PDA

View Full Version : Tools to Help Eliminate or Mitigate Spying and Snooping



sirgonzo420
10th June 2013, 09:39 AM
Since the revelation to the public of the "PRISM" program, and other such widescale-fullscale spying systems (which many of us have known to exist for some time now), I thought it might be a good time to start a thread for sharing information and tools to eliminate or at least mitigate the ridiculously unlawful intrusions into our lives and private communications by third parties.

Of course, software tools are only as secure as the devices that they are run on, so things like hardware keyloggers and other such devices and even some malicious pieces of software are beyond the scope of most of the digital solutions that will be found in this thread. Such intrusions would take greater effort to defeat.

Remember the 3 rules of computer security:

1 - Don't own a computer.

2 - Don't turn it on.

3 - Don't use it.


Anyway, that being said, here is one new protocol called "bitmessage":
Bitmessage is a P2P communications protocol (https://bitmessage.org/wiki/Protocol_specification) used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs. If Bitmessage is completely new to you, you may wish to start by reading the whitepaper (https://bitmessage.org/bitmessage.pdf).

https://bitmessage.org/wiki/Main_Page

Dogman
10th June 2013, 09:42 AM
The computer would be ok if it is never connected to any network and is stand alone. No internet access will do the trick.

Son-of-Liberty
10th June 2013, 09:50 AM
Startpage offers you Web search results from Google in complete privacy!

When you search with Startpage, we remove all identifying information from your query and submit it anonymously to Google ourselves. We get the results and return them to you in total privacy.

Your IP address is never recorded, your visit is not logged, and no tracking cookies are placed on your browser. When it comes to protecting your privacy, Startpage runs the tightest ship on the Internet. Our outstanding privacy policy and thoughtful engineering give you great search results in total anonymity. Here are some of our key features:

Free proxy surfing available.
Praised by privacy experts worldwide.
Fourteen-year company track record.
Third-party certified.

No IP address recorded.
No record is made of your searches.
No identifying or tracking cookies used.
Connection using powerful SSL encryption.

To learn more, check out our privacy page and read our privacy policy. We're confident you'll like what you see.

https://startpage.com/

https://www.ixquick.com/

sirgonzo420
10th June 2013, 02:58 PM
Here's something I thought was cool - and they accept bitcoins.

https://www.burnerphone.us/

Introducing the Burner Kit The simplest, most anonymous, and most affordable disposable cell phone ever manufactured. Made for people who value security and privacy.

30 day disposable phone number.
Unlimited talk and text for 30 days.
Nationwide coverage.
16 hour talk time.
30 day standby time.
Arrives fully charged.
Power cord included.
Completely anonymous.


$75.00 — Free Shipping

https://www.burnerphone.us/static/img/burner-kit-front-and-back.jpg

Need real anonymity?

Our Burner Kit is the simplest, most secure, and most affordable pre-paid cell phone kit in the US. The Burner Kit comes with a quality disposable cell phone, in addition to unlimited voice and SMS messaging for 30 days.
After 30 days, just throw away your Burner Kit and you'll never have to worry about compromising your identity.
When you receive your Burner Kit in the mail, it'll be fully ready to go. Your Burner will be fully charged and ready for usage as soon as you snap your battery into the phone! Your 30 days of usage start counting after your phone turns on for the first time.

We take your privacy seriously. You can purchase your Burner Kit using Credit or Debit card or Bitcoin (http://bitcoin.org/en/) (an anonymous digital crypto currency). Every time you make a purchase we'll package and ship your order, then destroy all transaction records in our system. We make it impossible to give or share your information with anyone.
Got questions? Email us (burnerllc@gmail.com).

Serpo
10th June 2013, 03:03 PM
Obama needs this info from OP

Anonymous infiltrates PRISM, intercepts Obama’s Skype
By http://www.chronicle.su/wp-content/themes/atahualpa/images/icons/twitter.gifKilgoar (http://twitter.com/kilgoar), on June 8th, 2013
http://www.chronicle.su/wp-content/uploads/prism-300x200.jpg (http://www.chronicle.su/wp-content/uploads/prism.jpg)An Anonymous spokesperson claimed to have hacked Obama’s Skype by gaining access to PRISM

INTERNET — Anonymous hackers claimed to have infiltrated PRISM’s network infrastructure after gaining access to the graphical user interface which was intended only for use by federal agents in cases of terrorism. Because the PRISM system has access to a log of all Internet phone calls (voIP via Skype, Google, etc.) and video chats, Anonymous vigilante intelligence researchers quickly unearthed evidence of high-level collusion between corporate executives and government officials. “We have access to President Obama’s Skype,” said a spokesperson for Anonymous, “and we’re only afraid it’s too absurd to be true.”
Anonymous will not comment on details of the leak until the information has been confirmed and verified. This time, Anonymous is seeking input from government sources so that their final release will be seen by the public as an even-handed nonpartisan attempt at uncovering the truth. “We want to know the government’s point of view simply because it will help us build a more complete view of what’s really going on. Even clever lies, denials, and evasion help us in our pursuit of truth. We won’t release the information until we’ve run it all over with several officials and received a frank appraisal of its context.”
President Obama has scheduled a press conference for Monday, and the White House has already released a statement condemning Anonymous. “The sad irony is that PRISM doesn’t even exist, but because of hacks like these we need something like it,” said White House Press Secretary Jay Carney. “We will not cooperate with terrorists on any level, and we refuse to comment on illegally obtained confidential information.”
Despite such polemic rhetoric, the general consensus of Anonymous is that truth is still of the utmost importance. “The White House can’t order all 20 million of its employees around. Someone will always talk to us, and help us understand the truth behind these troubling but somewhat ambiguous conversations and other communications. All your PRISM are belong to us, and it’s going to be this way for as long as something like PRISM exists.”

http://www.chronicle.su/news/anonymous-infiltrates-prism-intercepts-obamas-skype/

StreetsOfGold
10th June 2013, 04:20 PM
The computer would be ok if it is never connected to any network and is stand alone. No internet access will do the trick.

....and it doesn't have one of those intel chips which have built-in WiFi (accessible to "them") which will still work with the PC off

Ponce
10th June 2013, 04:26 PM
Anything that is put together by man can be taken apart by man so there is really never any secrets.....if you want to keep it a secret then dond't say it.


V

PatColo
10th June 2013, 04:48 PM
this thread's still a treasure trove,

Thread: Java Super Cookies MUST READ ! (http://gold-silver.us/forum/showthread.php?54607-Java-Super-Cookies-MUST-READ-%21)
this is also worthwhile:
Thread: DARPA Exposed - Corbett Report Radio 265 (http://gold-silver.us/forum/showthread.php?65738-DARPA-Exposed-Corbett-Report-Radio-265)



48 mins:
http://www.youtube.com/watch?v=iq2V_LkgRdo

http://www.youtube.com/watch?v=iq2V_LkgRdo

Download (http://www.corbettreport.com/mp3/crr265.mp3) < MP3 if you prefer to just listen

The internet. GPS. Windows. Videoconferencing. Siri. Smart dust. Why isn’t it common knowledge that these technologies started as DARPA-funded projects? When the government, defense contractors and tech giants team up to create the next generation of military technology, who wins and who loses? Find out on tonight’s broadcast.

WORKS CITED:
Army of Extreme Thinkers (http://articles.latimes.com/2003/aug/14/science/sci-darpa14)
12 Insane But True DARPA Projects (http://nakedlaw.avvo.com/government/12-insane-but-true-darpa-projects.html)
Fifty years of DARPA: Hits, misses and ones to watch (http://www.newscientist.com/article/dn13907)
FANG Challenge: Design a Next-Generation Military Ground Vehicle (https://www.youtube.com/watch?v=TMa1657gYIE)
10 brilliant DARPA inventions (http://www.pcpro.co.uk/features/373546/10-brilliant-darpa-inventions)
Director of DARPA departs Pentagon for Google (http://www.activistpost.com/2012/03/director-of-darpa-departs-pentagon-for.html)
High-Traffic Colluding Tor Routers in Washington (http://cryptogon.com/?p=624)
Creepy DARPA Robots (https://www.youtube.com/watch?v=mdYSStF4fqc)
Future World – Smart Dust (https://www.youtube.com/watch?v=GvdGggusRYU)
Berkeley Smart Dust Project (http://robotics.eecs.berkeley.edu/%7Epister/SmartDust/)
DARPA Project List (http://www.technovelgy.com/ct/technology-article.asp?artnum=59)


35:20 Corbett starts getting into "private/anon 'net surfing" via the TOR network. And raises questions about just how private it is, or is it another spook data mining venue.

Son-of-Liberty
10th June 2013, 05:06 PM
Here's something I thought was cool - and they accept bitcoins.

https://www.burnerphone.us/

Introducing the Burner Kit The simplest, most anonymous, and most affordable disposable cell phone ever manufactured. Made for people who value security and privacy.

30 day disposable phone number.
Unlimited talk and text for 30 days.
Nationwide coverage.
16 hour talk time.
30 day standby time.
Arrives fully charged.
Power cord included.
Completely anonymous.


$75.00 — Free Shipping

https://www.burnerphone.us/static/img/burner-kit-front-and-back.jpg

That is pretty cool and it doesn't look like they gouge you too badly on the BTC exchange rate. Too bad I am in Canada you guys get all the cool stuff.

75.00 USD
(0.7080 BTC)
Burner Kit

palani
10th June 2013, 06:22 PM
http://upload.wikimedia.org/wikipedia/commons/7/75/SDHC_memory_card_8GB.png

PLUS

http://wdfw.wa.gov/living/species/graphics/pigeon1.jpg

Serpo
10th June 2013, 06:48 PM
http://download.cnet.com/System-Safety-Monitor-Free-Edition/3000-2098_4-10556556.html

General of Darkness
10th June 2013, 06:56 PM
If half of us aren't already on some fucking list I would be surprised. Hell with my involvement with VoR I know I'm on more than one.

Blink
10th June 2013, 08:59 PM
https://startpage.com/

https://www.ixquick.com/

Giant US government Internet spying scandal revealed

The Washington Post and The Guardian have revealed a US government mass Internet surveillance program code-named "PRISM". They report that the NSA and the FBI have been tapping directly into the servers of nine US service providers, including Facebook, Microsoft, Google, Apple, Yahoo, YouTube, AOL and Skype, and began this surveillance program at least seven years ago. (clarifying slides)

These revelations are shaking up an international debate.

Ixquick has always been very outspoken when it comes to protecting people's privacy and civil liberties. So it won't surprise you that we are a strong opponent of overreaching, unaccountable spy programs like PRISM. In the past, even government surveillance programs that were begun with good intentions have become tools for abuse, for example tracking civil rights and anti-war protesters.

Programs like PRISM undermine our Privacy, disrupt faith in governments, and are a danger to the free Internet.

Ixquick and its sister search engine StartPage have in their 14-year history never provided a single byte of user data to the US government, or any other government or agency. Not under PRISM, nor under any other program in the US, nor under any program anywhere in the world. We are not like Yahoo, Facebook, Google, Apple, Skype, or the other US companies who got caught up in the web of PRISM surveillance.

Here's how we are different:

Ixquick does not store any user data. We make this perfectly clear to everyone, including any governmental agencies. We do not record the IP addresses of our users and we don't use tracking cookies, so there is literally no data about you on our servers to access. Since we don't even know who our customers are, we can't share anything with Big Brother. In fact, we've never gotten even a single request from a governmental authority to supply user data in the fourteen years we've been in business.
Ixquick uses encryption (HTTPS) by default. Encryption prevents snooping. Your searches are encrypted, so others can't "tap" the Internet connection to snoop what you're searching for. This combination of not storing data together with using strong encryption for the connections is key in protecting your Privacy.
Our company is based in The Netherlands, Europe. US jurisdiction does not apply to us, at least not directly. Any request or demand from ANY government (including the US) to deliver user data, will be thoroughly checked by our lawyers, and we will not comply unless the law which actually applies to us would undeniably require it from us. And even in that hypothetical situation, we refer to our first point; we don't even have any user data to give. We will never cooperate with voluntary spying programs like PRISM.
Ixquick cannot be forced to start spying. Given the strong protection of the Right to Privacy in Europe , European governments cannot just start forcing service providers like us to implement a blanket spying program on their users. And if that ever changed, we would fight this to the end.
Privacy.

It's not just our policy - it's our business.
~~~~~~~~~~~~~~~

We are working hard to offer you an encrypted email service later this year called StartMail. We have to stand up and protect our freedoms from increasing overreach from data gatherers. You've made the right choice by using Ixquick.com. Now is the time to tell others!

Sincerely,

Robert E.G. Beens
CEO Ixquick.com and StartPage.com

Son-of-Liberty
12th June 2013, 08:07 PM
TOR

https://www.torproject.org/

sirgonzo420
13th June 2013, 05:31 AM
TOR

https://www.torproject.org/

Yes, and also: The Amnesic Incognito Live System aka T.A.I.L.S.

Tails is a live DVD (https://en.wikipedia.org/wiki/live%5FCD) or live USB (https://en.wikipedia.org/wiki/live%5FUSB) that aims at preserving your privacy and anonymity.
It helps you to:


use the Internet anonymously almost anywhere you go and on any computer:
all connections to the Internet are forced to go through the Tor network (https://www.torproject.org/);
leave no trace on the computer you're using unless you ask it explicitly;
use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.

Learn more about Tails. (https://tails.boum.org/about/index.en.html)



amnesiac, noun:
forgetfulness; loss of long-term memory.
incognito, adjective & adverb:
(of a person) having one's true identity concealed.

Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly.
It is a complete operating-system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is Free Software (https://tails.boum.org/doc/about/license/index.en.html) and based on Debian GNU/Linux (http://www.debian.org/).
Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

iOWNme
13th June 2013, 05:59 AM
If you even attempt in the SLIGHTEST to 'hide' or to 'block' yourself when you have done nothing wrong you are not only legitimizing your oppressors, you are helping along their agenda unknowingly.

Stand up. Speak your mind. Defend yourself from violent criminals = Humanity will be a better place.

sirgonzo420
13th June 2013, 06:15 AM
If you even attempt in the SLIGHTEST to 'hide' or to 'block' yourself when you have done nothing wrong you are not only legitimizing your oppressors, you are helping along their agenda unknowingly.

Stand up. Speak your mind. Defend yourself from violent criminals = Humanity will be a better place.

It is not wrong to want privacy. Do you leave the door open when you take a shit? If not, why not? It's not wrong, what have you to hide?

Just because I'm an honest guy doesn't mean I want unauthorized third parties having access to my private conversations and exchanges.

And for what it's worth, I do stand up and speak my mind. I do what I damn well please.

mamboni
13th June 2013, 06:49 AM
Tagula

gunDriller
13th June 2013, 06:53 AM
one of the best tools you can have is an 'expendable' computer, dedicated to anonymous surfing.

a computer you never check your email from, unless it is an anonymous email that was set up on the expendable computer.

preferably, the anonymous computer was purchased well, anonymously. for example, i bought a laptop made by a now-bankrupt company, from a now-bankrupt office supply company, for a steep discount.

that purchase would be hard to track, but i did make one mistake - i paid using American Express. so the US gov. could see that i bought a laptop a few years ago, if they got ahold of my Amex history. but if they tried to find identifying information about the laptop - there's nowhere to go to for that.


web-surfing habits can also ID you. e.g. if you always read Drudge Report first, and then Yahoo News, and then Antiwar.com - even if you do it on an anonymous computer - if you visit the same 20 news websites as on your home computer, that creates a 'fingerprint' of sorts.

therefore, if you want to be more anonymous, you have to 'mix it up'.


another example - i am shopping for a 'canopy tarp', a heavy duty tarp for my back porch. i might end up using a truck tarp. they are pricey, $260 for one that's 20 feet by 20 feet.

if i have been looking on my home computer (not anonymous) for a canopy tarp, and then i use my supposedly 'anonymous' computer to also shop for a canopy tarp, it does stand out.


for sure DHS, NSA, etc. use every trick you can imagine (if you are computer literate), to track supposedly 'anonymous' users.

of course, if they have access to the webcam on your supposedly 'anonymous' computer, then you're sitting there thinking you're anonymous - and they see you ... no more anonymity. so, might want to put some duct tape over that web cam.


DHS/ NSA can also interview the staff at the Internet cafe where you are supposedly 'anonymous'. if you qualify as a "power user", and there are only 2 guys that show up at the Internet cafe certain days at 5 AM ... and the other guy is always playing Solitaire ... well, then you are easier to single out.

so, if i wanted to be "more anonymous"/ less identify-able, i would go to (for example) a local school that has open wireless access, and no one to watch who is using it. but they do have security cameras, so, to be anonymous, you need to sit somewhere where the camera can't see you.


long story short, it's still a cat-and-mouse game. measure/ countermeasure.

aeondaze
13th June 2013, 07:00 AM
It is not wrong to want privacy. Do you leave the door open when you take a shit? If not, why not? It's not wrong, what have you to hide?

Just because I'm an honest guy doesn't mean I want unauthorized third parties having access to my private conversations and exchanges.

And for what it's worth, I do stand up and speak my mind. I do what I damn well please.

SPOT ON!

I've used this analogy personaly with people that make that statement "what have you got to hide"

"Why do you close the toilet door when you shit?"

"Thats not the same thing"

"Sure it is. What are you doing in there, what are you trying to hide"

"Don't make fun of my bodily needs..."

"How fucking dare you insinuate your deisre for privacy when taking a shit is more important and somehow different than my desire for the privacy of my family and children"

and I usually back that up with this...

"Its a wonder of nature how people like you with very little intelectual acumen, who know naught about fascist tendencies nor the history of totalitarian governements somehow naturally gravitate toward this mode of thinking. All I can put it down to is a near pathological need for reassurance combined and an insecurity complex that leaves you easily intimidated which results in irational and voilent outbursts against those fearless in the face of opression and unwavering in their support for individual privacy as an inalianable right. You're a pathetic coward drowning in self loathing who's only pleasure in life is attempting to drag those with honour and courage down to the same gutter you inhabit. Clearly, you have a LOT more to hide than myself"

Blink
13th June 2013, 07:36 AM
"Its a wonder of nature how people like you with very little intelectual acumen, who know naught about fascist tendencies nor the history of totalitarian governements somehow naturally gravitate toward this mode of thinking. All I can put it down to is a near pathological need for reassurance combined and an insecurity complex that leaves you easily intimidated which results in irational and voilent outbursts against those fearless in the face of opression and unwavering in their support for individual privacy as an inalianable right. You're a pathetic coward drowning in self loathing who's only pleasure in life is attempting to drag those with honour and courage down to the same gutter you inhabit. Clearly, you have a LOT more to hide than myself"



Excellent rebuke......

horseshoe3
13th June 2013, 07:58 AM
When I see something like the burner phone, my first thought is "Cool". My second thought is, "It would sure make a lot of sense for TPTB to market something like this. They could herd all the privacy minded people into their burner phones and keep track of them." As an added bonus, people would feel more free to talk, thinking that they were untraceable and not knowing they had made themselves a target and are now giving up the goods.

iOWNme
13th June 2013, 01:27 PM
It is not wrong to want privacy. Do you leave the door open when you take a shit? If not, why not? It's not wrong, what have you to hide?

Just because I'm an honest guy doesn't mean I want unauthorized third parties having access to my private conversations and exchanges.

And for what it's worth, I do stand up and speak my mind. I do what I damn well please.


I didnt say anything about personal privacy, dont twist my words.

If you are going about your daily life, making phone calls or emails you have no moral obligation to do those things undercover because CRIMINALS may be watching/listening. As a matter of fact, you do have a moral obligation to do/say those things TWICE AS LOUD.

All you are doing is SELF SENSORING = Exactly what TPTB want because they know they cannot physically control you.

They rely on you to sensor yourself.

sirgonzo420
13th June 2013, 02:10 PM
I didnt say anything about personal privacy, dont twist my words.

If you are going about your daily life, making phone calls or emails you have no moral obligation to do those things undercover because CRIMINALS may be watching/listening. As a matter of fact, you do have a moral obligation to do/say those things TWICE AS LOUD.

All you are doing is SELF SENSORING = Exactly what TPTB want because they know they cannot physically control you.

They rely on you to sensor yourself.

There is a difference between private communication and general privacy and not hiding your thoughts and actions.

If you and I want to communicate with each other privately via encrypted messages, that is our prerogative. We are not hiding or censoring anything by keeping our exchange private.

Can't you appreciate the fact that some people want to communicate privately - not to hide anything - but simply not to be violated by eavesdropping?

Your argument appears to be basically "Why hide your/thoughts/communications/actions since you aren't doing anything wrong?"

If your point is not to modify behavior because of government snooping, realize that speaking twice as loud is still a modification of behavior.

Sometimes changing times require changing behavior.

Years ago, people could have private conversations without unauthorized third parties, and with relative ease.

Today, to have private conversations without unauthorized third parties, one must try a bit harder than in the past.

Of course, you can forsake your right to privacy, which is also your right. I can understand where you are coming from too.

Serpo
13th June 2013, 03:11 PM
http://www.activistpost.com/2013/06/7-powerful-ways-to-maintain-your.html

sirgonzo420
13th June 2013, 03:42 PM
http://prism-break.org/

Prism-break.org has lots of open-source software to make snooping a great deal more difficult.


Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software.

sirgonzo420
13th June 2013, 04:03 PM
Here's a useful interactive chart for understanding how Tor and HTTPS affects privacy:

https://www.eff.org/pages/tor-and-https

iOWNme
13th June 2013, 04:17 PM
I think we agree and dont even know it. LOL


There is a difference between private communication and general privacy and not hiding your thoughts and actions.

Of course there is a differnce. I didnt state it because i thought it was obvious. My entire post was directed towards the 'not hiding your thoughts and actions' category.



Can't you appreciate the fact that some people want to communicate privately - not to hide anything - but simply not to be violated by eavesdropping?

Umm....Of course i do. I wasnt talking about that, i was talking about people self sensoring themselves because they are to afraid 'Big Brother' is watching. Which is EXACTLY what 'Big Brother' wants you to do: Police yourself, because they know they cannot physically do it.


Your argument appears to be basically "Why hide your/thoughts/communications/actions since you aren't doing anything wrong?"

For the point i was making, yes this is correct. I NEVER said you should shit with the door open;....(As you insinuated).


If your point is not to modify behavior because of government snooping, realize that speaking twice as loud is still a modification of behavior.

I NEVER used the words 'behavior modification'. Why are you being so disingenuous? I simply stated if you are speaking your mind, you should do it more often and louder should you find out 'they' are snooping. Its my opinion.

palani
13th June 2013, 04:24 PM
Think 'code'.

An example ... A major fortune 500 company once gave their employees a list of 20 time wasting practices. No. 16 was 'coffee breaks'.

So when on the maintenance radios the mechanics would communicate by calling another by name followed by 'sixteen'.

PatColo
14th June 2013, 08:40 PM
7 Powerful Ways to Maintain Your Privacy and Integrity Online (http://www.collective-evolution.com/2013/06/13/7-powerful-ways-to-maintain-your-privacy-and-integrity-online/)


http://cdn3.collective-evolution.com/assets/uploads/2013/06/prism-slide-4.jpg (http://www.collective-evolution.com/2013/06/13/7-powerful-ways-to-maintain-your-privacy-and-integrity-online/)


Oh how i spy on thee - Let me count the ways... (http://www.collective-evolution.com/2013/06/13/7-powerful-ways-to-maintain-your-privacy-and-integrity-online/)


The recent NSA leaks from whistleblower Ed Snowden have publicly confirmed that digital privacy does not exist. The federal government and intelligence agencies have direct server access to the world’s most popular sites and services including Facebook, Google, Microsoft, Apple, and more.
( collective-evolution.com)

more: http://www.collective-evolution.com/2013/06/13/7-powerful-ways-to-maintain-your-privacy-and-integrity-online/

Posted by foon1e (http://www.blogger.com/profile/11620170404653771913) at 10:27 AM 1 comment: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=434288986299274755)

PatColo
15th June 2013, 03:05 AM
7 Powerful Ways to Maintain Your Privacy and Integrity Online (http://www.collective-evolution.com/2013/06/13/7-powerful-ways-to-maintain-your-privacy-and-integrity-online/)

A few hours ago I installed one of the free browser plugins which this ^ article reco's, "Do Not Track Me". So far no problems, seems pretty unobtrusive, outside of the initial popup forcing me to acknowledge the little icon it installed in the browser's toolbar. Opening the "my stats" page, it claims to have blocked 187 trackers now.

From their site: (https://www.abine.com/how-donottrackme-works/)


Every time you go online, you are being watched. Not anymore!

Now when you surf the web, DoNotTrackMe (https://www.abine.com/dntdetail.php) automatically blocks all tracking requests made by the websites you’re visiting. DNTMe also blocks annoying pop up ads, and loads certain websites up to 4 times faster. Check out the resources below to learn more about how online tracking works.


What is online tracking? (https://www.abine.com/what-is-online-tracking/)
Private browsing vs. DNTMe (https://www.abine.com/private-browsing-vs-donottrackme/)
Online tracking 101 (https://www.abine.com/infographics/what_is_online_tracking_infographic.php)
DNTMe FAQ & troubleshooting (https://www.abine.com/donottrackme/faq/)


Keep your email address safe with MaskMe BETA. Create an account to receive unlimited disposable email addresses that forward straight to your inbox.


Free Download (https://www.abine.com/how-donottrackme-works/#)
Learn More (https://www.abine.com/maskme/)


DeleteMe removes your personal information from the largest websites that collect and sell it.


20% Off Today (https://www.abine.com/deleteme/landing.php?utm_medium=DNTP-Product&utm_source=donottrackme)


Stop websites and companies from secretly tracking your activity on the web.


Free Download (https://www.abine.com/how-donottrackme-works/#)
Learn More (https://www.abine.com/donottrackme/)




other free privacy apps I run and reco' are CCleaner & NoScript.

PatColo
15th June 2013, 07:23 AM
Firefox plug-in warns users of NSA surveillance (http://rt.com/usa/prism-floyd-nsa-surveillance-723/)

Get short URL (http://rt.com/usa/prism-floyd-nsa-surveillance-723/)
Published time: June 14, 2013 19:43
Edited time: June 15, 2013 02:23
http://rt.com/files/news/1f/6d/30/00/5.si.jpg

AFP Photo / Leon Neal






Trends
NSA leaks (http://rt.com/trends/nsa-leaks-snowden-surveillance/) Tags
Internet (http://rt.com/tags/internet/), Security (http://rt.com/tags/security/), Social networks (http://rt.com/tags/social-networks/), USA

(http://rt.com/tags/usa/)


Ticking away the moments that make up a dull day? The government is likely logging even the most mundane day-to-day computer habits of millions of Americans, but there’s a way to stand up against surveillance while also rocking out.


According to leaked NSA documents published by The Guardian last week, the United States National Security Agency is conducting dragnet surveillance of the communications of Americans, regularly receiving phone records for millions of Verizon customers while also being capable of accessing the conversations that occur over Facebook, Google and several other major Internet names through a program called PRISM. Now a 28-year-old artist and developer from Brooklyn, New York has found a fun way of warning computer users about potential government surveillance, and he’s incorporated one of the best-selling rock albums ever in the process.


Justin Blinder released a plugin for the Web browser Firefox this week, and he’s already seeing a positive response in the press if not just based off of the idea alone. His “The Dark Side of the Prism” browser extension alerts Web surfers of possible surveillance by starting up a different song from Pink Floyd’s 1973 classic “The Dark Side of the Moon” each time a questionable site is crossed.



http://rt.com/files/news/1f/6d/30/00/14.jpgPRISM

Blinder told the Guardian that he built the program over the course of four hours with the hopes he could "create some sort of ambient notification that you are on a site that is being surveiled by the NSA."


"I was really interested in the fact that, although the PRISM leaks were a shock to many of us, we pretty much already kind of know we're being surveiled a lot of the time and giving away so much data," he said.


Upon news of the phone tracking program, even members of Congress said they couldn’t get over how much information was being shared between the telecoms and the government. Walking out of a briefing this Wednesday, Rep. Loretta Sanchez (D-California) said, "What we learned in there is significantly more than what is out in the media today,” and described her reaction as “astounded.” Sen. Rand Paul (R-Kentucky) said the program “represents an outrageous abuse of power and a violation of the Fourth Amendment to the Constitution,” and the American Civil Liberties Union has sued the government with a similar complaint filed in federal court.


Separate from leaking a document about the NSA’s access to phone records, former intelligence contractor Edward Snowden also gave The Guardian evidence of Microsoft, Google, Facebook, Yahoo, AOL and others sharing private communications of customers with the government. When “The Dark Side of the Prism” is installed, users of those sites will be reminded with one of the most iconic albums of the twentieth century.

"I just Googled 'Prism' and the cover came up," Blinder said. It just so happened that the long-time best-seller also fits the mood for exactly what the programmer was looking for.


"I didn’t want it to be too jarring because a lot of us seem to be giving in to being surveiled on a daily basis. I feel like people already know that. I didn't want it to be alarming,” he said.



http://rt.com/files/news/1f/6d/30/00/12.jpgImage from pinkfloyd.com

“The Dark Side of the Moon” was Pink Floyd’s eighth studio album and most commercially successfully, selling roughly 50 million copies and landing on the Billboard charts for 741 consecutive weeks. Surveillance, on the other hand, isn’t quite as popular: according to a Post/Washington Post poll released this week, 52 percent of Americans oppose the PRISM program.


With regards to Snowden, the American public is largely polarized on the issue. He’s been labeled as both a traitor and whistleblower and is currently the target of a Department of Justice investigation.


“He’s not a whistleblower, by the way, because a whistleblower actually wants the rule of law to be enforced,” Jeremy Bash, the former chief of staff for then-CIA Director Leon Panetta, told Politics Confidential this week. “He copied documents and he made a run for it. He may be actually aiding our enemies.”


On his part, Snowden said he leaked the documents because, “I can't in good conscience allow the US government to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building.”


Earlier this year, Pink Floyd lyricist Roger Waters lent his support to Army Private first class Bradley Manning, who is currently on trial for the largest intelligence leak in US history.


“We need more whistl blowers,” Waters wrote in a statement. “Blowing the whistle on our behalf is not just brave, it is heroic and it is our duty.”






Comments (46)
http://rt.com/usa/prism-floyd-nsa-surveillance-723/

Serpo
15th June 2013, 03:22 PM
Full NSA access built into every Windows OS since 1997
June 15 2013


Permalink
Deeze posted the following to the forum:


From Heise.de

How NSA access was built into Windows

Duncan Campbell 04.09.1999

Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.

Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.

A second key

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.

"For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked. Can the loophole be turned round against the snoopers?
Read More HERE. My comments follow:
Last summer I got contacted by a Microsoft programmer, who blew the whistle on Microsoft intentionally sabotaging the operating system, and then running closed code to conceal to the majority just how penetrable the operating system is for a chosen few. This programmer went on to say that for a price, if one Jewish corporation was in a battle against a non Jewish corporation, Microsoft would provide information about intentional back doors built into the competitor's computers, so that the zionist company could go in and entirely rape their data.


He also went further, and said that both McCaffee and Norton work closely with Microsoft, and build additional back doors competitors can exploit the same way and that these security suites do nothing to plug Microsoft's back doors and instead provide a different flavor of method for raping data, (the difference being like your preference for either Word or Wordperfect). In the same way Microsoft will allow a system rape, these additional paid for back doors can be used to destroy individuals by allowing ordinary priviledged people full access to your system, even if they are not an intelligence agency at all. Bottom line? The only secure system is a small fully open source Linux system that you can read through yourself and verify secure. Any Microsoft O.S. is as intentionally penetrable as your cell phone, which is also inevitably the product of a zionist corporation.

I had asked this programmer for the specifics, but then, as usual, all contact got cut and I received no further info, and this communication took place through a fresh mailbox for as long as it lasted (he was able to respond ONCE).

So it is far beyond just the NSA, if you are wondering how your competitor released your idea before you ever spoke about it to ANYONE, that is exactly how.


http://www.jimstonefreelance.com/

Cebu_4_2
15th June 2013, 04:34 PM
Here is the link for the Prism add-on which I could not find for hours... https://addons.mozilla.org/en-US/firefox/addon/dark-side-of-the-prism/

PatColo
15th June 2013, 07:30 PM
Full NSA access built into every Windows OS since 1997
June 15 2013
[...]
http://www.jimstonefreelance.com/

when was the msft monopoly prosecution by the injustice dept taking place again? In a recent spingola podcast (which?) I recall her & guest speculating about how that msft case went away quietly, the result of closed-door negotiations with bgates. And it was since around then that gates became more involved in "charities" including injecting as many as possible with "vaccine" bioweapons. If their OS's & apps weren't already compromised with backdoors before then, they've surely been since.

PatColo
15th June 2013, 07:36 PM
Here is the link for the Prism add-on which I could not find for hours... https://addons.mozilla.org/en-US/firefox/addon/dark-side-of-the-prism/

I'll hold off on installing that for the moment- not sure I want pink floyd randomly playing as I surf, often listening to podcasts at the same time. Anyone who installs, please review here. Here again is the RT article describing it,
http://rt.com/usa/prism-floyd-nsa-surveillance-723/

a few reviews at the mozilla page confirming my suspicions,


Reviews Rated 3 out of 5 stars by cockneyreject (https://addons.mozilla.org/en-US/firefox/user/cockneyrejct/) on June 15, 2013 · permalink (https://addons.mozilla.org/en-US/firefox/addon/dark-side-of-the-prism/reviews/477150/)
Love the idea, but has been said a way to switch the music off is badly needed.....it went nuts on this page!!! http://www.opednews.com/articles/See-You-On-The-Dark-Side-by-Pepe-Escobar-130613-763.html

Needs a better visual or short sound alert Rated 3 out of 5 stars by Tommy6860 (https://addons.mozilla.org/en-US/firefox/user/tommy6860/) on June 15, 2013 · permalink (https://addons.mozilla.org/en-US/firefox/addon/dark-side-of-the-prism/reviews/477148/)
While this appears to work, it happens just about at any website I visit and the music becomes annoying. I get the connection to the NSA's Prism and Pink Floyd's album logo, but the never-ending music really interferes with browsing the net. I especially noticed on any site that has the plug-ins for Facebook, Google+, Twitter, etc, that it sets off this extension.

Rated 3 out of 5 stars by JoyMarieC (https://addons.mozilla.org/en-US/firefox/user/JoyMarieC/) on June 15, 2013 · permalink (https://addons.mozilla.org/en-US/firefox/addon/dark-side-of-the-prism/reviews/477116/)
I have to agree with raven1962 I was very excited about this idea. However I had to uninstall it also. While opening many different windows while working I had all the songs playing at once..Quite the medley! I believe that a cut off of music option would be a great addition. Since most of us have to visit some of theses sites in our work! Thanks I will try it again should you add the feature. Just knowing which they are at least gives me a choice. Thanks for your work!

Cebu_4_2
15th June 2013, 09:46 PM
Once it goes off it doesn't stop until you close the page. It went off with facebook and I couldn't access any of my apps. It blocked them which I guess is good but no option to unblock any specific page. Had to disable it for now.