Keeping data private is vital in the days of smartphones and the free-floating information they carry. Justin wrote a guide on many of the deeply hidden and sometimes concerning privacy settings in iOS 7. Now we’re back to cover some of the new (and old) privacy settings in iOS 8 that you need to address right now. Don’t Miss: The 33 Best Hidden Features of iOS 8 Problem #1: The Keyboard Is Storing Your Passwords QuickType is Apple’s new predictive text feature for iOS 8, providing several suggestions to finish off words and sentences, nestled right above the keyboard as you type. While

IOS 8 is a creepers paradise. IF you updated please at least look over this

Watch on priceofliberty.tumblr.com

NSA Recruiter Grabs Student’s Phone to Stop him from Recording

So a National Security Agency recruiter named “Neal Z.” was manning a booth a University of New Mexico job fair when he was confronted by two students with cameras who began interrogating him about the agency’s spying tactics.

It began with one student accusing the NSA of collecting metadata of all phone calls within the United States, which Neal Z. first denied.

But when the student assured him that the NSA does do this, Neal Z. relented and admitted that it was done under the “legal authority” of the secret FISA court (United States Foreign Intelligence Surveillance Court).

The student then pointed out that a congressional panel determined that the collecting of metadata from U.S. phone calls was illegal and unconstitutional as Neal Z. tried to remain smug while displaying a wide-eyed paranoia that this kid knew too much.

“So why is it legal to collect information on every American citizen?” the student asked.

Neal Z. tried to brush him with off by saying, “you don’t understand what that collection is all about and if you don’t leave soon, I’m going to call the university security to get you out of my face.”

Better. Now if only iCloud had the same privacy protections as Mega

Here’s a new feature of iOS 8 that we weren’t expecting: Apple announced tonight that the new software makes it impossible for Apple to turn over the data on an iOS 8-equipped iPhone or iPad to U.S. law enforcement, even in the presence of a search warrant. Chalk one up for privacy.

This new legal and ethical stance from Apple is based on changes to the way iOS encryption works. With the newest version of Apple’s mobile software in place, the company can no longer bypass a user’s passcode—meaning that even if U.S. law enforcement presents Apple with a search warrant, the company is simply incapable of access passcode-protected data on a user’s device.

Apple will still be able to access any user data stored on iCloud, meaning a law enforcement request will compel the company to turn over iCloud files when presented with a warrant. But if the files only live on a user’s device, and not on the cloud, law enforcement’s out of luck.

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

“Our ability to act on data that does exist . . . is critical to our success,” Hosko said. He suggested that it would take a major event, such as a terrorist attack, to cause the pendulum to swing back toward giving authorities access to a broad range of digital information.

False flag when?

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers. …

“This is a great move,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union. “Particularly after the Snowden disclosures, Apple seems to understand that consumers want companies to put their privacy first. However, I suspect there are going to be a lot of unhappy law enforcement officials.”

Ronald T. Hosko, the former head of the FBI’s criminal investigative division, called the move by Apple “problematic,” saying it will contribute to the steady decrease of law enforcement’s ability to collect key evidence — to solve crimes and prevent them. …

“Our ability to act on data that does exist . . . is critical to our success,” Hosko said. He suggested that it would take a major event, such as a terrorist attack, to cause the pendulum to swing back toward giving authorities access to a broad range of digital information.

He suggested that it would take a major event, such as a terrorist attack, to cause the pendulum to swing back toward giving authorities access

Who are the real terrorists?

WHEN CHANGING CLOTHES
— 

To all my followers

When changing clothes, undressing etc,

always read just before u do, AAOOZUBILLAH HI MINISH SHAITAHHH NIRRA JEEEEM,

best I can write it out in English, ( im sure you know what I mean)

IT WILL BRING DOWN A VEIL OVER the unseen creations of allah,

to protect your privacy, as we must remember the jinn are always around and live within this planet too, and they can see all, unless you utter these powerful words of allah, that make them blind to your privacy.

may we all start acting upon this, to keep ourselves protected.

Public Oversight and The Rule of Law

One of the most striking elements of the surveillance practices is the extent to which laws and judicial procedures have been breached, ignored and undermined by agencies whose tasks it is to uphold the rule of law.

Before the Snowden revelations, the world had drifted into an unconscious acceptance that existing and unquestioned principles of law were somehow no longer valid. The most striking example of this was the report on “the use of the Internet for terrorism purposes” that was published by the United Nations Office on Drugs and Crime in 2012. That report actively encourages United Nations member states to establish “informal relationships or understandings with ISPs (both domestic and foreign) that might hold data relevant for law enforcement purposes about procedures for making such data available for law enforcement investigations.” These “informal relationships” seem to be exactly what the International Covenant on Civil and Political Rights (ICCPR) prohibits in Article 17, which states that “no one shall be subjected to arbitrary or unlawful interference with his privacy”. …

Watch on theredpillnetwork.tumblr.com
John McAfee: Secrets of The Cloud Revealed

Alex Jones talks with Scottish-American computer programmer and founder of McAfee, Inc., John McAfee about new Apple product releases, biometrics, and cyber security.

There are a few different issues that a criminal act like this brings up, but before I get into them it’s necessary to make one thing clear: If you deliberately seek out any of these images, you are directly participating in the violation not just of numerous women’s privacy but also of their bodies. These images - which I have not seen and which I will not look for - are intimate, private moments belonging only to the people who appear in them and who they have invited to see them. To have those moments stolen and broadcast to the world is an egregious act of psychic violence which constitutes a form of assault.


The people sharing these images are perpetuating an ongoing assault. The people gleefully looking at them are witnessing and enjoying an ongoing assault. When you have been asked by victims of a crime like this not to exacerbate the pain of that crime and you continue to do so anyway, you are consciously deciding that your enjoyment, your rights and perhaps even just your curiosity are more important than the safety and dignity of the people you’re exploiting. That out of the way, let’s get a few other things straight.

Don’t want nudes leaked? Just don’t put nudes on your computer/phone.

Don’t want your banking account hacked? Don’t use online banking.

Don’t want STD’s or pregnancy? Don’t have sex. Ever.

Don’t want to die? Don’t live.

Text
Photo
Quote
Link
Chat
Audio
Video