BeeHive Varna
http://beehive.bg
Тема:
Компютърна сигурност, анонимност, защита на лични данни в Интернет
Заглавие на лекцията:
"Privacy Is Dead, Get Over It REDUX", BeeHive Varna
Лектор:
Мурад Касим, Project Manager & Software Developer at 158 Ltd.
Дата:
10.12.2014 19:10, BeeHive Varna
Място:
BeeHive Co-Working Space, Varna, Bulgaria
Описание:
Това е продължението на оригиналната лекция "Privacy Is Dead" (https://www.youtube.com/watch?v=k_C_2...), която се проведе през октомври 2014 във BeeHive Varna (http://beehive.bg/). Целта на лекцията е да запознае всички хора с това до каква дълбока степен се събират лични данни по всеки един възможен начин за нас и че вече е невъзможно да бъдем аномни в интернет, благодарение на това че ние сами споделяме със всеки един нашите най-съкровени тайни. За всеки човек се изгражда много подробно досие, с което се търгува и ескпериментира по всякакъв възможен начин благодарение на нашето постоянно безразборно споделяне на лична информация.
Първо ще започнем с кратък преглед на причините, заради които компаниите имат интерес да изграждат поведенчески модели за нас, след това ще дадем няколко забавни примери за това как понякога хората споделят твърде лични неща с напълно непознати хора. След това следва една "по-техническа" част, където ще разгледаме накратко как големи компании като Facebook и Google събират данни за потребителите си, какво твърдят, че правят с тях и какво реално правят. Ще си поговорим и малко за нашумялата в последни години мрежа за анонимност Tor. Накрая ще завърша с някои наистина крайно авангардни технологии за следене и наблюдение, които са разработени и патентовани през последните няколко години и вече започват да се прилагат в САЩ.
Събитието във Facebook:
https://www.facebook.com/events/84997...
Благодарим на следните компании, за подкрепата им към събитието:
Beehive Varna - http://beehive.bg/
158 Ltd - http://158ltd.com
телевизия bTV - http://www.btv.bg/
телевизия "Черно Море" - http://www.cherno-more.tv/
списание "VIP" - http://spisanievip.com/
beehive varna, beehive coworking space, beehive.bg, beehive варна, споделено работно място варна, 158, 158ltd, 158ltd.com, компютърна сигурност, лични данни, анонимност, Tor, privacy, computer security, anonymity, network security, security, privacy, personal data, data protection, cybersecurity, privacy protection, protect your data, data collection, google, facebook, personal data collection, privacy policy
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
How to Spot Fake News: Be a Smarter Surfer
Presented by Liz Ryan and Erin Robinson
Derry Public Library
Learn how to spot fake news and pick up strategies on cross referencing, fact checking and avoiding propaganda!
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
How to Spot Fake News: Be a Smarter Surfer
Presented by Liz Ryan and Erin Robinson
Derry Public Library
Learn how to spot fake news and pick up strategies on cross referencing, fact checking and avoiding propaganda!
AI and Fake News: How Technology Has Changed Modern Propaganda QuekelsBaro
If you've been on social media at all in the past decade, you've likely spoken to at least one synthetic person without even realizing it. To be honest, probably more than one.
In this lecture, I introduce several common cognitive biases and logical fallacies, explain how to identify fake news, and suggest steps that can be taken to enhance one's ability to be a smart consumer of news.
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
How to Think in the Information Age: Finding Facts in a Post-Truth WorldSt. Petersburg College
With an ever-increasing daily torrent of information raining on people from almost every perceivable angle, it is impossible to process it all and, more importantly, to “separate the wheat from the chaff.” It is vital for everyone to be able to verify the accuracy and authority of information found on the Web while being able to detect bad data and lies to achieve the final goal of making intelligent decisions. As 21st Century library and information professionals, it is essential that we know how to think in the Information Age and to be able to pass this skill on to our users. In this webinar:
~ discover what misinformation is and explore ways to combat it.
~ learn to recognize misleading news, statistics, graphs, infographics, and more.
~ understand basic fallacies and how to detect bias.
~ appreciate how fast information spreads on social media and gather tools to help you become a stronger digital citizen.
~ utilize the scientific method to become a critical thinker in the Information Age.
Disrupting US elections with social information operation attacks. This presentation shows the role of digital identity in elections. It shares technical and social and combined attacks. It gives an introduction to information operations including false narratives and deep fakes. It provides ideas for technical, social and digital identity specific solutions.
Ed Snowden: hero or villain? And the implications for media and democracyPOLIS LSE
These are slides for a talk to a LSE student society on Ed Snowden and his significance for media and democracy. These are a first attempt to get some thoughts in order so should be seen as exploratory notes rather than some kind of definitive statement - feedback very welcome!
It follows up on my 2012 book on WikiLeaks which looked at the history of WikiLeaks but also put it into a wider context of what it means for politics and journalism.
Med denne brochure giver vi dig et overblik over de ydelser, vi i Nets tilbyder til håndtering af opkrævninger, informationer og dokumenter. Det er løsninger, som du kan integrere
i din software og dermed tilbyde dine kunder endnu mere værdi.
AI and Fake News: How Technology Has Changed Modern Propaganda QuekelsBaro
If you've been on social media at all in the past decade, you've likely spoken to at least one synthetic person without even realizing it. To be honest, probably more than one.
In this lecture, I introduce several common cognitive biases and logical fallacies, explain how to identify fake news, and suggest steps that can be taken to enhance one's ability to be a smart consumer of news.
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
How to Think in the Information Age: Finding Facts in a Post-Truth WorldSt. Petersburg College
With an ever-increasing daily torrent of information raining on people from almost every perceivable angle, it is impossible to process it all and, more importantly, to “separate the wheat from the chaff.” It is vital for everyone to be able to verify the accuracy and authority of information found on the Web while being able to detect bad data and lies to achieve the final goal of making intelligent decisions. As 21st Century library and information professionals, it is essential that we know how to think in the Information Age and to be able to pass this skill on to our users. In this webinar:
~ discover what misinformation is and explore ways to combat it.
~ learn to recognize misleading news, statistics, graphs, infographics, and more.
~ understand basic fallacies and how to detect bias.
~ appreciate how fast information spreads on social media and gather tools to help you become a stronger digital citizen.
~ utilize the scientific method to become a critical thinker in the Information Age.
Disrupting US elections with social information operation attacks. This presentation shows the role of digital identity in elections. It shares technical and social and combined attacks. It gives an introduction to information operations including false narratives and deep fakes. It provides ideas for technical, social and digital identity specific solutions.
Ed Snowden: hero or villain? And the implications for media and democracyPOLIS LSE
These are slides for a talk to a LSE student society on Ed Snowden and his significance for media and democracy. These are a first attempt to get some thoughts in order so should be seen as exploratory notes rather than some kind of definitive statement - feedback very welcome!
It follows up on my 2012 book on WikiLeaks which looked at the history of WikiLeaks but also put it into a wider context of what it means for politics and journalism.
Med denne brochure giver vi dig et overblik over de ydelser, vi i Nets tilbyder til håndtering af opkrævninger, informationer og dokumenter. Det er løsninger, som du kan integrere
i din software og dermed tilbyde dine kunder endnu mere værdi.
In Nets, we have created a strong Nordic supplier of payment, card and information solutions with a staff of more than 2.700. Nets' business objective is to become a leader in the Nordic Region and Northern Europe.
In recent years, we have seen an elimination race in Europe among suppliers of payment, card and information solutions. The winners will be those that are simultaneously able to consolidate their position and to create growth in new markets.
International customers want a single supplier that can handle payments in all their markets. They require us to be able to consistently and cost-effectively handle payments in the market where they are present and demand our services.
Our strong market platform especially in Denmark and Norway opens up an array of ways for Nets to improve customer support domestically as well as in the Nordic and European markets. We will protect our position in Denmark and Norway, and continue to function as a hub of joint development of the payment infrastructure in those countries. Our strong domestic platforms are also the springboard to a stronger market position in the rest of the Nordic Region and in Northern Europe.
Prince William Today Monthly Insert for June - In partnership with the Prince William Area Agency on Aging, the Prince William Chamber of Commerce will host Transitions: An Informational Expo on Aging Gracefully
Nets Share er en løsning til distribution af fysiske og elektroniske dokumenter. Med Nets Share får du mulighed for at sende dine dokumenter til dine kunders fortrukne modtagerkanal - hvad enten det er til e-Boks, e-mail eller fysisk postkasse.
4x4 at SXSW is:
4 speakers that rocked the convention
4 startups or companies to keep an eye on
4 insiders for your next SXSW visit
4 trends that will accompany us in the coming years
Essay about Gender Identity
The Horror Genre Essay
International Students Essay example
The Digital Age Essay
Essay about Tourist Destinations
Essay on Violence
Taking a Vacation Essay
What I Have Learned Essay
Researchers, Discovery and the Internet: What Next?David Smith
A web2.0 issues and implications overview I put together for the Research Information Network as part of their workshop on researchers and discovery services.
http://www.rin.ac.uk/discovery-services-workshop
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
8. Special thanks to legendary
STEVEN RAMBAM
Steven Rambam is an US based Private Investigator who is a regular
speaker at every H.O.P.E. conference and original author of the
original “Privacy Is Dead” talk!
www.stevenrambam.com
9. “PRIVACY IS DEAD, GET OVER IT!” REDUX
SPEAKER: MURAD KASIM
Project Manager, Software Engineer, 158 LTD
10. Table of Contents
● “Hard Facts” - 1h 30 min
Discussing publicly gathered data
● “Last Hopes” - 30 min
Defense tools and best practices to protect your remaining privacy
● “Q&A Panel” - 15 min
Will answer any questions you might have
11. What to expect...
● Sincerity
● A lof of English terms and technical language
● Real data gathered from public sources and investigations
● Some slight adult and controversial content (so if there is
anyone under 18 you need to be with a guardian… I
guess)
● Open. Source. Gathered. Data. Only. PERIOD.
● Walls of text and rooms of raw information
● Name dropping (“Hello, John!”)
● Some memes
● Now, you have been warned!
12. What NOT to expect...
● Hacking social accounts
● Distributing hacking tools
● Anything which might be considered illegal by
international laws
● Using malware
● Sugarcoating of facts
● Fitting in time...
13. The “Starting point”...
● Because of the storage size of databases
● Because of the computational power
available
● Because of the insane amount of devices
and technology available for everyone
● Because of the opening of NEW markets
and WAYS to make money…
● Because anyone barely cares anymore!...
18. And it’s not because they want to invade
your privacy.
It’s because they want to sell you stuff.
You must buy products!
19. Your privacy is worth money.
And it’s not BIG BROTHER who needs it but
BIG MARKETER (not small marketers!)
20. ...and the best source
for data is always self-
contributed information...
21. Every bit, event, friend, photo, text,
emotion and interest, it is you who goes up
there and posts it! Everything is posted on
Twitter and Facebook.
I don’t know about you, me, as a fellow
citizen…
It creeps me out.
It is you who is willfully giving the
information for free
22. ● Based on models, which are developed by aggregating data from
your past behaviors, merged with data from other people and
following statistic models advertising companies are able to
predict your future behavior
● Teenagers (14-20): Games, Music, Movies, Books
● Young adults (20-30): Nightclubs, Drinks, Intimate Partners,
University, Job offers
● Grown adults and families (30+): Insurance, Family care,
Children, Health Care, Mortgages, Travelling, etc.
Predictive Profiling
23. ● It’s not NSA being the “Big Brother” and
collecting data on you. In fact, their scale is
much smaller than what private companies
collect.
● NSA admitted the traffic is so much they cannot
store the real data (not the metadata) for more
than 3 days!
The NSA Hype
24. When I was a kid there was an expression:
“Damn, I wish I haven’t told that!”
25. NOTHING EVER GETS DELETED ANYMORE
Every action, post, feed, tweet is logged,
stored and cross-referenced with other
data which might match you and
probability of relevance is being
calculated.
26. THERE IS NO SENSE OF HUMOR
ANYMORE.
ESPECIALLY IN TECHNOLOGY.
27. ● People now talk freely about their
interests, sexual advances, bad habits,
crimes and everyone is able to see it
everywhere.
● You would be surprised how many
people post pictures of their rape
victims, corpses, weapons, drugs or
even stolen bank loot!
● It is all about the attention!
28.
29.
30.
31.
32. People just don’t care
anymore
A special collection of Steve Rambam’s
investigative searches
37. Now, of course, on Facebook too!
“Hmm… Probably this week is not a good
time to message her!”
38. The “Bulgarian” way
Some things arrive very fast in our country
(from software perspective of view).
But other things, like cutting-edge
hardware technology do not
(for good or bad).
48. The Cellphone - “A snitch in your pocket!”
● The cellphone is one of the most accurate trackers for
a human. You carry it everywhere. You take and even
sleep with it.
● The GPS on most Android phones and ALL iPhones
simply never turns off.
● Peer To Peer GPS reporting
55. Op: Occupy Wall Street
“Occupy Wall Street (OWS) is the name given to a protest movement that
began on September 17, 2011, in Zuccotti Park, located in New York City's
Wall Street financial district, receiving global attention and spawning the
Occupy movement against social and economic inequality worldwide.
The main issues raised by Occupy Wall Street were social and economic
inequality, greed, corruption and the perceived undue influence of
corporations on government—particularly from the financial services
sector. The OWS slogan, "We are the 99%", refers to income inequality and
wealth distribution in the U.S. between the wealthiest 1% and the rest of
the population. To achieve their goals, protesters acted on consensus-
based decisions made in general assemblies which emphasized direct
action over petitioning authorities for redress.”
- Wikipedia
56. Op: Occupy Wall Street
“Occupy Wall Street (OWS) is the name given to a protest movement that
began on September 17, 2011, in Zuccotti Park, located in New York City's
Wall Street financial district, receiving global attention and spawning the
Occupy movement against social and economic inequality worldwide.
The main issues raised by Occupy Wall Street were social and economic
inequality, greed, corruption and the perceived undue influence of
corporations on government—particularly from the financial services
sector. The OWS slogan, "We are the 99%", refers to income inequality and
wealth distribution in the U.S. between the wealthiest 1% and the rest of
the population. To achieve their goals, protesters acted on consensus-
based decisions made in general assemblies which emphasized direct
action over petitioning authorities for redress.”
- Wikipedia
57. PROGRAMMING 101
Let’s write some code!
Really, how hard could it
be to track some data
about our website’s
users and some of their
“more advanced”
behaviors?
58. Example for a very simple algorithm which
is able to track users which are trying to
avoid server restrictions
59.
60.
61. This very basic example was created in less
than 5 minutes with almost no efforts or
thinking.
Imagine what can be achieved on corporate
levels when you are being paid to do it...
66. Facebook
Facebook analyzes its
users and categorizes
them and their interests
beyond your wildest
dreams
Even beyond Big
Brother’s wildest
stories!
67.
68.
69. Why do they do all of this?
No one cares what are you doing, are you
happy or depressed, or you enjoy shooting
crocodiles with a shotgun
But by knowing these things they can know what exactly to sell to you!
72. “Project MKUltra — sometimes referred to as the CIA's mind control program — is
the code name of a U.S. government human research operation experimenting in
the behavioral engineering of humans. Organized through the Scientific Intelligence
Division of the Central Intelligence Agency (CIA), the project coordinated with the
Special Operations Division of the U.S. Army's Chemical Corps.
The program began in the early 1950s, was officially sanctioned in 1953, was
reduced in scope in 1964, further curtailed in 1967 and officially halted in 1973. The
program engaged in many illegal activities, in particular it used unwitting U.S. and
Canadian citizens as its test subjects, which led to controversy regarding its
legitimacy.
MKUltra used numerous methodologies to manipulate people's mental states and
alter brain functions, including the surreptitious administration of drugs (especially
LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and
sexual abuse, as well as various forms of torture.
The scope of Project MKUltra was broad, with research undertaken at 80
institutions, including 44 colleges and universities, as well as hospitals, prisons and
pharmaceutical companies. The CIA operated through these institutions using front
organizations, although sometimes top officials at these institutions were aware of
the CIA's involvement.”
- Wikipedia
73.
74.
75.
76. Facebook has the FINEST target marketing
data during the moment
If I want a chinese grandmother with blue
eyes and skills in fire and lapdancing they
can give me 50 of them just today.
77. Facebook and Twitter ENFORCE you to use
your real name, phone number and
location. You cannot use entire features or
contact people if you do not go by a real
name (most of the time).
And it is to be never deleted, of course.
87. Both Facebook and Google DO save
your messages and posts even if
you delete and never send them
Steve Rambam informs us about this by
subpoenas executed for “Facebook draft
messages”
92. By doing so, they will have even greater
chance to monitor your data (as a carrier),
because now PC users are declining and
Mobile are increasing.
Facebook know this better than all of us.
99. Here is what they want to know:
● Everything you hear
● Everything you see
● Everywhere you go
● Everything you do
● Everything you know and want to know
● Everyone who is connected to you
● ...because your eyeballs ARE WORTH $$$
100.
101.
102.
103.
104. Software is now able to do the
following from any video
● Face recognition of multiple targets
● Walking or posture recognition, identification and
analysis (how old are you, is this you, do you have any
decease, are you in hurry)
● Crown recognition (forming protests)
111. It was first Google for Search,
then Google for Business,
then Google for Government,
now Google for… Schools
112. “...wE cArE fOr tEh kIdZ! ^_^”
loljk for mor $$ ^_~
● Google now wants to establish itself in schools too:
http://www.google.com/enterprise/apps/education/
● Chromebooks for everyone!
122. “Tor is free software and an open
network that helps you defend
against traffic analysis, a form of
network surveillance that threatens
personal freedom and privacy,
confidential business activities and
relationships, and state security.”
Source: https://www.torproject.org/index.html.en
124. In a “slightly” realer world...
Tor (previously an acronym for The Onion Router) is an open source project
initially started and developed by the US government.
“The core principle behind Tor, "onion routing," was developed in the mid-
1990s by U.S. Naval Research Laboratory employees mathematician Paul
Syverson and computer scientists Michael Reed and David Goldschlag, with the
purpose of protecting U.S. intelligence communications online. Onion routing
was further developed by DARPA in 1997.
The alpha version of Tor, developed by Syverson and computer scientists Roger
Dingledine and Nick Mathewson and then called The Onion Routing project or
TOR project, launched on 20 September 2002.”
-Wikipedia (http://en.wikipedia.org/wiki/Tor_(anonymity_network))
130. The Digital Clash
Google’s Executive Chairman Eric Schmidt has
an increased amount of public clashes with
Wikileaks’ founder Julian Assange after their
infamous meeting in the Ecuadorian Embassy
136. Chelsea Manning
(formerly known as
Bradley Manning)
Chelsea Manning is an United States Army
soldier who was convicted in July 2013 of
violations of the Espionage Act and other
offenses, after releasing the largest set of
classified documents ever leaked to the public.
Manning was sentenced in August 2013 to 35
years' imprisonment, with the possibility of
parole in the eighth year, and to be
dishonorably discharged from the Army.
Bradley Manning has gave the documents to
Julian Assange, who had released them to the
wide press.
138. On 5th April 2010 WikiLeaks has released a
classified US military video depicting the
indiscriminate slaying of over a dozen people
in the Iraqi suburb of New Baghdad, including
two Reuters news staff.
The video, shot from an Apache helicopter
gun-sight, clearly shows the unprovoked
slaying of a wounded Reuters employee and
his rescuers. Two young children involved in
the rescue were also seriously wounded.
Reuters has been trying to obtain the video
through the Freedom of Information Act,
without success since the time of the attack.
139.
140.
141.
142. Assange believes he faces an extradition to
USA if he leaves the Ecuadorian embassy
143.
144. The Last Hopes...
A short of tools which might - or might not - help you enhance
or preserve your privacy online.
Remember:
Anonymity can be achieved
only temporarily with some amount of risk.
147. Secure messages and emails:
PGP (Pretty Good Privacy)
Pretty Good Privacy (PGP) is a data encryption and decryption
computer program that provides cryptographic privacy and
authentication for data communication. PGP is often used for
signing, encrypting, and decrypting texts, e-mails, files, directories,
and whole disk partitions and to increase the security of e-mail
communications.
149. VPN (Virtual Private Network)
A virtual private network (VPN) extends a
private network across a public network,
such as the Internet. It enables a computer
or Wi-Fi-enabled device to send and receive
data across shared or public networks as if
it were directly connected to the private
network, while benefiting from the
functionality, security and management
policies of the private network.
150. VPN (Virtual Private Network)
Most VPN services are paid.
Here are some good free VPNs which I
have used and tested myself:
● CyberGhost VPN:
http://www.cyberghostvpn.com/en_us
● VPN Reactor
https://www.vpnreactor.com
151. KeePassX
KeePassX is a password manager which
lets you access all your passwords by
entering a master password. All your
passwords are kept in encrypted form. It’s
better to have them in one place and
compromised than forgetting them all the
time or writing them down to napkins...
http://www.keepassx.org/
152. HTTPS Everywhere!
HTTPS Everywhere! is a browser addon (for
Chrome, Firefox and Opera) which tries to
run the websites always through the
secure HTTPS protocal (instead of the
insecure HTTP)
https://www.eff.org/https-everywhere
153. NoScript
NoScript is a browser addon which
prevents any website to run freely scripts
on your computer unless you explicitly
allow it to do so.
Highly recommended!
https://noscript.net/