Want to browse a computer/network/internet without leaving a trace? Well get like James Bond and become elite, check out this post by lifehacker.com
In this post, we’ll walk through how to use a USB stick or DVD to anonymize, encrypt, and hide everything you do on a computer no matter where you are. When we say “browse without leaving a trace”, we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you’ll ever need already installed on it. You can install Tails on one of your many dust-gathering USB drives or a DVD. We’ll show you how to set up your own portable boot disc in the second section, but let’s start by taking a look at what you get with Tails. Hit Read More
article by: gizmodo.
If you’ve visited Disneyland, you may have seen a small plane fly overhead at one point. The OC is full of rich-ass people, might be a Newport Beach golfer, no big deal, right? Except, as it turns out, the Anaheim police department had access to military-grade dragnet phone spying equipment, the kind that can suck up your phone’s information from an airplane along with thousands of others.
Anaheim isn’t a big city. With a population of 336,265, it is substantially smaller than Wichita, Kansas and Mesa, Arizona. This is how entrenched America’s berserk surveillance culture is: A suburban city’s police department had access to spying tools called dirtboxes, the same spying tools sought by the Air Force. Insane militarization isn’t just for big-city cops.
If you need maximum smartphone security and are willing to pay for it, the Blackphone 2 is now on sale. The latest handset from Silent Circle has privacy features like the Android-based PrivatOS operating system, encrypted calling and texts, and “spaces” that let you keep business separate from pleasure. But unlike the original Blackphone, the latest model is actually a decent smartphone, with a 5.5-inch 1080p screen, Qualcomm 8-core CPU, 3GB RAM, a 13-megapixel back-side illuminated camera and quick-charging 3,060 mAh battery.
Given the numerous privacy dangers lurking out there, what price would you pay for both security and a solid smartphone? Silent Cirlce thinks it’s $799, more than a 64GB iPhone 6s costs. However, if you need it, you need it, so assuming you’re in North America, you can grab a Blackphone 2 at Silent Circle’s website. In the UK and the rest of the world, it’s set to arrive “soon.”
article by: engadget
I had this fixed awhile back but since I installed a new computer/os I forgot to change my settings. If you use firefox or chrome you can be affected by the WebRTC function, i’ll post the details below but basically any web master can craft script to show him your real ip, local ip, and vpn ip. Be sure to make sure you get this fixed, otherwise using a VPN is useless.
article from: https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html
An extremely critical vulnerability has recently been discovered in WebRTC (Web Real-Time Communication)
, an open-source standard that enables the browsers to make voice or video calls without needing any plug-ins.
Cool new hacking game to test your elite skills on. I did the first few no problem but some of the other one’s I had to use the answer key a user wrote up. It’s pretty fun to try and decode the messages and to do some SQL injections. Try it out!
Also from Hack10 site, here is a link to the top hack-simulated games like this one which has a bunch of others that are a lot more intense:
Cool article I read by Hacker10
The following apps allow you to make free worldwide calls to other people that have the same app installed. Security wise, not only are your calls encrypted, additionally, VoIP apps bypass data retention laws, calls made with a calling app are not recorded by your network provider.
The best apps to make a secure call are those that are open source, available for Android and iPhone and encrypt your call with keys you only hold, you should also try to go with a company that does not have servers or offices in a country where mass surveillance is known to take place.
Click read more to see the list.
Going to Disney World again soon and wanted to get more information on the (magic bands) which contain RFID chips and link to your account. I wanted to see if anyone has a technical breakdown of these magic bands. Always wondering if they stored credit card info, and wanted to do some research. I will be updating this post with more about the magic bands themselves and some cool ones which I plan on buying to use! (Note: I would never try any methods in the park)
IMG FROM: http://www.nova-labs.org/blog/2014/02/16/dissecting-walt-disney-worlds-rfid-bracelet/
The nRF24LE1 is a highly integrated ultra low power 2.4GHz RF System-on-Chip (SoC) for 2.4GHz ISM (Industrial, Scientific and Medical) band operation. It includes a 2.4GHz RF transceiver core, an 8-bit CPU, and embedded Flash memory. By offering a peak RX/TX current lower than 14mA, a sub-μA power down mode, advanced power management, and 1.9 to 3.6V supply range, the nRF24LE1 provides a true ultra low power solution that enables months to years of battery lifetime when running from regular coin cells or AA/AAA batteries. Finally, a rich set of on-chip analog and digital peripherals makes the nRF24LE1 a flexible, single chip solution for a wide range of applications including PC peripherals, game controllers, remote controls, sports/fitness/healthcare sensors, and toys. (these are useful for Disney parks to allow customers to use them year after year)