Snowden: I couldn’t trust Microsoft so I used free software like Tor, Tails and Debian


At the Free Software Foundation's LibrePlanet 2016 conference, Edward Snowden credited free software with enabling him to blow the whistle about government surveillance. Speaking via video link from Russia, the former NSA contractor said that "what happened in 2013 couldn't have happened without free software".
But as well as indicating his preference for free, open source software, Snowden revealed that he refused to use Microsoft software because he "couldn't be sure" that there weren't backdoors built in.
Tor Project says Google, CloudFlare and others are involved in dark web surveillance and disruption


With privacy concerns and the threat of surveillance from the likes of the NSA, more and more people are turning to the dark web and Tor. The anonymous, encrypted network has become a haven for not just illegal activity, but also for those who simply don’t want what they do online to be tracked and traced.
But now the Tor Project has voiced concerns that CDN and DDoS protection service CloudFlare is monitoring Tor traffic by introducing CAPTCHAs and cookies. CloudFlare is not alone: similar accusations are levelled at Google and Yahoo which are described as 'larger surveillance companies'. Concerns about interference with Tor traffic have been raised by project administrators in a ticket entitled "Issues with corporate censorship and mass surveillance".
Experiment tracks what happens to stolen credentials


We all know that hackers are looking to steal credentials and get their hands on sensitive data, but exactly how does this process work?
Researchers at data protection company Bitglass carried out its second 'Where’s Your Data' experiment, creating a digital identity for an employee of a fictitious retail bank, a functional web portal for the bank, and a Google Drive account, complete with real credit-card data.
Google wants to drive ISIS from the open internet to the dark web


You can say what you like about ISIS, but it certainly knows how to do propaganda. In fact, the group can pretty much sit back with its feet up -- when it's not busy, you know, killing people in increasingly horrific ways -- as web users the world over are only too happy to do the legwork and spread the shocking imagery on its behalf. But Google has had enough and wants to drive ISIS from the web to the dark web.
While many would question the value of pushing the terrorist group further underground and encouraged to use ever-more secretive tools, Google believes ISIS propaganda doesn't belong on the open web, but should only be accessible through the like of Tor. Jared Cohen, director of Google Ideas believes it makes sense to drive Islamic State to the dark web to try to blunt its propaganda.
Facebook's Android app gains privacy-enhancing Tor support


Back towards the end of 2014, Facebook unveiled a new .onion address that allowed Tor users to visit the social network securely. Following on from this, the company is now giving Android users the ability to browse the site using Tor and the Facebook app.
Security, privacy and anonymity may be words readily associated with Tor, but few people would use them in the same sentence as Facebook. The social network says that there is increased demand for secure connections to Facebook from Tor-enabled browsers, hence spreading to the largest mobile platform. The news will make some mobile users happy, but there are currently no plans to migrate the feature from Android to iOS.
Ransom32 is JavaScript-powered ransomware affecting Windows, Mac and Linux


Cross-platform viruses and malware are something of a rarity, but now there's a first-in-its-class JavaScript-based ransomware that can infect Mac, Windows and Linux. Ransom32 uses the Node.js runtime environment running on the NW.js platform to burrow into the target operating system and hold files to ransom.
While on the face of it, this is just another example of ransomware that encrypts files and seeks Bitcoin payments to decrypt them, it is more than that. The NW.js framework not only allows for cross-platform infections, but also means it is harder to detect. Ransom32 bears some resemblance to CryptoLocker and has been dubbed Ransomware-as-a-Service.
It is your duty to use an ad blocker, says Edward Snowden


Ad blocking tools are rarely out of the news these days. In times of heightened awareness about online privacy, more and more people are turning to things like Adblock Plus to banish ads and clean up their web browsing experience. For many people an ad blocker is seen as essential.
Edward Snowden goes further. The former NSA contractor says that it is a web user's duty to protect their computer by blocking potential attack vectors such as Flash and JavaScript-riddled advertisements.
How to avoid online surveillance -- the essential guide


It would appear that mass surveillance of the Internet is here to stay. We can rage against the machine, but ultimately we're powerless to stop the likes of the NSA and GCHQ prying into whatever they want to pry into. More and more people are turning to the dark web to help cover their tracks, but even the supposedly anonymous haven of Tor can be cracked for a price.
Last week in the UK, the draft Investigatory Powers Bill was published outlining proposals for ISPs to retain user's browsing histories for a full year. Governments want to weaken encryption. The FCC ruled that Do Not Track requests are essentially meaningless. The NSA finds and takes advantage of vulnerabilities. It's little wonder that privacy groups are up in arms -- the erosion of online rights continues with terrifying speed. But all is not lost. There are still things you can do to help maintain your privacy. If you're concerned, here's what you can do.
The price of de-anonymization -- FBI paid $1m to Carnegie Mellon to crack Tor


Tor has long been thought of as offering a level of privacy, security and anonymity that enables people to do whatever they want online; it also facilitates access to the so-called Dark Web. Despite this, law enforcement agencies were able to crack Tor and identify a Silk Road 2.0 user. Now it seems that the FBI was helped out by researchers at Carnegie Mellon University.
It was previously known that the FBI tracked down Brian Richard Farrrell using information from a "university-based research institute". The Tor Project itself believes that the FBI paid researchers at the university at least $1 million to attack the network and gather data from Tor relays that could be analyzed and used to identify users' IP addresses.
Tor Messenger Beta brings ultra-secure messaging to the masses


When talk turns to privacy and online anonymity, it isn’t long before Tor enters the discussion. The Tor browser has become famous for its use of .onion domains, making it easier for people to browse the web without fear of being snooped upon.
Now there is a new tool for the security-minded to play with. Tor Messenger Beta is -- as you would expect -- a chat tool that routes traffic through Tor. One thing it has in its favor right from the start is that this is not a weird proprietory app -- it can be used in conjunction with existing networks such as Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and more.
Anonymous browser Tor is coming to iOS 9 to boost privacy


The release of iOS 9 meant a lot of things to a lot a people. For Tor it means that the privacy-focused browser will finally be able to make its way to iPhones around the world. No particular timetable has been set out, but an iOS version of the anonymizing browser is on the cards.
In fact, it is more than just the Tor browser that's on the way -- "there are a bunch of pieces in the works", according to developer Nathan Freitas. Bringing Tor tools to iOS 9 will bring Apple's mobile devices in line with Android, and it's all thanks to new capabilities in the latest version of the operating system.
Enterprises should block Tor to protect data, says IBM


Cyber crooks looking to hold your data hostage and extort money use the Tor network, and enterprises should block it if they value their data, a new report says.
The IBM X-Force Threat Intelligence Quarterly 3Q 2015 paper says hundreds of thousands of malicious events have originated from Tor in the US so far this year.
HORNET is an encrypted, anonymous web browsing system that destroys Tor's performance


With the current concerns about surveillance and privacy, more and more people are turning to anonymizing tools. The existence of unknown numbers of spying tools means that increasing numbers of people are turning to the likes of Tor to keep their online activities private.
But encryption systems such as those used by The Onion Relay have a horrible tendency to slow things down. A new encryption system called HORNET could be a solution. Its creators say that data transfer speeds of up to 93GBps are possible, with much of the acceleration coming from a reduction in the number of hops data has to make around the network.
Life imprisonment for Silk Road creator Ross Ulbricht


There are lots of online services and sites that quickly become notorious; the Pirate Bay and Napster to name but two. But Silk Road was something in a completely differently league. Found on the dark web, the site acted as a portal to drugs and other illegal goods. It started life back in 2011 and today its founder, Ross Ulbricht is sentenced to life in prison, a year and a half after his arrest.
Ulbricht was found guilty at a jury trial three months ago and today Judge Katherine Forrest said that Silk Road demonstrated he believed he "was better than the laws of this country". She said "this is deeply troubling, terribly misguided, and very dangerous" before handing down the harshest sentence available.
Anonymous Tor Cloud project closes down


The Tor browser is used by many to stay anonymous online -- and it's something that has been embraced by the likes of WikiLeaks as a way to safely gather information whilst hopefully avoiding the surveillance of the NSA. One lesser known project from the same stables is the Tor Cloud service, and Tor has announced that it is closing down.
Based on the Amazon EC2 cloud computing platform, Tor Cloud provided a way to share computing resources and allow faster uncensored access to the internet. However, the project is plagued with "at least one major bug ... that makes it completely dysfunctional" and after failing to find anyone to undertake the work, the decision was taken to shutter Tor Cloud. This does not mean that Tor itself is dead -- far from it -- and developers are being encouraged to create their own forked versions of Tor Cloud.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.