Some files need encryption and some files don’t

Andre De Beer asked if certain files on his hard drive need encryption. Some do and some dont.

If youre like the vast majority of PC users, you have no need to encrypt everything on your hard drive. Before you decide to encrypt anything, ask yourself this: What would you lose if criminals or the NSA got their hands on these files? If the answer is nothing, those files dont need encryption.

[Have a tech question? Ask PCWorld Contributing Editor Lincoln Spector. Send your query to answer@pcworld.com.]

Of course there are exceptions. If youre an accountant, a lawyer, or a spy, you probably should have your entire hard drive encrypted. If everything you work on is confidential, then everything has to be protected.

But what should the rest of us encrypt? Bank statements and legal documents, of course. Any file containing your (or anyone elses) social security number, bank account information, drivers license, or credit card information should be encrypted.

Theres absolutely no reason to encrypt photos and videosunless theyre the type of photos and videos that you want to hide from your family.

Yes, Im aware of the many good arguments for encrypting everything. Multitasking operating systems such as Windows can leak data everywhere. If your entire hard drive is encrypted, those leaks will be encrypted as well.

On the other hand, if your entire hard drive is encrypted, the very act of logging onto Windows effectively opens the vault. Whenever youre at your computer, the private files are accessible. They could be read over public Wi-Fi, or by a co-worker when you take a break.

Thats why I prefer an encrypted vault that I open when I need it and close when I dont. (And I never open it when using public Wi-Fi.)

What encryption program should you use? Not so long ago, I would have said Truecrypt. But nowwell, try these alternatives.

Continue reading here:
Some files need encryption and some files don't

The IRS wages war on open source nonprofits

The IRS has denied one open source software company's request to become a nonprofit.

I'm going to take the most controversial stance I have ever taken:

The IRS is a big bully.

(OK. Maybe that wasn't exactly controversial.)

We're all familiar with the ongoing controversy of the IRS targeting of non-profit organizations that are (potentially) affiliated with a political movement -- most notably conservative ones. But one thing that has, until now, simply not gotten enough attention is the IRS targeting of Open Source non-profit organizations.

That's right. The IRS has, in essence, waged war against not-for-profit groups that make Free and Open Source software.

This week, it was announced that the IRS has officially deniedYorba's -- an organization that focuses on Free Software such as Shotwell and Geary -- request to be a 501(c)(3) non-profit. (You can read the full text of from the IRS here.) This could possibly be a one-time, specific case, one that may not even have any relevance to other organizations.

But the wording that the IRS chose to use in denying their status is deeply troubling.

"You have a substantial nonexempt purpose because you develop software published under open source compatible licenses that authorize use by any person for any purpose, including nonexempt purposes such as commercial, recreational, or personal purposes, including campaign intervention and lobbying."

What this means: The IRS says that Yorba produces Open Source software that could be used by anyone. It is possible that a commercial company (aka "Not a non-profit") might use that software, in some way, without Yorba's knowledge. Therefore, Yorba cannot possibly be a non-profit.

See the article here:
The IRS wages war on open source nonprofits

Latest Snowden leak: Most data NSA collects is from non-targets

Newly leaked documents show a large percentage of electronic communications intercepted by the NSA is from ordinary Internet users not suspected of wrongdoing, according to a new report from the Washington Post.

The Post bases its assessment on the results of a four-month-long investigation and examination of 160,000 email and instant message exchanges provided by whistleblower Edward Snowden, and it reveals that as many as 90 percent of those whose data was collected were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.And many of those individuals were American citizens.

Edward Snowden.

While some of the information collected and retained was relevant to the NSAs operations, a large portion of the conversations intercepted involve irrelevant accounts of individuals going about their daily lives, according to the Post. Other tidbits of data collected include photos of peoples children.

The report notes that this sort of incidental collection is impossible to avoid, but the Post also states that in other contexts the U.S. government works harder to limit and discard irrelevant data. For example, the FBI works to avoid listening in when a suspects family member uses a wiretapped phone.

The NSA, on the other hand, makes no such distinction between relevant and irrelevant information, the report says, because the agency feels that it is difficult for one analyst to know what might become relevant to another.

This is but the latest revelation on the nature of the NSAs surveillance programs. Previous leaks highlighted a massive facial recognition program, as well as the bulk collection of phone call metadata and email records, among other things.And this new leak will likely only intensify fears that government surveillance will put a damper on the open Internet, a concern highlighted in a recent study from the Pew Research Center.Visit the Washington Post for the full report.

More:
Latest Snowden leak: Most data NSA collects is from non-targets

Thousands of intercepted conversations provided by Edward Snowden

NEW YORK (CNNMoney) -

Heaps of baby photos, fitness selfies, medical records and resumes are among thousands of private communications scooped up and stored by NSA spy programs.

That's according to new disclosures based on documents Edward Snowden, the former National Security Agency contractor, gave to The Washington Post -- disclosures that show just how easy it is for Americans' private conversations to be swept into the spy agency's traps.

Snowden provided the Post with what it said were 160,000 intercepted conversations, including e-mails, instant messages, photographs, social network posts and other documents. The trove included messages exchanged from 2009 through 2012, and some were hundreds of pages long.

Nearly 90% of the individuals -- or accounts -- whose information was obtained were not federal targets, but rather ordinary Internet users, a Post analysis found. Some had visited online forums in which targets chatted, or exchanged e-mails with a target, and "were caught in a net the agency had cast for somebody else," the Post reported.

Some were identified by either the government or newspaper as Americans. It said NSA analysts censored 65,000 references to Americans' names, contact information or other details. The paper found almost 900 "unmasked" e-mail addresses "that could be strongly linked to U.S. citizens or U.S. residents."

The Post said the agency's standards for classifying someone as a foreigner could apply to "tens of millions of Americans," such as those who log into an e-mail account when traveling outside the country or use proxy servers located outside the U.S.

At least one subject was classified as foreign simply because the person communicated in a foreign language.

CNN's inquiries of the NSA were not answered on Sunday. The Post said it withheld several significant conversations that were within the documents at the request of unnamed government officials.

Past revelations based on Snowden-provided documents have shown how the U.S. government taps private accounts, scoops up personal data and hacks Internet security measures. Sunday's disclosure sheds light on what the government collects through some of those efforts.

See the article here:
Thousands of intercepted conversations provided by Edward Snowden

Ordinary people ‘outnumber foreigners in NSA spying …

The Washington Post said a study of a large collection of communications intercepted by the US National Security Agency showed that ordinary Internet users, including Americans, far outnumbered legally targeted foreigners caught in the surveillance.

Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else, the Post said.

Nearly half of the files contained names, email addresses or other details that the NSA marked as belonging to US citizens or residents, it said.

The paper said the files also contained discoveries of considerable intelligence value, including fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into US computer networks.

Tracking the communications led to the capture of some terrorism suspects, including Umar Patek, a suspect in a 2002 bombing on the Indonesian island of Bali, it said.

The Post also found that the NSA held on to material that analysts described as useless.

These files tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.

Some of the files however included discoveries of considerable intelligence value.

Last week the Post reported that all but four countries Britain, Canada, Australia and New Zealand were seen as valid spy targets for the NSA. Currently, Germanys parliament is investigating the extent of spying by the NSA and its partners on German citizens and politicians, and whether German intelligence aided it.

Read the original post:
Ordinary people ‘outnumber foreigners in NSA spying ...

iOS Vision+ Utility V1.1 Demo Video for DJI Phantom 2 Vision + Booster Encryption – Video


iOS Vision+ Utility V1.1 Demo Video for DJI Phantom 2 Vision + Booster Encryption
Vision+ Utility enhances the DJI Phantom 2 Vision+ WiFi video connection performance. It will boost both the WiFi range extender and the WiFi transmitter output signal to increase the FPV...

By: TACODOTTOY

More:
iOS Vision+ Utility V1.1 Demo Video for DJI Phantom 2 Vision + Booster Encryption - Video

Kristov Atlas, pt2 : Anonymous Bitcoin, Cryptography and Online Safety – #204 – Video


Kristov Atlas, pt2 : Anonymous Bitcoin, Cryptography and Online Safety - #204
This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It #39;s being...

By: GnosticMedia

Read the original here:
Kristov Atlas, pt2 : Anonymous Bitcoin, Cryptography and Online Safety - #204 - Video

OWASP AppSec EU 2013: Keynote: Cryptography in Web Security: Stupid, Broken, and maybe Wor – Video


OWASP AppSec EU 2013: Keynote: Cryptography in Web Security: Stupid, Broken, and maybe Wor
For more information and to download the video visit: Playlist OWASP AppSec EU 2013: Speaker: Thomas Roes. For more information and to download the video vis...

By: Web Dersim

See the rest here:
OWASP AppSec EU 2013: Keynote: Cryptography in Web Security: Stupid, Broken, and maybe Wor - Video