Page 1 of 2 12 LastLast
Results 1 to 10 of 16

Thread: Prism Break

  1. #1

    Default Prism Break

    http://prism-break.org/

    Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software.

    Operating system

    • Apple OS X

    • Google Chrome OS

    • Microsoft Windows
    • Trisquel FSF endorsed, user-friendly GNU/Linux distribution.
    • Debian Popular ethical GNU/Linux distribution.
    • Fedora Fast, stable, powerful GNU/Linux distribution.
    • Linux Mint Comfortable and easy to use GNU/Linux distribution.
    • Liberté Linux Live CD/USB designed as a communication aid in hostile environments.
    • Tails Live CD/USB aimed at preserving your privacy and anonymity.
    Apple, Google, and Microsoft are a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA.
    This leaves us with two free alternatives: GNU/Linux and BSD.
    GNU/Linux has a much larger community to help you with the transition. It’s recommended that you begin your explorations by looking for a GNU/Linux distribution that suits your needs.
    Canonical’s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks by default.
    Note: PRISM Break recommends the no-codecs edition of Linux Mint, as the other editions are encumbered with software patents. More info.
    Android OS

    • Google Android

    • Google Play
    CyanogenMod licensing: “CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.” —Wikipedia
    F-Droid is a free alternative to the Google Play app store.
    iOS

    • Apple iOS
    iOS is insecure, and unfortunately there aren‘t a lot of free encryption apps available for iOS either. It‘s also impossible to verify whether if an iOS app was compiled from the original source.
    Web browser

    • Apple Safari

    • Google Chrome

    • Microsoft Internet Explorer
    Use a combination of Tor Browser and another free browser to surf the web. Try to use Tor for everything. Browsing the web may be a bit slower, but it's far more secure.
    Note that using Tor Browser to log into PayPal or a banking website may trip the website's fraud protection software.
    Users of Tor Browser should also be aware that logging into HTTP (instead of HTTPS) websites may result in your credentials being captured by a malicious exit node.
    Note: Mozilla Firefox is technically not completely free software, as Mozilla recommends non-free add-ons on their website.
    Web browser add-ons
    Safeguard your privacy and stop websites from tracking you by installing Adblock Edge, Disconnect, HTTPS Everywhere, and NoScript in your browser.
    Cryptocat and Mailvelope are browser addons for IM and email encryption, respectively. At this time, it may be more secure to use external software for more proven encryption.
    Why not Adblock Plus? Adblock Plus shows “acceptable ads” by default, and uses more memory than Adblock Edge.
    Why not Ghostery? Ghostery is a proprietary plugin. Use Disconnect instead.
    Web search

    • Google Search

    • Microsoft Bing

    • Yahoo! Search
    Startpage is proprietary, hosted in the USA/Netherlands, and provides you with anonymized Google search results (including images).
    DuckDuckGo is partly proprietary, hosted in the USA, and provides you with anonymized Bing search results.
    Pick your poison.
    Email services

    • Google Gmail

    • Microsoft Outlook.com

    • Yahoo! Mail
    Bitmessage is a promising alternative to email, but it’s is not ready for daily usage. Use at your own risk.
    Riseup is hosted in the USA. It’s also beginning to offer VPN, chat, and etherpad services.
    Why not Hushmail? See "compromises to email privacy".
    The only way to have full control over your email is to run your own mail server. This is not for everyone though, as it requires considerable time investment and technical knowledge.
    While not complete yet, the FreedomBox project is aiming at creating a turnkey solution for encrypted communications.
    Email desktop clients

    • Apple Mail

    • Microsoft Office Outlook

    • Novell Groupwise
    Here is a guide to encrypting your email with Thunderbird, GNU Privacy Guard (GPG), and Enigmail.
    Note: Mozilla Thunderbird is technically not completely free software, as Mozilla recommends non-free add-ons on their website.
    Email encryption
    “Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”
    Wikipedia
    Social networking

    • Google+

    • Facebook

    • LinkedIn

    • Twitter
    • RetroShare Free, secure, P2P communications platform.
    • buddycloud Open source, federated social network. XMPP/Jabber
    • Diaspora* Community-run, distributed social network.
    • Friendica Privacy respecting, distributed, federated social network.
    • GNU Social Self-hosted, decentralized social network.
    • Lorea Distributed and federated social nodes.
    • Movim Private, decentralized social network server. XMPP/Jabber
    • pump.io Self-hosted social stream server.
    • Salut à Toi Multi-frontend, multipurpose communication tool. XMPP/Jabber
    • Tent Free, autonomous social network protocol.
    identi.ca is a popular Twitter-like social networking hub for the free and open source software community. The site is converting to the pump.io software platform sometime this week.
    Instant messaging

    • AOL Instant Messenger

    • Google Talk

    • OS X Messages

    • Yahoo! Messenger
    • Pidgin Open source chat program. XMPP/Jabber OTR
    • Off-the-Record Messaging - OTR Install and enable this plugin in Pidgin for encrypted chat. OTR
    • Adium Free, multiprotocol chat client for OS X. XMPP/Jabber OTR
    • Gibberbot Private, secure OTR messaging for Android. Android
    • Surespot Free, open-source, end-to-end encrypted messaging. Android
    • TextSecure Secure SMS/MMS communication for Android. Android mostly free*
    • Xabber OTR-encrypted instant messaging for Android. Android XMPP/Jabber
    • ChatSecure Encrypted IM for iOS. iOS
    Cryptocat in the Web browser add-ons section may be of interest as well.
    Video conferencing & VoIP

    • FaceTime

    • Google+ Hangouts

    • Google Talk

    • Skype
    • Jitsi Encrypted text and video chat. XMPP/Jabber SIP
    • Linphone Encrypted voice and video client. SIP
    • Mumble Encrypted, low-latency voice chat.
    • CSIPSimple Free, encrypted VoIP for Android. Android SIP
    • RedPhone Secure private calls for Android. Android mostly free*
    Jitsi is a drop-in, encrypted replacement for almost all the tasks Skype is used for.
    Mumble an open source voice chat client in the style of Ventrilo and TeamSpeak.
    WebRTC is an upcoming, promising browser to browser communications API.
    Online transactions

    • PayPal

    • Google Wallet
    The Bitcoin blockchain is a decentralized, public ledger of all transactions in the Bitcoin network.
    “It may be the TCP/IP of money.” —Paul Buchheit
    Media publishing

    • Flickr

    • Instagram

    • Picasa

    • Tumblr

    • YouTube
    Self-hosted is important. Hosting your blog on WordPress.com is no better for your data security than Blogger or Tumblr.
    Document collaboration

    • Google Docs

    • Microsoft Office Web Apps

    • Zoho Office Suite
    --
    Maps

    • Apple Maps

    • Google Maps
    --
    Cloud storage

    • Apple iCloud

    • Dropbox

    • Google Drive

    • Microsoft SkyDrive
    Why not MEGA? While MEGA is free as in beer, the software is proprietary.
    Why not SpiderOak? SpiderOak is proprietary software.
    Why not Tarsnap? Tarsnap is partially proprietary and hosts your data on Amazon Web Services.
    Web analytics

    • Google Analytics
    • Piwik Open source, self-hosted web analytics.
    Piwik analytics powers this site. It‘s set up to anonymize the last octet (255.255.255.???) of visitor IPs. Check out the live data here: prism-break.org/analytics.
    DNS provider

    • Google Public DNS
    Google Public DNS permanently logs your ISP and location information for analysis. Your IP address is also stored for 24 hours.
    OpenNIC does not log anything.
    Darknet
    • I2P The invisible internet project.
    • Freenet Decentralized censorship-resistant network.
    • Nightweb Anonymous I2P network for Android.
    • Syndie Distributed, anonymous forum software.
    “A darknet is an anonymizing network where connections are made only between trusted peers.
    Darknets are distinct from other distributed P2P networks as sharing is anonymous, and therefore users can communicate with little fear of governmental or corporate interference.“
    Wikipedia
    *This website uses the Free Software Foundation’s definition of free software.

    “Free software” means software that respects users’ freedom and community. Roughly, the users have the freedom to run, copy, distribute, study, change and improve the software. With these freedoms, the users (both individually and collectively) control the program and what it does for them. (more …)
    —The Free Software Foundation
    Take action against PRISM at the Electronic Frontier Foundation Action Center.

    MASSIVE SURVEILLANCE EXPOSED
    Recent reports by the Guardian and the Washington Post confirm secret spying programs on phone records and Internet activity. It‘s time for a full accounting of America's secret spying programs—and an end to unconstitutional surveillance. (more …)
    —The Electronic Frontier Foundation
    Mentioned by the media.

    Catalan

    German

    English

    French

    Spanish

    Italian

    Dutch

    Polish

    Russian

    Chinese (Traditional)



    • Updated 2013-06-26 by @zcpeng
    • Contribute on GitHub
    • Donate bitcoin: 1NAfx5GEZHR8t69LjxTeShPP4XXaxeUqQw
    • A Nylira project
    Disclaimer: Using the recommended projects on this site will not guarantee that 100% of your communications will be shielded against surveillance states. Please do your own research before trusting these softwares with sensitive communication.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  2. #2

    Default

    On Wednesday, Stallman was induced into the Internet Hall of Fame. He is founder of the Free Software Foundation and has pioneered the notion of copyleft. He is available for interviews, but they should be scheduled as far in advance as possible.
    He said today: "It is said that 'knowledge is power.' Internet corporations took this maxim to heart, and set out to know as much as possible about each of us. Then the U.S. and other governments began massively collecting personal information from these companies, and in other ways too. That's how they hope to have power over us. Digital technology turns out to mean building a giant digital dossier about each person. This might be OK if we had a government we could trust implicitly to respect human rights, one that would never try to stretch its power. What we have, under Bush and Obama, is a security-industrial complex that systematically crosses legal limits, egged on by corporations that will make more money through putting together more extensive dossiers, and saying they are doing this to 'keep us safe' from real but minor threats.


    "It used to be that the threat to people's freedom from computers was that they used programs that the users don't control -- nonfree programs, that is. The free software movement aims to provide free/libre replacements for nonfree programs. Free software is software that respects the users' freedom and community. A program that isn't free gives its owner unjust power over its users. Often it is designed to spy on them, restrict them, or even abuse them. (See 'Proprietary Surveillance,' DefectiveByDesign.org and 'Proprietary Sabotage.') With free software, the users can fix the program so it doesn't spy, restrict, or mistreat.


    "But the threats have multiplied. For years I've called portable phones 'Stalin's dream' because of their surveillance capabilities. (Their movements are tracked, and they can be converted remotely into listening devices that transmit your conversations all the time, even when you try to shut them off.) For years I've warned that it is a mistake to entrust personal data to web sites, or even identify yourself to them. For years I've paid cash rather than use my credit card.


    "The U.S. is slowly converting driver's licenses into national ID cards. Without showing ID, you can't fly, or ride Amtrak, or stay in a hotel in New York City, or open a bank account, or fill a prescription for pain killers. The immigration bill now being considered may make it impossible to get a job without national ID.

    "Meanwhile, as license-plate cameras spread around our cities, the U.S. is slowly assembling a system that will track all movements of all cars, as is done in the UK. 'Smart meters' will build a dossier of how much electricity you use each hour or each minute, which says whether you are home. And the Internet of Things threatens to recruit all the products in your home as digital informers.


    "Once data is collected, it will be misused. Formal limits on accessing the data will do nothing to stop the state from collecting all sorts of data about anyone it is determined to crush, such as torture whistleblower John Kiriakou. If no one dares tell us what the state is doing, the state will get out of control.


    "We need to stop the accumulation of digital dossiers about people in general. Such collection should be permitted only under a court order applying to a specific person."


    See a brief video of Stallman and a longer speech of his on free software and copyright.

    Stallman sent his statement in an email with the following at the top:
    [To any NSA and FBI agents reading my email: please consider
    [ whether defending the US Constitution against all enemies,
    [ foreign or domestic, requires you to follow Snowden's example.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  3. #3

    Default

    Encryption Works: How to Protect Your Privacy (And Your Sources) in the Age of NSA Surveillance


    July 2, 2013


    By Micah Lee



    Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
    — Edward Snowden, answering questions live on the Guardian's website
    The stories of how NSA whistleblower Edward Snowden first contacted journalists Glenn Greenwald and Laura Poitras (both Freedom of the Press Foundation board members), and how he communicated with the Washington Post's Barton Gellman, have given the public a rare window into digital security and conversing online in the age of mass surveillance.
    In response, we've just published our first whitepaper—using the public comments by both Snowden and the journalists involved as illustrations—to show how reporters, whistleblowers, and ordinary Internet users can still protect their privacy online.
    You can read the whitepaper here [PDF version].
    It's important to remember that while the NSA is the biggest, best funded spy agency in the world, other governments, including China and Russia, spend massive amounts of money of their own high-tech surveillance equipment and are known to specifically seek out journalists and sources for surveillance. In the US, bad digital security can cost whistleblowers their freedom, but in other countries it can cost both journalists and sources their lives. A recent example from Syria illustrates how careless digital security can have tragic results.
    The whitepaper covers:
    • A brief primer on cryptography, and why it can be trustworthy
    • The security problems with software, and which software you can trust
    • How Tor can be used to anonymize your location, and the problems Tor has when facing global adversaries
    • How the Off-the-Record instant message encryption protocol works and how to use it
    • How PGP email encryption works and best practices
    • How the Tails live GNU/Linux distribution can be used to ensure high endpoint security





    https://pressfreedomfoundation.org/b...a-surveillance
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  4. #4

    Default

    THis is a great resource thread Magda. Thanks for it.

    Personally, I find Tor Browser to be so slow that I no longer use it. But I can heartily recommend Private Tunnel for private/anonymous browsing. Although it is not free, it is relatively cheap and there is no noticeable drop in speeds etc.
    The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
    Carl Jung - Aion (1951). CW 9, Part II: P.14

  5. #5

    Default Stay Anonymous

    _| || |_/ ___|| |_ __ _ _ _ / \ _ __ ___ _ __
    |_ .. _\___ \| __/ _` | | | | / _ \ | '_ \ / _ \| '_ \
    |_ _|___) | || (_| | |_| |/ ___ \| | | | (_) | | | |
    |_||_| |____/ \__\__,_|\__, /_/ \_\_| |_|\___/|_| |_|
    |___/




    Contents:
    1) What is the Tor Project?
    2) What is the Tor Browser Bundle?
    3) What is Orbot?
    4) What are some additional browser security addons?
    5) What is TrueCrypt?
    6) What is OTR?
    7) What is Tails?
    8) What is WhisperSystems?
    9) What is an ideal world to protect my privacy online?




    ################################################## ###
    What is the Tor Project
    ################################################## ###


    https://www.torproject.org


    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet
    .
    ################################################## ###
    What is the Tor Browser Bundle (TBB)?
    ################################################## ###


    The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.


    The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.


    The easiest way to use Tor is to install the browser bundle, go to the following link:


    https://www.torproject.org/projects/torbrowser.html.en


    Then download the browser bundle and extract it to some place on your local hard drive, I would suggest using an encrypted volume or removable media (such as a usb stick) that supports hardware encryption.


    ################################################## ###
    What is Orbot?
    ################################################## ###


    https://guardianproject.info/apps/orbot/


    Orbot is an application that allows mobile phone users to access the web, instant messaging and email without being monitored or blocked by their mobile internet service provider. Orbot brings the features and functionality of Tor (read more below) to the Android mobile operating system.


    Orbot 1.0.5.2 (packaging Tor 0.2.2.25) is currently available in the Android Market and from the Tor Project website.


    BROWSING


    You can use the Orweb Privacy Browser which we offer, which only works via Orbot and Tor.
    You can also try Firefox Mobile with our ProxyMob Add-On to browse via the Tor network.


    INSTANT MESSAGING


    For Instant Messaging, please try Gibberbot which provides integrated, optional support for Orbot and Tor.


    OTHER APPS


    Transparent Proxying: You must root your device in order for Orbot to work transparently for all web and DNS traffic. If you root your device, whether it is 1.x or 2.x based, Orbot will automatically, transparently proxy all web traffic on port 80 and 443 and all DNS requests. This includes the built-in Browser, Gmail, YouTube, Maps and any other application that uses standard web traffic.


    ################################################## ###
    What are some additional browser security addons?
    ################################################## ###


    ****
    If you're not going the route of using the TBB or some other anonymizing services, you can use these
    solutions and technologies to help to protect yourself online
    ****


    https://www.eff.org/https-everywhere


    HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.


    ****
    https://adblockplus.org/en/firefox


    Adblock Plus blocks all annoying ads on the web by default: video ads on YouTube, Facebook ads, flashy banners, pop-ups, pop-unders and much more.


    Simply install Adblock Plus to your browser (it is available for Firefox, Chrome and Opera) or your Android smartphone or tablet and all intrusive ads are automatically removed from any website you visit.


    ****
    https://easylist.adblockplus.org/en/


    The EasyList subscriptions are lists of filters designed for Adblock Plus that automatically remove unwanted content from the internet, including annoying adverts, bothersome banners and troublesome tracking. The subscriptions are currently maintained by three authors, MonztA, Famlam and Khrin, who are ably assisted by an ample forum community.


    ****
    https://www.ghostery.com/


    Ghostery is your window into the invisible web – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior.


    Ghostery tracks over 1,200 trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.


    ****
    http://noscript.net/


    The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank).


    NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.


    ################################################## ###
    What is truecrypt?
    ################################################## ###


    http://www.truecrypt.org/


    TrueCrypt is a freeware software application used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Windows 2000) the entire storage device (pre-boot authentication).


    TrueCrypt supports Microsoft Windows, Mac OS X and Linux operating systems (using FUSE). Both 32-bit and 64-bit versions of these operating systems are supported, except for Windows IA-64 (not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process). The version for Windows 7, Windows Vista, or Windows XP can encrypt the boot partition or entire boot drive. There is an independent, compatible implementation, tcplay, for DragonFly BSD and Linux.


    TrueCrypt supports a concept called plausible deniability, by allowing a single "hidden volume" to be created within another volume. In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose existence may be denied.


    The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In a paper published in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista, Microsoft Word, Google Desktop, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released.




    ################################################## ###
    What is GnuPG?
    ################################################## ###


    https://www.gnupg.org


    GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems.


    GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German government.


    Suggested reading: https://en.wikipedia.org/wiki/GnuPG


    ################################################## ###
    What is OTR?
    ################################################## ###


    https://securityinabox.org/en/pidgin_main


    Pidgin is a free and open source client that lets you organize and manage your different Instant Messaging (IM) accounts using a single interface. The Off-the-Record (OTR) plug-in designed for use with Pidgin ensures authenticated and secure communications between Pidgin users.


    Both Pidgin and OTR are available for Microsoft Windows and for GNU/Linux. Another multi-protocol IM program for Microsoft Windows that supports OTR is Miranda IM. For the Mac OS we recommend using Adium, a multi-protocol IM program that supports the OTR plugin.


    Pidgin is a free and open source Instant Messaging (IM) client that lets you organize and manage your different (IM) accounts through a single interface. Before you can start using Pidgin you must have an existing IM account, after which you will register that account to Pidgin. For instance, if you have an email account with Gmail, you can use their IM service GoogleTalk with Pidgin. The log-in details of your existing IM account are used to register and access your account through Pidgin.


    Pidgin is strongly recommended for IM sessions, as it offers a greater degree of security than alternative messaging clients, and does not come bundled with unnecessary adware or spyware which may compromise your privacy and security.


    Off-the-Record (OTR) messaging is a plugin developed specifically for Pidgin. It offers the following privacy and security features:


    Authentication: You are assured the correspondent is who you think it is.


    Deniability: After the chat session is finished, messages cannot be identified as originating from either your correspondent or you.


    Encryption: No one else can access and read your instant messages.


    Perfect Forward Security: If third party obtains your private keys, no previous conversations are compromised.


    Note: Pidgin must be installed before the OTR plugin.


    Note: All users are encouraged to learn as much as possible about the privacy and security policies of their Instant Messaging Service Provider.


    ################################################## ###
    What is Tails?
    ################################################## ###


    https://tails.boum.org/


    Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly.


    It is a complete operating-system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.


    Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.


    ################################################## ###
    What is Whisper Systems?
    ################################################## ###


    http://www.whispersystems.org/


    WhisperSystems is an opensource project dedicated to helping to secure your mobile devices file systems and communications.


    RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.


    Use the default system dialer and contacts apps to make calls as you normally would.
    RedPhone will give you the opportunity to upgrade to encrypted calls whenever possible.
    RedPhone calls are encrypted end-to-end, but function just like you're used to.
    RedPhone uses your normal phone number to make and receive calls, so you don't need yet another identifier.


    TextSecure encrypts your text messages over the air and on your phone. It's almost identical to the normal text messaging application, and is just as easy to use.


    A full replacment for the default text messaging application.
    All messages are encrypted locally, so if your phone is lost, your messages will be safe.
    Messages to other TextSecure users are encrypted over the air, protecting your communication in transit.



    Install TextSecure Get TextSecure Source Arrow
    Screenshot


    ################################################## ###
    What would this look like in an ideal world?
    ################################################## ###


    For general web-browsing use Tails from an encrypted/hidden partition on removable media. You will not have flash and/or java support but with the implementation of HTML5 it won't matter for much longer. If you absolutely have to use a site that requires Java or Flash, then your identity might be exposed.


    You can create hidden/encrypted volumes for multiple virtual machines that you use for other things, like "vulnerability assessments".


    While your ISP cannot intercept your communications and neither can the government in these scenarios they can see that you are sending a large amount of encrypted traffic from your location, which could raise a red flag for certain 3-letter acronyms interested in your activities.


    Using the technique of encryption within encryption you could use multiple "proxified" connections using ssh/tor and other means to obfuscate your traffic. It is possible to use tails as a virtual machine with all of it's traffic proxied to a remote SSH session. This will effectively send all your tor traffic via an ssh session,


    The government is coming after your privacy, using the technologies outlined here will make it very difficult if not impossible to be able to track you online.


    Some random helpful free tools.


    https://www.virtualbox.org/
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  6. #6

    Default

    Given the disgusting news that Google Android have been totally evil and have been collaborating with the NSA and embedded NSA code in their mobile phones I was pleased to see that Mozilla Fire Fox is just about to go into the mobile operating system business. It is based on HTML5. Haven't tried it but will once it becomes available my area. They have just lauinched this month. The phones look cheap. It is launching in Spain and Poland and some parts of South America, Colombia etc. I want to know if we can just format Android and install FF os on existing phones?

    http://en.wikipedia.org/wiki/Firefox_OS
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  7. #7

    Default

    Ubuntu Touch Developer Preview on a Galaxy Nexus
    Canonical Ltd.
    Unix-like
    In development
    Open source
    21 February 2013
    Ubuntu Touch Developer Preview / 21 February 2013
    Mobile & PC, cross device, cross platform, tablets, notebooks, smartphones, GPS smartnav, In-vehicle infotainment
    Multilingual
    C, C++, QML, HTML5
    Ubuntu Software Center
    Click (dpkg[citation needed])
    ARM and x86
    Monolithic (Linux kernel)
    GNU
    Graphical (Unity Next)
    Mainly the GPL and various other open source licenses
    www.ubuntu.com/phone
    www.ubuntu.com/tablet
    If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and it never will.” - Frederick Douglass
    "Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
    "Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn

  8. #8

    Default

    Prism-break doesn't recommend Cannonical's Ubuntu because it contains Amazon ads and data leaks by default.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

  9. #9

    Default

    Quote Originally Posted by Magda Hassan View Post
    Prism-break doesn't recommend Cannonical's Ubuntu because it contains Amazon ads and data leaks by default.
    Shame on Cannonical!...that is not their stated ethic.....:moon: I can't say for their iPhone product, but on my Ubuntu on my PC, I JUST turned off all recording of data [the option exists] under the privacy setting.....:mexican: I'll explore this further...their privacy policy is a bit unnerving compared to what I thought it would be http://www.ubuntu.com/privacy-policy

    With MS, there is really nothing one can do. Just a personal note. I had a potentially very important, never publicly released JFK assassination-related photo. I had it on several places on my computer - each was named differently, each was in a folder in a different location, named differently. This was before I used Ubuntu and was using Windows-7. Once, just after I was kicked off of the EF I went searching for the photo [as Jack White, one other person, and I were working on what information could be gleaned from it - and attempt to determine if it was 'information' or 'dis-information' before public release], and all copies had been removed [folders were intact and all other photos left alone!] by some invasive personalized malware purpose-built for removal of this photo from my computer! NB - I have it back, however, and can't say how - here. The 'former' intel operative who gave me the photo in an email stated that the photo had something to do with my being removed from the EF - but I can't prove that in any way. They also claim they have been 'punished' for having given it to me and, in fact, this person who was once very active on several JFK forums has been nowhere seen posting, and has even taken down parts of their own website on related matters, from about one month after that picture was taken off my computer. Beware! Store sensitive items offline! :spy:

    Ideally, one should have two identical computers. One online; the other offline.....
    Last edited by Peter Lemkin; 07-14-2013 at 06:58 AM.
    If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and it never will.” - Frederick Douglass
    "Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
    "Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn

  10. #10

    Default

    If you want a nice easy Linux system for your pooter I can recommend Mint. Beautiful.

    P.S. One is based on Ubuntu and the other is based on Debian. Get the Debian one if you are after good security.
    "I think it would be a good idea." Mahatma Gandhi, when asked what he thought of Western civilization.

    The philosophers have only interpreted the world, in various ways; the point is to change it.
    Karl Marx.

    "Well, he would, wouldn't he?" Mandy Rice-Davies, 1963, replied Ms Rice Davies when the prosecuting counsel pointed out that Lord Astor denied an affair or having even met her.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •