PDA

View Full Version : Prism Break



Magda Hassan
06-26-2013, 12:42 PM
http://prism-break.org/

Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software.



Proprietary Free alternative Notes

Operating system (http://prism-break.org/#operating-system)


http://prism-break.org/assets/img/prop/apple-osx.png
Apple OS X

http://prism-break.org/assets/img/prop/google-chrome.png
Google Chrome OS

http://prism-break.org/assets/img/prop/ms-windows.png
Microsoft Windows




http://prism-break.org/assets/img/free/trisquel.png (http://trisquel.info/) Trisquel (http://trisquel.info/) FSF endorsed, user-friendly GNU/Linux distribution.
http://prism-break.org/assets/img/free/debian.png (http://www.debian.org/) Debian (http://www.debian.org/) Popular ethical GNU/Linux distribution.
http://prism-break.org/assets/img/free/fedora.png (http://fedoraproject.org/) Fedora (http://fedoraproject.org/) Fast, stable, powerful GNU/Linux distribution.
http://prism-break.org/assets/img/free/linuxmint.png (http://www.linuxmint.com/) Linux Mint (http://www.linuxmint.com/) Comfortable and easy to use GNU/Linux distribution.
http://prism-break.org/assets/img/free/liberte.png (http://dee.su/liberte) Liberté Linux (http://dee.su/liberte) Live CD/USB designed as a communication aid in hostile environments.
http://prism-break.org/assets/img/free/tails.png (https://tails.boum.org/) Tails (https://tails.boum.org/) Live CD/USB aimed at preserving your privacy and anonymity.

Apple, Google, and Microsoft are a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA.
This leaves us with two free alternatives: GNU/Linux (https://www.gnu.org/distros/free-distros.html) and BSD (https://en.wikipedia.org/wiki/Comparison_of_BSD_operating_systems).
GNU/Linux has a much larger community to help you with the transition. It’s recommended that you begin your explorations by looking for a GNU/Linux distribution (http://distrowatch.com/) that suits your needs.
Canonical’s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks (https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks) by default.
Note: PRISM Break recommends the no-codecs edition of Linux Mint, as the other editions are encumbered with software patents. More info (https://github.com/nylira/prism-break/issues/126#issuecomment-19898104).



Android OS (http://prism-break.org/#android)


http://prism-break.org/assets/img/prop/android.png
Google Android

http://prism-break.org/assets/img/prop/google-play.png
Google Play




http://prism-break.org/assets/img/free/cyanogenmod.png (http://www.cyanogenmod.org/) CyanogenMod (http://www.cyanogenmod.org/) Aftermarket firmware for Android devices.
http://prism-break.org/assets/img/free/replicant.png (http://replicant.us/) Replicant (http://replicant.us/) Fully free Android distribution.
http://prism-break.org/assets/img/free/fdroid.png (http://f-droid.org/) F-Droid (http://f-droid.org/) Free and open source app store for Android.

CyanogenMod licensing: “CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.” —Wikipedia (https://en.wikipedia.org/wiki/CyanogenMod#Licensing)
F-Droid is a free alternative to the Google Play app store.



iOS (http://prism-break.org/#ios)


http://prism-break.org/assets/img/prop/ios.png
Apple iOS




http://prism-break.org/assets/img/free/prohibition.png (https://en.wikipedia.org/wiki/IPhone#Secret_tracking) iOS is unsecure (https://en.wikipedia.org/wiki/IPhone#Secret_tracking) iOS devices contain hardware tracking.

iOS is insecure, and unfortunately there aren‘t a lot of free encryption apps available for iOS either. It‘s also impossible to verify (http://www.reddit.com/r/privacy/comments/1gnytj/privacy_technology_review_encrypted_imvoipphonesms/cambx4r) whether if an iOS app was compiled from the original source.



Web browser (http://prism-break.org/#web-browser)


http://prism-break.org/assets/img/prop/apple-safari.png
Apple Safari

http://prism-break.org/assets/img/prop/google-chrome.png
Google Chrome

http://prism-break.org/assets/img/prop/ms-ie.png
Microsoft Internet Explorer




http://prism-break.org/assets/img/free/tor.png (https://www.torproject.org/index.html.en) Tor Browser Bundle (https://www.torproject.org/index.html.en) Encrypted, anonymous browsing.
http://prism-break.org/assets/img/free/icecat.png (http://www.gnu.org/software/gnuzilla/) GNUzilla IceCat (http://www.gnu.org/software/gnuzilla/) GNU version of Firefox.
http://prism-break.org/assets/img/free/firefox.png (http://www.mozilla.org/en-US/firefox/new/) Mozilla Firefox (http://www.mozilla.org/en-US/firefox/new/) Open source web browser.
http://prism-break.org/assets/img/free/orbot.png (https://www.torproject.org/docs/android) Orbot (https://www.torproject.org/docs/android) Tor proxy for Android. Android
http://prism-break.org/assets/img/free/onionbrowser.png (https://mike.tig.as/onionbrowser/) Onion Browser (https://mike.tig.as/onionbrowser/) Secure browsing for iOS. $0.99 iOS

Use a combination of Tor Browser and another free browser to surf the web. Try to use Tor for everything. Browsing the web may be a bit slower, but it's far more secure.
Note that using Tor Browser to log into PayPal or a banking website may trip the website's fraud protection software.
Users of Tor Browser should also be aware that logging into HTTP (instead of HTTPS) websites may result in your credentials being captured by a malicious exit node.
Note: Mozilla Firefox is technically not completely free software, as Mozilla recommends non-free add-ons on their website.



Web browser add-ons (http://prism-break.org/#browser-addons)



http://prism-break.org/assets/img/free/httpseverywhere.png (https://www.eff.org/https-everywhere) HTTPS Everywhere (https://www.eff.org/https-everywhere) Encrypts your communications from thousands of websites.
http://prism-break.org/assets/img/free/adblockedge.png (https://addons.mozilla.org/en-us/firefox/addon/adblock-edge/) Adblock Edge (https://addons.mozilla.org/en-us/firefox/addon/adblock-edge/) Block advertisements on the web.
http://prism-break.org/assets/img/free/cryptocat.png (https://crypto.cat/) Cryptocat (https://crypto.cat/) Private, encrypted online conversations.
http://prism-break.org/assets/img/free/disconnect.png (https://disconnect.me/) Disconnect (https://disconnect.me/) Stop third-party sites from tracking you.
http://prism-break.org/assets/img/free/mailvelope.png (http://www.mailvelope.com/) Mailvelope (http://www.mailvelope.com/) OpenPGP encryption for webmail.
http://prism-break.org/assets/img/free/noscript.png (http://noscript.net/) NoScript (http://noscript.net/) Only enable JavaScript, Java, and Flash for sites you trust.
http://prism-break.org/assets/img/free/webpg.png (http://webpg.org/) WebPG (http://webpg.org/) GnuPG/PGP in your browser.

Safeguard your privacy and stop websites from tracking you by installing Adblock Edge, Disconnect, HTTPS Everywhere, and NoScript in your browser.
Cryptocat and Mailvelope are browser addons for IM and email encryption, respectively. At this time, it may be more secure to use external software for more proven encryption.
Why not Adblock Plus? Adblock Plus shows “acceptable ads” by default, and uses more memory than Adblock Edge.
Why not Ghostery? Ghostery is a proprietary plugin. Use Disconnect instead.



Web search (http://prism-break.org/#web-search)


http://prism-break.org/assets/img/prop/google.png
Google Search

http://prism-break.org/assets/img/prop/ms-bing.png
Microsoft Bing

http://prism-break.org/assets/img/prop/yahoo.png
Yahoo! Search




http://prism-break.org/assets/img/free/startpage.png (http://startpage.com/) Startpage (https://startpage.com/) Private, unlogged web searches.
http://prism-break.org/assets/img/free/duckduckgo.png (https://duckduckgo.com/) DuckDuckGo (https://duckduckgo.com/) Anonymous, unlogged web searches.
http://prism-break.org/assets/img/free/seeks.png (http://www.seeks-project.info/site/) Seeks Project (http://www.seeks-project.info/site/) Open decentralized platform for collaborative search.
http://prism-break.org/assets/img/free/yacy.png (http://www.yacy.net/) YaCy (http://www.yacy.net/) Decentralized web search.

Startpage is proprietary, hosted in the USA/Netherlands, and provides you with anonymized Google search results (including images).
DuckDuckGo is partly proprietary, hosted in the USA, and provides you with anonymized Bing search results.
Pick your poison.



Email services (http://prism-break.org/#email-services)


http://prism-break.org/assets/img/prop/google-mail.png
Google Gmail

http://prism-break.org/assets/img/prop/ms-outlook.png
Microsoft Outlook.com

http://prism-break.org/assets/img/prop/yahoo.png
Yahoo! Mail




http://prism-break.org/assets/img/free/autistici.png (http://www.autistici.org/en/index.html) Autistici/Inventati (http://www.autistici.org/en/index.html) A full range of free, privacy-aware services. approval-required
http://prism-break.org/assets/img/free/bitmessage.png (https://bitmessage.org/) Bitmessage (https://bitmessage.org/) Encrypted, decentralized email server. beta
http://prism-break.org/assets/img/free/riseup.png (https://riseup.net/en) Riseup (https://riseup.net/en) Secure and private email accounts. invite-only

Bitmessage is a promising alternative to email, but it’s is not ready for daily usage. Use at your own risk.
Riseup is hosted in the USA. It’s also beginning to offer VPN, chat, and etherpad services.
Why not Hushmail? See "compromises to email privacy" (https://en.wikipedia.org/wiki/Hushmail#Compromises_to_email_privacy).
The only way to have full control over your email is to run your own mail server. This is not for everyone though, as it requires considerable time investment and technical knowledge.
While not complete yet, the FreedomBox (https://www.freedomboxfoundation.org/) project is aiming at creating a turnkey solution for encrypted communications.



Email desktop clients (http://prism-break.org/#email-clients)


http://prism-break.org/assets/img/prop/apple.png
Apple Mail

http://prism-break.org/assets/img/prop/ms-outlook.png
Microsoft Office Outlook

http://prism-break.org/assets/img/prop/groupwise.png
Novell Groupwise




http://prism-break.org/assets/img/free/thunderbird.png (https://www.mozilla.org/en-US/thunderbird/) Mozilla Thunderbird (https://www.mozilla.org/en-US/thunderbird/) Open source email application.
http://prism-break.org/assets/img/free/clawsmail.png (http://www.claws-mail.org/) Claws Mail (http://www.claws-mail.org/) Lightweight email application with GPG support.
http://prism-break.org/assets/img/free/evolution.png (http://projects.gnome.org/evolution/) Evolution (http://projects.gnome.org/evolution/) Free email and calendar application with GPG support.
http://prism-break.org/assets/img/free/icedove.png (http://directory.fsf.org/wiki/Icedove) Icedove (http://directory.fsf.org/wiki/Icedove) Free version of Mozilla Thunderbird.
http://prism-break.org/assets/img/free/kmail.png (http://userbase.kde.org/KMail) KMail (http://userbase.kde.org/KMail) KDE email client with GPG support.

Here is a guide (http://www.enigmail.net/documentation/quickstart.php) to encrypting your email with Thunderbird, GNU Privacy Guard (GPG), and Enigmail.
Note: Mozilla Thunderbird is technically not completely free software, as Mozilla recommends non-free add-ons on their website.



Email encryption (http://prism-break.org/#email-encryption)





http://prism-break.org/assets/img/free/enigmail.png (http://www.enigmail.org/) Enigmail (http://www.enigmail.org/) An OpenPGP add-on for Thunderbird/Icedove.
http://prism-break.org/assets/img/free/gnupg.png (http://www.gnupg.org/) GNU Privacy Guard - GPG (http://www.gnupg.org/) Free OpenPGP implementation.

“Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”
— Wikipedia (https://en.wikipedia.org/wiki/Pretty_Good_Privacy)



Social networking (http://prism-break.org/#social-networking)


http://prism-break.org/assets/img/prop/google-plus.png
Google+

http://prism-break.org/assets/img/prop/facebook.png
Facebook

http://prism-break.org/assets/img/prop/linkedin.png
LinkedIn

http://prism-break.org/assets/img/prop/twitter.png
Twitter




http://prism-break.org/assets/img/free/retroshare.png (http://retroshare.sourceforge.net/) RetroShare (http://retroshare.sourceforge.net/) Free, secure, P2P communications platform.
http://prism-break.org/assets/img/free/buddycloud.png (http://www.buddycloud.com/) buddycloud (http://www.buddycloud.com/) Open source, federated social network. XMPP/Jabber
http://prism-break.org/assets/img/free/diaspora.png (http://wiki.diasporafoundation.org/) Diaspora* (http://wiki.diasporafoundation.org/) Community-run, distributed social network.
http://prism-break.org/assets/img/free/friendica.png (http://friendica.com/) Friendica (http://friendica.com/) Privacy respecting, distributed, federated social network.
http://prism-break.org/assets/img/free/gnusocial.png (https://www.gnu.org/software/social/) GNU Social (https://www.gnu.org/software/social/) Self-hosted, decentralized social network.
http://prism-break.org/assets/img/free/lorea.png (https://lorea.org/) Lorea (https://lorea.org/) Distributed and federated social nodes.
http://prism-break.org/assets/img/free/movim.png (http://movim.eu/) Movim (http://movim.eu/) Private, decentralized social network server. XMPP/Jabber
http://prism-break.org/assets/img/free/pumpio.png (http://pump.io/) pump.io (http://pump.io/) Self-hosted social stream server.
http://prism-break.org/assets/img/free/salutatoi.png (http://sat.goffi.org/) Salut à Toi (http://sat.goffi.org/) Multi-frontend, multipurpose communication tool. XMPP/Jabber
http://prism-break.org/assets/img/free/tentio.png (https://tent.io/) Tent (https://tent.io/) Free, autonomous social network protocol.

identi.ca (https://identi.ca/) is a popular Twitter-like social networking hub for the free and open source software community. The site is converting to the pump.io software platform sometime this week.



Instant messaging (http://prism-break.org/#instant-messaging)


http://prism-break.org/assets/img/prop/aim.png
AOL Instant Messenger

http://prism-break.org/assets/img/prop/google.png
Google Talk

http://prism-break.org/assets/img/prop/apple-messages.png
OS X Messages

http://prism-break.org/assets/img/prop/yahoo.png
Yahoo! Messenger




http://prism-break.org/assets/img/free/pidgin.png (http://www.pidgin.im/) Pidgin (http://www.pidgin.im/) Open source chat program. XMPP/Jabber OTR
http://prism-break.org/assets/img/free/otr.png (http://www.cypherpunks.ca/otr/) Off-the-Record Messaging - OTR (http://www.cypherpunks.ca/otr/) Install and enable this plugin in Pidgin for encrypted chat. OTR
http://prism-break.org/assets/img/free/adium.png (http://adium.im/) Adium (http://adium.im/) Free, multiprotocol chat client for OS X. XMPP/Jabber OTR
http://prism-break.org/assets/img/free/gibberbot.png (https://guardianproject.info/apps/gibber/) Gibberbot (https://guardianproject.info/apps/gibber/) Private, secure OTR messaging for Android. Android
http://prism-break.org/assets/img/free/surespot.png (https://www.surespot.me/) Surespot (https://www.surespot.me/) Free, open-source, end-to-end encrypted messaging. Android
http://prism-break.org/assets/img/free/textsecure.png (https://whispersystems.org/#encrypted_texts) TextSecure (https://whispersystems.org/#encrypted_texts) Secure SMS/MMS communication for Android. Android mostly free*
http://prism-break.org/assets/img/free/xabber.png (http://www.xabber.com/) Xabber (http://www.xabber.com/) OTR-encrypted instant messaging for Android. Android XMPP/Jabber
http://prism-break.org/assets/img/free/chatsecure.png (https://chatsecure.org/) ChatSecure (https://chatsecure.org/) Encrypted IM for iOS. iOS

Cryptocat in the Web browser add-ons section may be of interest as well.



Video conferencing & VoIP (http://prism-break.org/#video-voip)


http://prism-break.org/assets/img/prop/facetime.png
FaceTime

http://prism-break.org/assets/img/prop/google-plus.png
Google+ Hangouts

http://prism-break.org/assets/img/prop/google.png
Google Talk

http://prism-break.org/assets/img/prop/ms-skype.png
Skype




http://prism-break.org/assets/img/free/jitsi.png (https://jitsi.org/) Jitsi (https://jitsi.org/) Encrypted text and video chat. XMPP/Jabber SIP
http://prism-break.org/assets/img/free/linphone.png (http://www.linphone.org/) Linphone (http://www.linphone.org/) Encrypted voice and video client. SIP
http://prism-break.org/assets/img/free/mumble.png (http://mumble.sourceforge.net/) Mumble (http://mumble.sourceforge.net/) Encrypted, low-latency voice chat.
http://prism-break.org/assets/img/free/csipsimple.png (http://code.google.com/p/csipsimple/) CSIPSimple (http://code.google.com/p/csipsimple/) Free, encrypted VoIP for Android. Android SIP
http://prism-break.org/assets/img/free/redphone.png (https://whispersystems.org/#encrypted_voice) RedPhone (https://whispersystems.org/#encrypted_voice) Secure private calls for Android. Android mostly free*

Jitsi is a drop-in, encrypted replacement for almost all the tasks Skype is used for.
Mumble an open source voice chat client in the style of Ventrilo and TeamSpeak.
WebRTC (http://www.webrtc.org/) is an upcoming, promising browser to browser communications API.



Online transactions (http://prism-break.org/#online-transactions)


http://prism-break.org/assets/img/prop/paypal.png
PayPal

http://prism-break.org/assets/img/prop/google.png
Google Wallet




http://prism-break.org/assets/img/free/bitcoin.png (http://bitcoin.org/) Bitcoin (http://bitcoin.org/) P2P digital currency with no central authority.
http://prism-break.org/assets/img/free/cryptocoin.png (http://bitcointalk.org/index.php?topic=134179.0) Alternative cryptocurrencies (http://bitcointalk.org/index.php?topic=134179.0) List of alternative encrypted digital currencies. beta

The Bitcoin blockchain is a decentralized, public ledger of all transactions in the Bitcoin network.
“It may be the TCP/IP of money.” —Paul Buchheit



Media publishing (http://prism-break.org/#media-publishing)


http://prism-break.org/assets/img/prop/flickr.png
Flickr

http://prism-break.org/assets/img/prop/instagram.png
Instagram

http://prism-break.org/assets/img/prop/google-picasa.png
Picasa

http://prism-break.org/assets/img/prop/tumblr.png
Tumblr

http://prism-break.org/assets/img/prop/google-youtube.png
YouTube




http://prism-break.org/assets/img/free/noblogs.png (http://noblogs.org/) Noblogs.org (http://noblogs.org/) Blog publishing platform based on WordPress, by autistici.org.
http://prism-break.org/assets/img/free/mediagoblin.png (http://mediagoblin.org/) GNU MediaGoblin (http://mediagoblin.org/) Decentralized media publishing platform.
http://prism-break.org/assets/img/free/piwigo.png (http://piwigo.org/) Piwigo (http://piwigo.org/) Self-hosted photo gallery platform.
http://prism-break.org/assets/img/free/wordpress.png (http://wordpress.org/) WordPress (http://wordpress.org/) Self-hosted website publishing platform.
http://prism-break.org/assets/img/free/zenphoto.png (http://www.zenphoto.org/) Zenphoto (http://www.zenphoto.org/) Self-hosted media management system.

Self-hosted is important. Hosting your blog on WordPress.com is no better for your data security than Blogger or Tumblr.



Document collaboration (http://prism-break.org/#document-collaboration)


http://prism-break.org/assets/img/prop/google-drive.png
Google Docs

http://prism-break.org/assets/img/prop/ms-office.png
Microsoft Office Web Apps

http://prism-break.org/assets/img/prop/zoho.png
Zoho Office Suite




http://prism-break.org/assets/img/free/etherpad.png (http://etherpad.org/) Etherpad (http://etherpad.org/) Self-hosted, real-time collaborative documents.
http://prism-break.org/assets/img/free/ethercalc.png (http://ethercalc.org/) Ethercalc (http://ethercalc.org/) Multi-user spreadsheet server.

--



Maps (http://prism-break.org/#maps)


http://prism-break.org/assets/img/prop/apple.png
Apple Maps

http://prism-break.org/assets/img/prop/google.png
Google Maps




http://prism-break.org/assets/img/free/openstreetmap.png (http://www.openstreetmap.org/) OpenStreetMap (http://www.openstreetmap.org/) Free, collaborative world wide map.

--



Cloud storage (http://prism-break.org/#cloud-storage)


http://prism-break.org/assets/img/prop/apple-icloud.png
Apple iCloud

http://prism-break.org/assets/img/prop/dropbox.png
Dropbox

http://prism-break.org/assets/img/prop/google-drive.png
Google Drive

http://prism-break.org/assets/img/prop/ms-skydrive.png
Microsoft SkyDrive




http://prism-break.org/assets/img/free/git-annex.png (http://git-annex.branchable.com/assistant/) git-annex assistant (http://git-annex.branchable.com/assistant/) Synchronize folders on your computers and drives.
http://prism-break.org/assets/img/free/owncloud.png (http://owncloud.org/) ownCloud (http://owncloud.org/) Cloud data in your control.
http://prism-break.org/assets/img/free/seafile.png (http://seafile.com/) Seafile (http://seafile.com/) Self-hosted file sync and collaboration for teams.
http://prism-break.org/assets/img/free/sparkleshare.png (http://sparkleshare.org/) Sparkleshare (http://sparkleshare.org/) Self-hosted version control and file sync.
http://prism-break.org/assets/img/free/tahoe-lafs.png (https://tahoe-lafs.org/trac/tahoe-lafs) Tahoe-LAFS (https://tahoe-lafs.org/trac/tahoe-lafs) Free and open cloud storage system.

Why not MEGA? While MEGA is free as in beer, the software is proprietary.
Why not SpiderOak? SpiderOak is proprietary software.
Why not Tarsnap? Tarsnap is partially proprietary and hosts your data on Amazon Web Services.



Web analytics (http://prism-break.org/#web-analytics)


http://prism-break.org/assets/img/prop/google.png
Google Analytics




http://prism-break.org/assets/img/free/piwik.png (http://piwik.org/) Piwik (http://piwik.org/) Open source, self-hosted web analytics.

Piwik analytics powers this site. It‘s set up to anonymize the last octet (255.255.255.???) of visitor IPs. Check out the live data here: prism-break.org/analytics (http://prism-break.org/analytics).



DNS provider (http://prism-break.org/#dns-provider)


http://prism-break.org/assets/img/prop/google.png
Google Public DNS




http://prism-break.org/assets/img/free/opennic.png (http://www.opennicproject.org/) OpenNIC Project (http://www.opennicproject.org/) Total DNS neutrality.
http://prism-break.org/assets/img/free/namecoin.png (http://namecoin.com/) Namecoin (http://namecoin.com/) Distributed DNS based on Bitcoin technology.

Google Public DNS permanently logs your ISP and location information for analysis. Your IP address is also stored for 24 hours.
OpenNIC does not log anything.



Darknet (http://prism-break.org/#darknet)



http://prism-break.org/assets/img/free/i2p.png (http://www.i2p2.de/) I2P (http://www.i2p2.de/) The invisible internet project.
http://prism-break.org/assets/img/free/fn.png (https://freenetproject.org/) Freenet (https://freenetproject.org/) Decentralized censorship-resistant network.
http://prism-break.org/assets/img/free/nightweb.png (http://nightweb.net/) Nightweb (http://nightweb.net/) Anonymous I2P network for Android.
http://prism-break.org/assets/img/free/syndie.png (http://syndie.de/) Syndie (http://syndie.de/) Distributed, anonymous forum software.

“A darknet is an anonymizing network where connections are made only between trusted peers.
Darknets are distinct from other distributed P2P networks as sharing is anonymous, and therefore users can communicate with little fear of governmental or corporate interference.“
—Wikipedia (https://en.wikipedia.org/wiki/Darknet_%28file_sharing%29)



*This website uses the Free Software Foundation’s definition of free software.
“Free software” means software that respects users’ freedom and community. Roughly, the users have the freedom to run, copy, distribute, study, change and improve the software. With these freedoms, the users (both individually and collectively) control the program and what it does for them. (more …) (http://www.gnu.org/philosophy/free-sw.html)
—The Free Software Foundation (https://www.fsf.org/)


Take action against PRISM at the Electronic Frontier Foundation Action Center.
MASSIVE SURVEILLANCE EXPOSED
Recent reports by the Guardian and the Washington Post confirm secret spying programs on phone records and Internet activity. It‘s time for a full accounting of America's secret spying programs—and an end to unconstitutional surveillance. (more …) (https://www.eff.org/action)
—The Electronic Frontier Foundation (https://www.eff.org/)


Mentioned by the media. Catalan

“Alternatives per a esquivar el programa nord-americà d'espionatge global.” (http://www.vilaweb.cat/noticia/4124465/20130612/alternatives-esquivar-programa-nord-america-despionatge-global.html) VilaWeb. 2013-06-12.
German

Fennen, Nicolas. “PRISM-Break: Mit dieser Software der NSA-Spionage entgehen.” (https://netzpolitik.org/2013/prism-break-mit-dieser-software-der-nsa-spionage-entgehen/) Netzpolitik.org. 2013-06-11.
red. “Prism-Break: So surfen sie an der NSA vorbei.” (http://meedia.de/internet/prism-break-so-surfen-sie-an-der-nsa-vorbei/2013/06/12.html) Meedia. 2013-06-12.
Sabin, Denis. “Wir demonstrieren. Deal with it!” (http://berlin.piratenpartei.de/2013/06/18/wir-demonstrieren-deal-with-it/) Piratenpartei Berlin. 2013-06-18.
Schischka, Benjamin. “Diese Programme sperren Lauscher vom US-Geheimdienst aus.” (http://www.pcwelt.de/news/Diese_Programme_sperren_Lauscher_vom_US-Geheimdienst_aus-PRISM-break.org-7959148.html) PC-WELT. 2013-06-12.
Wimmer, Barbara. “Wie man der NSA-Spionage entkommen kann.” (http://futurezone.at/netzpolitik/16495-wie-man-der-nsa-spionage-entkommen-kann.php) futurezone.at. 2013-06-16.
“Wie bewege ich mich sicher im Netz?.” (http://www1.wdr.de/fernsehen/aks/rubriken/angeklickt/angeklicktsichersurfen100.html) Aktuelle Stunde. 2013-06-14.
English

/r/technology “How to opt out of PRISM, the NSA’s global data surveillance program.” (http://www.reddit.com/r/technology/comments/1g1sxa/how_to_opt_out_of_prism_the_nsas_global_data/) Reddit. 2013-06-10.
Bilton, Ricardo. “PRISM fears give private search engine DuckDuckGo its best week ever.” (http://venturebeat.com/2013/06/13/prism-fears-give-private-search-engine-duckduckgo-its-best-week-ever/) VentureBeat. 2013-06-13.
Daws, Ryan. “Looking to hide online? PRISM-break shows you how.” (http://www.telecomstechnews.com/news/2013/jun/14/looking-hide-online-prism-break-shows-you-how/) Telecoms Tech. 2013-06-14.
Glaser, April, and Libby Reinish. “How to Block the NSA From Your Friends List.” (http://www.slate.com/blogs/future_tense/2013/06/17/identi_ca_diaspora_and_friendica_are_more_secure_a lternatives_to_facebook.html) Slate. 2013-06-17.
Khanse, Anand. “Opt Out Of PRISM website launched; recommends alternative software & services” (http://news.thewindowsclub.com/opt-out-of-prism-website-launched-63420/) TWCN Tech News. 2013-06-16.
Love, Dylan. “How To Become Invisible To The NSA's Domestic Spying Program” (http://www.businessinsider.com/how-to-opt-out-of-prism-2013-6) Business Insider. 2013-06-16.
Keiser, Max. “Site of the day: prism-break.org.” (http://www.maxkeiser.com/2013/06/site-of-the-day-prism-break-org/) Max Keiser Financial War Reports. 2013-06-11.
Neagle, Colin. “How to opt out of PRISM, the NSA’s spying program.” (https://www.networkworld.com/community/blog/how-opt-out-prism-nsas-spying-program) Network World. 2013-06-10.
Phipps, Simon. “How to break out of PRISM.” (http://www.infoworld.com/d/open-source-software/how-break-out-of-prism-220733) InfoWorld. 2013-06-14.
Walton, Zach. “Don’t Trust Tech Companies With Your Data? Use These Alternatives.” (http://www.webpronews.com/dont-trust-tech-companies-with-your-data-use-these-alternatives-2013-06) WebProNews 2013-06-10.
Wheatley, Mike “How To Get Out Of PRISM and Avoid NSA Spying” (http://siliconangle.com/blog/2013/06/12/how-to-get-out-of-prism-and-avoid-nsa-spying/) SiliconANGLE. 2013-06-12
French

Big Browser. “PRISM — Comment passer entre les mailles de la surveillance d’Internet ?” (http://bigbrowser.blog.lemonde.fr/2013/06/11/prism-comment-passer-entre-les-mailles-de-la-surveillance-dinternet/) Le Monde. 2013-06-11.
Duvauchelle, Antoine “PRISM : la fronde s'organise en Europe et aux Etats-Unis” (http://www.zdnet.fr/actualites/prism-la-fronde-s-organise-en-europe-et-aux-etats-unis-39791319.htm) ZDNet.fr. 2013-06-12.
L., A. “Comment se rendre invisible du réseau PRISM?” (http://www.rtbf.be/info/medias/dossier/vu-sur-le-web/detail_comment-se-rendre-invisible-du-reseau-prism?id=8025651) RTBF Medias. 2013-06-24.
L., Julien. “PRISM : des logiciels et services alternatifs pour limiter la surveillance.” (http://www.numerama.com/magazine/26211-prism-des-logiciels-et-services-alternatifs-pour-limiter-la-surveillance.html) Numerama. 2013-06-11.
Legrand, David. “ Cryptocat chiffre vos transferts, l'EFF recommande ses outils alternatifs” (http://www.pcinpact.com/news/80372-cryptocat-chiffre-vos-transferts-eff-recommande-ses-outils-alternatifs.htm) PC INpact. 2013-06-11.
Pelletier, Nicolas. “Surveillance : comment contourner le programme Prism.” (http://www.rue89.com/2013/06/11/surveillance-comment-contourner-programme-prism-243208) Rue89. 2013-06-11.
“PRISM – Comment passer entre les mailles de la surveillance d’Internet ?” (http://www.wikistrike.com/article-prism-comment-passer-entre-les-mailles-de-la-surveillance-d-internet-118425122-comments.html) WikiStrike. 2013-06-11.
Spanish

Alvarez, Felipe. “PRISM: qué es, posibles consecuencias, cómo evitarlo” (http://alt-tab.com.ar/prism-que-es-posibles-consecuencias-como-evitarlo) alt-tab. 2013-06-17.
Mu. “De PRISM también se sale.” (http://ciberderechos.barrapunto.com/ciberderechos/13/06/11/1050240.shtml) Barrapunto. 2013-06-12.
Novoa, Jaime “Mozilla, Reddit y EFF lanzan Stopwatching.Us, una campaña en contra de PRISM.” (http://www.genbeta.com/seguridad/mozilla-reddit-y-eff-lanzan-stopwatching-us-una-campana-en-contra-de-prism) Genbeta. 2013-06-12.
Italian

Frediani, Carola. “Prism, ecco come sfuggirgli.” (http://daily.wired.it/news/internet/2013/06/14/prism-datagate-579222.html) Wired.it. 2013-06-14.
Guida, Andrea. “PRISM Break, lista delle alternative “sicure” ai servizi e ai software “spioni”.” (http://www.geekissimo.com/2013/06/16/prism-break-alternative-sicure-servizi-software-spioni/) Geekissimo. 2013-06-16.
Dutch

Pruyn, Rowald. “Website wijst hoe je van spionage PRISM afkomt.” (http://www.zdnet.be/article/149845/website-wijst-hoe-je-van-spionage-prism-afkomt/) ZDNet.be. 2013-06-11.
Pruyn, Rowald. “Website biedt alternatieven om PRISM-spionage te voorkomen.” (http://www.pcmweb.nl/nieuws/website-biedt-alternatieven-om-prism-spionage-te-voorkomen.html) PCM. 2013-06-10.
Verkuil, Martijn. “Prism-break.org: Voorkom PRISM-spionage” (http://www.computeridee.nl/nieuws/prism-breakorg-voorkom-prism-spionage) Computer Idee. 2013-06-13.
“Ontwerper zet 'NSA-vrije' software op een rij.” (http://www.trouw.nl/tr/nl/5133/Media-technologie/article/detail/3457572/2013/06/12/Ontwerper-zet-NSA-vrije-software-op-een-rij.dhtml) Trouw. 2013-06-12.
Polish

altruista. “Nie daj się szpiegować - PRISM BREAK.” (http://strims.pl/s/Security/t/u0axy3/nie-daj-sie-szpiegowac-prism-break) strims.pl. 2013-06-12.
fabek. “Nie daj się szpiegować - PRISM BREAK.” (http://www.wykop.pl/link/1550337/nie-daj-sie-szpiegowac-prism-break/) Wykop.pl. 2013-06-11.
igH “* “nieszpiegujące” zamienniki oprogramowania.” (http://niebezpiecznik.pl/post/nieszpiegujace-zamienniki-oprogramowania/) Niebezpieczenik.pl. 2013-06-17.
Russian

Михаил Бушуев, Клаус Янзен. “Как защититься от онлайн-слежки” (http://dw.de/p/18owi) DW.de. 2013-06-14.
Chinese (Traditional)

blackhat. “如何避开网络跟踪和隐藏网络痕迹. (http://www.solidot.org/story?sid=35183) Solidot.pl. 2013-06-17.






Updated 2013-06-26 by @zcpeng (http://twitter.com/zcpeng)
Contribute on GitHub (https://github.com/nylira/prism-break)
Donate bitcoin: 1NAfx5GEZHR8t69LjxTeShPP4XXaxeUqQw
A Nylira (http://nylira.com/) project
Disclaimer: Using the recommended projects on this site will not guarantee that 100% of your communications will be shielded against surveillance states. Please do your own research before trusting these softwares with sensitive communication.

Magda Hassan
06-28-2013, 12:39 AM
​ On Wednesday, Stallman was induced into the Internet Hall of Fame (http://internethalloffame.org/press/latest-news/internet-hall-fame-announces-2013-inductees). He is founder of the Free Software Foundation (http://www.fsf.org/) and has pioneered the notion of copyleft (http://www.gnu.org/copyleft/). He is available for interviews, but they should be scheduled as far in advance as possible.
He said today: "It is said that 'knowledge is power.' Internet corporations took this maxim to heart, and set out to know as much as possible about each of us. Then the U.S. and other governments began massively collecting personal information from these companies, and in other ways too. That's how they hope to have power over us. Digital technology turns out to mean building a giant digital dossier about each person. This might be OK if we had a government we could trust implicitly to respect human rights, one that would never try to stretch its power. What we have, under Bush and Obama, is a security-industrial complex that systematically crosses legal limits, egged on by corporations that will make more money through putting together more extensive dossiers, and saying they are doing this to 'keep us safe' from real but minor threats.


"It used to be that the threat to people's freedom from computers was that they used programs that the users don't control -- nonfree programs, that is. The free software movement (http://gnu.org/) aims to provide free/libre replacements for nonfree programs. Free software (http://gnu.org/philosophy/free-sw.html) is software that respects the users' freedom and community. A program that isn't free gives its owner unjust power over its users. Often it is designed to spy on them, restrict them, or even abuse them. (See 'Proprietary Surveillance (http://gnu.org/philosophy/proprietary-surveillance.html),' DefectiveByDesign.org (http://defectivebydesign.org/) and 'Proprietary Sabotage (http://gnu.org/philosophy/proprietary-sabotage.html).') With free software, the users can fix the program so it doesn't spy, restrict, or mistreat.


"But the threats have multiplied. For years I've called portable phones 'Stalin's dream' because of their surveillance capabilities. (Their movements are tracked, and they can be converted remotely into listening devices that transmit your conversations all the time, even when you try to shut them off.) For years I've warned that it is a mistake to entrust personal data to web sites, or even identify yourself to them. For years I've paid cash rather than use my credit card.


"The U.S. is slowly converting driver's licenses into national ID cards. Without showing ID, you can't fly, or ride Amtrak, or stay in a hotel in New York City, or open a bank account, or fill a prescription for pain killers. The immigration bill now being considered may make it impossible to get a job without national ID.

"Meanwhile, as license-plate cameras spread around our cities, the U.S. is slowly assembling a system that will track all movements of all cars, as is done in the UK. 'Smart meters' will build a dossier of how much electricity you use each hour or each minute, which says whether you are home. And the Internet of Things (http://en.wikipedia.org/wiki/Internet_of_Things) threatens to recruit all the products in your home as digital informers.


"Once data is collected, it will be misused. Formal limits on accessing the data will do nothing to stop the state from collecting all sorts of data about anyone it is determined to crush, such as torture whistleblower John Kiriakou. If no one dares tell us what the state is doing, the state will get out of control.


"We need to stop the accumulation of digital dossiers about people in general. Such collection should be permitted only under a court order applying to a specific person."


See a brief video of Stallman (http://www.masternewmedia.org/news/2006/10/24/what_is_free_software_a.htm) and a longer speech of his on free software and copyright (http://archive.org/details/20090203-Richard-Stallman-UofC-01).

Stallman sent his statement in an email with the following at the top:
[To any NSA and FBI agents reading my email: please consider
[ whether defending the US Constitution against all enemies,
[ foreign or domestic, requires you to follow Snowden's example.

Magda Hassan
07-03-2013, 02:00 AM
Encryption Works: How to Protect Your Privacy (And Your Sources) in the Age of NSA Surveillance


July 2, 2013


By Micah Lee https://pressfreedomfoundation.org/sites/all/themes/press_freedom/images/profile-twitter.png (https://twitter.com/micahflee)




Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.

— Edward Snowden, answering questions live on the Guardian's website (http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower)The stories of how (http://www.salon.com/2013/06/10/qa_with_laura_poitras_the_woman_behind_the_nsa_sco ops/) NSA whistleblower Edward Snowden first contacted journalists Glenn Greenwald and Laura Poitras (both Freedom of the Press Foundation board members), and how he communicated (http://articles.washingtonpost.com/2013-06-09/world/39856622_1_intelligence-powers-single-point) with the Washington Post's Barton Gellman, have given the public a rare window into digital security and conversing online in the age of mass surveillance.
In response, we've just published our first whitepaper—using the public comments by both Snowden and the journalists involved as illustrations—to show how reporters, whistleblowers, and ordinary Internet users can still protect their privacy online.
You can read the whitepaper here (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance) [PDF version (https://pressfreedomfoundation.org/sites/default/files/encryption_works.pdf)].
It's important to remember that while the NSA is the biggest, best funded spy agency in the world, other governments, including China and Russia, spend massive amounts of money of their own high-tech surveillance equipment and are known to specifically seek out journalists and sources for surveillance. In the US, bad digital security can cost whistleblowers their freedom, but in other countries it can cost both journalists and sources their lives. A recent example from Syria (http://www.cjr.org/feature/the_spy_who_came_in_from_the_c.php?page=all) illustrates how careless digital security can have tragic results.
The whitepaper covers:

A brief primer on cryptography (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#crypto), and why it can be trustworthy
The security problems with software, and which software you can trust (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#trust)
How Tor can be used to anonymize your location (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#tor), and the problems Tor has when facing global adversaries
How the Off-the-Record (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#otr) instant message encryption protocol works and how to use it
How PGP (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#pgp) email encryption works and best practices
How the Tails (https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance#tails) live GNU/Linux distribution can be used to ensure high endpoint security





https://pressfreedomfoundation.org/blog/2013/06/encryption-works-how-protect-your-privacy-age-nsa-surveillance

David Guyatt
07-03-2013, 02:42 PM
THis is a great resource thread Magda. Thanks for it.

Personally, I find Tor Browser to be so slow that I no longer use it. But I can heartily recommend Private Tunnel for private/anonymous browsing. Although it is not free, it is relatively cheap and there is no noticeable drop in speeds etc.

Magda Hassan
07-12-2013, 12:31 PM
_| || |_/ ___|| |_ __ _ _ _ / \ _ __ ___ _ __
|_ .. _\___ \| __/ _` | | | | / _ \ | '_ \ / _ \| '_ \
|_ _|___) | || (_| | |_| |/ ___ \| | | | (_) | | | |
|_||_| |____/ \__\__,_|\__, /_/ \_\_| |_|\___/|_| |_|
|___/




Contents:
1) What is the Tor Project?
2) What is the Tor Browser Bundle?
3) What is Orbot?
4) What are some additional browser security addons?
5) What is TrueCrypt?
6) What is OTR?
7) What is Tails?
8) What is WhisperSystems?
9) What is an ideal world to protect my privacy online?




################################################## ###
What is the Tor Project
################################################## ###


https://www.torproject.org


A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet
.
################################################## ###
What is the Tor Browser Bundle (TBB)?
################################################## ###


The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.


The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.


The easiest way to use Tor is to install the browser bundle, go to the following link:


https://www.torproject.org/projects/torbrowser.html.en


Then download the browser bundle and extract it to some place on your local hard drive, I would suggest using an encrypted volume or removable media (such as a usb stick) that supports hardware encryption.


################################################## ###
What is Orbot?
################################################## ###


https://guardianproject.info/apps/orbot/


Orbot is an application that allows mobile phone users to access the web, instant messaging and email without being monitored or blocked by their mobile internet service provider. Orbot brings the features and functionality of Tor (read more below) to the Android mobile operating system.


Orbot 1.0.5.2 (packaging Tor 0.2.2.25) is currently available in the Android Market and from the Tor Project website.


BROWSING


You can use the Orweb Privacy Browser which we offer, which only works via Orbot and Tor.
You can also try Firefox Mobile with our ProxyMob Add-On to browse via the Tor network.


INSTANT MESSAGING


For Instant Messaging, please try Gibberbot which provides integrated, optional support for Orbot and Tor.


OTHER APPS


Transparent Proxying: You must root your device in order for Orbot to work transparently for all web and DNS traffic. If you root your device, whether it is 1.x or 2.x based, Orbot will automatically, transparently proxy all web traffic on port 80 and 443 and all DNS requests. This includes the built-in Browser, Gmail, YouTube, Maps and any other application that uses standard web traffic.


################################################## ###
What are some additional browser security addons?
################################################## ###


****
If you're not going the route of using the TBB or some other anonymizing services, you can use these
solutions and technologies to help to protect yourself online
****


https://www.eff.org/https-everywhere


HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.


****
https://adblockplus.org/en/firefox


Adblock Plus blocks all annoying ads on the web by default: video ads on YouTube, Facebook ads, flashy banners, pop-ups, pop-unders and much more.


Simply install Adblock Plus to your browser (it is available for Firefox, Chrome and Opera) or your Android smartphone or tablet and all intrusive ads are automatically removed from any website you visit.


****
https://easylist.adblockplus.org/en/


The EasyList subscriptions are lists of filters designed for Adblock Plus that automatically remove unwanted content from the internet, including annoying adverts, bothersome banners and troublesome tracking. The subscriptions are currently maintained by three authors, MonztA, Famlam and Khrin, who are ably assisted by an ample forum community.


****
https://www.ghostery.com/


Ghostery is your window into the invisible web – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior.


Ghostery tracks over 1,200 trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.


****
http://noscript.net/


The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank).


NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.


################################################## ###
What is truecrypt?
################################################## ###


http://www.truecrypt.org/


TrueCrypt is a freeware software application used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Windows 2000) the entire storage device (pre-boot authentication).


TrueCrypt supports Microsoft Windows, Mac OS X and Linux operating systems (using FUSE). Both 32-bit and 64-bit versions of these operating systems are supported, except for Windows IA-64 (not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process). The version for Windows 7, Windows Vista, or Windows XP can encrypt the boot partition or entire boot drive. There is an independent, compatible implementation, tcplay, for DragonFly BSD and Linux.


TrueCrypt supports a concept called plausible deniability, by allowing a single "hidden volume" to be created within another volume. In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose existence may be denied.


The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In a paper published in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista, Microsoft Word, Google Desktop, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released.




################################################## ###
What is GnuPG?
################################################## ###


https://www.gnupg.org


GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems.


GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German government.


Suggested reading: https://en.wikipedia.org/wiki/GnuPG


################################################## ###
What is OTR?
################################################## ###


https://securityinabox.org/en/pidgin_main


Pidgin is a free and open source client that lets you organize and manage your different Instant Messaging (IM) accounts using a single interface. The Off-the-Record (OTR) plug-in designed for use with Pidgin ensures authenticated and secure communications between Pidgin users.


Both Pidgin and OTR are available for Microsoft Windows and for GNU/Linux. Another multi-protocol IM program for Microsoft Windows that supports OTR is Miranda IM. For the Mac OS we recommend using Adium, a multi-protocol IM program that supports the OTR plugin.


Pidgin is a free and open source Instant Messaging (IM) client that lets you organize and manage your different (IM) accounts through a single interface. Before you can start using Pidgin you must have an existing IM account, after which you will register that account to Pidgin. For instance, if you have an email account with Gmail, you can use their IM service GoogleTalk with Pidgin. The log-in details of your existing IM account are used to register and access your account through Pidgin.


Pidgin is strongly recommended for IM sessions, as it offers a greater degree of security than alternative messaging clients, and does not come bundled with unnecessary adware or spyware which may compromise your privacy and security.


Off-the-Record (OTR) messaging is a plugin developed specifically for Pidgin. It offers the following privacy and security features:


Authentication: You are assured the correspondent is who you think it is.


Deniability: After the chat session is finished, messages cannot be identified as originating from either your correspondent or you.


Encryption: No one else can access and read your instant messages.


Perfect Forward Security: If third party obtains your private keys, no previous conversations are compromised.


Note: Pidgin must be installed before the OTR plugin.


Note: All users are encouraged to learn as much as possible about the privacy and security policies of their Instant Messaging Service Provider.


################################################## ###
What is Tails?
################################################## ###


https://tails.boum.org/


Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly.


It is a complete operating-system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.


Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.


################################################## ###
What is Whisper Systems?
################################################## ###


http://www.whispersystems.org/


WhisperSystems is an opensource project dedicated to helping to secure your mobile devices file systems and communications.


RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.


Use the default system dialer and contacts apps to make calls as you normally would.
RedPhone will give you the opportunity to upgrade to encrypted calls whenever possible.
RedPhone calls are encrypted end-to-end, but function just like you're used to.
RedPhone uses your normal phone number to make and receive calls, so you don't need yet another identifier.


TextSecure encrypts your text messages over the air and on your phone. It's almost identical to the normal text messaging application, and is just as easy to use.


A full replacment for the default text messaging application.
All messages are encrypted locally, so if your phone is lost, your messages will be safe.
Messages to other TextSecure users are encrypted over the air, protecting your communication in transit.



Install TextSecure Get TextSecure Source Arrow
Screenshot


################################################## ###
What would this look like in an ideal world?
################################################## ###


For general web-browsing use Tails from an encrypted/hidden partition on removable media. You will not have flash and/or java support but with the implementation of HTML5 it won't matter for much longer. If you absolutely have to use a site that requires Java or Flash, then your identity might be exposed.


You can create hidden/encrypted volumes for multiple virtual machines that you use for other things, like "vulnerability assessments".


While your ISP cannot intercept your communications and neither can the government in these scenarios they can see that you are sending a large amount of encrypted traffic from your location, which could raise a red flag for certain 3-letter acronyms interested in your activities.


Using the technique of encryption within encryption you could use multiple "proxified" connections using ssh/tor and other means to obfuscate your traffic. It is possible to use tails as a virtual machine with all of it's traffic proxied to a remote SSH session. This will effectively send all your tor traffic via an ssh session,


The government is coming after your privacy, using the technologies outlined here will make it very difficult if not impossible to be able to track you online.


Some random helpful free tools.


https://www.virtualbox.org/

Magda Hassan
07-14-2013, 05:23 AM
Given the disgusting news that Google Android have been totally evil and have been collaborating with the NSA and embedded NSA code in their mobile phones I was pleased to see that Mozilla Fire Fox is just about to go into the mobile operating system business. It is based on HTML5. Haven't tried it but will once it becomes available my area. They have just lauinched this month. The phones look cheap. It is launching in Spain and Poland and some parts of South America, Colombia etc. I want to know if we can just format Android and install FF os on existing phones?

http://en.wikipedia.org/wiki/Firefox_OS

Peter Lemkin
07-14-2013, 05:47 AM
Ubuntu Touch Developer Preview on a Galaxy Nexus (http://en.wikipedia.org/wiki/Galaxy_Nexus)


Company (http://en.wikipedia.org/wiki/Software_industry) /developer (http://en.wikipedia.org/wiki/Software_developer)Canonical Ltd. (http://en.wikipedia.org/wiki/Canonical_Ltd.)


OS familyUnix-like (http://en.wikipedia.org/wiki/Unix-like)


Working stateIn development


Source modelOpen source (http://en.wikipedia.org/wiki/Open_source)


Initial release21 February 2013


Latest unstable release (http://en.wikipedia.org/wiki/Software_release_life_cycle)Ubuntu Touch Developer Preview (http://en.wikipedia.org/wiki/Ubuntu_Touch_Developer_Preview) / 21 February 2013


Marketing targetMobile & PC, cross device, cross platform, tablets, notebooks, smartphones, GPS smartnav, In-vehicle infotainment (http://en.wikipedia.org/wiki/In-vehicle_infotainment)


Availablelanguage (http://en.wikipedia.org/wiki/Natural_language)(s)Multilingual


Availableprogramming languages (http://en.wikipedia.org/wiki/Programming_languages)(s)C (http://en.wikipedia.org/wiki/C), C++ (http://en.wikipedia.org/wiki/C%2B%2B), QML (http://en.wikipedia.org/wiki/QML), HTML5 (http://en.wikipedia.org/wiki/HTML5)


Update methodUbuntu Software Center (http://en.wikipedia.org/wiki/Ubuntu_Software_Center)


Package managerClick (http://en.wikipedia.org/w/index.php?title=Click_(file_format)&action=edit&redlink=1) (dpkg (http://en.wikipedia.org/wiki/Dpkg)[citation needed (http://en.wikipedia.org/wiki/Wikipedia:Citation_needed)])


Supported platformsARM (http://en.wikipedia.org/wiki/ARM_architecture) and x86 (http://en.wikipedia.org/wiki/X86)


Kernel (http://en.wikipedia.org/wiki/Kernel_(computing)) typeMonolithic (http://en.wikipedia.org/wiki/Monolithic_kernel) (Linux kernel (http://en.wikipedia.org/wiki/Linux_kernel))


Userland (http://en.wikipedia.org/wiki/Userland_(computing))GNU (http://en.wikipedia.org/wiki/GNU_Core_Utilities)


Default user interface (http://en.wikipedia.org/wiki/User_interface)Graphical (Unity Next (http://en.wikipedia.org/wiki/Unity_Next))


License (http://en.wikipedia.org/wiki/Software_license)Mainly the GPL (http://en.wikipedia.org/wiki/GNU_General_Public_License) and various other open source licenses


Official websitewww.ubuntu.com/phone (http://www.ubuntu.com/phone)
www.ubuntu.com/tablet (http://www.ubuntu.com/tablet)

Magda Hassan
07-14-2013, 06:01 AM
Prism-break doesn't recommend Cannonical's Ubuntu because it contains Amazon ads and data leaks (https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks) by default.

Peter Lemkin
07-14-2013, 06:14 AM
Prism-break doesn't recommend Cannonical's Ubuntu because it contains Amazon ads and data leaks (https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks) by default.

Shame on Cannonical!...that is not their stated ethic.....:moon: I can't say for their iPhone product, but on my Ubuntu on my PC, I JUST turned off all recording of data [the option exists] under the privacy setting.....:mexican: I'll explore this further...their privacy policy is a bit unnerving compared to what I thought it would be http://www.ubuntu.com/privacy-policy

With MS, there is really nothing one can do. Just a personal note. I had a potentially very important, never publicly released JFK assassination-related photo. I had it on several places on my computer - each was named differently, each was in a folder in a different location, named differently. This was before I used Ubuntu and was using Windows-7. Once, just after I was kicked off of the EF I went searching for the photo [as Jack White, one other person, and I were working on what information could be gleaned from it - and attempt to determine if it was 'information' or 'dis-information' before public release], and all copies had been removed [folders were intact and all other photos left alone!] by some invasive personalized malware purpose-built for removal of this photo from my computer! NB - I have it back, however, and can't say how - here. The 'former' intel operative who gave me the photo in an email stated that the photo had something to do with my being removed from the EF - but I can't prove that in any way. They also claim they have been 'punished' for having given it to me and, in fact, this person who was once very active on several JFK forums has been nowhere seen posting, and has even taken down parts of their own website on related matters, from about one month after that picture was taken off my computer. Beware! Store sensitive items offline! :spy:

Ideally, one should have two identical computers. One online; the other offline.....

Magda Hassan
07-14-2013, 06:50 AM
If you want a nice easy Linux system for your pooter I can recommend Mint. Beautiful.

P.S. One is based on Ubuntu and the other is based on Debian. Get the Debian one if you are after good security.

Magda Hassan
07-20-2013, 09:37 AM
Good value.

Jolly Roger ‏@PiracyParty (https://twitter.com/PiracyParty)2m (https://twitter.com/PiracyParty/status/358509508114391040)
Anyone need a #VPN (https://twitter.com/search?q=%23VPN&src=hash)? http://EarthVPN.com (http://t.co/flqbUgrOTV) promo code: SCHOOLOFPRIVACYVPN20% off $4 a month, or $40 a year. #YouAreAPirate

http://schoolofprivacy.eu/vpn
L (https://twitter.com/search?q=%23YouAreAPirate&src=hash)ots of good info here.



VPNs (http://schoolofprivacy.eu/vpn)Here is a list of VPN Providers to choose from. Before choosing a provider please be sure to READ their privacy and TOS (Terms of Service) statements. To remain fully secure you should go with a company who chooses NOT to log IP addresses OR logs them for very short periods of time. Always choose a VPN provider who is over seas, NEVER in the same country as you. Preferred providers will be marked with an asterisk (*). If you prefer to use proxies then here is our page on Proxies (http://schoolofprivacy.eu/freshproxies).We also have a page on seedboxes (http://schoolofprivacy.eu/seedboxes) and offshore hosting (http://schoolofprivacy.eu/hosting) we alsoreview (http://schoolofprivacy.eu/vpnreviews) various security products
NOTICE: “When a VPN says they don’t log and offer multiple servers u have to research all the servers individual policies"
How To Make VPNs Even More Secure (http://torrentfreak.com/how-to-make-vpns-even-more-secure-120419/) - Check this out for added protection. By: TorrentFreak
Legend
* - This marks recommended VPNs.
http://i.imgur.com/oKQGfqx.jpg - This marks VPNs that accept Bitcoins.
http://i.imgur.com/xh5pFUB.png - This marks VPNs that offer Free Trial.
http://i.imgur.com/KxvmIbh.jpg - This marks VPNs that accept Liberty Reserve.
http://i.imgur.com/ycjyBPP.png - This marks VPNs that accept Paysafe card.
http://i.imgur.com/1MZ0mRV.jpg - This marks VPNs that allow Port Forwarding.
http://i.imgur.com/8g71on8.png- This marks our interview with a VPN company.
http://i.imgur.com/N6pqAmS.png-This marks VPNs that have a plan less then 7$ a month.
http://i.imgur.com/GHE57ON.gif-This marks VPNs who offer socks5 access/Bittorent Proxy (http://schoolofprivacy.eu/post/49130295267/what-is-a-bittorent-proxy)
Our personal recommendations/vpns who dont log *

Privateinternetaccess (https://www.privateinternetaccess.com/pages/buy-vpn/SCHOOL001)* http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40879834584/interview-with-private-internet-access)http://i.imgur.com/N6pqAmS.pnghttp://i.imgur.com/GHE57ON.gif
proxy.sh (http://proxy.sh/panel/aff.php?aff=046)* http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/ycjyBPP.pnghttp://i.imgur.com/N6pqAmS.png
TorGuard (http://torguard.net/aff.php?aff=210) * http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/N6pqAmS.pnghttp://i.imgur.com/GHE57ON.gif30% off all services: reddit30
BTguard (http://btguard.com/?a=wearehidden)* http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/N6pqAmS.pnghttp://i.imgur.com/GHE57ON.gif
vpntunnel.se (https://www.vpntunnel.com/?a_aid=50f151358cc66) * http://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40305834664/short-interview-with-vpntunnel-se)http://i.imgur.com/N6pqAmS.png
TorrentPrivacy (http://torrentprivacy.com/?id=wearehidden) * http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/GHE57ON.gif
Cryptocloud (https://billing.cryptocloud.com/aff.php?aff=004) * http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/1MZ0mRV.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/28370464017/my-interview-with-marc-tager-the-managing-director-of) 50% off with #Snowden
Zorrovpn (https://zorrovpn.com/?ref=schoolofprivacy) http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/49813877750/interview-with-zorrovpn)
ivpn (https://www.ivpn.net/aff.php?aff=227) http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/43554037348/short-interview-with-ivpn-net)
AirVPN (https://airvpn.org/) http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/xh5pFUB.png
Earthvpn (https://www.earthvpn.com/billing/aff.php?aff=010)http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/N6pqAmS.pnghttp://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/50402473044/interview-with-earthvpn) 20% OFF with SCHOOLOFPRIVACYVPN
VPNReactor (https://www.vpnreactor.com/) http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/N6pqAmS.png
BlackVPN (https://www.blackvpn.com/) * http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40306263518/short-interview-with-blackvpn)
PrivatVPN (http://affiliate.privatvpn.se/scripts/click.php?a_aid=518693adb2fc2) http://i.imgur.com/xh5pFUB.png
Privacy.io (http://privacy.io/?ref=272267) http://i.imgur.com/N6pqAmS.png
Mullvad (http://mullvad.net/) http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40306784701/short-interview-with-mullvad)http://i.imgur.com/N6pqAmS.png
ItsHidden (http://itshidden.com/)
Ipredator (https://www.ipredator.se/) *http://i.imgur.com/xh5pFUB.pnghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/46836487887/interview-with-ipredator)
nVPN (http://nvpn.net/) * http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/ycjyBPP.pnghttp://i.imgur.com/1MZ0mRV.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40305226306/short-interview-with-nvpn)http://i.imgur.com/N6pqAmS.png
Faceless (http://faceless.me/) http://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40306633330/short-interview-with-faceless-vpn)
PRQ (http://www.prq.se/?p=tunnel&intl=1) http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/40303548673/short-interview-with-prq)
Anonine (https://www.anonine.com/) * http://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/44223453755/short-interview-with-anonine-vpn)http://i.imgur.com/N6pqAmS.png
cryptovpn (http://cryptovpn.com/?ref=wearehidden) http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/KxvmIbh.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/44475829805/short-interview-with-cryptovpn)
nordvpn (http://www.nordvpn.com/) http://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/46838507041/interview-with-nordvpn)http://i.imgur.com/N6pqAmS.png
azirevpn (https://www.azirevpn.com/) http://i.imgur.com/oKQGfqx.jpghttp://i.imgur.com/8g71on8.png (http://schoolofprivacy.eu/post/46155928995/interview-with-azirevpn)http://i.imgur.com/N6pqAmS.png
And please check out our interviews with different VPN providers see what they had to say (http://schoolofprivacy.eu/vpninterviews)
(for more information about VPNs and logging please visit here (http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/) and Here (http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/?utm_source=dlvr.it&utm_medium=twitter) for torrentfreaks VPN interviews)
When purchasing a VPN, you DO NOT want the account you have purchased being traced back to you, so you will have to purchase with a pre-paid VISA Gift Card. NEVER buy a VPN or any service for that matter with your personal bank account debit card or personal credit card. You doing so can lead to an easily traceable footprint. You can also use bitcoins (http://bitcoin.org/),Liberty Reserve (https://encrypted.google.com/url?sa=t&rct=j&q=liberty%20reserve&source=web&cd=1&cad=rja&ved=0CDEQFjAA&url=https%3A%2F%2Fwww.libertyreserve.com%2F&ei=i9wwUemCOYG9ygGAlIHgDw&usg=AFQjCNFyY7edEU5KPRrb8H1OFciz4-p1AQ&bvm=bv.43148975,d.aWc) , paysafe (https://www.paysafecard.com/en-ca/) anonymously if the provider accepts it.
Also, a VPN is not the only measure you should take. We strongly recommend using a PAID VPN plus the TOR service. Remember take anonymity seriously, be smart.
(Asterisk indicates recommended selections)
EVERYTHING ABOVE THIS LINE DOES NOT LOG
__________________________________________________ __
FREE VPNs:
This is a list of some Free VPN providers that you can use to hide your IP address, keep in mind most Free VPNs WILL log your IP and abide by laws to hand them over.
Please be careful when using them, and I strongly recommend not using them for anything illegal. The best option is to go with Paid VPN+Tor, but if you do not have the money this list can be helpful.

SecurityKiss (http://www.securitykiss.com/) (has 300mb a day free hosted in europe)
ultrasurf (http://ultrasurf.us/) (has unlimited traffic hosted in the US)*
tunnelbear (http://www.tunnelbear.com/) (has monthly limits but is free and good)
proxpn (http://proxpn.com/) (free vpn which will also work for mac users)
Hotspotshield (http://hotspotshield.com/) - (not the best, but better than being naked)
acevpn (http://www.acevpn.com/free-ace-vpn-service-invite/)
your-freedom (https://www.your-freedom.net/)
vpnbook (http://www.vpnbook.com/)
expatshield (http://expatshield.com/) has UK servers
Vpnium (https://vpnium.com/)
versavpn (https://www.versavpn.com/)
freevpn.nl (http://freevpn.nl/) has dutch server
spotflux (http://spotflux.com/) UK servers, free for mac,windows, android and IOS
Hide.io (https://www.hide.io/) 2GB a month romania and netherlands
Privitize (http://privitize.com/) (sweden)
cyberghost (http://cyberghostvpn.com/) (A good one but , free accounts are given 2GB a month but A free one month premium is included if you subscribe to their email newsletter


Android VPNs:
DroidVPN (http://droidvpn.com/) Gives a free trial
superfreevpn (http://www.superfreevpn.com/android-free-vpn/) completely free


iPhone VPNs:
Free iPhone VPN List (http://www.bestvpnservice.com/blog/best-free-iphone-vpn-services/)

Magda Hassan
07-20-2013, 12:19 PM
To replace vulnerable programmes like Drop Box and others that use cloud storage.


BitTorrent’s serverless P2P sync software hits beta, adds Android support

NSA-resistant? Sync files without storing them in the cloud.

by Jon Brodkin (http://arstechnica.com/author/jon-brodkin/) - July 18 2013, 2:00am AUSEST

BitTorrent, Inc. today plans to release a beta version of BitTorrent Sync, software that provides Dropbox-like syncing using the same peer-to-peer file sharing technology that powers BitTorrent clients. Some new features—including "mobile apps and an archive capability for retrieving previous versions of synced files," BitTorrent said—have been added since we went hands-on with the alpha version (http://arstechnica.com/information-technology/2013/04/bittorrent-sync-creates-private-peer-to-peer-dropbox-no-cloud-required/) of the software back in April.
The first mobile app is for Android (https://play.google.com/store/apps/details?id=com.bittorrent.sync); an iOS version will follow soon.
The "SyncArchive" feature "is a basic versioning capability introduced with the Beta. It will include a folder where you can see all previous versions of your files," BitTorrent's announcement said. "Unobtrusive and searchable, this feature has been in high demand and will evolve over time."
The beta version of BitTorrent Sync is expected to go live at noon Eastern time and will be available for download here (http://labs.bittorrent.com/experiments/sync.html). There are various bug fixes, and the beta software should be more stable than the alpha version. There's no word yet on when the software will be robust enough to drop the "beta" label.
http://cdn.arstechnica.net/wp-content/uploads/2013/07/bittorrent-sync-android.pngBitTorrent Sync for Android.
BitTorrent, Inc.
Serverless sync

The software adds a sync folder to your devices just as services like Dropbox, Google Drive, or SkyDrive do. But instead of signing into a cloud service, Sync uses randomly generated or user-chosen 21-byte keys to sync folders across computers and mobile devices. One-way synchronization and one-time secrets for sharing files are supported.
The service is free and has no limits on file size.
"Because BitTorrent Sync is based on the principles of the BitTorrent protocol, you can sync as many big files as you want," the company said. "Transfers are encrypted, and information isn’t stored on a server in the cloud; data is protected by encrypted keys. Data is never passed through a stranger's computer or is stored on a server. Your files belong to you, and stay on the devices."
Besides Android, Sync has versions for Windows, Mac, Linux, and FreeBSD. BitTorrent Sync can also run on Linux-based Network Attached Storage devices.
Since the alpha launch in April, the software has been used to sync more than 8PB of data, BitTorrent said. "While we have general statistics about the BitTorrent Sync app, we don’t have any access to private information," the company wrote, by way of reassuring people that their data is safe. "The client reports back anonymous usage statistics to check if there’s a new build available and to help improve the app."
BitTorrent also made its pitch that Sync is the software to use for privacy-conscious individuals. "With all of the NSA and PRISM developments of late, consumers are more keenly aware of online privacy and digital security issues," the company said. "As BitTorrent Sync doesn’t rely on servers, your data is never exposed to prying eyes… Likewise, Sync is built in such a way that the product will never shut down. The software will be as usable (and free) in the future as it is today. The user is always in control of their own data."
If you're looking for a weekend project, you might want to check out this May blog post (http://blog.bittorrent.com/2013/05/23/how-i-created-my-own-personal-cloud-using-bittorrent-sync-owncloud-and-raspberry-pi/) from BitTorrent Digital Creative Manager Dan Brown. Brown describes how he used a Raspberry Pi, BitTorrent Sync, and OwnCloud to create his own "personal cloud."
"I’ve been using [BitTorrent Sync] for syncing several gigabytes of RAW photos and video across my various machines," Brown wrote. "There is the occasional scenario, however, where I’ve wanted to grab a few files, but my other machine is turned off. To solve this problem, I’m using a Raspberry Pi as a low power, always-on device with Sync installed. Just for kicks, I’m also using Owncloud (http://owncloud.org/) (open source) to provide me with a web interface for accessing my files from any computer, including my mobile phone."

http://labs.bittorrent.com/experiments/sync.html?utm_source=BitTorrentBlog&utm_medium=Post&utm_campaign=Sync_0711713

(http://labs.bittorrent.com/experiments/sync.html?utm_source=BitTorrentBlog&utm_medium=Post&utm_campaign=Sync_0711713)http://arstechnica.com/information-technology/2013/07/bittorrents-serverless-p2p-sync-software-hits-beta-adds-android-support/

Magda Hassan
08-07-2013, 02:04 AM
One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android (http://www.cnet.com/android-atlas/) version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'"
The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?"
Where does security innovation go next?
The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
http://asset2.cbsistatic.com/cnwk.1d/i/tim/2013/01/29/Wickr_1.9_ID_Connect_270x513.jpg Secure SMS app Wickr's interface for finding friends.
(Credit: Wickr)
Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data.
"[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata.
"Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?"
To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy.
Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards (http://news.cnet.com/8301-1009_3-57594793-83/maskme-guards-your-privacy-like-a-vigilant-angel/) is another example of a service that doesn't have access to its own users' data.
Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service."
Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.


The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google.
Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship.
"I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic.
It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
Longer-term solutions
Right now, the intersection of individual information security experts, governments, and private companies large and small is at a crisis point. How they untangle and compromise their competing interests could have far-reaching ramifications for all.
Maiffret, the teen hacker turned respected infosec expert both inside and outside the infosec community, thinks that the government is going to have to give up some ground.
"I think they know they need to say more. How do you say more, and not jeopardize things," is the question, he said. "There is a better middle ground. It's just like businesses accepting social media, it won't happen overnight."
Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory."
Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
http://news.cnet.com/8301-1009_3-57597093-83/surveillance-scandal-rips-through-hacker-community/

Magda Hassan
08-11-2013, 12:42 AM
http://piratebrowser.com/
PirateBrowser - No more censorship! PirateBrowser is a bundle package of the Tor client (Vidalia) (https://www.torproject.org/), FireFox Portable browser (http://portableapps.com/apps/internet/firefox_portable) (with foxyproxy addon (https://getfoxyproxy.org/)) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.
This is how it looks like:
http://piratebrowser.com/browser.jpg
Download PirateBrowser Version 0.6b

Magnet link (magnet:?xt=urn:btih:12C542A45C523D36DED2EB5F816A0 8D173861409&dn=PirateBrowser_0.6b.exe&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounc e&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fa nnounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncee)
Torrent file (http://piratebrowser.com/downloads/PirateBrowser_0.6b.exe.torrent)
Self extracting archive (http://piratebrowser.com/downloads/PirateBrowser_0.6b.exe)


Getting Started

1) Download (http://piratebrowser.com/#down) PirateBrowser and save it to your computer: http://piratebrowser.com/img/dl-1.jpg
2) Run the downloaded .exe file You may be prompted to verify the application, press "Run":
http://piratebrowser.com/img/dl-2.jpg
3) Select the desination folder and press "Extract": http://piratebrowser.com/img/dl-3.jpg
(It will create a PirateBrowser folder in the path you assign)
4) Go to the new directory and run the "Start PirateBrowser.exe" file: http://piratebrowser.com/img/dl-4.jpg
5) The application will start up. Once connected to the Tor Network the standalone Firefox browser will open up and you can start browsing: http://piratebrowser.com/img/dl-5.jpg

TIP: If you want to create a icon on your desktop to start the PirateBrowser, you can right click on "Start PirateBrowser.exe", choose "Send to" and then "Desktop (create shortcut)".



FAQ Does it make me surf the net anonymously?
While it uses Tor network (https://www.torproject.org/), which is designed for anonymous surfing, this browser is intended just to circumvent censorship — to remove limits on accessing websites your government doesn't want you to know about.

Magda Hassan
08-14-2013, 11:13 AM
http://dooble.sourceforge.net/
Dooble is a free and open source (https://en.wikipedia.org/wiki/Open_source) web browser (https://en.wikipedia.org/wiki/Web_browser). The aim of Dooble is to create a comfortable and safe browsing medium.[3] (https://en.wikipedia.org/wiki/Dooble#cite_note-3) Currently, Dooble is available for FreeBSD (https://en.wikipedia.org/wiki/FreeBSD),[2] (https://en.wikipedia.org/wiki/Dooble#cite_note-sfmain-2) Linux (https://en.wikipedia.org/wiki/Linux),[4] (https://en.wikipedia.org/wiki/Dooble#cite_note-mainpage-4) OS X (https://en.wikipedia.org/wiki/OS_X),[4] (https://en.wikipedia.org/wiki/Dooble#cite_note-mainpage-4) and Windows (https://en.wikipedia.org/wiki/Windows).[4] (https://en.wikipedia.org/wiki/Dooble#cite_note-mainpage-4) Dooble should be compatible with any operating system where Qt (https://en.wikipedia.org/wiki/Qt_%28framework%29) is available.[dubious (https://en.wikipedia.org/wiki/Wikipedia:Disputed_statement) – discuss (https://en.wikipedia.org/wiki/Talk:Dooble#compatible_with_any_operating_system_w here_Qt_is_available)]



Features Dooble is designed and implemented in order to improve privacy and usability.
Addons
Version 1.26 of Dooble introduced support for addons (https://en.wikipedia.org/wiki/Addon). Linux and Windows installers contain the Interface_(chat) (https://en.wikipedia.org/wiki/Interface_%28chat%29) plugin, a new Open Source (https://en.wikipedia.org/wiki/Open_Source) Social Networking (https://en.wikipedia.org/wiki/Social_Networking) application that's similar to ChatZilla (https://en.wikipedia.org/wiki/ChatZilla) and Diaspora (https://en.wikipedia.org/wiki/Diaspora).[5] (https://en.wikipedia.org/wiki/Dooble#cite_note-5) As of version 1.40, the Tor (https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29)Browser Add-On based on Vidalia (https://en.wikipedia.org/wiki/Vidalia_project) is supported: Tor Browser Addon (http://sourceforge.net/projects/torbrowser/).
Bookmarks
Dooble includes a simple bookmarks browser. Users may also modify an existing bookmark via a popup that's accessible from the location widget.
Cookie Management
Along with standard cookie management options, Dooble also provides a mechanism that automatically removes cookies. If permitted, Dooble will occasionally remove undesired cookies (https://en.wikipedia.org/wiki/Cookies).[6] (https://en.wikipedia.org/wiki/Dooble#cite_note-6)[7] (https://en.wikipedia.org/wiki/Dooble#cite_note-golem-7)
Distributed Search Engine
Dooble partially integrates the distributed search engine YaCy (https://en.wikipedia.org/wiki/YaCy).[8] (https://en.wikipedia.org/wiki/Dooble#cite_note-prolinux-8)
Encrypted Browsing Information
Most of the data that Dooble retains is encrypted. Dooble does not encode file associations and user settings. Dooble also provides a session-based model where the data is encrypted with a temporary password.
File Manager and FTP Browser
Included is a non-JavaScript (https://en.wikipedia.org/wiki/JavaScript) file manager and FTP (https://en.wikipedia.org/wiki/FTP) browser.[7] (https://en.wikipedia.org/wiki/Dooble#cite_note-golem-7)
Proxy Configuration
Highly-configurable proxy (https://en.wikipedia.org/wiki/Proxy_server) settings provide reasonable flexibility.
Session Restoration
Dooble supports session restoration for authenticated sessions. If Dooble exits prematurely, the user may restore previous tabs and windows at the next authenticated session.
Third-Party Content Blocking
Some Web sites employ iFrames in order to distribute content from one or more third-party Web sites. Since this technology may raise privacy issues with some users, Dooble provides a means of blocking external content.
History The first version (0.1) was released in September, 2009.[8] (https://en.wikipedia.org/wiki/Dooble#cite_note-prolinux-8) The current version (1.44) was released in August, 2013.[2] (https://en.wikipedia.org/wiki/Dooble#cite_note-sfmain-2)
Releases Dooble is also available on Nokia (https://en.wikipedia.org/wiki/Nokia)'s N900 (https://en.wikipedia.org/wiki/N900). [9] (https://en.wikipedia.org/wiki/Dooble#cite_note-9)
Reception Dooble has been rated as the ninth of ten "top" Linux browsers by Jack Wallen.[10] (https://en.wikipedia.org/wiki/Dooble#cite_note-10)
See also

List of web browsers (https://en.wikipedia.org/wiki/List_of_web_browsers)
List of web browsers for Unix and Unix-like operating systems (https://en.wikipedia.org/wiki/List_of_web_browsers_for_Unix_and_Unix-like_operating_systems)
Comparison of web browsers (https://en.wikipedia.org/wiki/Comparison_of_web_browsers)
Qt (framework) (https://en.wikipedia.org/wiki/Qt_%28framework%29)

References



^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-1) Netzwelt-Editor. "Dooble: alternativer Webbrowser" (http://www.netzwelt.de/download/10023-dooble.html). Netzwelt.de. Retrieved July 17, 2011.
^ a (https://en.wikipedia.org/wiki/Dooble#cite_ref-sfmain_2-0) b (https://en.wikipedia.org/wiki/Dooble#cite_ref-sfmain_2-1) c (https://en.wikipedia.org/wiki/Dooble#cite_ref-sfmain_2-2) "Dooble Web Browser" (http://sourceforge.net/projects/dooble/). Sourceforge. Retrieved July 18, 2011.
^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-3) Frank Ziemann (August 28, 2009). "Dooble für die Privatsphäre" (http://www.pcwelt.de/news/Neuer-Browser-Dooble-fuer-die-Privatsphaere-443292.html). PC Welt (https://en.wikipedia.org/wiki/PC_Welt). Retrieved July 17, 2011.
^ a (https://en.wikipedia.org/wiki/Dooble#cite_ref-mainpage_4-0) b (https://en.wikipedia.org/wiki/Dooble#cite_ref-mainpage_4-1) c (https://en.wikipedia.org/wiki/Dooble#cite_ref-mainpage_4-2) "Dooble Web browser" (http://dooble.sourceforge.net/). Retrieved July 18, 2011.
^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-5) InterFace Team. "http://interface.sf.net – Welcome to InterFace! The Open Source Social Networking addon for the Dooble Web Browser" (http://interface.sf.net). http://interface.sf.net. Retrieved December 15, 2011.
^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-6) Computer-Bild-Editor. "Dooble" (http://www.computerbild.de/download/Dooble-6160126.html). Computerbild.de. Retrieved July 17, 2011.
^ a (https://en.wikipedia.org/wiki/Dooble#cite_ref-golem_7-0) b (https://en.wikipedia.org/wiki/Dooble#cite_ref-golem_7-1) Pakalski, Ingo (December 30, 2009). "Dooble-Browser setzt auf Datenschutz" (http://www.golem.de/0912/72129.html) (in German). Golem.de. Retrieved July 18, 2011.
^ a (https://en.wikipedia.org/wiki/Dooble#cite_ref-prolinux_8-0) b (https://en.wikipedia.org/wiki/Dooble#cite_ref-prolinux_8-1) Benthin, Falko (August 26, 2009). "Das Dooble-Browser-Projekt arbeitet an einem freien Browser, welcher die Privatsphäre seiner Anwender schützt." (http://www.pro-linux.de/news/1/14620/browser-dooble-legt-wert-auf-privatsphaere.html) (in German). Pro-Linux (https://en.wikipedia.org/w/index.php?title=Pro-Linux&action=edit&redlink=1). Retrieved July 17, 2011.
^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-9) Aapo Rantalainen. "Release Package for Dooble on Maemo" (http://maemo.org/packages/view/dooble). Maemo. Retrieved September 30, 2012.
^ (https://en.wikipedia.org/wiki/Dooble#cite_ref-10) Jack Wallen. "Top 10 Linux browsers" (http://www.zdnet.co.uk/news/desktop-apps/2011/02/04/top-10-linux-browsers-how-i-rate-them-40091669/9/). ZDNEt UK. Retrieved July 18, 2011.


External links

https://upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png
Wikimedia Commons has media related to: Dooble (https://commons.wikimedia.org/wiki/Category:Dooble)




Official website (http://dooble.sf.net)

External links to Addons

InterFace Chat Application Addon (http://interface.sf.net)
Website for Development of Addons (http://dooble-cosmos.sf.net)
Maemo Release Package (http://maemo.org/packages/view/dooble)

Peter Lemkin
08-21-2013, 09:43 AM
Hacking attack on Tor allegedly linked to SAIC and NSAPosted on August 5, 2013 (http://darkernet.in/hacking-attack-on-tor-allegedly-linked-to-saic/) by admin (http://darkernet.in/author/admin/)
http://darkernet.in/wp-content/uploads/2013/08/wpid6685-wpid-promo_cyber.jpg (http://darkernet.in/wp-content/uploads/2013/08/wpid6685-wpid-promo_cyber.jpg)
The IP address hardcoded into the 0-day Firefox javascript, used to compromise the Tor network via a version of Tor bundle, has been traced back to Science Applications International Corp (a company investigated by Blue Cabinet) which has worked with former Edward Snowden employer Booz Allen Hamilton, is an NSA contractor, has supplied communications technology to the Assad regime, and also developed a tool for the NSA called – wait for it – PRISM.
It is alleged the FBI with Verizon are behind this attack but CryptoCloud (https://t.co/FvincX8Fx2)points out that this may be a ruse (http://cryptocloud.org/viewtopic.php?f=14&p=3860#p3860)and that the real culprit is probably the NSA, who regularly contract out to SAIC and who are basically waging war – overt and covert, using any means at its disposal, against all-comers – in this case, using O-day browser malware. See below for more, plus CryptoCloud via aforementioned link…
The IP address in question is 65.222.202.%. C block. Seehttp://www.domaintools.com/research/ip-explorer/?ip=65.222.202.53 (http://www.domaintools.com/research/ip-explorer/?ip=65.222.202.53)for more on this. Note: according to Baneki Privacy the whole C Block is nsa.gov though Wired reckons the block is shared by several US Government agencies.
UPDATE: Tor advises (https://blog.torproject.org/blog/tor-security-advisory-old-tor-browser-bundles-vulnerable)that the attack was specifically aimed at Windows users and was fixed via June and July upgrades of Tor.
A. The hacking attack
According to Hacker News (http://thehackernews.com/2013/08/Firefox-Exploit-Tor-Network-child-pornography-Freedom-Hosting.html)… “The FBI appears to have gained access to Freedom Hosting and injected malicious HTML code that checks the visitor’s browser to see if he is using Firefox 17. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address located in eastern Virginia.
“The Openwatch reported that the execution of malicious JavaScript inside the Tor Browser Bundle, perhaps the most commonly used Tor client, comes as a surprise to many users. Previously, the browser disabled JavaScript execution by default for security purposes, however this change was recently reverted by developers in order to make the product more useful for average internet users. As a result, however, the applications have become vastly more vulnerable to attacks such as this.
The JavaScript code’s payload analyzed by reverse engineering and exploit developer Vlad Tsyrklevich, who reveals that it briefly connects to a server and sends the hostname and MAC address of the victim. “Briefly, this payload connects to 65.222.202.54:80 and sends it an HTTP request that includes the host name (via gethostname gethostname) and the MAC address of the local host (via calling SendARP on gethostbyname gethostbyname ->h_addr_list). After that it cleans up the state and appears to deliberately crash.”
Microsoft used to provide the US government with an early start on its security vulnerabilities, which was reportedly used to aid its cyber espionage programs. But here no idea at this point, that Mozilla worked with the government in this case.”
http://darkernet.in/wp-content/uploads/2013/08/wpid-Firefox+Zero-Day+used+by+FBI+to+track+down+owner+of+Tor+hidden+ services+hosting.jpg (http://darkernet.in/wp-content/uploads/2013/08/wpid-Firefox+Zero-Day+used+by+FBI+to+track+down+owner+of+Tor+hidden+ services+hosting.jpg)
B. SAIC
Investigated by Blue Cabinet (http://bluecabinet.info/wiki/Blue_cabinet/SAIC), “Science Applications International Corp. is a major intelligence, military, aerospace, engineering and systems contractor. It is involved in defense/military (DoD), intelligence community, and homeland security contracting, as well as selected commercial markets.” But that’s not all…
SAIC (http://www.saic.com/)offers a range of scientific, engineering, and technology applications for national security, energy and the environment, critical infrastructure, and health. The company employs around 45,000 people and its customers include the Department of Defense, the intelligence community (e.g. the CIA, NSA, etc), the Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. It offers a full suite of intelligence, surveillance and reconnaissance (ISR) and cyber security solutions across a broad spectrum of national security programs. According to its website, its capabilities “support the entire intelligence lifecycle, from the collection of vital information across all domains, to the processing of data into intelligence products, and to the employment of people supporting national and military intelligence agencies as well as other federal and civilian customers within the national security arena… Quick reaction capabilities (QRC) in airborne, maritime, and space-based solutions are enhanced by processing, exploitation, and dissemination technologies; and worldwide mission support helps our customers in the intelligence community and the Department of Defense tackle the toughest global ISR challenges.”
And then there is…
The “Planning tool for Resource Integration, Synchronization and Management” or PRISM (according to NSA this is a different PRISM to the one revealed by Edward Snowden) is a web-based tool and despite its name is supposedly used by US military intelligence to send tasking instructions to data collection platforms, deployed to military operations. It was developed by SAIC , first mentioned in 2002 and since then has featured in many job descriptions (http://cryptome.org/2013/06/prism-spy-tools.htm)on the internet.
According to Top Level Communications (http://electrospaces.blogspot.nl/2013/06/is-prism-just-not-so-secret-web-tool.html)… “The earliest document which mentions the Planning tool for Resource Integration, Synchronization and Management (PRISM) is a paper (pdf) from July 2002, which was prepared by the MITRE Corporation Center for Integrated Intelligence Systems. The document describes the use of web browsers for military operations, the so-called “web-centric warfare”, for which intelligence collection management programs were seen as the catalyst. These programs fuse battlefield intelligence information with the national data that they already possess, in order to provide a complete picture to their users. The program was originally prototyped and fielded for the US European Command, but is also being used in other military operation areas such as Iraq… The application was first developed for use on JWICS, the highly secure intelligence community network, but is now also being used on SIPRNet, the secure internet used by the US military.”
SAIC was also selected to lead the 2002 TRAILBLAZER (http://www.thefreelibrary.com/SAIC+Team+Wins+National+Security+Agency+TRAILBLAZE R+Contract.-a093081931)program for analyzing network data. The NSA selected the SAIC-led Digital Network Intelligence (DNI) Enterprise team that included Northrop Grumman Corporation, Booz Allen Hamilton Inc., The Boeing Company (NYSE:BA), Computer Sciences Corporation (NYSE:CSC) and SAIC wholly-owned subsidiary Telcordia Technologies to contribute to the modernization of the NSA’s signals intelligence capabilities. However, the program was canceled in 2006 and wasreported (http://dissenter.firedoglake.com/2013/03/29/the-nsa-four-blowing-the-whistle-on-corruption-around-boondoggle-for-private-intelligence-contractors/)to have been “one of the worst failures in US intelligence history.”
And more…
Some believe that SAIC was the joint developer with DHS and MIT of the Imaging System for Immersive Surveillance – or ISIS – a prototype Trapwire-style camera that spots suspicious objects and there is a theory (http://darkernet.in/aaron-swartz-the-dhs-mit-trapwire-style-surveillance-system-untangling-the-wires/)that the late Aaron Swartz was looking into ISIS at the time he was being charged.
And finally…
Just over three years, ago at its Plenary Conference in Rome, the NATO Industrial Advisory Group (NIAG) elected (http://investors.saic.com/phoenix.zhtml?c=193857&p=irol-newsArticle&ID=1439093&highlight=)SAIC’S Senior Vice President, Robert G. Bell as its Chairman for 2010-201. Bell succeeded Dr. Raffaele Esposito of Finmeccanica’s Selex Communications company (which was supplying communications technology to the Syrian military – revealed thanks to Anonymous and Wikileaks and the Syria Files and Darker Net – see here (http://darkernet.in/a-wikileaks-syria-files-darker-net-investigation-ex-gchqmod-chiefs-head-company-that-supplies-defence-equipment-to-assad-regime/), here (http://darkernet.in/wikileaks-syria-files-emails-from-pr-firm-that-advises-assad-reveal-us-govts-real-politik-or-disinformation/)and here (http://darkernet.in/syria-damascus-under-attack-wikileaks-provides-new-evidence-that-defence-suppliers-provided-expertise-in-period-surrounding-homs-shelling/).). NIAG provides the CNAD with industry advice on how to better foster government-to-industry and industry-to-industry cooperation concerning defense equipment and services; and assisting NATO’s Main Armaments Groups in exploring opportunities for international collaboration. Previously Bell served as SAIC Account Manager for NATO and the U.S. European Command. Prior to that Bell worked at NATO Headquarters as Assistant Secretary General for Defense Investment and at the White House as the National Security Council Senior Director for Defense Policy and Arms Control.
Posted from darker.net