-
HTML5 and covert peer to peer filesharing
Imagine a well-designed P2P distribution network that was reasonably anonymous, took no effort to install or configure and could be used without large amounts of effort by any normal computer user. Such tools can and indeed have been built and open up a range of opportunities for illegal use to cybe …
- On:
-
Is GCHQ password advice dodgy?
It is unusual, to say the least, for me to find a part of the work of GCHQ that is not entirely obnoxious. However, their recently published password guidance seems rather reasonable, despite this dig from the Guardian some will be sceptical about trusting the advice of the intelligence agency o …
- On:
-
SSH: to change port or not to change port
There are strong opinions on whether to run your SSH daemon on ports other than the default 22. On the pro side, the argument is that most automated tools only check port 22, so you reduce your exposure to random script kiddies by not running it there. That’s just security by obscurity say t …
- On:
-
Why breaking encryption to stop terror is a monumentally shit idea
I have a confession to make. I use strong crypto. There I’ve said it. In the opinion of some that makes me a terrorist. I also drink water. I have heard terrorists do that too.UK Prime Minister, David Cameron, would certainly like to be able to read everything I ever write. He isn’t a …
- On:
-
Saturday at the 2014 Logan Symposium: my highights
On Saturday at the Barbican in London I attended the 2014 Logan symposium — a conference that was intended to bring together key figures in the fight against invasive surveillance and secrecy. The idea was to build alliances between progressive cyber-activists, hackers and journalists. Speaker …
- On:
-
Quick tip: Making Gandi SHA-2 certificates work with all browsers
At newint we are working our way through our SSL/TLS certificates to make sure they are all signed with SHA2 algorithim, rather than SHA1, which is starting to show its age. We use Gandi as our certificate provider. As you can see, they have very recently started issuing SHA2 certificates if you …
- On:
-
Trickle down totalitarianism: why everyone will be listening in soon
It has been just over a year since the Snowden revelations first confirmed what many of us had suspected for some time — the NSA and GCHQ were in the personal data collection market in a big way. And it wasn’t just targetted data (like of criminals or terrorists, for example) they …
- On:
-
Stegospam: Hiding messages in spam for fun and mischief
tl;dr GCHQ/NSA seem to keep encrypted data but throw away spam. I made a tool that lets you hide your encrypted data in spam. In recent weeks it has emerged that GCHQ and NSA have been spying not only on their political allies, but on the population in general. Many of us are shocked, if unsur …
- On:
-
Ethical tech — 10 ways to keep your digital life free and secure
This is a rewrite of an article that first appeared in the Internet Showdown issue of New Internatoinalist magazine. I have expanded some sections and rephrased others.Perhaps the most important reason to use Free Software is that it allows you, not a corporation, …
- On:
-
Collusion: How UK protest websites help business and the police
Online privacy and anonymity should be important for all of us. Doubly so for activists who are likely to get up the noses of capitalist business and the police. Ideally, then, the websites of protest groups ought to steer clear of technology that shares the identities of visitors with advertisin …
- On: