The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: August 2, 2017
NATO convoy attacked in Kandahar – NavyTimes.com
Posted: August 2, 2017 at 9:01 am
NavyTimes.com | NATO convoy attacked in Kandahar NavyTimes.com WASHINGTON A NATO convoy came under attack in Kandahar province, Afghanistan, resulting in several casualties, according to Captain William Salvin, a spokesperson for Operation Resolute Support. The attack was conducted using some form of ... |
View original post here:
NATO convoy attacked in Kandahar - NavyTimes.com
Posted in NATO
Comments Off on NATO convoy attacked in Kandahar – NavyTimes.com
NSA illegally spied on Kim Dotcom in New Zealand – BetaNews
Posted: at 9:01 am
Kim Dotcom has been of interest to the US government and law enforcement agencies for some time, and it was ruled that the Mega and Megaupload founder could be extracted to the US. But now it seems that the NSA was spying on the internet entrepreneur after surveillance was supposed to have stopped.
New Zealand's Government Communications Security Bureau (GCSB) had been working with the NSA on a joint surveillance operation called Operation Debut. While surveillance was supposed to have stopped in January 2012, it has emerged that the NSA continued to use GCSB's technology without its knowledge.
According to a report in the New Zealand Herald, GCSB "lost control of its surveillance technology" and later discovered that it had been used to continue to spy on Dotcom for at least an additional two months. The information has come to light in new documents released by the GCSB to the High Court.
The admission is being used as evidence that the NSA was illegally spying on Dotcom while he was resident in New Zealand, using GCSB equipment. It is not clear how this surveillance operation could have been continued by the NSA without GCSB's knowledge, but Dotcom has issued a warning:
New Zealanders must know how much power a foreign state holds over their private information. The NSA has unrestricted access to GCSB surveillance systems. In fact, most of the technology the GCSB uses was supplied by the NSA. If the GCSB was aiding and abetting the NSA to spy directly on New Zealanders then the seriousness of the situation has changed dramatically and a truly independent inquiry and a new criminal investigation will be unavoidable.
The documents show that GCSB systems were also used to illegally spy on an additional 88 people.
Photo credit: Kim Dotcom
Read more here:
NSA illegally spied on Kim Dotcom in New Zealand - BetaNews
Posted in NSA
Comments Off on NSA illegally spied on Kim Dotcom in New Zealand – BetaNews
Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers – InsideSources
Posted: at 9:01 am
From left, National Intelligence Director Dan Coats, National Security Agency director Adm. Michael Rogers and acting FBI Director Andrew McCabe, arrive for the Senate Intelligence Committee hearing about the Foreign Intelligence Surveillance Act, on Capitol Hill, Wednesday, June 7, 2017, in Washington. (AP Photo/Carolyn Kaster)
A Senate Democrat on the Intelligence Committee is pressing the nations top spy chief to clarify whether FISA Section 702, an expiring law used by the National Security Agency to conduct broad international surveillance, can be used to domestically target Americans.
Oregon Democratic Sen. Ron Wyden asked Director of National Intelligence (DNI) Dan Coats in June ifthe government [can] use FISA Act Section 702 to collect communications it knows are entirely domestic.
Section 702 of the 2008 Foreign Intelligence Surveillance Amendments Act authorizes NSA to tap the physical infrastructure of internet service providers, like fiber connections, to intercept foreign emails, instant messages, and other communications belonging to foreign nationals as they exit and enter the U.S.
Unlike domestic NSA surveillance programs that largely collect metadata information like when a message was sent and received, but not the message itself Section 702 includes the actual content of intercepts.
Not to my knowledge, Coats responded during a congressional oversight hearing. It would be against the law.
Privacy advocates suspect Section 702 creates a loophole for NSA to incidentally collect data belonging to Americans that couldamount to millions of warrantless intercepts. Wyden, who as a member of the Senate Intelligence Committee is privy to classified briefings from Coats and other intelligence agencies, seems to have suspicions of his own.
After the hearing reporters sought clarity from Coats, to which the Office of the Director of National Intelligence (ODNI) responded in a letter.
Section 702(b)(4) plainly states we may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States. The DNI interpreted Senator Wydens question to ask about this provision and answered accordingly, the letter from ODNI reads.
Wyden cryptically responded to the ODNI letter, saying [t]hat was not my question, and asked Coats to provide a public response to my question, as asked during the hearing.
Coats has so far declined to provide that response. In a letter to Coats Monday Wyden again asked the DNI to respond publicly to the original question.
As I noted in my previous letter, following the hearing, your office responded from inquiries to reporters by answering a different question, Wyden wrote.
The episode is eerily reminiscent of a March 2013 exchange between Wyden and then-DNI James Clapper, when the senator famously asked the Obama administrations spy chief whether NSA collects any type of data at all on millions or hundreds of millions of Americans.
No sir, Clapper answered. Not wittingly.
Months later Americans found out Clappers answer was untrue when former NSA contractor Edward Snowden leaked the existence of widespread agency surveillance programs intercepting data belonging to millions of Americans. Clapper later claimed he thought Wyden was asking a different question: whether NSA was listening to Americans phone conversations.
I thought, though in retrospect, I was asked when are you going to startstop beating your wife kind of question, which is, meaning not answerable necessarily, by a simple yes or no, Clapper later told NBC. So I responded in what I thought was the most truthful or least untruthful manner, by saying, No.
Going back to my metaphor, what I was thinking of is looking at the Dewey Decimal numbers of those books in the metaphorical library, he continued. To me collection of U.S. persons data would mean taking the books off the shelf, opening it up and reading it.
Wyden, who knew Clappers answer was untrue from Senate intelligence briefings, recently said hed spent six months teeing it up to ask that question, and that hes been just as careful with the question he asked Coats, suggesting theres more to the answer than Coats provided in June.
Im not dropping this, Wyden said in July. And to say, Oh, he responded to something different, Ill let you draw your own conclusions on that.
Snowden in a March interview said using Section 702 to surveil Americans comes down to little more than word games.
These intelligence agenciestheyre saying to them, collect doesnt mean that we copied your communications, that we put it in the bucket, that we saved it in case we want to look at it, he told The Intercept. To them, collect means that they take it out of the bucket, and actually look at it and read it.
Section 702 expires at the end of December unless Congress renews the law.
Follow Giuseppe on Twitter
Subscribe for the Latest From InsideSources Every Morning
Original post:
Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers - InsideSources
Posted in NSA
Comments Off on Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers – InsideSources
Bush-appointed judge finds federal marriage ban unconstitutional – Wisconsin Gazette
Posted: at 9:00 am
A U.S. District Judge in Connecticut, writing a 104-page decision, on Tuesday ruled that the 1996 Defense of Marriage Act violates the 5th Amendment to the U.S. Constitution.
The ruling by U.S. District Judge Vanessa Bryant, named to the federal bench by President George W. Bush, is the latests of several court ruling against DOMA.The law, which denies federal health and other benefits to same-sex couples, is headed to the U.S. Supreme Court.
Bryant ruled in a case brought by six same-sex couples and a widower, all legally married in the New England states of Connecticut, New Hampshire and Vermont. Marriage equality is now legal in six states and the District of Columbia.
Section 3 of the law violates the 5th Amendments guarantee of equal protection, ruled Bryant, in that it obligates the federal government to single out a certain category of marriages as excluded from federal recognition, thereby resulting in an inconsistent distribution of federal marital benefits.
A U.S. District judge in Connecticut ruled that a federal law defining marriage as only between a man and a woman is unconstitutional because it denies tax, health and other benefits to married gay couples in her state and others.
Judge Vanessa L. Bryant, who was appointed to the bench by former President George W. Bush, ruled today that the marriage restriction contained in the 1996 Defense of Marriage Act violates the Fifth Amendment right to equal protection.
Bryant wrote that the restriction obligates the federal government to single out a certain category of marriages as excluded from federal recognition, thereby resulting in an inconsistent distribution of federal marital benefits.
She also said many courts have concluded that homosexuals have suffered a long and significant history of purposeful discrimination.
Several courts across the country have made similar rulings. The Obama administration has asked the U.S. Supreme Court to settle the issue.
The ruling came in the case of six married same-sex couples and a widower who sued after being denied federal benefits. The plaintiffs are from Connecticut, New Hampshire and Vermont.
Among the plaintiffs are Joanne Pedersen and her spouse, Ann Meitzen.
Im thrilled that the court ruled that our marriage commitment should be respected by the federal government just as it is in our home state of Connecticut, Pedersen said in a statement after the ruling was released.
She and Meitzen, of Waterford, Conn., were married in December 2008. Pedersen, a retired civilian employee of the U.S. Navy, is enrolled in the Federal Employees Health Benefits Program. She sought to get Meitzen covered under the plan, but her request was denied.
Meitzen has a chronic lung condition that affects her ability to work and wants to retire, but she cant because of the cost of her health insurance, Bryants ruling said.
Read the original here:
Bush-appointed judge finds federal marriage ban unconstitutional - Wisconsin Gazette
Posted in Fifth Amendment
Comments Off on Bush-appointed judge finds federal marriage ban unconstitutional – Wisconsin Gazette
HiQ v. LinkedIn: Does First Amendment limit application of computer … – Reuters
Posted: at 8:59 am
(Reuters) - In 1986, when Congress enacted the Computer Fraud and Abuse Act, the Internet was still in its larval stage. Some U.S. government agencies communicated via the Defense Departments Arpanet, the Internets precursor. Universities and research centers were just starting to network with the government and each other. Commercial Internet service providers didnt exist. Tim Berners-Lee hadnt yet published his revolutionary proposal to link computers around the worldto share information. Mark Zuckerberg was 2 years old.
The CFAA, in other words, was not written to answer the question posed in litigation between the data analytics company hiQ and the social media site LinkedIn: Does a social media site control access to information its users post publicly? As Ive previously explained, hiQs business is to sell employers data analysis bases on their employees public LinkedIn profiles. LinkedIn believes hiQs data harvesting violates its rules. In May, LinkedIn sent hiQ a cease-and-desist letter advising the data company that LinkedIn had blocked its access to members profiles. If hiQ attempted to circumvent the block, LinkedIn said, it could face prosecution under the 1986 computer fraud law, which criminalizes unauthorized access to a computer.
Last month, hiQ sued LinkedIn, seeking an injunction to allow hiQ to continue scraping public data from LinkedIn. LinkedIn is allowing hiQ access while the litigation moves forward, but hiQs CEO, Mark Weidick, has said (including to me in an interview Tuesday) that his business probably wont survive if it loses its case against LinkedIn.
But hiQs fate is hardly the only consequence of the case. U.S. District Judge Edward Chen of San Francisco, who presided last week over a hearingon hiQs motion for a preliminary injunction, will have to decide whether the CFAA is in tension with the First Amendment. Can private Internet companies use the CFAA to control access to public information? Or does the doctrine of constitutional avoidance preclude interpreting the 1986 law in a way that implicates the First Amendment?
Its no accident that both hiQ and LinkedIn brought in top-notch constitutional lawyers to argue at last weeks hearing. Former U.S. Solicitor General Donald Verrilli of Munger Tolles & Olson represented LinkedIn, which contends hiQ has no First Amendment right of access to LinkedIns computer servers. Under the 9th Circuits interpretation of the CFAA, LinkedIn argued, hiQ is akin to a trespasser who has been warned to go away.
Verrilli drew an analogy between LinkedIns publicly available profiles and books in a public library. You go and get books and other information and material from the public library, but the fact that the information's available to the public in that sense doesn't mean that you can break into the library with a crowbar at two in the morning because you're seized with a desire to read 'Moby Dick', Verrilli said. It doesn't mean that you can take a book out, when you're supposed to return it in two weeks, and keep it for a year, because you want that information. It doesn't mean if your library privileges have been revoked for abusing the rules, that you can show a fake ID at the door to get back in. The information's public, but it's subject to conditions.
Verrillis library comparison was sufficiently compelling that hiQs constitutional heavyweight, Harvard professor Laurence Tribe, took care to counter it. Library books, he said, used to have borrowing cards in the back of books showing how often books were checked out. A borrower could presumably could have looked at those cards to figure out which books were most popular a rudimentary form of the data analytics hiQ performs. LinkedIn, in Tribes analogy, is trying to use the threat of government prosecution under the CFAA to bar hiQ from looking at an electronic equivalent of those old-school library book cards.
For the government to make it a crime for me to make use of that information because they want to be the exclusive distributors of information about what's popular to read would, of course, be unconstitutional, Tribe said. That's the setting in which I want to put this case.
According to hiQ, which is also represented by Farella Braun & Martel, LinkedIns trespassing comparisons dont apply because hiQ never ventured beyond public LinkedIn profiles. The data company didnt use someone elses password to access LinkedIn, for example, or hack LinkedIn servers. HiQ argued that social media sites like Facebook, LinkedIn and Twitter are modern-day public forums, as the U.S. Supreme Court just held in June, in Packingham v. North Carolina. The CFAA, hiQ contends, cannot be read to give LinkedIn the power to use government authority to suppress the public flow of information.
Giving any powerful entity, public or private, the ability to choke off, at its discretion, speech is a dangerous path down which we should not go, Tribe said at the hearing.
Judge Chen, who previously presided over one of the 9th Circuits landmark CFAA cases, U.S. v. Nosal, was admirably engaged with both sides lawyers during oral argument, thanking them at the end of the hearing for their superb presentations. He promised a quick decision, since, as he said, I've got a feeling it's not going to end here.
Ive got a feeling hes right about that.
Originally posted here:
HiQ v. LinkedIn: Does First Amendment limit application of computer ... - Reuters
Posted in First Amendment
Comments Off on HiQ v. LinkedIn: Does First Amendment limit application of computer … – Reuters
Promoting First Amendment censorship – Herald and News
Posted: at 8:59 am
Shirley Tipton's Friday, July 28 Herald and News letter, "Johnson Amendment needs to be kept alive", deeply disturbs bothers and angers me.
This letter is predicated upon blatant ignorance! Her letter in essence is not only promoting continuing government censorship of the First Amendment and free speech by targeting and censoring pastors, but likewise defends another career criminal politician from America's shameful past.
I previously alluded to this in my Sept. 27, 2016 letter, also to the Herald and News, titled: "Trump description would fit LBJ well."
question: why are the worse socialists in America ignorant, deluded self righteous senior citizens who blindly "suck up to the party line," continue to re-elect repeat offenders to both houses of Congress and state legislatures, and stubbornly embrace the almighty nanny state?
Perhaps the links listed below will help expose and rebuke the unconstitutional 1954 Johnson Amendment which rightly is government censorship. These include:
"How the Johnson Amendment Threatens Churches's Freedoms" by Michelle Terry
"Come Out of Hiding Pastors, Trump Has Set You Free", May 11, 2017 by Dave Daubenmire.
This along with other credible writers such as Devvy Kidd, Chuck Baldwin, etc. remain archived
"Lawmakers Have a Plan to Stop IRS From Censoring the Free Speech of Pastors" by Rachel del
guidice", October 4, 2016.
Need I continue on? Probably not. Again, after reading Shirley Tipton's letter "I got heated up
like the barrel jacket on a World War II German MG-42 machine gun!" Yet, the Bible states: "Be ye angry and sin not, do not let the sun go down on your wrath."
I attempt to channel my anger into civic activism.
Originally posted here:
Promoting First Amendment censorship - Herald and News
Posted in First Amendment
Comments Off on Promoting First Amendment censorship – Herald and News
SMU Becomes the Face of the Collegiate War On The First Amendment – The Hayride
Posted: at 8:59 am
As a chapter chair of College Republicans, I have never been more alarmed by the blatant attack on our First Amendment rights to freedom of speech than I am at the present.
Over the past decade (and particularly the past year), universities across the country have left conservative-leaning students and faculty reeling over their treatment of seemingly benign ideas. Organizations like Campus Reform were forced into existence as a response to faculty and administration officials on various campuses to expose behavior that was intended to stifle conservative views. While student groups like College Republicans and Turning Point USA are attempting to reverse the dangerous course that many of these campuses are set on, the have a long way to go before higher-education can be taken seriously again.
While stories about liberal campuses enforcing liberal policies and in some cases disenfranchising their conservative students go back many years, it appears that incidents have spiked over the past year in particular. It doesnt take much for many of us to recall the riots in Berkeley, California over Milo Yiannopoulos and the violence that was caused. However, the nonsense continues heavily in California, where a case in which conservative students at Orange Coast College allege that their college hired an investigator to harass them is only one of many in the state.
However, its clear that the problem isnt just California, its everywhere. The Foundation for Individual Rights in Education (FIRE) has logged hundreds of cases across the nation, including ones in Louisiana and Texas. The organization has handled cases at LSU, Texas A&M San Antonio, TCU, Texas Tech, and others over cases regarding free speech and other topics. As recently as yesterday, in a case that has not been noted by FIRE but rather by media outlets, a student government diversity chair from the University of Central Florida declared on social media that Trump supporters are not welcome on our campus. These cases are not isolated; they are rampant throughout the United States.
Today, that very same sort of case came to Southern Methodist University in the worst sort of way. Last week, the SMU chapter of Young Americans for Freedom submitted a request in order to place 2,977 flags in memory of the victims of the September 11th attacks. Not only was their request denied by SMU administration, but the administration included in its response letter that The University also respects the right of all members of the community to avoid messages that are triggering, harmful, or harassing. The SMU College Republicans, along with SMU College Democrats, Turning Point USA at SMU, Mustangs for Life, SMU Feminist Equality Movement, and SMU Young Americans for Freedom all responded with a fierce bipartisan rebuke of the administrations decision.
A flag memorial to honor those who lost their lives in the events of 9/11, or displays promoting the education and discussion of the pro-life, pro-choice movements among SMU students must not be viewed as attacks on others. In choosing to view these displays as such, SMU is deviating from its call as a center of higher learning. Its mission is to be a place where ideas are challenged and intellect thrives, not a place to hide or silence alternative points of view, reads the letter from the student groups to the SMU president. The letter is absolutely correct: inhibition of free speech, no matter which side of the spectrum, no matter how much you individually disagree with it, and no matter how stupid it may seem to you, is not good for a free society. Its insulting to the memory of the 2,977 victims of 9/11 to insinuate that a memorial to them would be triggering, and its even more disconcerting the standard that this policy would set. Colleges and universities will undoubtedly produce our nations next set of leaders, conservative or liberal. By teaching these students that its okay to void another persons opinion simply because it offends you in some way isnt diverse, and its intellectually bankrupt. In fact, its degrading the very purpose of our Constitution. It teaches potential future leaders that its okay to take away the rights of someone due to their opinions.
Luckily for us, it appears that the student body at Southern Methodist University at least understands that free speech is something to be valued. Lets hope that message is spread to the rest our campuses as well.
Visit link:
SMU Becomes the Face of the Collegiate War On The First Amendment - The Hayride
Posted in First Amendment
Comments Off on SMU Becomes the Face of the Collegiate War On The First Amendment – The Hayride
Online privacy protection – Choice – CHOICE
Posted: at 8:57 am
Last updated: 01 August 2017
Whether you're just worried about Facebook settings or you want to hide all your online movements, you need a privacy audit.
In an age of mandatory data retentionit's crucial to understand your privacy settings. What are you really sharing and with whom? And how do you hide what you want to hide online? Review the online services you use and work out how much of your personal information is getting out into the online world.
In this article:
So just how worried are you about online privacy? You need some level of concern because not everyone can be trusted online. Young people may not appreciate that what goes online stays online, and older people may have concerns about exposing themselves on the web.
To help guide you, we've created an easy ready reckoner for finding your paranoia level and then understanding what you could be sharing and how to protect yourself whether you're the next Snowden or just a little wary.
The thing to understand with any platform or service is that if it's free, your personal data is the currency. That goes for Facebook, Gmail and other free email services, Google and all its tentacles that follow you from a search all around the web, free public Wi-Fi, the list could go on.
The first place to start is Facebook, but the platform itself will always have dibs on your personal details. It's just the price of doing business with the social media giant. The only way around it is to avoid using it altogether or severely limit how much personal information you put into your profile, such as your school, workplace and country of residence.
If you can't kick the habit altogether, it might be worth reviewing your privacy settings. Log in and go to Settings > Privacy. Here you can restrict who sees your posts, who can contact you for a friend request and who can look up your profile. If you're worried about securing your login, under Security and Login choose two-factor authentication such as password and code, alerts for unrecognised logins and encrypted email notifications.
If you're prone to turning to 140 characters to express yourself, you might want to check your Twitter, particularly given the social media platform's changes to privacy settings. What a surprise, it's taking more of your information in the name of 'personalised' content (read: advertising and marketing using your social life as raw material) and data collection is automatically opted-in on your behalf.
Log in to Twitter, then go to Settings and privacy, then Privacy and safety. Here you can review how much of your personal details are revealed, such as your location, and set up tweet protection so you can approve who sees your tweets. To see how Twitter personalises content and collects and shares your data, go to Personalization and Data. This will tell you what personal information will be used to show you ads and even tap into the apps you have on your mobile device for targeting content.
Paranoia rating: X
If you're conducting a lot of your life online, a password manager will help securely store your passwords and potentially prevent accounts with simple passwords from being hacked. Simple passwords such as your child's name are easy to create and easy to remember, but they can leave you vulnerable to hacking. Our password manager reviews can help you find a program that will create unique, complex passwords that are securely stored so you don't have to remember or worse, write down all these passwords.
If you use Google to search the web a lot and you have one or more Google accounts such as Gmail, you're potentially gifting the search giant a lot of your private details. One way to see how much you've exposed is to review your footprint in Google MyActivity. Click on the Activity Controls tab to review your activity and see how your personal information is handled.
Paranoia rating: XX
If you think that governments around the world are giving themselves a little too much licence to access your personal movements online, it could be time to use a VPN. Virtual private networks (VPNs) help shield your web browsing, identity and location, creating a secure 'digital tunnel' between you and your online destinations. A VPN can also protect you from online identity theft while using a public Wi-Fi connection and is essential if you're doing any kind of shopping, financial or other sensitive transaction on public internet.
Not sure where to start? Our VPN reviewswill show you which services we recommend when it comes to protecting your privacy online.
A messaging app with good security is another way to protect private conversations via the net. Depending on the level of privacy you're looking for, you may want to go with a dedicated security-focused app such as Wickr, Confide or Tunnel, or perhaps one of the more popular apps such as WhatsApp, Facebook Messenger and iOS Messages.
Paranoia rating: XXX
You might be plotting espionage, or you might just want to prevent government and business, as much as possible, from prying into your life online. If you fit this description, then there are a few things you won't want to go online without.
Your privacy toolkit won't be complete without email encryption. Emails aren't usually encrypted, which means that messages and attachments in your inbox and in transit can potentially be read. Luckily there are free email encryption programs that you can use without too much trouble that will protect your messages from prying eyes. Mailvelope works with Chrome and Firefox as a plugin and can work with Gmail, Yahoo Mail and Outlook.com.
Next up in your privacy toolkit will be Tor and the Tor browser. Tor, which is short for The Onion Router, is a network of secure computers provided by individuals to help others stay secure online. It's often used by dissidents, journalists, whistleblowers and activists in countries with hostile governments to hide their activity and communications online. Tor hides the 'header' or metadata that can reveal details such as the source, destination, size and timing of web traffic. There are mobile versions for Android, Orbot, and Onion Browser for iOS. If you need to send large files securely, the Onionshare uses the Tor network for anonymity.
If you would rather leave no trace of your web activity on the computer you're using, you can go one step further with Tails. It's a secure operating system that can run from a USB drive, storage cards or DVD that encrypts all of your files, emails and instant messaging traffic using the Tor network and can just plug in and then be removed after use.
Paranoia rating: XXXX
If after all of these measures you still think your privacy isn't fully protected, you might want to consult a higher source by reading The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, by Kevin D. Mitnick. He was once a hacker, but has been a long-time security consultant and public speaker on issues of security.
Posted in Tor Browser
Comments Off on Online privacy protection – Choice – CHOICE
Bitcoin splits as new currency takes off – BBC News
Posted: at 8:56 am
BBC News | Bitcoin splits as new currency takes off BBC News A new version of Bitcoin has been mined for the first time in the crypto-currency's history. Bitcoin Cash is the result of months of debate and development over how the currency would continue to evolve. Fears of large swings in the value of Bitcoin ... New digital currency 'bitcoin cash' rallies nearly 200% following blockchain split Bitcoin tumbles as 'split' takes effect; Ether rebounds Bitcoin splits into two as transaction volumes increase |
Read more here:
Bitcoin splits as new currency takes off - BBC News
Posted in Bitcoin
Comments Off on Bitcoin splits as new currency takes off – BBC News
Bitcoin split in two, here’s what that means – CNNMoney
Posted: at 8:56 am
After ongoing debates over how to scale the digital currency called bitcoin, some people have decided to make an entirely new currency called Bitcoin Cash.
It's a bit complicated for those who aren't in the bitcoin weeds. Essentially, political, technological, and ideological debates about growing bitcoin have come to a head. And some say that an entirely new currency called Bitcoin Cash could help scale bitcoin and bring it to the masses.
"The course of the summer has been a battle between competing visions," said Zaki Manain, an independent cryptocurrency expert. This week the competition is playing out.
In order for bitcoin to become a simple global payment system for anyone to use, it needs to get over its growing pains. For some, the solution to that is to make a whole new currency using similar software.
So what does that mean?
Let's start with why scaling bitcoin is tough.
Bitcoin is built on something called a blockchain. The bitcoin blockchain is a public ledger containing all the transaction data from anyone who uses bitcoin. Transactions are added to "blocks" or the links of code that make up the chain, and each transaction must be recorded on a block. But these blocks are full, and it is slowing transactions way down.
Currently, there are an average of about 1,700 transactions that can be saved per bitcoin block, at about three transactions per second, Manain said. That's not very much. (Visa, for example, handles thousands of transactions every second.)
Because the bitcoin blockchain is becoming too congested, someone could pay for something with bitcoin, but it wouldn't be approved for hours.
Related: What is bitcoin?
The bitcoin community tried to solve this problem by implementing a rule change to its software. Called "Segregated Witness," the rule change would let people put more transactions on each block. This, in technical terms, is called a "soft fork," and would not result in an entirely new cryptocurrency. The new rule is supposed be enacted this month.
For some, this was not enough. That's where Bitcoin Cash comes in.
Bitcoin Cash
The creation of Bitcoin Cash is what is called a "hard fork." The creators are releasing a completely new software that allows for eight times the number of transactions per block. This means Bitcoin Cash could process transactions faster.
Bitcoin Cash is not worth the same as bitcoin. As of this writing, a unit of Bitcoin Cash is valued around $240, but one Bitcoin is worth more than $2,700.
Like bitcoin, Bitcoin Cash relies on the community. It will only be successful if people decide en masse to create the blocks for the Bitcoin Cash blockchain. The first block was created Tuesday afternoon EST.
What it means for consumers and businesses
Anyone who owns bitcoin will also own the same number of Bitcoin Cash units. However, not all bitcoin exchanges (where people store their bitcoin) will accept Bitcoin Cash, and that could potentially hinder the widespread adoption of the new digital currency.
And in order for Bitcoin Cash to be used for mainstream transactions like buying coffee, businesses will have to accept it, regardless of whether they already accept bitcoin or not.
"This will be informative for how we deal with these systems in the future," Manain said. "Without a doubt this is going to be a blueprint, and we are going to learn a lot from this process."
CNNMoney (San Francisco) First published August 1, 2017: 2:09 PM ET
Continued here:
Bitcoin split in two, here's what that means - CNNMoney
Posted in Bitcoin
Comments Off on Bitcoin split in two, here’s what that means – CNNMoney