BlogHide Resteemsm4r4nz4 (36)in privacy • 7 years agoThe Illusion of Online PrivacyAs the Ashley Madison hack demonstrated, Web companies can't guarantee privacy. There was a time when people had secrets. Men could discreetly dispose of receipts for flowers, drinks or jewelry…m4r4nz4 (36)in befree • 7 years agoA Dollar For Your DataInformation about you is free for the taking on the Web. A new crop of entrepreneurs wants you to collect. nless your name is Oprah Winfrey or Warren Buffett, you’d be hard pressed to find anyone…m4r4nz4 (36)in surveillance • 7 years agoThe law behind surveillanceNSA operations The law behind surveillance Foreign intelligence Sign up for our newsletter: Donate Now! Home › Surveillance programs Surveillance programs Background: the US Intelligence…m4r4nz4 (36)in privacy • 7 years agoThe Mission to Decentralize the InternetIn the nineteen-seventies, the Internet was a small, decentralized collective of computers. The personal-computer revolution that followed built upon that foundation, stoking optimism encapsulated…m4r4nz4 (36)in security • 7 years agoThis Simple iPhone Case can be Used to Steal ATM PINsATM It’s a common wisecrack around the criminal community. This whole stealing ATM PINs thing would be a lot simple if a gadget would just do all the work. Sounds like a crazy dream, right…m4r4nz4 (36)in privacy • 7 years agoThe FCC has a plan to destroy net neutrality. It’s up to us to stop it.The Federal Communications Commission's new Chairman Ajit Pai just announced a proposal to gut net neutrality. Net neutrality is the freedom to say, watch and make what we want online without…m4r4nz4 (36)in privacy • 7 years agoThe Eternal Value of PrivacyThe most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and other wholesale surveillance measures -- is this line: "If you aren't doing…m4r4nz4 (36)in surveillance • 7 years agoWho Is Publishing NSA and CIA Secrets, and Why?There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One: someone, probably a country's…m4r4nz4 (36)in security • 7 years agosocial engineering methodsSocial engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration…m4r4nz4 (36)in surveillance • 7 years agothe world of surveillance"Surveillance Is the Business Model of the Internet" Under surveillance capitalism, we’ve lost control of our devices and our data – but there is a way back. Interview with Bruce Schneier by Agne…