Apr 282017
 

Imagine you’re about to get on a flight to New Orleans to see your sweetie. You’re in line dreaming of jazz, beignets and jambalaya when you’re pulled aside by a U.S. Customs and Border Protection agent.

click here for the full article

Government spies can see everything you’re doing with your phone on a plane

 Posted by on 2016-12-07 at 12:13  airlines, government, government spying, privacy, Reblog, security, spying  Comments Off on Government spies can see everything you’re doing with your phone on a plane
Dec 072016
 

If you like your privacy, don’t fly the friendly skies with your phone connected to in-flight networks.

click here for the full article

The FBI Now Possesses Expanded Hacking Powers Despite Last-Minute Efforts By Congress

 Posted by on 2016-12-01 at 18:02  cyber security, fbi, government spying, Hacking, homeland security, Internet, nsa, privacy, Reblog, security, spying  Comments Off on The FBI Now Possesses Expanded Hacking Powers Despite Last-Minute Efforts By Congress
Dec 012016
 

The FBI is not a fan of computer security, nor is it a fan of disclosing how it collects information. Just ask anybody trying to track its domestic drones and what they’re listening to.

click here for the full article

Laura Poitras Films The Architecture Of Surveillance—And Projects Films On It, Too

 Posted by on 2016-11-30 at 01:15  documentary, freedom, government, Internet, nsa, privacy, Reblog, security, spying  Comments Off on Laura Poitras Films The Architecture Of Surveillance—And Projects Films On It, Too
Nov 302016
 

The architecture of surveillance is everywhere and nowhere.

click here for the full article

Onion Pi

 Posted by on 2016-11-25 at 18:37  encryption, privacy, Reblog, security, tech, tor  Comments Off on Onion Pi
Nov 252016
 

Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. Using it is easy-as-pie.

click here for the full article

Lock down your Twitter: take care that rogue third-party apps don’t hijack your account

 Posted by on 2016-11-25 at 11:22  Reblog, security, tech, twitter  Comments Off on Lock down your Twitter: take care that rogue third-party apps don’t hijack your account
Nov 252016
 

If you’re a long-time Twitter user, you’ve probably come across your fair share of third-party apps. Most of these tools exist for completely harmless purposes – analysing your follower metrics, scheduling posts or posting results from a quiz.

click here for the full article