous browsing tool out there, and it is described as a 'censorship circumvention tool'. Tor Browser has a vast following in the online privacy and security communities. It works by bouncing your communication through numerous encrypted node on the internet, making it impossible to determine your location or other identifying information. Tor Browser employs complex technology, but is refreshingly accessible. It's based on the same code as Firefox, and guides you through the process of getting online one step at a time. It uses different connection methods depending on what you're trying to achieve, but there's no need to understand the details because it's all taken care of for you. This combination of effective protection and ease of use makes Tor Browser the best free privacy software you can download today. Download here: Tor Browser 2. Privoxy Privoxy gives you total control over your privacy, but the options might be overwhelming Privoxy is a web proxy tool that's available not only for Mac, Windows and Linux, but also Android and iOS. It is a tremendously powerful tool, but you'll need to invest a little time and effort to get it up and running. Privoxy can be used in conjunction with just about any web browser, which is a big bonus; simply set the browser to run its traffic through the tool. However, one of Privoxy's key features could also be a drawback for new users: it gives you very granular control over privacy settings, and configuring them is very much a manual process. There's a helpful quick start guide available, but it has the potential to be off-putting. That said, if you're happy to persevere, this free privacy software lets you set up advanced filters that will not only ensure you remain anonymous online, but also protect you against unwanted ads. Download here: Privoxy 3. Hotspot Shield Free Free privacy software that protects your identity by hiding your IP address from prying eyes Hotspot Shield VPN is available in two flavors: a free, ad-supported one, and a paid-for version that offer unlimited bandwidth. Hotspot Shield hides your IP address and provides encrypted traffic tunnelling (ideal for use on public Wi-Fi networks) to improve security and ensure privacy. You may not want to use Hotspot Shield at all time. For instance, you may only be interested in using it to access certain sites that are blocked in your country. In this case you can create shortcuts to individual sites in the Hotspot Shield window which will enable protection before launching the sites. Protection can also be toggled on an off with a single click. The paid-for version, Hotspot Elite, only costs a few pounds or dollars a month, but it's worth trying the free edition first before opening your wallet. Its additional features, including ad-free browsing and dedicated customer support, make it a tempting proposition. Download here: Hotspot Shield Free 4. TunnelBear Free and user-friendly, TunnelBear is VPN made easy – but keep an eye on the data limit In addition to anonymous browsing, free VPN tool TunnelBear can also be used to bypass traffic-shaping and throttling put in place by ISPs. The free version of TunnelBear gives you up to 500MB of data each month, but if this isn't enough, unlimited data is available for a subscription fee, with prices starting at US$4.16 per month (about £3, AU$6). Whether you go premium or stick with the free version, you can share a single account between up to five phones, tablets, Windows PCs or Macs. Configuration is incredibly simple, and TunnelBear's free privacy software can be used with any browser. It's probably the most accessible VPN tool there is, and is just about impossible not to recommend. Download here: TunnelBear The free version of Cyberghost has a limited number of spaces on its server, but it works well once you're connected 5. CyberGhost VPN A great VPN tool for protecting your privacy online, but free users have to wait their turn Another multi-platform VPN tool, CyberGhost VPN is available as a free ad-supported app, as well as a paid-for edition offering better performance and more features. For day-to-day or occasional use, the free version should be perfectly adequate. Configuration is very simple, with the only potential stumbling block being the installation of a virtual network adaptor. With a single click, CyberGhost VPN will activate, giving the impression that you're browsing from another country. The free privacy software also lets you keep an eye on how much traffic you've transferred through the service using a handy graph. The downside of using the free version is that there's a limited numbers of spaces on the servers, so you may have to wait to gain access (although you're unlikely to be kept hanging for long). Download here: CyberGhost VPN Source
  15. Online security needs to taken seriously to prevent attacks Sure, you may not be a celebrity, but who's to say your account may not become interesting to a hacker? Who's to say said hacker won't keep your content captive in turn for a ransom? The Fappening is happening again, as you may have heard already. Just like in 2014, hackers are dumping photos and videos of female celebrities on platforms such as 4chan and reddit, exposing intimate footage that was never meant to see the light of day. The morality of such a move can only be expressed through one word - "lacking." It does not matter who you are, you have the right to privacy, just as these actresses and models did. Just because they are public persons does not mean that every little thing they do is public too. Victim blaming, like in many other instances, is not the way to go; because that's what these women are: victims of what one reader perfectly described as "digital sexual assault." We're not even going to bring into discussion those who think these women took personal, private, pictures just so they could get hacked and exposed. Then and now In 2014, hackers managed to get into celebrities' accounts by hacking into their iCloud and Gmail accounts via a simple phishing scam. This time around, it's unclear how they managed to do this, but there are so many ways this could have been achieved. An obvious one is a phishing attack - one inconspicuous email sent to these women, have them click a link, get them to sign in their data, and you're in. Then, there have been so many data breaches in recent months and years that it's quite possible their information was already out there. Reusing your password is a surefire way to get hacked if someone really wants a way into your account. Even tweaking it just a bit will not keep a hacker away for long. There's also Twitter, a place where every celebrity has an account. As one hacker pointed out after President Trump entered the White House, it's quite easy to guess what email address one is using by trying to reset their password, unless proper steps are taken to secure the account, namely to have them ask you for personal information (your phone number) when resetting your password). Upgrade your security So what are a few steps to avoid getting hacked like these ladies have? 1. never use the same password twice and use complicated passwords that are (preferably) at least 10 characters long. 2. secure your email and cloud accounts with two-step authentication 3. don't download suspicious files on your computer or phone 4. don't tap on links sent to you via email from people you don't know 5. don't install apps that have not been verified - they might carry malware 6. secure your social media accounts with two-step authentication and any other steps they offer to keep your details private 7. take the time every so often to update your passwords and security questions Online security is extremely important nowadays and it will only continue to grow in importance. It is hacks like these, affecting people's privacy, that stress just how crucial it is to safeguard all your data. Source
  16. I am just copying the important chunks from this article The recent leaks reveal how, for years, CIA was busy hacking into many consumer electronics devices, including Wi-Fi routers, Samsung Smart TVs, iPhones and Android-powered devices. According to the documents, the agency employed specialized tools to exploit the security vulnerabilities in these devices and recorded videos, audio conversations, text messages, or anything that could help them keep tabs on the owners of those devices. According to WikiLeaks, many malwares and hacking tools were developed by EDG (Engineering Development Group), one of CIA’s own software development group, while some tools and applications were acquired from other government agencies or third-party dealers. The CIA dubbed these third-parties as their partners, and used codenames like SurfsUp, Peppermint, Anglerfish and Fangtooth. Forbes reported that these vulnerabilities are worth a lot in the market, i.e., over $1 million for every bug. Severity of the leaks: The malware created by CIA for hacking into users’ personal gadgets are so effective that they can safely bypass even the most popular security programs. Amongst Different OSs, Android Attracted the Most Exploits The popular Smartphone Operating System, Android, enjoys a major market share in the Smartphone industry. Perhaps, that’s what makes it one of the important targets for the Central Intelligence Agency. Amongst the many exploits reported by WikiLeaks, a good chunk of those exploits were especially developed to break into Android devices and applications. Chronos, purchased from Anglerish, exploits the security weaknesses of Android devices that are running on 4.0 Dugrito, another tool by Anglerfish, is a remote access exploit that hits devices running 4.0 – 4.1.2 Flamekimmer, a tool by SurfsUp, hits devices that use Broadcom Wi-fi chipsets, running OS 4.4.4 RCE bugs, by Anglerfish, Fangtooth, NSA and GCHQ, are remote access exploits that can be used for hacking into any device from anywhere Dragonfly, currently no information available except that it is a RCE bug for Android security exploits Sulfur, by Fangtooth, one of the most critical exploits that hits the kernel files of Android, leaking information remotely RoidRage, another tool that allows hackers to have remote access of the hacked device At first, WikiLeaks provided detailed information on these Android exploits by CIA but it later redacted the pages to prevent the actual codes from getting into the wrong hands.
  17. NEW DELHI: A burger can cost you a lot. Personal data of more than 2.2 million users has leaked from McDonald's India app, McDelivery, cyber security firm Fallible said. The leaked data includes name, phone number, email addresses, home addresses, accurate home-coordinates and social profile links. Cyber security experts said hackers could use the information to access financial details of users, including credit/debit card information and e-wallet details. The compromised app and website of the US burger chain is operated by Westlife Development, which runs McDonald's operations in the south and west India. The official spokesperson of McDonald's India (west & south) said, "We would like to inform our users that our website and app does not store any sensitive financial data of users like credit card details, wallets passwords or bank account information. The website and app has always been safe to use, and we update security measure on regular basis. As a precautionary measure, we would also urge our users to update the McDelivery app on their devices. At McDonald's India, we are committed to our users' data privacy and protection." Amit Singh, co-founder of Yitsol, which provides cloud migration services, said, "Security is the last priority of many firms in India. I know of incidents in Hyderabad, where hackers stole user information from startups and demanded ransom in Bitcoins." With the country going digital and app usage on the rise companies could not afford to relax when it comes to cyber security, he said. Fallible said it contacted McDelivery about the data leak on February 7 and received an acknowledgement from a senior IT manager at the firm. "The McDonald's fix is incomplete and the endpoint is still leaking data," Fallible wrote on its blog on Saturday. Article source
  18. Abelssoft GoogleClean 2017.135 (Retail) Take control about what Google knows about you! Today Google "sees" everything. Most Google products like Google Desktop, Google Chrome, Google Picasa, Google Earth and Google Toolbar collect data about the usage, generate a unique ID and transfer them back to Google. GoogleClean can prevent this and switches off those data transfers. It allows you to use all Google products without any headaches and without having to worry about the consequences. GoogleClean does not influence the functionality of Google products. It takes away the bad things and leaves you the good things. GoogleClean 2017 Prevents espionage Turns off the espionage features of various Google applications. Deletes Traces Deletes traces of Google applications on your computer. Automatic Trace Watcher Automatic check for Google application traces and automatic cleanup. Features: Switch off Google spy functionality Many Google Applications collect Information about their users and send data back home. Google exactly knows which websites you visit and what contents you are looking for in the internet. It is almost impossible to deactivate some of these spy features manually. With GoogleClean you can switch off those data transfers easily. Remove unwanted content from Google Search Did you ever searched for yourself on Google and found results that you did not like, that harm your privacy or put you in a bad light? You can change that now! With the new Delete Google-Traces Find and delete Flash cookies (also known as Super-Cookies), form data, surfing traces and data garbage of Google applications. Protect your Computer automatically No need to delete surfing traces manually. The Google Radar is a small application that will permanently look out for Google traces and data garbage on your Computer. The Google Radar starts up with Windows and will keep your system clean automatically. Homepage: https://www.abelssoft.de/en/windows/Security-Privacy/GoogleClean Release Date: 2017-01-09 OS: XP/Vista/7/8/10 Language: Multilingual Download using below link: Site: http://uptobox.comSharecode[?]: /y1v0xyge1398 --------------------------------------- Site: https://www.NoFile.ioSharecode[?]: /f/jXIFuEeg7Y1 Password: www.NoFile.io BR// IMMAGNETO
  19. Five Issues That Will Determine The Future Of Internet Health In January, we published our first Internet Health Report on the current state and future of the Internet. In the report, we broke down the concept of Internet health into five issues. Today, we are publishing issue briefs about each of them: online privacy and security, decentralization, openness, web literacy and digital inclusion. These issues are the building blocks to a healthy and vibrant Internet. We hope they will be a guide and resource to you. We live in a complex, fast moving, political environment. As policies and laws around the world change, we all need to help protect our shared global resource, the Internet. Internet health shouldn’t be a partisan issue, but rather, a cause we can all get behind. And our choices and actions will affect the future health of the Internet, for better or for worse. We work on many other policies and projects to advance our mission, but we believe that these issue briefs help explain our views and actions in the context of Internet health: 1. Online Privacy & Security: Security and privacy on the Internet are fundamental and must not be treated as optional. In our brief, we highlight the following subtopics: Meaningful user control – People care about privacy. But effective understanding and control are often difficult, or even impossible, in practice. Data collection and use – The tech industry, too often, reflects a culture of ‘collect and hoard all the data’. To preserve trust online, we need to see a change. Government surveillance – Public distrust of government is high because of broad surveillance practices. We need more transparency, accountability and oversight. Cybersecurity – Cybersecurity is user security. It’s about our Internet, our data, and our lives online. Making it a reality requires a shared sense of responsibility. Protecting your privacy and security doesn’t mean you have something to hide. It means you have the ability to choose who knows where you go and what you do. 2. Openness: A healthy Internet is open, so that together, we can innovate. To make that a reality, we focus on these three areas: Open source – Being open can be hard. It exposes every wrinkle and detail to public scrutiny. But it also offers tremendous advantages. Copyright – Offline copyright law built for an analog world doesn’t fit the current digital and mobile reality. Patents – In technology, overbroad and vague patents create fear, uncertainty and doubt for innovators. Copyright and patent laws should better foster collaboration and economic opportunity. Open source, open standards, and pro-innovation policies must continue to be at the heart of the Internet. 3. Decentralization: There shouldn’t be online monopolies or oligopolies; a decentralized Internet is a healthy Internet. To accomplish that goal, we are focusing on the following policy areas. Net neutrality – Network operators must not be allowed to block or skew connectivity or the choices of Internet users. Interoperability – If short-term economic gains limit long-term industry innovation, then the entire technology industry and economy will suffer the consequences. Competition and choice – We need the Internet to be an engine for competition and user choice, not an enabler of gatekeepers. Local contribution – Local relevance is about more than just language; it’s also tailored to the cultural context and the local community. When there are just a few organizations and governments who control the majority of online content, the vital flow of ideas and knowledge is blocked. We will continue to look for public policy levers to advance our vision of a decentralized Internet. 4. Digital Inclusion: People, regardless of race, income, nationality, or gender, should have unfettered access to the Internet. To help promote an open and inclusive Internet, we are focusing on these issues: Advancing universal access to the whole Internet – Everyone should have access to the full diversity of the open Internet. Advancing diversity online – Access to and use of the Internet are far from evenly distributed. This represents a connectivity problem and a diversity problem. Advancing respect online – We must focus on changing and building systems that rely on both technology and humans, to increase and protect diverse voices on the Internet. Numerous and diverse obstacles stand in the way of digital inclusion, and they won’t be overcome by default. Our aim is to collaborate with, create space for, and elevate everyone’s contributions. 5. Web Literacy: Everyone should have the skills to read, write and participate in the digital world. To help people around the globe participate in the digital world, we are focusing on these areas: Moving beyond coding – Universal web literacy doesn’t mean everyone needs to learn to code; other kinds of technical awareness and empowerment can be very meaningful. Integrating web literacy into education – Incorporating web literacy into education requires examining the opportunities and challenges faced by both educators and youth. Cultivating digital citizenship – Everyday Internet users should be able to shape their own Internet experience, through the choices that they make online and through the policies and organizations they choose to support. Web literacy should be foundational in education, like reading and math. Empowering people to shape the web enables people to shape society itself. We want people to go beyond consuming and contribute to the future of the Internet. Promoting, protecting, and preserving a healthy Internet is challenging, and takes a broad movement working on many different fronts. We hope that you will read these and take action alongside us, because in doing so you will be protecting the integrity of the Internet. For our part, we commit to advancing our mission and continuing our fight for a vibrant and healthy Internet. Source
  20. Telegram v3.18.0 Beta Overview: Pure instant messaging — simple, fast, secure, and synced across all your devices. Over 100 million active users in two and a half years. FAST: Telegram is the fastest messaging app on the market, connecting people via a unique, distributed network of data centers around the globe. SYNCED: You can access your messages from all your devices at once. Start typing on your phone and finish the message from your tablet or laptop. Never lose your data again. UNLIMITED: You can send media and files, without any limits on their type and size. Your entire chat history will require no disk space on your device, and will be securely stored in the Telegram cloud for as long as you need it. SECURE: We made it our mission to provide the best security combined with ease of use. Everything on Telegram, including chats, groups, media, etc. is encrypted using a combination of 256-bit symmetric AES encryption, 2048-bit RSA encryption, and Diffie–Hellman secure key exchange. POWERFUL: You can create group chats for up to 5,000 members, share large videos, documents of any type (.DOC, .MP3, .ZIP, etc.), and even set up bots for specific tasks. It's the perfect tool for hosting online communities and coordinating teamwork. RELIABLE: Built to deliver your messages in the minimum bytes possible, Telegram is the most reliable messaging system ever made. It works even on the weakest mobile connections. FUN: Telegram has powerful photo and video editing tools and an open sticker/GIF platform to cater to all your expressive needs. SIMPLE: While providing an unprecedented array of features, we are taking great care to keep the interface clean. With its minimalist design, Telegram is lean and easy to use. 100% FREE & NO ADS: Telegram is free and will always be free. We are not going to sell ads or introduce subscription fees. PRIVATE: We take your privacy seriously and will never give third parties access to your data. For those interested in maximum privacy, Telegram offers Secret Chats. Secret Chat messages can be programmed to self-destruct automatically from both participating devices. This way you can send all types of disappearing content — messages, photos, videos, and even files. Secret Chats use end-to-end encryption to ensure that a message can only be read by its intended recipient. We keep expanding the boundaries of what you can do with a messaging app. Don’t wait years for older messengers to catch up with Telegram — join the revolution today. Requirements: 4.0+ What's New: Mar 15 | v3.18 New! Added the possibility of routine Voice Calls through connected Bluetooth devices New! Email hint and verification for Payment methods and invoice creation New! Customized ringtone per user New! Busy and network issues recognition for VoIP New! Slow connection enhancements New! Additional: I am not fully sure. But Telegram might be giving an option to record calls also. This app has NO advertisements Downloads: Note: To make use of the voice calls feature, both the end-users should have this specific version. Mirror:
  21. Proton VPN 0.9.4 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. The ProtonVPN client for Windows can be downloaded here: Windows: https://protonvpn.com/download/ Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Download(Win): https://protonvpn.com/download/ProtonVPN_win_v0.9.4.exe
  22. Facebook Bans Devs From Creating Surveillance Tools With User Data Without a hint of irony, Facebook has told developers that they may not use data from Instagram and Facebook in surveillance tools. The social network says that the practice has long been a contravention of its policies, but it is now tidying up and clarifying the wording of its developer policies. American Civil Liberties Union, Color of Change and the Center for Media Justice put pressure on Facebook after it transpired that data from users' feeds was being gathered and sold on to law enforcement agencies. The re-written developer policy now explicitly states that developers are not allowed to "use data obtained from us to provide tools that are used for surveillance." It remains to be seen just how much of a difference this will make to the gathering and use of data, and there is nothing to say that Facebook's own developers will not continue to engage in the same practices. Deputy chief privacy officer at Facebook, Rob Sherman, says: Transparency reports published by Facebook show that the company has complied with government requests for data. The secrecy such requests and dealings are shrouded in means that there is no way of knowing whether Facebook is engaged in precisely the sort of activity it is banning others from performing. Source
  23. Mozilla: People Have No Idea How To Protect Their Privacy And Security Online Privacy and security are major concerns when it comes to life online, but a survey by Mozilla reveals that a worrying number of people do not know how to stay in control of them. The company also found that a third of people feel they have no control over their information online, with a similar number confessing to knowing "very little" about encryption. But these are not the only concerns of internet users. Mozilla also asked about people's greatest online fears. Topping the list is "being hacked by a stranger" (a fear held by 80 percent of people), and "being tracked by advertisers" (61 percent). As well as presenting the results of its survey, Mozilla also has some important advice. The survey results reveal the thoughts of 30,000 internet users. Mozilla notes: "We recycle passwords, we run outdated software and we volunteer personal information for a free coupon. If this same carelessness carried over to the physical world, our wallets might be a lot lighter. And our neighbors might know a lot more about us than we want. Why is that? And what can we do to fix it?" To answer "why?", the answer seems to be ignorance -- perhaps with a dash of laziness when it comes to self-education. 90 percent of people said they don’t know much about how to protect themselves online -- Mozilla says that a good starting point is to ensure that all software is kept fully up to date. Privacy is also a major concern with people feeling a general lack of control over their personal information -- Mozilla suggests using private browsing modes. While a third of people admitted to knowing nothing, or next to nothing about encryption, Germans are usually clued up: 85 percent of German respondents have some knowledge of encryption. Despite a generally poor knowledge of security, most people (two thirds) said they would not be willing to attend a training session to learn about secure tools. We've already mentioned some of the fears people have, and other interesting findings include the revelation that 40 percent of people are concerned about being harassed online. 7 percent fear friends or family accessing private accounts. It seems that the internet -- as well as how it has developed, and how data is used -- has turned us into a paranoid bunch. Asked who they would trust for information about online privacy, 56 percent would turn to non-profits, 13 percent would trust the government, and a mere 5 percent would put their faith in social media. Check out the full results of the survey in Mozilla's post on Medium. Source
  24. Julian Assange said WikiLeaks will work with tech companies to resolve the CIA's exploits. Julian Assange, the founder of WikiLeaks, wants big players like Apple and Samsung to disarm the CIA's exploits before he releases them to the world. WikiLeaks wants to join forces with tech giants against the CIA. The leak-focused site on Tuesday released thousands of alleged CIA documents, accusing the intelligence agency of amassing tools that can break into iPhones, Android devices, smart TVs and cars. WikiLeaks' "Vault 7" release also indicated that the CIA hoarded vulnerabilities in iOS and Android and kept them secret so it could continue using them to gain access to devices. CNET is unable to verify whether the documents are real or have been altered. On Thursday, WikiLeaks founder Julian Assange said that his organization will work with tech giants like Apple, Google and Samsung to plug those holes before it releases more details on the CIA's hacking program. "We have quite a lot of exploits ... that we want to disarm before we think about publishing it," Assange said at a press conference streamed on Periscope. "We're going to work with some of these manufacturers to try and get these antidotes out there." His press conference was the latest turn in a drama that has potentially blown open how the CIA could use our own devices to spy on us. The documents show how the agency has allegedly been able to break into even encrypted devices such as phones and computers by taking control of their operating systems. Assange said he's been keeping WikiLeaks' findings under wraps while the CIA's exploits can still be used because he doesn't want them falling into the wrong hands. He said the CIA has already "lost control of its entire cyberweapons arsenal," which he criticized for being poorly secured. He said WikiLeaks has much more information on the CIA's cyberweapons program that it's waiting to reveal. "This is an historic act of devastating incompetence," Assange said, "to have created such an arsenal and stored it all in one place and not secured it." The CIA has not confirmed or denied the authenticity of WikiLeaks' release but did say that it is the CIA's job to "be innovative" and "cutting edge" with its technology. The intelligence agency said it will continue to spy on foreign countries to "protect America from terrorists, hostile nation states and other adversaries." The agency also sought to cast suspicion on the messenger. "As we've said previously, Julian Assange is not exactly a bastion of truth and integrity," CIA spokesman Jonathan Liu said Thursday in a statement. Challenges for Android and others For some of the smaller exploits, it will take companies two or three days to patch up the vulnerabilities, Assange said. For exploits on so-called internet of things devices like smart baby monitors or refrigerators, it could take much longer. Samsung said it is "urgently looking" into the CIA's alleged exploits after WikiLeaks named a program that could secretly turn its TVs into listening devices. Apple said it had already patched up most of the vunerabilities with its latest version of iOS. Microsoft said that it's aware of the CIA's alleged tools and that it's "looking into it." Google said in a statement that it had already patched up most of the holes. However, the various makers of Android devices add their own custom software, which may still be vulnerable. Android users will also have the most difficulty in getting fixes for some of the CIA's exploits because the operating system is used by multiple manufacturers with different rollout schedules for updates. "For some systems, like Android with many manufacturers, there is no automatic update to the system. That means that only people who are aware of it can fix it," Assange said. "Android is significantly more insecure than iOS, but both of them have significant problems." WikiLeaks is still sorting through thousands of documents for future releases. The organization redacted more than 78,000 IP addresses, more than a quarter of which came from the US. The CIA said it does not spy on US citizens, but WikiLeaks is still investigating how many of the 22,000 IP addresses in the US are from the CIA's hacking unit and how many are malware victims. Assange said the CIA's hacking programs cannot be properly regulated by its design. "The technology is designed to be unaccountable. It's designed to be untraceable," he said. Source
  25. There are many arguments for and against your right to privacy. Made by everyone from governments to corporations and private citizens. I only care to reiterate one of these points: once you give it up you’re never getting it back. To be clear this is not a post arguing for or against your right to privacy. It’s important and it needs to be protected. Instead, let’s talk innovation vs. privacy and a strategic middle ground for protecting your privacy while enabling innovation. It’s no secret that with the right data even existing technologies like Apple’s Siri or Google’s Google Now can simply be an extension of your thinking and complement your life almost like magic. Most of our lives are already tied to the internet. Facebook itself has collected over 300 petabytes of personal data as of 2014. Whether it’s your social network, things you buy, the information you’ve looked up at specific times of the day, your location history, information from your fitness tracker, photos and videos. A pattern of at least part of who you are is already sitting sprawled across a collection of servers — online. Now imagine putting all of it together. Combined with information like your credit and medical history can become an extremely powerful profile of who you are and what you do. Then imagine something like an artificially intelligent assistant having access to that information? It’ll know when to order you a pizza, to arrange a party with your friends, manage your calendar, order the right groceries online, pay your bills, play the right music at just the right times, do your taxes and more… First impression — it wouldn’t be that straightforward, at least from a privacy standpoint. Yes, companies already collect a lot of information about you that play a major role in our economy — everything from making mission critical business decisions to insurance and some government policies rely on a certain level of access to the personal information of its population. But it’s a scary thought to put all the information together in one place and let anyone (or thing) have access to it. At a fundamental level personal privacy gives people a chance to improve themselves. Mistakes can be brushed off, governments can’t surveil you for crimes you might commit and your boss won’t know you’re 50% less productive today because you were out drinking last night. Now if we were a perfect society maybe, just maybe, zero privacy could go well. But given human nature and private agendas; definitely not. In fact, this line of thinking is unproductive, simply because it’s too risky a path to go down. Is ‘online’ ever safe? Data protection goes hand in hand with privacy protection. Most companies, internet businesses in particular, are already holding onto a lot of information about you. All these companies also take serious steps to make sure your information is protected. But it’s no doubt that anyone motivated can and will eventually get to it. Consider the Yahoo hack that compromised over a billion user accounts in 2013 — the largest data breach in history. Or consider any one of these everyday services that have been breached at some point: DropBox, Evernote, Ebay, LinkedIn and more! Just take a look at this timeline. Given the nature of computer systems and the internet, it’s possible to get to any information stored anywhere, especially if you’re targeted. So would it ever be possible to break through this barrier? On the most part, this post is a result of some research for a concept personal AI — something that had unrestricted access to every bit of your life so it could complement you perfectly. I’m sure at least the techies reading this will appreciate how awesome this could be. But given the privacy roadblocks, it’s going to be a while (or never) before any entity is ever trusted with that level of access to your private information. As I see it there are two ways to achieve this without infringing your personal privacy. An isolated system or device, hosted by the individual using this AI. It could be an open source project that you personally setup for yourself. No third party access to your information. Call it your own, private Jarvis. Or, a novel framework for gathering, transporting, storing and retrieving this type of personal information. Ideally, a framework that can fulfill the purpose of the information without really holding onto all your personal information. A decentralized approach to privacy where instead of any single company or entity holding your personal information it’s randomly and securely distributed across a network (like Bitcoin) and services (third parties) are given access (by you) to processed information instead of raw data. This is discussed in depth by Guy Zyskind, Oz Nathan and Alex Pentland on their paper — Decentralizing Privacy: Using Blockchain to Protect Personal Data. It’s definitely an interesting approach to balancing the innovation vs. privacy dilemma. Middle ground? There is no middle ground. At least none where you don’t have to give up some or all of your privacy. But, what you could do instead is to take a completely novel approach to privacy as discussed in the paper referenced above: where you own your own personal data and give services permission (that you can revoke anytime) to access certain processed pieces of information. It’s a good balance of making your information available to fuel innovative technologies like AI personal assistants while maintaining healthy control over your personal information. By Udara Jay https://hipademic.com/your-right-to-privacy-vs-innovation-40b22f759676#.x4kk9xmup