Watch on priceofliberty.tumblr.com

NSA Recruiter Grabs Student’s Phone to Stop him from Recording

So a National Security Agency recruiter named “Neal Z.” was manning a booth a University of New Mexico job fair when he was confronted by two students with cameras who began interrogating him about the agency’s spying tactics.

It began with one student accusing the NSA of collecting metadata of all phone calls within the United States, which Neal Z. first denied.

But when the student assured him that the NSA does do this, Neal Z. relented and admitted that it was done under the “legal authority” of the secret FISA court (United States Foreign Intelligence Surveillance Court).

The student then pointed out that a congressional panel determined that the collecting of metadata from U.S. phone calls was illegal and unconstitutional as Neal Z. tried to remain smug while displaying a wide-eyed paranoia that this kid knew too much.

“So why is it legal to collect information on every American citizen?” the student asked.

Neal Z. tried to brush him with off by saying, “you don’t understand what that collection is all about and if you don’t leave soon, I’m going to call the university security to get you out of my face.”

Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

Better. Now if only iCloud had the same privacy protections as Mega

Here’s a new feature of iOS 8 that we weren’t expecting: Apple announced tonight that the new software makes it impossible for Apple to turn over the data on an iOS 8-equipped iPhone or iPad to U.S. law enforcement, even in the presence of a search warrant. Chalk one up for privacy.

This new legal and ethical stance from Apple is based on changes to the way iOS encryption works. With the newest version of Apple’s mobile software in place, the company can no longer bypass a user’s passcode—meaning that even if U.S. law enforcement presents Apple with a search warrant, the company is simply incapable of access passcode-protected data on a user’s device.

Apple will still be able to access any user data stored on iCloud, meaning a law enforcement request will compel the company to turn over iCloud files when presented with a warrant. But if the files only live on a user’s device, and not on the cloud, law enforcement’s out of luck.

Keeping data private is vital in the days of smartphones and the free-floating information they carry. Justin wrote a guide on many of the deeply hidden and sometimes concerning privacy settings in iOS 7. Now we’re back to cover some of the new (and old) privacy settings in iOS 8 that you need to address right now. Don’t Miss: The 33 Best Hidden Features of iOS 8 Problem #1: The Keyboard Is Storing Your Passwords QuickType is Apple’s new predictive text feature for iOS 8, providing several suggestions to finish off words and sentences, nestled right above the keyboard as you type. While

IOS 8 is a creepers paradise. IF you updated please at least look over this

“Our ability to act on data that does exist . . . is critical to our success,” Hosko said. He suggested that it would take a major event, such as a terrorist attack, to cause the pendulum to swing back toward giving authorities access to a broad range of digital information.

False flag when?

Okay, I’m gonna try to make this quick because I need to get to work. But I feel like I also need to talk about this somewhere.

So. I have this friend who’s about to turn 13. She’s my ex’s kid; I don’t make a habit of going around friending 13 year olds. (Not that there’s anything wrong with friending 13 year olds, but it’s not a common occurrence in our age-segregated society.)

Anyway. She’s the coolest. One of the most important things to me, when me and my ex broke up, was making sure I maintained a good relationship with her. I’ve been making a real effort to do that, and I think she and I have gotten closer since the split, given that we spent “family” time together before but not much time one-on-one. (She doesn’t live with my ex, so we mostly only got together at holidays and such.)

I still feel kinda awkward with her, ‘cause she’s a teenager and I’m a dorky old person and I don’t always know what to talk to her about. I don’t have kids of my own, and most of the other young people in my life are either 18+ or, like, five. This no-longer-a-little-kid-but-not-quite-exactly-a-grownup hinterland is new to me. Is she too old for coloring books? Is she too young for novels with sex in them? (Turns out the answer to both questions is “no”, depending on the specifics of the coloring book and the novel.) I try to remember what I was like and into at that age, but that doesn’t really help either because a) she’s had a harder life than I did and she’s way more mature than I was at 12, and b) I was 12 twenty years ago; the world was different back then, even kid world. But we figure it out. She’s a big reader, so we mostly talk about books and YouTube and go swimming and make cupcakes and stuff.

Here’s the thing: Most of the adults in her life are not very tech savvy. Certainly, they’re not on Tumblr or whatever. She has a Facebook page that she shares with family and posts the kind of innocuous stuff you post where your grandparents can see it. And another Facebook that’s mostly just friends her age, me, and one of her aunts, where she posts somewhat more ranty teenager-type memes about how people who don’t like her for who she is can find other friends, etc.

And then there’s another space online where she talks to her Internet friends. And, like you do, she uses that space to talk about suicidal thoughts, self-injury, depression, feeling abandoned by her family, considering anorexia, the support she gets from her online community, etc. I don’t think the other adults in her life know about this space. And I don’t think it occurs to her that any of them might read it. I only stumbled across it because I happen to be more Internet-savvy than her grandparents…and I haven’t mentioned it to her.

So. I guess this is where that ultimate question of the relationship between privacy and safety gets personal. Honestly, I’m grateful that I didn’t find this site until after my ex and I had split up, because otherwise I think I would’ve felt much more torn about whether I should show it to her Dad. Even when we were together, one of the common points of tension between my ex and I was that I wanted to advocate for the kiddo more, but was always trying to strike a balance between doing that in ways that didn’t make my ex feel like I was criticizing their parenting, thus putting a strain on their relationship with me. Now that we’re split, I’m in the advantageous position of knowing exactly where my priorities lie. I still care about my ex a lot. But their daughter and my relationship with her comes first.

People, especially young people, use the Internet to communicate about and find support around things they don’t feel safe sharing with the people they know in “real life.” That’s one thing I do remember from being a teenager — and from talking to my friends online about depression, self-injury, feeling suicidal, anorexia, being angry at my family, and the like. This is all stuff I went through when I was her age, too, and I turned out alright. But there’s always the possibility that I wouldn’t have. I dunno. All I know is that if someone had tipped my parents off to the stuff I was sharing online at the time, I would have experienced that as a major betrayal.

It’s important to me not to violate what feels to her right now like a safe space. It’s also important to me that she’s actually safe. I’m trying to think and feel through the complexities of how to balance both those things in a way that’s respectful towards her, that’s respectful towards her relationship with her Dad, and that acknowledges how much they care about her and what a really good and loving parent they are, even if I do think they are inattentive and distracted from her life sometimes, and that also pays attention to the complicated custody situation she’s in with the people she currently lives with (who are not people I trust to treat her respectfully the way I trust her Dad.)

I dunno. I don’t know that I’m exactly looking for advice, although I’m open to it. I think I just…am dealing with a tough thing that I’m not exactly sure how to talk about to people in my “real life” without compromising her privacy, and so I decided to talk to my Internet friends for support. Like you do. :P

Okay, I really gotta go to work now.

WHEN CHANGING CLOTHES
— 

To all my followers

When changing clothes, undressing etc,

always read just before u do, AAOOZUBILLAH HI MINISH SHAITAHHH NIRRA JEEEEM,

best I can write it out in English, ( im sure you know what I mean)

IT WILL BRING DOWN A VEIL OVER the unseen creations of allah,

to protect your privacy, as we must remember the jinn are always around and live within this planet too, and they can see all, unless you utter these powerful words of allah, that make them blind to your privacy.

may we all start acting upon this, to keep ourselves protected.

Public Oversight and The Rule of Law

One of the most striking elements of the surveillance practices is the extent to which laws and judicial procedures have been breached, ignored and undermined by agencies whose tasks it is to uphold the rule of law.

Before the Snowden revelations, the world had drifted into an unconscious acceptance that existing and unquestioned principles of law were somehow no longer valid. The most striking example of this was the report on “the use of the Internet for terrorism purposes” that was published by the United Nations Office on Drugs and Crime in 2012. That report actively encourages United Nations member states to establish “informal relationships or understandings with ISPs (both domestic and foreign) that might hold data relevant for law enforcement purposes about procedures for making such data available for law enforcement investigations.” These “informal relationships” seem to be exactly what the International Covenant on Civil and Political Rights (ICCPR) prohibits in Article 17, which states that “no one shall be subjected to arbitrary or unlawful interference with his privacy”. …

Watch on theredpillnetwork.tumblr.com
John McAfee: Secrets of The Cloud Revealed

Alex Jones talks with Scottish-American computer programmer and founder of McAfee, Inc., John McAfee about new Apple product releases, biometrics, and cyber security.

There are a few different issues that a criminal act like this brings up, but before I get into them it’s necessary to make one thing clear: If you deliberately seek out any of these images, you are directly participating in the violation not just of numerous women’s privacy but also of their bodies. These images - which I have not seen and which I will not look for - are intimate, private moments belonging only to the people who appear in them and who they have invited to see them. To have those moments stolen and broadcast to the world is an egregious act of psychic violence which constitutes a form of assault.


The people sharing these images are perpetuating an ongoing assault. The people gleefully looking at them are witnessing and enjoying an ongoing assault. When you have been asked by victims of a crime like this not to exacerbate the pain of that crime and you continue to do so anyway, you are consciously deciding that your enjoyment, your rights and perhaps even just your curiosity are more important than the safety and dignity of the people you’re exploiting. That out of the way, let’s get a few other things straight.

Don’t want nudes leaked? Just don’t put nudes on your computer/phone.

Don’t want your banking account hacked? Don’t use online banking.

Don’t want STD’s or pregnancy? Don’t have sex. Ever.

Don’t want to die? Don’t live.

Text
Photo
Quote
Link
Chat
Audio
Video