Items tagged with: Surveillance

#Surveillance Techniques: How Your Data Becomes Our #Data


All your data are belong to U.S.

Don't trust a three-letter #organization: #nsa #fbi #cia #usa #gov #dhs #DoD
#snowden #fail #freedom #politics #democracy #justice #privacy #HumanRights

Domestic Surveillance Techniques - Our Data Collection Program

How the Domestic Surveillance Directorate collects information about U.S. citizens
Link to source
skanda42 5 years ago

#Surveillance Techniques: How Your Data Becomes Our #Data


All your data are belong to U.S.

Don't trust a three-letter #organization: #nsa #fbi #cia #usa #gov #dhs #DoD
#snowden #fail #freedom #politics #democracy #justice #privacy #HumanRights

Domestic Surveillance Techniques - Our Data Collection Program

How the Domestic Surveillance Directorate collects information about U.S. citizens

Kill bill C-51

#Petition #Canada #Privacy #C-51 #Spy #censorship #censor #surveillance

Dear MPs: We demand to be heard on Bill C-51

Parliament is about to resume on Monday, with no plan to deal with C-51’s dangerous spy powers. I emailed my MP demanding to be heard – will you email yours?
Link to source
skanda42 5 years ago

Kill bill C-51

#Petition #Canada #Privacy #C-51 #Spy #censorship #censor #surveillance

Dear MPs: We demand to be heard on Bill C-51

Parliament is about to resume on Monday, with no plan to deal with C-51’s dangerous spy powers. I emailed my MP demanding to be heard – will you email yours?
Link to source
Steph20 5 years ago

This Company Has Built a Profile on Every American Adult

zobrazit v plné velikosti

“Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to search troves of public and nonpublic records—known addresses, DMV records, photographs of a person’s car—and condense them into comprehensive reports costing as little as $10. Now they can combine that information with the kinds of things marketers know about you, such as which politicians you donate to, what you spend on groceries, and whether it’s weird that you ate in last night, to create a portrait of your life and predict your behavior.”

“IDI, a year-old company in the so-called data-fusion business, is the first to centralize and weaponize all that information for its customers. The Boca Raton, Fla., company’s database service, idiCORE, combines public records with purchasing, demographic, and behavioral data. Chief Executive Officer Derek Dubner says the system isn’t waiting for requests from clients—it’s already built a profile on every American adult, including young people who wouldn’t be swept up in conventional databases, which only index transactions. “We have data on that 21-year-old who’s living at home with mom and dad,” he says.”

“Dubner declined to provide a demo of idiCORE or furnish the company’s report on me. But he says these personal profiles include all known addresses, phone numbers, and e-mail addresses; every piece of property ever bought or sold, plus related mortgages; past and present vehicles owned; criminal citations, from speeding tickets on up; voter registration; hunting permits; and names and phone numbers of neighbors. The reports also include photos of cars taken by private companies using automated license plate readers—billions of snapshots tagged with GPS coordinates and time stamps to help PIs surveil people or bust alibis.”
The present and future look like this. It grows in every country (at different speed). Can we soon be honest about it and call it the new grand blackmail of citizens? Corporations and government knows everything about you and can use that power in unfair way, you are naked in their eyes. As naked you become vulnerable, easy to be pressured, manipulated. Knowing you're exposed you censor yourself. What if the future offers personal/indivudual prices on goods and services based on the fusion data collected on you. Would they be to your advantage or disadvantage? We are not only losing our sense of privacy, many are blindly giving it away. The vultures are having a feast.

#Article #Surveillance #DataCollection #Technology #Privacy #Information #IDI #Corporation #DataFusion
Link to source
Palantír 6 years ago from Diaspora

New Report: FBI Can Access Hundreds of Millions of Face Recognition Photos

zobrazit v plné velikosti
The FBI has quietly built up a database of 412 Million portraits, which can be automatically scanned to identify suspects who appear on surveillance photos.

Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos than we ever thought. And the Bureau has been hiding this fact from the public—in flagrant violation of federal law and agency policy—for years.

According to the GAO Report, FBI’s Facial Analysis, Comparison, and Evaluation (FACE) Services unit not only has access to FBI’s Next Generation Identification (NGI) face recognition database of nearly 30 million civil and criminal mug shot photos, it also has access to the State Department’s Visa and Passport databases, the Defense Department’s biometric database, and the drivers license databases of at least 16 states. Totaling 411.9 million images, this is an unprecedented number of photographs, most of which are of Americans and foreigners who have committed no crimes.
All collected information can and will be used against you in the future. This time it was the US, next some country in Europe. The awful trend is continuing in one dire direction...sigh. This new database have been used since April 2015 according to the report, and since then the FBI have made 36000 searches in the database.

#Article #EFF #Privacy #Transparancy #DataCollection #FaceRecognition #Surveillance
Link to source
Palantír 6 years ago from Diaspora

Creepy startup will help landlords, employers and online dates strip-mine intimate data from your Facebook page

zobrazit v plné velikosti

A new startup wants to take a "deep dive" into the private social media activity of prospective tenants—their chats, check-ins, how many times they've posted words like "pregnant" or "loan"—and score their "personality" for their potential landlord. Why would anyone let this happen? Because "people will give up their privacy to get something they want," Steve Thornhill, co-founder of the British startup Score Assured tells The Washington Post.

zobrazit v plné velikosti

For a bulk subscription fee, the landlord could "optionally" require all prospective tenants to grant Tenant Assured full access to their Twitter, Facebook, Instagram and LinkedIn profiles. Then "analytical software" starts mining everything they've ever done there.

How many times did they check-in to that bar? What online retail logins do they use? How often has their relationship status changed? Do they par_tay__? _That and a disconcerting more gets assessed into a "financial stress level" as well as a breakdown of five personality traits—"extraversion, neuroticism, openness, agreeableness, and conscientiousness"—and the report is sent to the landlord.

Thornhill is aware that some things—like age and pregnancy, which are protected statuses under the U.S. housing discrimination law—can't legally be used as factors in determining someone's qualifications as a tenant. "All we can do is give them the information," Thornhill told _The Washington Post. _"It's up to landlords to do the right thing." Wink wink.

zobrazit v plné velikosti

Is this illegal? "Clearly it raises alarm bells," Seth A. Miller of Collins, Dobkin & Miller LLP, which specializes in housing and landlord/tenant law tells me in an email:
"In NYC, there is an expanded list of categories of people that cannot be discriminated against: not just race, national origin, religion, ethnicity and gender, but also source of income and lawful profession. Generally, asking a tenant about whether he or she is a member of such a group can be evidence of discrimination. [Tenant Score] facilitates this kind of discrimination. If that's the idea, then the designer of [Tenant Score] may be legally exposed, despite the claim that it is only passing information along. Even if the makers of [Tenant Score], and the landlords who use it, manage to evade legal liability, it should be made illegal. People should not be forced to join social media just to rent an apartment, and landlords and employers should not have the right to view posts that were not written for them to read."

Even though the landlord doesn't directly view the social media posts, the tenant report includes "activity times" and whether they mentioned words like "no money," "being poor," "staying in," "terrorist," "fraud" and "justice." Seth A. Miller:
"I would think that all of the metadata that could be generated from analyzing a person's private social media posts would fall into the category of material that was not intended by the author to be seen by anyone but the intended recipient of the posts. That doesn't make it illegal, but that is what makes it so creepy."
Tenant Assured is just the beginning of Score Assured's bold vision for the future. _Washington Post: _
By the end of July, the company expects to be offering specialized versions of the service to everyone from employers and HR departments to parents shopping around for nannies. Some day, Thornhill imagines, you won't hire a dog sitter or book an Airbnb without first viewing their social media dossier, as compiled by his company.
There is a variety of ways in which the startup's aspirations would fuck you. Some of them aren't even intentional, just wonky. For example, when a _Telegraph Money_ ran the software on their own people—who happen to post things with the words "loan" in it, being money reporters—the algorithm gave them some negative points in the financial stability department.

It's inaccurate and discriminatory. And it's so so creepy, as is everything Thornhill says in interviews, like "If you're living a normal life, then, frankly, you have nothing to worry about."

[+] [+]

#privacy #corporatesurveillance #landlords #employers #dating #surveillance #facebook

New Startup That Sends Dossiers On Your Private Social Media Profiles To Potential Landlords Should Be Illegal

A new startup wants to take a “deep dive” into the private social media activity of prospective tenants—their chats, check-ins, how many times they’ve posted words like “pregnant” or “loan”—and score their “personality” for their potential landlord. Why would anyone let this happen? Because “people will give up their privacy to get something they want,” Steve Thornhill, co-founder of the British startup Score Assured tells The Washington Post.
Link to source
atom jack 6 years ago from Diaspora
Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption by 7 Years

zobrazit v plné velikosti

From The Intercept:
When pressed by The Intercept to explain his figure, Clapper said it came from the National Security Agency. “The projected growth maturation and installation of commercially available encryption — what they had forecasted for seven years ahead, three years ago, was accelerated to now, because of the revelation of the leaks.”

Asked if that was a good thing, leading to better protection for American consumers from the arms race of hackers constantly trying to penetrate software worldwide, Clapper answered no.

“From our standpoint, it’s not … it’s not a good thing,” he said.
When coming from an agency, and a nation that defines anything and everyone as terrorists when it suits them, this alone proves why we need strong and easy to use encryption everywhere. It should be more effort to turn off encryption than to just leave it on.

#nsa #encryption #privacy #surveillance
Link to source
Harald Eilertsen 6 years ago from Diaspora
#Facebook usage over #Tor passes 1M per month fuelling a massive #surveillance site/network though

TechCrunch: Facebook usage over Tor passes 1M per month (Natasha Lomas)

The number of people using the Tor anonymizing browser to access Facebook has passed the one million mark this month for the first time, Facebook has..
Link to source
Dr. Roy Schestowitz (罗伊) 6 years ago from Diaspora

security alert: modern cpus from intel and amd have an build-in backdoor

Modern cpus from intel and amd have build-in co-processors, which run besides the operating system and the code is proprietary. So even if you are running gnu/linux, it can leak your private keys! For more details, read on: (and don´t forget to #share this post, thanks)

Why is the latest Intel hardware unsupported in libreboot? #intel

It is extremely unlikely that any post-2008 Intel hardware will ever be supported in libreboot, due to severe security and freedom issues; so severe, that the libreboot project recommends avoiding all modern Intel hardware. If you have an Intel based system affected by the problems described below, then you should get rid of it as soon as possible. The main issues are as follows:

Intel Management Engine (ME) #intelme

Introduced in June 2006 in Intel's 965 Express Chipset Family of (Graphics and) Memory Controller Hubs, or (G)MCHs, and the ICH8 I/O Controller Family, the Intel Management Engine (ME) is a separate computing environment physically located in the (G)MCH chip. In Q3 2009, the first generation of Intel Core i3/i5/i7 (Nehalem) CPUs and the 5 Series Chipset family of Platform Controller Hubs, or PCHs, brought a more tightly integrated ME (now at version 6.0) inside the PCH chip, which itself replaced the ICH. Thus, the ME is present on all Intel desktop, mobile (laptop), and server systems since mid 2006.

The ME consists of an ARC processor core (replaced with other processor cores in later generations of the ME), code and data caches, a timer, and a secure internal bus to which additional devices are connected, including a cryptography engine, internal ROM and RAM, memory controllers, and a direct memory access (DMA) engine to access the host operating system's memory as well as to reserve a region of protected external memory to supplement the ME's limited internal RAM. The ME also has network access with its own MAC address through an Intel Gigabit Ethernet Controller. Its boot program, stored on the internal ROM, loads a firmware "manifest" from the PC's SPI flash chip. This manifest is signed with a strong cryptographic key, which differs between versions of the ME firmware. If the manifest isn't signed by a specific Intel key, the boot ROM won't load and execute the firmware and the ME processor core will be halted.

The ME firmware is compressed and consists of modules that are listed in the manifest along with secure cryptographic hashes of their contents. One module is the operating system kernel, which is based on a proprietary real-time operating system (RTOS) kernel called "ThreadX". The developer, Express Logic, sells licenses and source code for ThreadX. Customers such as Intel are forbidden from disclosing or sublicensing the ThreadX source code. Another module is the Dynamic Application Loader (DAL), which consists of a Java virtual machine and set of preinstalled Java classes for cryptography, secure storage, etc. The DAL module can load and execute additional ME modules from the PC's HDD or SSD. The ME firmware also includes a number of native application modules within its flash memory space, including Intel Active Management Technology (AMT), an implementation of a Trusted Platform Module (TPM), Intel Boot Guard, and audio and video DRM systems.

The Active Management Technology (AMT) application, part of the Intel "vPro" brand, is a Web server and application code that enables remote users to power on, power off, view information about, and otherwise manage the PC. It can be used remotely even while the PC is powered off (via Wake-on-Lan). Traffic is encrypted using SSL/TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known vulnerabilities, which have been exploited to develop rootkits and keyloggers and covertly gain encrypted access to the management features of a PC. Remember that the ME has full access to the PC's RAM. This means that an attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open files, all running applications, all keys pressed, and more.

Intel Boot Guard is an ME application introduced in Q2 2013 with ME firmware version 9.0 on 4th Generation Intel Core i3/i5/i7 (Haswell) CPUs. It allows a PC OEM to generate an asymmetric cryptographic keypair, install the public key in the CPU, and prevent the CPU from executing boot firmware that isn't signed with their private key. This means that coreboot and libreboot are impossible to port to such PCs, without the OEM's private signing key. Note that systems assembled from separately purchased mainboard and CPU parts are unaffected, since the vendor of the mainboard (on which the boot firmware is stored) can't possibly affect the public key stored on the CPU.

ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called "Protected Audio Video Path" (PAVP). The ME receives from the host operating system an encrypted media stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the GPU, which then decrypts the media. PAVP is also used by another ME application to draw an authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC's screen in a way that the host OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core i3/i5/i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called "Intel Insider". Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the omnipotent capabilities of the ME: this hardware and its proprietary firmware can access and control everything that is in RAM and even everything that is shown on the screen.

The Intel Management Engine with its proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and mouse movements, and even capture or display images on the screen. And it has a network interface that is demonstrably insecure, which can allow an attacker on the network to inject rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a threat to freedom, security, and privacy that can't be ignored.

Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be removed entirely from the flash memory space. libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel Core i3/i5/i7 CPU and a PCH, include "ME Ingition" firmware that performs some hardware initialization and power management. If the ME's boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.

Due to the signature verification, developing free replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn't release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME's boot ROM would reject any modified firmware that isn't signed by Intel. Thus, the ME firmware is both hopelessly proprietary and "tivoized".

In summary, the Intel Management Engine and its applications are a backdoor with total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the libreboot project strongly recommends avoiding it entirely. Since recent versions of it can't be removed, this means avoiding all recent generations of Intel hardware.

More information about the Management Engine can be found on various Web sites, including, the smashthestack network, coreboot wiki, and Wikipedia. The book Platform Embedded Security Technology Revealed describes in great detail the ME's hardware architecture and firmware application modules.

Firmware Support Package (FSP) #fsp

On all recent Intel systems, coreboot support has revolved around integrating a blob (for each system) called the FSP (firmware support package), which handles all of the hardware initialization, including memory and CPU initialization. Reverse engineering and replacing this blob is almost impossible, due to how complex it is. Even for the most skilled developer, it would take years to replace. Intel distributes this blob to firmware developers, without source.

Since the FSP is responsible for the early hardware initialization, that means it also handles SMM (System Management Mode). This is a special mode that operates below the operating system level. It's possible that rootkits could be implemented there, which could perform a number of attacks on the user (the list is endless). Any Intel system that has the proprietary FSP blob cannot be trusted at all. In fact, several SMM rootkits have been demonstrated in the wild (use a search engine to find them).

CPU microcode updates #microcode

All modern x86 CPUs (from Intel and AMD) use what is called microcode. CPUs are extremely complex, and difficult to get right, so the circuitry is designed in a very generic way, where only basic instructions are handled in hardware. Most of the instruction set is implemented using microcode, which is low-level software running inside the CPU that can specify how the circuitry is to be used, for each instruction. The built-in microcode is part of the hardware, and read-only. Both the circuitry and the microcode can have bugs, which could cause reliability issues.

Microcode updates are proprietary blobs, uploaded to the CPU at boot time, which patches the built-in microcode and disables buggy parts of the CPU to improve reliability. In the past, these updates were handled by the operating system kernel, but on all recent systems it is the boot firmware that must perform this task. Coreboot does distribute microcode updates for Intel and AMD CPUs, but libreboot cannot, because the whole point of libreboot is to be 100% free software.

On some older Intel CPUs, it is possible to exclude the microcode updates and not have any reliability issues in practise. All current libreboot systems work without microcode updates (otherwise, they wouldn't be supported in libreboot). However, all modern Intel CPUs require the microcode updates, otherwise the system will not boot at all, or it will be extremely unstable (memory corruption, for example).

Intel CPU microcode updates are signed, which means that you could not even run a modified version, even if you had the source code. If you try to upload your own modified updates, the CPU will reject them. In other words, the microcode updates are tivoized.

The microcode updates alter the way instructions behave on the CPU. That means they affect the way the CPU works, in a very fundamental way. That makes it software. The updates are proprietary, and are software, so we exclude them from libreboot. The microcode built into the CPU already is not so much of an issue, since we can't change it anyway (it's read-only).

Intel is uncooperative #intelbastards

For years, coreboot has been struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot developers, and companies, have tried to get Intel to cooperate; namely, releasing source code for the firmware components. Even Google, which sells millions of chromebooks (coreboot preinstalled) have been unable to persuade them.

Even when Intel does cooperate, they still don't provide source code. They might provide limited information (datasheets) under strict corporate NDA (non-disclosure agreement), but even that is not guaranteed. Even ODMs and IBVs can't get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).

Recent Intel graphics chipsets also require firmware blobs.

Intel is only going to get worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to change their policies and to be more friendly to the free software community. Reverse engineering won't solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a radical change happens within Intel.

Basically, all Intel hardware from year 2010 and beyond will never be supported by libreboot. The libreboot project is actively ignoring all modern Intel hardware at this point, and focusing on alternative platforms.

Why is the latest AMD hardware unsupported in libreboot? #amd

It is extremely unlikely that any post-2013 AMD hardware will ever be supported in libreboot, due to severe security and freedom issues; so severe, that the libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the problems described below, then you should get rid of it as soon as possible. The main issues are as follows:

AMD Platform Security Processor (PSP) #amdpsp

This is basically AMD's own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the implementation is wildly different.

The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main x86 core startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the x86 cores will not be released from reset, rendering the system inoperable.

The PSP is an ARM core with TrustZone technology, built onto the main CPU die. As such, it has the ability to hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, login data, browsing history, keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM "features" to work as intended), which means that it has at minimum MMIO-based access to the network controllers and any other PCI/PCIe peripherals installed on the system.

In theory any malicious entity with access to the AMD signing key would be able to install persistent malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD firmware in the past, and there is every reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to remotely monitor and control any PSP enabled machine. completely outside of the user's knowledge.

Much like with the Intel Boot Guard (an application of the Intel Management Engine), AMD's PSP can also act as a tyrant by checking signatures on any boot firmware that you flash, making replacement boot firmware (e.g. libreboot, coreboot) impossible on some boards. Early anecdotal reports indicate that AMD's boot guard counterpart will be used on most OEM hardware, disabled only on so-called "enthusiast" CPUs.

AMD IMC firmware #amdimc


AMD SMU firmware #amdsmu

Handles some power management for PCIe devices (without this, your laptop will not work properly) and several other power management related features.

The firmware is signed, although on older AMD hardware it is a symmetric key, which means that with access to the key (if leaked) you could sign your own modified version and run it. Rudolf Marek (coreboot hacker) found out how to extract this key in this video demonstration, and based on this work, Damien Zammit (another coreboot hacker) partially replaced it with free firmware, but on the relevant system (ASUS F2A85-M) there were still other blobs present (Video BIOS, and others) preventing the hardware from being supported in libreboot.

AMD AGESA firmware #amdagesa

This is responsible for virtually all core hardware initialization on modern AMD systems. In 2011, AMD started cooperating with the coreboot project, releasing this as source code under a free license. In 2014, they stopped releasing source code and started releasing AGESA as binary blobs instead. This makes AGESA now equivalent to Intel FSP.

AMD CPU microcode updates #amdmicrocode

Read the Intel section #microcode. AMD's updates are practically the same, though it was found with much later hardware in AMD that you could run without microcode updates. It's unknown whether the updates are needed on all AMD boards (depends on CPU).

AMD is incompetent (and uncooperative) #amdbastards

AMD seemed like it was on the right track in 2011 when it started cooperating with and releasing source code for several critical components to the coreboot project. It was not to be. For so-called economic reasons, they decided that it was not worth the time to invest in the coreboot project anymore.

For a company to go from being so good, to so bad, in just 3 years, shows that something is seriously wrong with AMD. Like Intel, they do not deserve your money.

Given the current state of Intel hardware with the Management Engine, it is our opinion that all performant x86 hardware newer than the AMD Family 15h CPUs (on AMD's side) or anything post-2009 on Intel's side is defective by design and cannot safely be used to store, transmit, or process sensitive data. Sensitive data is any data in which a data breach would cause significant economic harm to the entity which created or was responsible for storing said data, so this would include banks, credit card companies, or retailers (customer account records), in addition to the "usual" engineering and software development firms. This also affects whistleblowers, or anyone who needs actual privacy and security.


#security #alert #backdoor #surveillance #pleaseshare #sharingiscaring #managementengine #me #activemanagementtechnology #amt #government #nsa #gchq #bnd #intelligenceagencies #nationalintelligence #coreboot #libreboot #fsf #blob #proprietary #freesoftware #freehardware
Link to source
Erdmolch 6 years ago from Diaspora
The NSA’s SKYNET program may be killing thousands of innocent people | Ars Technica UK - #nsa #cia #surveillance #phones #assassination

The NSA’s SKYNET program may be killing thousands of innocent people

"Ridiculously optimistic" machine learning algorithm is "completely bullshit," says expert.
Link to source
harry haller ( 6 years ago from Diaspora
#surveillance #privacy #Microsoft #USA

Microsoft case: DoJ says it can demand every email from any US-based provider

Microsoft counsel addresses question of US search warrant for Hotmail emails stored in Ireland: ‘We would go crazy if China did this to us’
Link to source
freebird 6 years ago from Diaspora

Windows 10 automatically sends parents detailed dossier of their children's internet history and computer use

Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.

The operating system sends a weekly note that includes a list of websites children have visited, how many hours per day they have spent on the computer, and for how long they have used their favourite apps, according to reports.

The feature appears to be turned on by default for family accounts — not notifying either children or their parents that they are being spied on — and was reported by parents who hadn’t asked for and weren’t aware of activating the feature themselves.
Well this is fucked up!!

Many people have read Orwell's Nineteen Eighty-Four novel, to me it seems most people noticed the surveillance bit in the book and focus on that. To me, what Winston Smith feared and dreaded the most (beside room 101 rats) was not to be able to trust anybody, fearing that everybody was a snitch. The surveillance bit, however annoying it was, he could still deal with but not being able to having a friend or the constant worry of being betrayed by those close or anyone for that matter took the greatest toll on him.

Some of you may have read the excellent novel by Hans Fallada – Every Man Dies Alone (Alone In Berlin (UK title)) and can link those two books together and know what I mean by the fear of snitching. It is a must read book by-the-way.

Windows 10 and I believe it was introduced in the number 8 have actively made that step, normalising surveillance within your family, that is disgusting. This is the new normal...sigh... #news #Surveillance #windows #internet #children #privacy #spying

Windows 10 has a way of helping parents spy on children and it's terrifying

Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.
Link to source
Palantír 6 years ago from Diaspora
Zuckerberg's Internet dot org will control what billions do online #surveillance and #censorship (by omission)

No Fake Internet: Mark Zuckerberg wants to control what 3 billion people do online

We all deserve access to the real open Internet. Stand with people around the world demanding Zuckerberg stops restricting access to the net.
Link to source
Dr. Roy Schestowitz (罗伊) 7 years ago from Diaspora
Later posts Earlier posts