Page 2 of 2 FirstFirst 12
Results 11 to 16 of 16

Thread: Prism Break

  1. #11

    Default If you want a VPN

    Good value.

    Jolly Roger

    Anyone need a #VPN? promo code: SCHOOLOFPRIVACYVPN20% off $4 a month, or $40 a year. #YouAreAPirate
    ots of good info here.


    Here is a list of VPN Providers to choose from. Before choosing a provider please be sure to READ their privacy and TOS (Terms of Service) statements. To remain fully secure you should go with a company who chooses NOT to log IP addresses OR logs them for very short periods of time. Always choose a VPN provider who is over seas, NEVER in the same country as you. Preferred providers will be marked with an asterisk (*). If you prefer to use proxies then here is our page on Proxies.We also have a page on seedboxes and offshore hosting we alsoreview various security products
    NOTICE: “When a VPN says they don’t log and offer multiple servers u have to research all the servers individual policies"
    How To Make VPNs Even More Secure - Check this out for added protection. By: TorrentFreak

    * - This marks recommended VPNs.
    - This marks VPNs that accept Bitcoins.
    - This marks VPNs that offer Free Trial.
    - This marks VPNs that accept Liberty Reserve.
    - This marks VPNs that accept Paysafe card.
    - This marks VPNs that allow Port Forwarding.
    - This marks our interview with a VPN company.
    -This marks VPNs that have a plan less then 7$ a month.
    -This marks VPNs who offer socks5 access/Bittorent Proxy

    Our personal recommendations/vpns who dont log *
    And please check out our interviews with different VPN providers see what they had to say
    (for more information about VPNs and logging please visit here and Here for torrentfreaks VPN interviews)
    When purchasing a VPN, you DO NOT want the account you have purchased being traced back to you, so you will have to purchase with a pre-paid VISA Gift Card. NEVER buy a VPN or any service for that matter with your personal bank account debit card or personal credit card. You doing so can lead to an easily traceable footprint. You can also use bitcoins,Liberty Reserve , paysafe anonymously if the provider accepts it.
    Also, a VPN is not the only measure you should take. We strongly recommend using a PAID VPN plus the TOR service. Remember take anonymity seriously, be smart.
    (Asterisk indicates recommended selections)
    __________________________________________________ __
    FREE VPNs:
    This is a list of some Free VPN providers that you can use to hide your IP address, keep in mind most Free VPNs WILL log your IP and abide by laws to hand them over.
    Please be careful when using them, and I strongly recommend not using them for anything illegal. The best option is to go with Paid VPN+Tor, but if you do not have the money this list can be helpful.
    cyberghost (A good one but , free accounts are given 2GB a month but A free one month premium is included if you subscribe to their email newsletter

    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  2. #12

    Default Free encrypted serverless P2P sync software.

    To replace vulnerable programmes like Drop Box and others that use cloud storage.

    BitTorrent’s serverless P2P sync software hits beta, adds Android support

    NSA-resistant? Sync files without storing them in the cloud.

    by Jon Brodkin - July 18 2013, 2:00am AUSEST

    BitTorrent, Inc. today plans to release a beta version of BitTorrent Sync, software that provides Dropbox-like syncing using the same peer-to-peer file sharing technology that powers BitTorrent clients. Some new features—including "mobile apps and an archive capability for retrieving previous versions of synced files," BitTorrent said—have been added since we went hands-on with the alpha version of the software back in April.
    The first mobile app is for Android; an iOS version will follow soon.
    The "SyncArchive" feature "is a basic versioning capability introduced with the Beta. It will include a folder where you can see all previous versions of your files," BitTorrent's announcement said. "Unobtrusive and searchable, this feature has been in high demand and will evolve over time."
    The beta version of BitTorrent Sync is expected to go live at noon Eastern time and will be available for download here. There are various bug fixes, and the beta software should be more stable than the alpha version. There's no word yet on when the software will be robust enough to drop the "beta" label.
    BitTorrent Sync for Android.
    BitTorrent, Inc.
    Serverless sync

    The software adds a sync folder to your devices just as services like Dropbox, Google Drive, or SkyDrive do. But instead of signing into a cloud service, Sync uses randomly generated or user-chosen 21-byte keys to sync folders across computers and mobile devices. One-way synchronization and one-time secrets for sharing files are supported.
    The service is free and has no limits on file size.
    "Because BitTorrent Sync is based on the principles of the BitTorrent protocol, you can sync as many big files as you want," the company said. "Transfers are encrypted, and information isn’t stored on a server in the cloud; data is protected by encrypted keys. Data is never passed through a stranger's computer or is stored on a server. Your files belong to you, and stay on the devices."
    Besides Android, Sync has versions for Windows, Mac, Linux, and FreeBSD. BitTorrent Sync can also run on Linux-based Network Attached Storage devices.
    Since the alpha launch in April, the software has been used to sync more than 8PB of data, BitTorrent said. "While we have general statistics about the BitTorrent Sync app, we don’t have any access to private information," the company wrote, by way of reassuring people that their data is safe. "The client reports back anonymous usage statistics to check if there’s a new build available and to help improve the app."
    BitTorrent also made its pitch that Sync is the software to use for privacy-conscious individuals. "With all of the NSA and PRISM developments of late, consumers are more keenly aware of online privacy and digital security issues," the company said. "As BitTorrent Sync doesn’t rely on servers, your data is never exposed to prying eyes… Likewise, Sync is built in such a way that the product will never shut down. The software will be as usable (and free) in the future as it is today. The user is always in control of their own data."
    If you're looking for a weekend project, you might want to check out this May blog post from BitTorrent Digital Creative Manager Dan Brown. Brown describes how he used a Raspberry Pi, BitTorrent Sync, and OwnCloud to create his own "personal cloud."
    "I’ve been using [BitTorrent Sync] for syncing several gigabytes of RAW photos and video across my various machines," Brown wrote. "There is the occasional scenario, however, where I’ve wanted to grab a few files, but my other machine is turned off. To solve this problem, I’m using a Raspberry Pi as a low power, always-on device with Sync installed. Just for kicks, I’m also using Owncloud (open source) to provide me with a web interface for accessing my files from any computer, including my mobile phone." t&utm_campaign=Sync_0711713
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  3. #13


    One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'"
    The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?"
    Where does security innovation go next?
    The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
    Secure SMS app Wickr's interface for finding friends.
    (Credit: Wickr)
    Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data.
    "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata.
    "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?"
    To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy.
    Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
    Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service."
    Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.

    The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google.
    Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship.
    "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic.
    It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
    Longer-term solutions
    Right now, the intersection of individual information security experts, governments, and private companies large and small is at a crisis point. How they untangle and compromise their competing interests could have far-reaching ramifications for all.
    Maiffret, the teen hacker turned respected infosec expert both inside and outside the infosec community, thinks that the government is going to have to give up some ground.
    "I think they know they need to say more. How do you say more, and not jeopardize things," is the question, he said. "There is a better middle ground. It's just like businesses accepting social media, it won't happen overnight."
    Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory."
    Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  4. #14

    PirateBrowser - No more censorship!

    PirateBrowser is a bundle package of the Tor client (Vidalia), FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.
    This is how it looks like:

    Download PirateBrowser

    Version 0.6b

    Getting Started

    • 1) Download PirateBrowser and save it to your computer:

    • 2) Run the downloaded .exe file

      You may be prompted to verify the application, press "Run":
    • 3) Select the desination folder and press "Extract":

      (It will create a PirateBrowser folder in the path you assign)
    • 4) Go to the new directory and run the "Start PirateBrowser.exe" file:

    • 5) The application will start up. Once connected to the Tor Network the standalone Firefox browser will open up and you can start browsing:

      • TIP: If you want to create a icon on your desktop to start the PirateBrowser, you can right click on "Start PirateBrowser.exe", choose "Send to" and then "Desktop (create shortcut)".


    Does it make me surf the net anonymously?

    While it uses Tor network, which is designed for anonymous surfing, this browser is intended just to circumvent censorship — to remove limits on accessing websites your government doesn't want you to know about.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  5. #15

    Dooble is a free and open source web browser. The aim of Dooble is to create a comfortable and safe browsing medium.[3] Currently, Dooble is available for FreeBSD,[2] Linux,[4] OS X,[4] and Windows.[4] Dooble should be compatible with any operating system where Qt is available.[dubiousdiscuss]


    Dooble is designed and implemented in order to improve privacy and usability.
    Version 1.26 of Dooble introduced support for addons. Linux and Windows installers contain the Interface_(chat) plugin, a new Open Source Social Networking application that's similar to ChatZilla and Diaspora.[5] As of version 1.40, the TorBrowser Add-On based on Vidalia is supported: Tor Browser Addon.
    Dooble includes a simple bookmarks browser. Users may also modify an existing bookmark via a popup that's accessible from the location widget.
    Cookie Management
    Along with standard cookie management options, Dooble also provides a mechanism that automatically removes cookies. If permitted, Dooble will occasionally remove undesired cookies.[6][7]
    Distributed Search Engine
    Dooble partially integrates the distributed search engine YaCy.[8]
    Encrypted Browsing Information
    Most of the data that Dooble retains is encrypted. Dooble does not encode file associations and user settings. Dooble also provides a session-based model where the data is encrypted with a temporary password.
    File Manager and FTP Browser
    Included is a non-JavaScript file manager and FTP browser.[7]
    Proxy Configuration
    Highly-configurable proxy settings provide reasonable flexibility.
    Session Restoration
    Dooble supports session restoration for authenticated sessions. If Dooble exits prematurely, the user may restore previous tabs and windows at the next authenticated session.
    Third-Party Content Blocking
    Some Web sites employ iFrames in order to distribute content from one or more third-party Web sites. Since this technology may raise privacy issues with some users, Dooble provides a means of blocking external content.

    The first version (0.1) was released in September, 2009.[8] The current version (1.44) was released in August, 2013.[2]

    Dooble is also available on Nokia's N900. [9]

    Dooble has been rated as the ninth of ten "top" Linux browsers by Jack Wallen.[10]
    See also


    External links

    External links to Addons

    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  6. #16

    Default trouble in Paradise

    Hacking attack on Tor allegedly linked to SAIC and NSA

    Posted on August 5, 2013 by admin

    The IP address hardcoded into the 0-day Firefox javascript, used to compromise the Tor network via a version of Tor bundle, has been traced back to Science Applications International Corp (a company investigated by Blue Cabinet) which has worked with former Edward Snowden employer Booz Allen Hamilton, is an NSA contractor, has supplied communications technology to the Assad regime, and also developed a tool for the NSA called – wait for it – PRISM.
    It is alleged the FBI with Verizon are behind this attack but CryptoCloudpoints out that this may be a ruse and that the real culprit is probably the NSA, who regularly contract out to SAIC and who are basically waging war – overt and covert, using any means at its disposal, against all-comers – in this case, using O-day browser malware. See below for more, plus CryptoCloud via aforementioned link…
    The IP address in question is 65.222.202.%. C block. See for more on this. Note: according to Baneki Privacy the whole C Block is though Wired reckons the block is shared by several US Government agencies.
    UPDATE: Tor advises that the attack was specifically aimed at Windows users and was fixed via June and July upgrades of Tor.
    A. The hacking attack
    According to Hacker News … “The FBI appears to have gained access to Freedom Hosting and injected malicious HTML code that checks the visitor’s browser to see if he is using Firefox 17. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address located in eastern Virginia.
    “The Openwatch reported that the execution of malicious JavaScript inside the Tor Browser Bundle, perhaps the most commonly used Tor client, comes as a surprise to many users. Previously, the browser disabled JavaScript execution by default for security purposes, however this change was recently reverted by developers in order to make the product more useful for average internet users. As a result, however, the applications have become vastly more vulnerable to attacks such as this.
    The JavaScript code’s payload analyzed by reverse engineering and exploit developer Vlad Tsyrklevich, who reveals that it briefly connects to a server and sends the hostname and MAC address of the victim. “Briefly, this payload connects to and sends it an HTTP request that includes the host name (via gethostname gethostname) and the MAC address of the local host (via calling SendARP on gethostbyname gethostbyname ->h_addr_list). After that it cleans up the state and appears to deliberately crash.”
    Microsoft used to provide the US government with an early start on its security vulnerabilities, which was reportedly used to aid its cyber espionage programs. But here no idea at this point, that Mozilla worked with the government in this case.”

    B. SAIC
    Investigated by Blue Cabinet , “Science Applications International Corp. is a major intelligence, military, aerospace, engineering and systems contractor. It is involved in defense/military (DoD), intelligence community, and homeland security contracting, as well as selected commercial markets.” But that’s not all…
    SAIC offers a range of scientific, engineering, and technology applications for national security, energy and the environment, critical infrastructure, and health. The company employs around 45,000 people and its customers include the Department of Defense, the intelligence community (e.g. the CIA, NSA, etc), the Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. It offers a full suite of intelligence, surveillance and reconnaissance (ISR) and cyber security solutions across a broad spectrum of national security programs. According to its website, its capabilities “support the entire intelligence lifecycle, from the collection of vital information across all domains, to the processing of data into intelligence products, and to the employment of people supporting national and military intelligence agencies as well as other federal and civilian customers within the national security arena… Quick reaction capabilities (QRC) in airborne, maritime, and space-based solutions are enhanced by processing, exploitation, and dissemination technologies; and worldwide mission support helps our customers in the intelligence community and the Department of Defense tackle the toughest global ISR challenges.”
    And then there is…
    The “Planning tool for Resource Integration, Synchronization and Management” or PRISM (according to NSA this is a different PRISM to the one revealed by Edward Snowden) is a web-based tool and despite its name is supposedly used by US military intelligence to send tasking instructions to data collection platforms, deployed to military operations. It was developed by SAIC , first mentioned in 2002 and since then has featured in many job descriptions on the internet.
    According to Top Level Communications … “The earliest document which mentions the Planning tool for Resource Integration, Synchronization and Management (PRISM) is a paper (pdf) from July 2002, which was prepared by the MITRE Corporation Center for Integrated Intelligence Systems. The document describes the use of web browsers for military operations, the so-called “web-centric warfare”, for which intelligence collection management programs were seen as the catalyst. These programs fuse battlefield intelligence information with the national data that they already possess, in order to provide a complete picture to their users. The program was originally prototyped and fielded for the US European Command, but is also being used in other military operation areas such as Iraq… The application was first developed for use on JWICS, the highly secure intelligence community network, but is now also being used on SIPRNet, the secure internet used by the US military.”
    SAIC was also selected to lead the 2002 TRAILBLAZER program for analyzing network data. The NSA selected the SAIC-led Digital Network Intelligence (DNI) Enterprise team that included Northrop Grumman Corporation, Booz Allen Hamilton Inc., The Boeing Company (NYSE:BA), Computer Sciences Corporation (NYSE:CSC) and SAIC wholly-owned subsidiary Telcordia Technologies to contribute to the modernization of the NSA’s signals intelligence capabilities. However, the program was canceled in 2006 and wasreported to have been “one of the worst failures in US intelligence history.”
    And more…
    Some believe that SAIC was the joint developer with DHS and MIT of the Imaging System for Immersive Surveillance – or ISIS – a prototype Trapwire-style camera that spots suspicious objects and there is a theory that the late Aaron Swartz was looking into ISIS at the time he was being charged.
    And finally…
    Just over three years, ago at its Plenary Conference in Rome, the NATO Industrial Advisory Group (NIAG) elected SAIC’S Senior Vice President, Robert G. Bell as its Chairman for 2010-201. Bell succeeded Dr. Raffaele Esposito of Finmeccanica’s Selex Communications company (which was supplying communications technology to the Syrian military – revealed thanks to Anonymous and Wikileaks and the Syria Files and Darker Net – see here , here and here .). NIAG provides the CNAD with industry advice on how to better foster government-to-industry and industry-to-industry cooperation concerning defense equipment and services; and assisting NATO’s Main Armaments Groups in exploring opportunities for international collaboration. Previously Bell served as SAIC Account Manager for NATO and the U.S. European Command. Prior to that Bell worked at NATO Headquarters as Assistant Secretary General for Defense Investment and at the White House as the National Security Council Senior Director for Defense Policy and Arms Control.
    Posted from
    If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and it never will.” - Frederick Douglass
    "Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
    "Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts