-
Using Tor for apt package management on Debian
Recently, the Debian project announced that they intend to make more of their services available as Tor hidden services. They have added a new package to the repositories making it easy to use Tor hidden services when using apt to upgrade packages.Tor is software that allows better anonymity when …
- On:
-
HTML5 and covert peer to peer filesharing
Imagine a well-designed P2P distribution network that was reasonably anonymous, took no effort to install or configure and could be used without large amounts of effort by any normal computer user. Such tools can and indeed have been built and open up a range of opportunities for illegal use to cybe …
- On:
-
Obama crypto leak: no mandatory broken encryption. Yet.
A recent leak published in the Washington Times seems to point to the Obama administration backing down on recent proposals to include backdoors in encryption products following pushback from the public, crypto experts and some of the big US tech companies.The memo, which was published last week, …
- On:
-
Cameron’s turd in the encryption punchbowl
In a week when it was revealed that GCHQ was illegally spying on Amnesty International, British Prime Minister David Cameron has added yet another turd to the increasingly shitty punchbowl of his vision of the future internet by proposing a ban on effective encryption. Last time Cameron said some …
- On:
-
Dear ICANN: Please don’t attack privacy, anonymity and free speech
ICANN, the not-for-profit public benefit corporation which coordinates the naming system of the internet recently announced some disturbing plans to take over the running of domain privacy services and to stop those services from providing, well, domain privacy.Here’s a good tl;dr from t …
- On:
-
Why breaking encryption to stop terror is a monumentally shit idea
I have a confession to make. I use strong crypto. There I’ve said it. In the opinion of some that makes me a terrorist. I also drink water. I have heard terrorists do that too.UK Prime Minister, David Cameron, would certainly like to be able to read everything I ever write. He isn’t a …
- On:
-
Saturday at the 2014 Logan Symposium: my highights
On Saturday at the Barbican in London I attended the 2014 Logan symposium — a conference that was intended to bring together key figures in the fight against invasive surveillance and secrecy. The idea was to build alliances between progressive cyber-activists, hackers and journalists. Speaker …
- On:
-
Infographic: Facebook Vs the Stasi in numbers
Some time ago, OpenDataCity made a map visualising the relative size of data held by the Stasi and NSA, you can view it below. Partly inspired by that, I thought it would be interesting to compare the Stasi with another vast data collection operation — Facebook. Here, then, is Facebook Vs t …
- On:
-
Trickle down totalitarianism: why everyone will be listening in soon
It has been just over a year since the Snowden revelations first confirmed what many of us had suspected for some time — the NSA and GCHQ were in the personal data collection market in a big way. And it wasn’t just targetted data (like of criminals or terrorists, for example) they …
- On:
-
Anonymous Public DNS with OpenNIC
The Domain Name System (DNS) is like a phone book — you send a query to a server that says what is the number for charlieharvey.org.uk? and it sends back an IP address. Nowadays lots of people use either their ISP’s DNS server or one of the public DNS servers like Google’s 8.8.8 …
- On: