Dec 10 10:22

New Bill Would Allow British Intelligence to Hack Children’s Toys to Spy on People in Their Homes

The draft Investigatory Powers Bill currently being considered there would allow British intelligence agencies to take over children’s toys and spy on people with them. From inside their own homes. The bill would also force Internet providers to assist in the “legal” hackings.

Dec 10 10:08


I’ve covered in detail how the U.S. establishment has beenaggressively pushing against the American public’s right to private communications, i.e. encryption, ever since the terror attacks in Paris. This push continues unabated, with the latest shots fired earlier today by FBI chief James Comey at a Senate Judiciary Committee hearing.

We learn the following from the Intercept:

FBI Director James Comey on Wednesday called for tech companies currently offering end-to-end encryption to reconsider their business model, and instead adopt encryption techniques that allow them to intercept and turn over communications to law enforcement when necessary.

Comey had previously argued that tech companies could somehow come up with a “solution” that allowed for government access but didn’t weaken security. Tech experts called this a “magic pony” and mocked him for his naivete.

Webmaster's Commentary: 

A short memo to FBI Director Comey, who obviously hasn't gotten the memo: the bad guys and bad countries already have theIR end-to-end encryption fully bullet-proofed.

What it appears you want is to spy on every electronic communication every American individual or company creates, no matter how innocent that communication might be.

Smart people already understand to keep their business and personal communications as vanilla as humanly possibly, with nothing that could possibly be seen as "suspicious" in any way.

So, sir, I say directly to you, aAnd you can shout this from the rooftops, should you so choose: I am a Methodist, a Christian pacifist who believes, passionately, in good faith negotiations as the best possible way to resolve geopolitical tensions.

I believe in logic, and not "magical thinking", so I cannot be cowed by a governmental narrative which tries to bend the facts of an issue, or outright lie about it.

I would never would advocate violence, because that only begets more violence.


Dec 10 09:50

Mysterious hackers attempting to bring down entire internet by DDoS-ing critical servers

Mysterious hackers are yet again trying to bring down the entire internet by bombarding crucial servers that support it with a gigantic, sustained distributed denial of service (DDoS) attack, which has caused webpages to load slowly in some locations.

There are 13 internet root name servers in the world that run the internet, and these servers are responsible for helping your web browser to locate top-level domains such as .com, .org, .net or any country-specific top level domains like .uk, .fr, .sg, .de, .ae and .cn. The servers function as a sort of internet address book and they make up what is known as the domain name system (DNS) system.

Webmaster's Commentary: 

In the weeks before 9-11 the FBI shut down the websites of Muslim charities in the US so that nobody could post doubts about the official story of the eeeeeevil Muslims who destroyed the World Trade Towers. Today the problem is much greater if the US is planning a major false flag. They have to shut down the entire Independent Media so there is no questioning of the official narrative (which will include blaming the crash of the internet on the designated patsy). You may want to write this next part down. Should DNS go down, you can still reach What Really Happened by typing into the address bar of your browser.

Dec 10 09:04

'Legacy' Wordpress blog site of The Independent serving malware

The Independent has become the latest big-name publisher to serve malware.

Trend Micro is warning that the UK news site's Wordpress-based blog section has been compromised.

The company says the attack seems to have begun on November 21, with a compromised page serving the Angler exploit kit, taking advantage of visitors with old Flash version to hit them with the Cryptesla 2.2.0 ransomware.

Dec 10 08:44

Ron Paul - Internet, RIP?

The adoption of these FCC rules on the Internet represents the largest regulatory power grab in recent history. The FCC’s newly adopted rule takes the most dynamic means of communication and imposes the regulatory structure designed for public utilities. Federal regulation could also open the door to de facto censorship of ideas perceived as threatening to the political class – ideas like the troops should be brought home, the PATRIOT Act should be repealed, military spending and corporate welfare should be cut, and the Federal Reserve should be audited and ended.

The one bright spot in this otherwise disastrous move is that federal regulations making it more difficult to use the Internet will cause more Americans to join our movement for liberty, peace, and prosperity. The federal government should keep its hands off of the Internet!

Dec 10 08:31

Reality Check: The NSA Hasn’t Actually Stopped Spying on Anybody

Dec 09 16:44

No charges against Colorado students in sexting scandal, says DA

Colorado high school and middle school students accused of exchanging hundreds of naked photos won't face criminal charges, a district attorney announced Wednesday, but he warned of more severe consequences if it happens again.

Thom LeDoux, the district attorney for the state's 11th Judicial District, said investigators did not find aggravating factors like adults' involvement, the posting of graphic images to the Internet, bullying and related unlawful sexual contact.

And he added that, while the "decision does not condone or excuse the behavior of the individuals involved," authorities wanted to avoid "the inequities in punishing just those that have come forward, have been identified, or have cooperated with the authorities."

Webmaster's Commentary: 

Would you rather have the kids sneaking out to the barn to play "You show me yours and I'll show you mine?" Nobody ever got pregnant or a sexually transmitted disease over a cell phone!

Dec 09 15:49

New Bill Would ALLOW British Intelligence to Hack Children’s Toys to Spy on People in Their Homes

While the police and surveillance state here seemingly gets worse all the time, Britain’s is about to take the Orwellian Nightmare cake.

The draft Investigatory Powers Bill currently being considered there would allow British intelligence agencies to take over children’s toys and spy on people with them. From inside their own homes. The bill would also force Internet providers to assist in the “legal” hackings.

So long as the toy is internet-connected, it could theoretically be remotely hacked.

Dec 09 12:44

Hillary Clinton Urges Silicon Valley to ‘Disrupt’ ISIS

Hillary Clinton said on Sunday that the Islamic State had become “the most effective recruiter in the world” and that the only solution was to engage American technology companies in blocking or taking down militant websites, videos and encrypted communications.

Webmaster's Commentary: 


Dec 09 09:55


Chinese engineers in the northeastern port city of Tianjin have developed the first mind-controlled car.

Dec 09 09:36

This smart car seems to have tattled on its driver

A Florida woman was reportedly arrested and placed into custody last week, after her car implicated her in at least one alleged hit-and-run incident.

You read that right.

Dec 09 09:08

Best Buy discounts Apple Watch: Simple sale or sign of weaker demand?

Best Buy discounts the Apple Watch by $100 in a move that either will bring in more traffic or reflect that interest in the wearable isn't converting to sales.

Webmaster's Commentary: 

Americans have lost their "Discretionary" wealth. Between skyrocketing health care costs, increased taxation, declining wages and salaries, most Americans are struggling just to get by. Yes, the iWatch is cool. But people (like me) are asking, "Is it really something that will be useful?" For most people the answer is, "Not really." Most of the iWatch functions require the presence of an iPhone, and if you have the iPhone, why do you need the iWatch (or the rumored iRing)? It's just one more device to learn how to use, keep charged, and constantly install software patches on! People get tired of that after a while.

Dec 09 07:47

There is no internet censorship in China, says China’s top censor

A senior Chinese official known as the “gatekeeper” of the country’s internet has denied that the country censors online information.

Lu Wei, chief of the State Internet Information Office, said China does not censor but “manages” internet content in Zhejiang on Wednesday.

Dec 09 07:46

While the world is pushing for more surveillance, Germany wants to become encryption site number one and make end-to-end encryption the standard

In November, the Interior Minister of Germany, Thomas De Maizière, signed a charta to strengthen confidential communication online. This charta states that is supports and promotes strong end-to-end encryption. While around the world surveillance measures are on the rise, Germany wants to become 'Encryption Site Number One'.

Dec 08 19:23

The Two Leading Presidential Candidates -- Clinton And Trump -- Are Both Mocking Free Speech On The Internet

You’re going to hear all of the usual complaints, you know, freedom of speech, et cetera. But if we truly are in a war against terrorism and we are truly looking for ways to shut off their funding, shut off the flow of foreign fighters, then we’ve got to shut off their means of communicating. It’s more complicated with some of what they do on encrypted apps, and I’m well aware of that, and that requires even more thinking about how to do it.

Dec 08 17:01

Millions of Internet Explorer users must update, or lose patches

The software giant will no longer update older versions of Internet Explorer, leaving millions without patches or security updates.

Dec 08 16:56

Lenov-lol, a load of Tosh, and what the Dell? More bad holes found in PC makers' bloatware

Lenovo laptops and PCs can be hijacked by visiting a malicious website – and Dell and Toshiba machines suffer vulnerabilities, too, we're told.

If you're running the Lenovo Solution Center bundled with Lenovo gear, and you browse by an evil webpage, scripts on that page can run code with full system privileges on your computer, allowing them to install malware, spy on you, and cause other havoc. Any programs or software nasties already on your machine can exploit Lenovo Solution Center to gain admin access, and therefore full control, without you lifting a finger.

Dec 08 15:37

Trump Calls for Internet Restrictions to Stop ISIS Recruiting Efforts

How this could be technically feasible, or how it could be done exclusively for terrorists, is not clear. And in any case, don’t we already have the NSA’s sprawling surveillance apparatus watching and recording everything we do?

Dec 08 13:16


Blue Collar jobs may have been disappearing rapidly as robots and other technological advances have rendered workers redundant, but that’s nothing compared to what’s going to happen to white collar jobs predicts real estate titan Jeff Greene, per Forbes:

Dec 08 11:28


Erdogan thinks banning my blog in Turkey will prevent Turks to reach my toons, he can think again! More toons to come!

Webmaster's Commentary: 

I wonder if WRH is banned in Turkey!

Dec 08 11:27


Incitement does indeed pose a threat to the future of Israelis and Palestinians. But it is to be found in the falsehoods promoted by Netanyahu and his ministers, not the bitter truths being posted on YouTube.

Dec 08 11:03

GWX Control Panel (formerly GWX Stopper)

This is a free tool that can remove and disable the 'Get Windows 10' notification area icon on Windows 7 and Windows 8. Newer versions can also disable 'Upgrade to Windows 10' behavior in the Windows Update control panel. See the user guide at the Ultimate Outsider blog. You can still download GWX Control Panel as a standalone executable if you don't like installers.

Webmaster's Commentary: 

This is the free tool to delete the "Upgrade to Windows 10" Icon and block the forced upgrade. However, as noted below, there are reports that the latest patches to Windows 7 and Windows 8 are now continuously reversing the settings to allow Microsoft to force you to upgrade!

Dec 08 10:57

Windows 7 holdouts: Why diehard users refuse to move to Windows 10

We asked, you answered. From legacy software to pure suspicion, the people speak about why they're staying right where they are, thank you.

Dec 08 10:07

Windows 10 upgrades reportedly appearing as mandatory for some users

Microsoft is reportedly making it harder for Windows 7 and Windows 8.1 users to avoid the upgrade to Windows 10.

Some users now claim that they no longer see an option in the Control Panel to install updates to their current version of Windows. Instead, a message says that the “upgrade to Windows 10 is ready,” and prompts users to “restart your PC to begin the installation.” Another user claims to have seen a countdown timer for installing Windows 10, with an option to reschedule but no way to call off the upgrade entirely.

Webmaster's Commentary: 

Dear Microblorch

You have provided no guarantees that our current Windows 7 or 8 software will work under Windows 10. If you force us to migrate to Windows 10, you force us to upgrade all our software, much of which is now only available on a monthly subscription subject to increase without notice.


This move could seriously wreck not only home users but small businesses whose systems stop working, and I predict there will be a multi-trillion dollar class action lawsuit to sue Microsoft for all the economic damages We The People suffer.


Dec 08 10:04

Donald Trump wants to close up the Internet, saying "We have to go see Bill Gates,” to better understand the Internet and then possibly “close it up.”“We’re losing a lot of people because of the Internet.”

Hours after Donald Trump suggested the U.S. ban Muslims from entering the United States, the leading Republican presidential candidate said America should also consider “closing the Internet up in some way” to fight Islamic State terrorists in cyberspace.

Dec 08 09:48

Microsoft prepares for massive Windows 10 upgrade strategy

Microsoft has been preparing Windows 7 and Windows 8.1 PCs for a more aggressive Windows 10 upgrade strategy that the company will kick off shortly, according to the developer of a tool that blocks such upgrades.

“Over Thanksgiving weekend I started getting reports that the Windows Update ‘AllowOSUpgrade’ setting was getting flipped back on on a number of peoples’ PCs, and it keeps re-setting itself at least once a day if they switch it back off,” said Josh Mayfield, the software engineer who created GWX Control Panel. The tool was originally designed to make the “Get Windows 10” (hence GWX) applet go away after Microsoft installed it on consumer and small business Windows 7 and 8.1 PCs starting in March, then activated in June.

“This is new behavior, and it does leave your PC vulnerable to unwanted Windows 10 upgrade behavior,” he said.

Dec 08 08:46

Dailymotion hit by malvertising attack as perpetrators ‘up their game'

Malicious adverts spreading malware managed to make their way onto popular French video streaming site Dailymotion. The infection involved a rogue ad and JavaScript that ultimately directs surfers to sites harbouring the Angler Exploit Kit (EK).

The practical upshot was that Windows users running out-of-date software, such as older versions of Adobe Flash, would be infected with either the Bedep trojan or ad fraud malware, or maybe both.

Dec 08 08:24

SAMUELSON: Internet a potential ‘weapon of mass destruction’

When it comes to cyberwar and cyber­terrorism, we need to think the unthinkable, says veteran TV journalist Ted Koppel. And for Koppel, the unthinkable is this: Someone hacks into the nation’s electric power grid and causes large parts of it to crash for a prolonged period.

Anyone who has endured a blackout from a storm or mechanical breakdown — probably most Americans — knows how frustrating and infuriating it can be. You lose your lights, refrigeration, communications and sense of control. But two certitudes limit the anger and anxiety: first, outages are usually small geographically; and second, we know that power will be restored in days or weeks.

Not so with a cyberattack, which aims to cripple the system and cause chaos. Lengthy disruptions may be widespread. Then the effects become horrific, as Koppel writes in his new book “Lights Out.”

Webmaster's Commentary: 

Get ready for a virtual 9-11. Now, my understanding is that while the office computers in utilities are connected to the internet, the actual computers running the reactors, turbines, pumps, whatever are isolated to protect them from outside sabotage. That is why the US and Israel had to smuggle STUXNET into the Iranian centrifuge facility on a flash drive. But it makes for a good scare story (and occasional movie script).

Dec 07 15:05

Neutral no more? Court hears case against open internet

Lawyers for regulators and telecom companies have presented their arguments over net neutrality rules before a federal appeals court. With no way to tell which direction the judges will lean, the fate of open internet hangs in the balance.

Dec 07 10:30

Windows' Nemesis: Pre-boot malware pwns payment processors

Cybercrooks targeting payment card data have developed a sophisticated malware that executes before the operating system boots.

Security researchers at FireEye / Mandiant came across the rarely seen so-called bootkit technique during a recent investigation at an organisation in the financial transaction processing industry.

Dec 07 09:04

Study: TV Advertising Falls Globally; Digital Poised to Overtake by End of 2017

For the first time in history, outside of recession years, global television advertising revenue fell year-over-year as digital advertising surged once again. Digital, in fact, should overtake TV by the end of 2017, according to a study released Monday from Magna Global.

In the U.S., digital advertising will surpass TV in 2016.

Dec 07 08:28

State of Surveillance: Police, Privacy and Technology

Dec 06 22:18

Hello (hackable) Barbie

Cybersecurity researchers uncovered a number of major security flaws in systems behind Hello Barbie, an Internet-connected doll that listens to children and uses artificial intelligence to respond. Vulnerabilities in the mobile app and cloud storage used by the doll could have allowed hackers to eavesdrop on even the most intimate of those play sessions, according to a report released Friday by Bluebox Security and independent security researcher Andrew Hay.

Dec 06 18:38

After Paris Attacks, Proposed French Law Would Block Tor and Forbid Free Wi-Fi

After the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network, according to an internal document from the Ministry of Interior seen by French newspaper Le Monde.

Dec 06 12:51

After Paris Attacks, Proposed French Law Would Block Tor and Forbid Free Wi-Fi

After the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network, according to an internal document from the Ministry of Interior seen by French newspaper Le Monde. That document lays out two proposed pieces of legislation, one around the state of emergency, and the other concerning counter-terrorism. In the former, the French government is considering to “Forbid free and shared wi-fi connections” during a state of emergency. This comes from a police opinion included in the document: the reason being that it is apparently difficult to track individuals who use public wi-fi networks.

Dec 06 10:46

After Paris Attacks, Proposed French Law Would Block Tor and Forbid Free Wi-Fi

After the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network, according to an internal document from the Ministry of Interior seen by French newspaper Le Monde.

That document lays out two proposed pieces of legislation, one around the state of emergency, and the other concerning counter-terrorism.

In the former, the French government is considering to “Forbid free and shared wi-fi connections” during a state of emergency. This comes from a police opinion included in the document: the reason being that it is apparently difficult to track individuals who use public wi-fi networks.

The latter piece of legislation, meanwhile, says the government is considering “to block or forbid communications of the Tor network.” The legislation, according to Le Monde, could be presented as early as January 2016.

Dec 06 10:43

After Illegally Censoring Websites For Five Years On Bogus Copyright Charges, US Gov't Quietly 'Returns' Two Domains

One of the craziest stories of outright censorship by the US government isn't getting any attention at all. Five years ago, ICE -- Immigrations and Customs Enforcement -- a part of the Department of Homeland Security, illegally seized a group of domain names, claiming that they were violating copyright law. As we noted soon after this, the affidavit that ICE used to get a court to sign off on the seizures was particularly ridiculous, showing a near total lack of understanding of both the law and how the internet worked.

Webmaster's Commentary: 

"We are the government! We don't HAVE to know what we are doing!"

Dec 06 10:35

Lenov-lol, a load of Tosh, and what the Dell? More bad holes found in PC makers' bloatware

Lenovo laptops and PCs can be hijacked by visiting a malicious website – and Dell and Toshiba machines suffer vulnerabilities, too, we're told.

If you're running the Lenovo Solution Center bundled with Lenovo gear, and you browse by an evil webpage, scripts on that page can run code with full system privileges on your computer, allowing them to install malware, spy on you, and cause other havoc. Any programs or software nasties already on your machine can exploit Lenovo Solution Center to gain admin access, and therefore full control, without you lifting a finger.

Dec 06 08:00

InfoWars article on Sandy Hook book ban scrubbed – even from Google cache!

Webmaster addition. Many of the recent attacks on my server have targeted the free PDF of "Nobody Died at Sandy Hook." Clearly the government does not want you to read this book! So download your own local copy and email it to friends.

Dec 05 11:32

YouTube Police Bans Documentary Exposing Climate Change

Dec 05 10:40

Big Cable’s Sledgehammer Is Coming Down

Why usage-based billing is a threat to the open internet, and what can be done to stop it

Dec 05 07:58

Rogers Media Inc. agrees to pay $200,000 for allegedly violating Canada's anti-spam law

The Canadian Radio-television and Telecommunications Commission (CRTC) announced on Friday that Rogers Media Inc. has paid $200,000 in relation to alleged violations of Canada’s anti-spam legislation (CASL).

Webmaster's Commentary: 

Many of the attacks on the WRH servers came from Roger's Media!

Dec 05 07:44

1st ever anti-spam warrant takes down Toronto botnet server

The CRTC has issued its first warrant under the federal government's anti-spam legislation to take down a Toronto-based malware server in an attempt to disrupt an international network of infected computers.

Webmaster's Commentary: 


Dec 04 09:40

Smart Meters Transmit EMFs and RFs That Cause Non-Thermal Health Effects

By Catherine J. Frompovich

Smart meters are being forced onto homeowners throughout the USA by electric, natural gas and water utility companies. However, informed consent is being denied those customers, who know what EMFs and RFs can do to human health, since utility companies ride roughshod over consumers’ rights to know and customers’ privacy and surveillance issues, which smart meters violate.

Recently in Pennsylvania, the ad hoc consumers group PASMA—Pennsylvania Smart Meter Awareness—issued a Press Release about the scientific and medical proof confirming adverse health effects from electromagnetic frequencies, which smart meters produce and use to operate. Those health effects are called “Non-thermal” health effects from microwave technology...

Dec 04 08:11

Wetherspoon’s hack: pub chain’s website hit by huge cyber attack, personal information and credit card details lost

Wetherspoon’s has been hacked, potentially putting hundreds of thousands of its customers’ information at risk.

The pub company said that 650,000 people might have had their personal details leaked, and that the card details of 100 people had been compromised.

The company said that those credit card details couldn’t be used on their own to steal money. But the stolen personal information will probably be sold on the black market, and the company recommends that customers stay vigilant.

Dec 04 07:54

Domination: Crims steal admin logins, infect sites, drop Cryptowall 4

"The campaign is carried out by installing a cocktail of malware on the compromised PC … which systematically harvests all usable usernames and passwords from the infected system and sends them to a series of control and command servers controlled by the attackers," Zaharia says.

"The Angler exploit kit will then scan for vulnerabilities in popular third party software and in insecure Microsoft Windows processes, if the system hasn’t been updated.

"Once the security holes are identified, Angler will exploit them and force-feed Cryptowall 4.0 into the victim’s system."

Zaharia says the campaign is "extensive" and operates from six bulletproof hosting servers in Ukraine.

Dec 04 00:13

San Bernardino killers erased digital presence day before the attacks

The Muslim husband and wife behind the mass shooting in San Bernardino began erasing their digital footprint a day in advance of the deadly attack, deleting email accounts, disposing of hard drives and smashing their cellphones, according to law enforcement investigators who are treating the probe as a counterterrorism case.

Dec 03 18:15

Newest ransomware pilfers passwords before encrypting gigabytes of data

A new wave of crypto ransomware is hitting Windows users courtesy of poorly secured websites. Those sites are infected with Angler, the off-the-shelf, hack-by-numbers exploit kit that saves professional criminals the hassle of developing their own attack.

The latest round is especially nasty because before encryption, the drive-by attacks first use malware known as Pony to harvest any login credentials stored on the infected computer, according to a blog post published by a firm called Heimdal Security.

Dec 03 16:19

US, China reach agreement on cyber espionage

The United States and China have reached an agreement to expand cooperation on stopping cyber espionage between the two geopolitical rivals.

Dec 03 14:57

Do Not Be Impressed by Mark Zuckerberg’s Phony Generosity

Exact phrasing: the stock, currently worth $45 billion, will be donated “during [he and his wife’s] lives.” He’s 31 and she’s 30, so actuarial tables being what they are, by approximately the year 2065.

If Facebook or the Internet or the earth still exist.

Whoop de doo.

Dec 03 14:57

Britain’s counter-terror database ‘crashes twice a week’ – report

A counter-terror database designed to prevent criminals and extremists from sneaking into Britain breaks down twice a week and could cost £275 million to mend, a report has warned.

Dec 03 14:56

Doctor Winds up in Turkish Court for Posting Facebook Meme Comparing President Erdogan and 'Lord of the Rings' Gollum

The trial will not only include numerous lawyers, and research conducted on whether or not Gollum's character is "good, bad, ugly, or suffering" etc., but the probe also involve everyone from psychologists to behavioral scientists to cinema experts... all because the Turkish president let a Facebook meme with an imaginary character hurt his feelings.

Dec 03 10:22

Porn sites hit by massive malware attack affecting millions of visitors

Hundreds of porn sites have been targeted by criminals using malicious advertising – commonly known as malvertising – to infect visitors' devices with malware. The latest campaign comes after similar attacks in recent months on a number of popular adult websites, including xHamster, RedTube and PornHub.

Malicious adverts were discovered by the US-based security firm Malwarebytes on what it said were moderately popular porn sites attracting millions of visitors each day. The sites included DrTuber, Nuvid, Eroprofile, IcePorn and Xbabe. The adverts are hosted and served by the adult ad network AdXpansion and do not need to be clicked on to potentially affect a visitor to a site.

Dec 03 09:10

Strong Cities Network; DHS; and the SPLC

By Tom DeWeese

Thinking Globally, Acting Locally to Destroy Freedom

On September 29, 2015, Attorney General Loretta Lynch delivered a speech to the United Nations that should be considered one of the most powerful and frightening threats to American freedom ever conceived. Lynch was announcing United States’ support and participation in a new program called the Strong Cities Network...

Dec 03 08:39

No Enemy Needed: US Jammed Its Own Satellites 261 Times This Year Alone

A high-ranking US general confessed that the most dangerous adversary of the United States in the realm of electronic warfare these days just may be… the United States itself.

Webmaster's Commentary: 

So when your cable TV goes black right at the good part of the show you are watching, it may be because some space war trainee zorched the satellite!

Dec 02 19:20

ZIONIST SHILLS get PAID "easy $" for posting comments, tweeting or clicking the LIKE button!!!

Dec 02 07:41

Is YouTube in Cahoots With Israel to Censor Palestinian Videos?

Representatives from video sharing website YouTube and parent company Google have met with a high-ranking Israeli official to discuss ways in which “inflammatory material” can be censored on the web.

Tzipi Hotovely, Deputy Foreign Minister of the Jewish State, met with representatives of Youtube and Google last week to elaborate ways of enhancing cooperation in censoring content that’s “inciting violence and terrorism,” Middle East Monitor reported.

Dec 01 16:47

Nearly 1,000 Clinton emails had classified info

The State Department’s latest release of Hillary Clinton documents brings the total number of Clinton emails known to contain classified material to nearly 1,000.

The department on Monday released its largest batch of emails yet, posting 7,800 pages of the former secretary of state’s communications.

The latest batch contains 328 emails deemed to have classified information. According to the State Department, that brings the total number with classified information to 999.

Dec 01 16:38

GCHQ can hack your systems at will – thanks to 'soft touch' oversight

Documents released by GCHQ to the Investigatory Powers Tribunal suggest the agency may be allowed to hack multiple computers in the UK under single "thematic" or "class" warrants.

Responding to complaints brought by Privacy International and seven global internet and communication service providers, the British spy agency told the tribunal it was applying for bulk hacking warrants from secretaries of state and then deciding internally whether it was necessary and proportionate to hack the individuals targeted.

Dec 01 16:37

Bitcoin cloud miners a '$20m Ponzi scheme – there was no cloud at all'

The US Securities and Exchange Commission (SEC) has filed charges against two bitcoin mining businesses it says operated as illegal Ponzi schemes.

According to a complaint [PDF] the watchdog filed with the US District Court in Delaware, GAW Miners and Zenminer, both controlled by Josh Garza, stand accused of taking money intended for mining operations and using it to pay other investors.

The SEC alleges that the two companies, who billed themselves as cloud computing operations devoted to mining bitcoins, never actually had the hardware necessary to perform the computing tasks associated with cryptocurrency mining.

Dec 01 14:50

Life in the Electronic Concentration Camp: The Surveillance State Is Alive and Well

how do you hide more needles in haystacks? add more hay - some randomly sprayed with metallic paint - and more non-magnetic needles then watch as he system fails under the load of garbage results

Dec 01 12:31

Life in the Electronic Concentration Camp

Having already transformed local police into extensions of the military, the Department of Homeland Security, the Justice Department and the FBI are preparing to turn the nation’s police officers into techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial recognition programs, license plate readers, cell phone Stingray devices and so much more.

Dec 01 12:01

FBI chief is wild card for Clinton

FBI Director James Comey is the pivotal figure in the 2016 presidential race that no one is talking about.

Comey, a Republican appointed by President Obama who enjoys a stellar reputation on both sides of the aisle, is investigating Hillary Clinton’s use of a private email server as secretary of State.

Clinton is the overwhelming favorite to win the Democratic presidential nomination next year and is expected to be a tough candidate for any Republican to face in 2016.

Yet the controversy surrounding her private email account remains an Achilles’ heel.

Webmaster's Commentary: 

Not according to the Washington Post which has already written the obituary for the email scandal.

Dec 01 10:41

FBI can demand web history, phone location data without a warrant

The FBI can use national security letters (NSLs) to force companies to turn over sensitive user data without a warrant, according to filings.

Dec 01 09:14

Italians to spend €150m ... snooping on PS4 jabber

Italian counter-terror agents are to monitor Sony's PlayStation Network for jihadi chatter, according to the nation's justice minister, following alarmingly silly reports that a PS4 was used to coordinate the terrorist attacks in Paris.

Dec 01 08:50

BEX ALERT - Hillary Clinton’s e-mail problems have gone dormant. For now.

On Monday afternoon, the State Department released almost 8,000 e-mails Hillary Clinton sent and received during her time as the nation's top diplomat. You probably didn't notice.

That is a very good thing for the former secretary of state as the first votes of the 2016 presidential campaign grow ever closer.

Webmaster's Commentary: 

Actually, we did notice, no thanks to the corporate media which was focused on other matters (by design). But We The People are still very conerned over Hillary's email server because there is a very important question that needs to be asked, which the corporate media is clearly trying to avoid!

Back in 1996, when Bill Clinton was running for re-election, he authorized the transfer of highly sensitive technology to China. This technology had military applications and allowed China to close the gap in missile performance with the United States. The transfers were opposed and severely criticized by the Defense Department.

At the same time Bill Clinton was transferring this technology to China, huge donations began to pour into his re-election campaign from the US companies allowed to sell the technology to China, and from American citizens of Chinese descent. The fact that they were US citizens allowed them to donate to political campaigns, but it later emerged that they were acting as conduits for cash coming in from Asian sources, including Chinese Intelligence Agencies! The scandal became known as China-gate!

This establishes a history of the Clintons treating US secrets as their own personal property, selling them to raise money for campaigns.

Now then, let us consider a private email server with weak security, at least one known totally open access point, no encryption, and outside the control and monitoring systems of the US government, on which are parked many of the nation's most closely guarded secrets! It is already established that Hillary's email was hacked. One hacker named Guccifer provided copies of emails to Russia Today, which published them. Another hacker is reported to be offering 32,000 of Hillary's emails for the sum of $500,000. Security experts agree that Hillary's server had worse security than the Ashley Madison website!

Now, consider a charitable foundation owned by the Clintons (which actually does very little charitable work). Being a charitable foundation, it is allowed to accept "donations" from foreign sources, and roughly 40% of the cash that has poured into the Clinton Foundation has come from foreign sources. Many of those foreign sources received preferential treatment from Secretary of State Hillary Clinton, sufficient for attorney Larry Klayman to file a RICO lawsuit against the foundation (which as of last report was thrown out of court by a Clinton-appointed judge who refused to recuse himself over the obvious conflict of interest)!

Easy means of delivering secrets. Easy means of accepting payment! And now there is confirmation that Hillary did have a private "off the books" spy network, centered on Sidney Blumenthal, while she was secretary of state!

This is a perfect setup to repeat the 1996 selling of secrets for cash. In other words, a perfect espionage operation, running out the US State Department, with the weak email server providing the secrets and a charitable foundation to accept and launder the payments! Hillary doesn't have to physically steal the files, the way Jonathan Pollard did. Hillary doesn't have to scratch an X on a mailbox, the way Aldrich Ames did. Hillary doesn't have to tape bundles of stolen documents underneath a park bridge, like Robert Hannsen did!

It is time to look past the small scandal of the private email server at what may be a far larger scandal hidden behind it!

And the longer the government and corporate media avoids this question, the more complicit they look!

Dec 01 08:26

How Corporate America keeps huge hacks secret

The backbone of America -- banks, oil and gas suppliers, the energy grid -- is under constant attack by hackers.

But the biggest cyberattacks, the ones that can blow up chemical tanks and burst dams, are kept secret by a law that shields U.S. corporations. They're kept in the dark forever.

Webmaster's Commentary: 

And the NSA cannot find them either!

Dec 01 07:50


In the last 25 years, dolphin-safe labeling of tuna managed to reduce unnecessary annual deaths of the mammals from over 100,000 to only 3,000—an astounding 97% reduction—but the World Trade Organization just effectively nullified this critical program.

Dec 01 07:42

FLASHBACK - CENSORSHIP SHOCK: bans investigative book 'Nobody Died at Sandy Hook' because it disagrees with government version of what happened

In a stunning demonstration of online book burning, has just banned a book because of its contents. The book Nobody Died at Sandy Hook consists of analysis from a dozen contributor authors, and it's edited by Jim Fetzer, Ph.D. The book concludes that Sandy Hook was a staged FEMA drill carried out by the government to push an agenda of nationwide gun control.

Webmaster's Commentary: 

You can download a free copy of the book from THIS LINK. Save a local copy to forward to your friends.




Nov 30 11:48


So, having established the Clintons' record of treating the United States like it is their own personal property, let us look at what is going on today.

The Clintons have set up a corporation called the Clinton Foundation, which presents itself as a charitable foundation. That status is in question as the paperwork to make it a legal 501(c)3 does not seem to exist. Moreover, the Clinton Foundation spends just a tiny fraction of its revenues on any real charities, with Bill and Hillary Clinton being the "charity" that receives most of the money. Portions of the Foundation are operating as cash "pass throughs" while a watchdog on real charities describes the Clinton Foundation as a "slush fund."

Optional Banner: 
WRH Exclusive
Nov 30 11:24

Passports Required For Domestic Travel In 2016, But IRS Can Revoke Passports For Taxes

Think you only need a passport to board an international flight? In 2016, some fliers better have one to fly domestic, which means they had better be paying their taxes. It now looks as though your passport could be cancelled if you owe the IRS. The Real ID Act created a national standard for state-issued IDs. It hits air travel in 2016. Some states initially refused to comply, fearing that the feds would make a national database of citizens. Others cited high administrative costs and a 50% increase in fees for drivers. Most states are OK, but millions in Louisiana, Minnesota, New Hampshire and New York may have to start using a passport to fly domestically.

Nov 30 11:00

7 holiday scams and how to protect yourself

More than half of shoppers (52%) are concerned about identity theft this holiday season, according to a survey of more than 1,000 U.S. consumers by the credit union TransUnion. And they should be: The holiday season is prime time for scammers and identity thieves who hope to cash out as people become preoccupied with gift-buying, festivities and travel.

Here are seven scams and ways you can avoid being suckered:

Webmaster's Commentary: 

And all of them clearly beyond the ability of the NSA to find and stop!

Nov 30 10:22


Drone delivery is coming, and faster than most think. Time Magazine disagrees. Time proclaims Here’s Why Drone Delivery Won’t Be Reality Any Time Soon Time notes the FAA will not have anything to do with autonomous deliveries other than line-of-sight, but I expect regulations will be worked out soon enough. Countries like Canada and the UK are ahead of the US in addressing regulations, and history suggests that such pressure and demand from consumers is all it will take to get the US to catch up.

Nov 30 09:45


The Israeli Deputy Foreign Minister, Member of Knesset Tzipi Hotovely, held meetings this week with representatives of YouTube and Google, to find ways of cooperating to censor Palestinian videos from occupied Palestine, videos she dubbed as “inciting violence and terrorism.”

Israeli daily Maariv said Hotovely will be working with Google and YouTube officials in a joint mechanism that will be in charge of “monitoring and preventing” any publication of materials deemed by Tel Aviv to be “inflammatory.”

Hotovely announced in a Hebrew-only press release that she met with YouTube CEO Susan Wojcicki, and Google’s Director of Public Policy, Jennifer Oztzistzki, at Google’s Silicon Valley Offices.

Nov 30 07:47

UK Internet Providers Call Controversial Surveillance Bill Impractical

Some $265 million is allotted in the legislation to compensate companies for the extra work needed to record and keep that data, but that’s hardly enough to pay the overhead costs, and what it will take to keep the data secure.

“Even if the hardware costs are met up front, which is the established method for cost recovery, the ongoing costs of storing and looking after that data will still have to come out of individual end-user customer price rises,” James Blessing, chair of the Internet Services Providers’ Association, said before British Parliament’s Science and Technology Committee earlier this month.

The costs involved in keeping Internet records are compounded by the security risks involved, as any large trove of personal information, which is very difficult to separate from the metadata the law requires collecting, is an enticing target for hackers.

Nov 30 07:47

Ransomware will target also Medical Devices

Technology has a huge role in our lives, we depend on it even more, including our smartwatch and also our medical device. Unfortunately, we usually forgot that even our medical devices, the ones they help to save lives, are also technological devices that could be affected by many security issues like a normal PC … and hackers can exploit these vulnerabilities!

A report issued by Forrester released some days ago, predict that for 2016 we will start seeing ransomware take advantage of medical devices.

Now imagine that a patient having a pacemaker suddenly receives a message on his phone saying “Want to keep using the pacemaker? “, ” pay us 2 bitcoins”, it may look bizarre, but its probably things that may happen in a near future.

Nov 30 07:03

Judge: Stingrays are “simply too powerful” without adequate oversight

A federal judge in Illinois has recently taken the unusual step of issuing three new stringent requirements for the government when it wants to deploy cell-site simulators. The move aims to protect the Fourth Amendment rights of innocent bystanders against unreasonable search and seizure.

Of course, for now, this order only applies to this one judge in the Northern District of Illinois.

These new stingray requirements come just about a month after the Department of Homeland Security imposed its own warrant requirement, following a similar move by the Department of Justice.

Nov 29 19:16

Israel To Coordinate With Google, YouTube, To Censor Palestinian Videos Of Conflict

Israeli daily Maariv said Hotovely will be working with Google and YouTube officials in a joint mechanism that will be in charge of “monitoring and preventing” any publication of materials deemed by Tel Aviv to be “inflammatory.” Hotovely announced in a Hebrew-only press release that she met with YouTube CEO Susan Wojcicki, and Google’s Director of Public Policy, Jennifer Oztzistzki, at Google’s Silicon Valley Offices.

Nov 28 10:02

Crypto 102

Published on Nov 27, 2015

Crypto 102 - How To Make A Secret - Warning you could be shot for doing this exercise

Nov 28 08:22

Raspberry Pi Zero: the $5 computer

The original Raspberry Pi Model B and its successors put a programmable computer within reach of anyone with $20-35 to spend. Since 2012, millions of people have used a Raspberry Pi to get their first experience of programming, but we still meet people for whom cost remains a barrier to entry. At the start of this year, we began work on an even cheaper Raspberry Pi to help these people take the plunge.
Four fathers!?!??

Nov 27 11:11

China to Unleash Killer Robot Army to Fight Terrorism

By Nicholas West

This warnings are abundant about the rise of "killer robots;" they have spawned an unresolved dialogue at the United Nations, and even the U.S. military is seeking ways to create moral, ethical robots. Such dialogue and warnings might give one the perception that killer robots are not already here. Wrong, they are...

Nov 27 08:26

'Most complex malware ever': Security experts smash system that stole cash from millions

“This is POS malware on steroids. We have been examining POS malware…for at least the last eight years, and we have never seen this level of sophistication in terms of development… [Engineers say] it is the most sophisticated framework they have ever put their hands on,” Steve Ward from iSight told The Register.

The ModPOS malware is “wrapped” in multiple layers of encryption to obfuscate its tracks, so when the malware uploads cypher data to a remote server, it becomes next to impossible to find out exactly what data was stolen.

And it is not only the encryption that makes ModPOS so sophisticated. To fish out holders' personal data at the moment when the credentials pass through an electronic point-of-sale device, such as a cash register, the malware also uses a combination of tricks like ‘key-logging’, ‘network monitoring’ and ‘RAM scraping’, Gizmodo reports.

Nov 27 08:17

Google is attacking alternative news

We've been mentioning this for a several years and now other alternative news producers are feeling it too.

Google/YouTube is selectively "de-monetizing" the channels that feature alternative news.

Here's a channel we admire the "Next News Network" reporting the problem.

The issue is that it costs cold hard cash to produce videos, host them, handle the emails, and deal with never-ending technical problems.

This doesn't even address the fact that while people are doing this work, they can't earn money from other sources. (No one can be in two places at the same time no matter how hard they try.)

Webmaster's Commentary: 

This has been going on quite a while. Google has refused WRH for advertising and monitization ever since our first videos went up. Google is clearly starting to expand that program to other independent media. The fastest way to bring down a dictatorship is to force them to act like one where everybody can see it!

Nov 26 16:04

Penalties Continue For Downing Drones; FAA Seeks Mandatory Registration

By Joe Wright

As hobby drones continue to proliferate across the U.S., the rules about their use remain murky, as do the rules for blasting them out of the sky if you feel personally threatened by one. Since we have had a fair amount of reader support for taking down drones, it’s worthwhile to look at what one might expect if a course of action is taken...

Nov 26 10:34

Human resources: Walmart hired Lockheed Martin to keep tabs on employees

Walmart hired global security giant Lockheed Martin a few years ago to monitor activism in its massive workforce, according to new documents. The defense contractor tracked employees’ social media and reported protest participation to the retail giant.

Lockheed Martin, the world’s largest defense contractor, provided Walmart, the world’s largest retailer, with intelligence-gathering and surveillance services in 2012, according to a lengthy report by Bloomberg Businessweek. The news has emerged just before Black Friday protests by a union-funded group called OUR Walmart, the report claims. Participants demand higher wages and reliable scheduling for Walmart employees.

Webmaster's Commentary: 

Absoflippinglutely unbelievable, but thoroughly predictable.

Nov 26 10:07

Saudi Arabia To Sue Twitter User Who Called Poet's Death Sentence 'ISIS-Like'

Saudi Arabia's justice ministry plans to sue a Twitter user who compared the death sentence handed down on Friday to a Palestinian poet to the punishments meted out by Islamic State, a major government-aligned newspaper reported on Wednesday.

Nov 26 08:32

Sneaky Microsoft renamed its data slurper before sticking it back in Windows 10

“Anonymity is like virginity. You don't get it back once you've lost it,” writes one Register reader on Microsoft’s latest raid on your privacy.

Microsoft pulled a major update for Windows after it blew away the user's privacy settings, allowing app developers and advertisers to glean the user’s identity.

But that’s only part of the story, which gets murkier by the day.

We already knew Windows 10 Threshold deleted third-party data monitoring tools and cleanup tools, including stalwarts like Spybot and CCleaner. It even disabled Cisco’s VPN software. Just a bug, said Microsoft.

Two bugs would be a puzzling coincidence – but something else makes it altogether more troubling.

Nov 26 07:26

Israel meets with Google and YouTube to discuss censoring Palestinian videos

Israel’s Deputy Foreign Minister Tzipi Hotovely has met with representatives of YouTube and Google to discuss ways to cooperate in what she calls the fight against “inciting violence and terrorism”.

Israel’s Maariv newspaper reported yesterday that Hotovely agreed to work with Google and YouTube in order to establish a joint working mechanism to monitor and prevent the publication of “inflammatory material” originating in the Palestinian territories.

Webmaster's Commentary: 

"Just because we are stealing their land, destroying their homes, and killing their children is no reason to let them complain about it to the world!!!" -- Nodding Yahoo

Nov 25 15:18

Hacktivists smash ISIS website with Prozac and Viagra ads

Hackers affiliated with online activist group Anonymous have taken down an Islamic State (IS, formerly ISIS/ISIL) website on the dark web and replaced it with ads for anti-depressant Prozac and erectile dysfunction treatment drug Viagra, with a message urging extremists to calm down.

Nov 25 12:15

AVG defends plans to flog user data as privacy row continues

Security software firm AVG has defended changes in its privacy policy, due to come into effect on Thursday (15 October), allowing it to collect and resell users’ anonymised web browsing and search history.

AVG argues that it has no immediate plans to monetise users’ browsing habits. However, independent security experts remain critical, arguing that the firm is putting user privacy and even trust in security firm more generally at risk.

Nov 25 11:36

FLASHBACK 2014 - The Details About the CIA's Deal With Amazon

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks.

Webmaster's Commentary: 

Well, I guess I know why I am being DOSed from the Amazon IPs! I am up against the varsity! And it probably doesn't help that former White House spokesdrone Jay Carney is now a VP at Amazon. :)

Nov 25 08:33

Perfectly legal ways you can still get Windows 7 cheap (or even free)

Windows 7 is more than six years old. Most of the cheap upgrade offers that were available when it was fresh and new are long gone. But if you prefer the familiar Windows 7 interface (or need it for testing and evaluation) you can still find great deals. Here are all the details you need.

Nov 25 08:25

Second Dell backdoor root cert found

A second root certificate has been found in new Dell laptops days after the first backdoor was revealed.

The DSDTestProvider certificate was first discovered by Laptopmag. It is installed through Dell System Detect into the Trusted Root Certificate Store on new Windows laptops along with the private key.

Dell has been contacted for comment. The Texas tech titan has called the first certificate gaffe an "unintended security vulnerability" in boilerplate media statements.

Carnegie Mellon University CERT says it allows attackers to create trusted certificates and impersonate sites, launch man-in-the-middle attacks, and passive decryption.

Nov 25 08:24

Amazon resets account passwords feared compromised – report appears to be asking some of its customers to reset passwords after a breach of some sort.

The online bazaar apparently sent cryptic emails to some of its account holders warning them that their passwords were blabbed in some way, and therefore have to be changed.

"We recently discovered that your password may have been improperly stored on your device or transmitted to Amazon in a way that could potentially expose it to a third party. We have corrected the issue to prevent this exposure," Amazon is reported to have told customers.

Amazon says it has no evidence that the passwords were abused, and had reset the credentials out of an "abundance of caution."

Webmaster addition: No evidence of abuse? My server has been DOSed repeatedly from IP addresses this week!

Nov 24 09:08

iPad Pro: Apple's tablet is a big fat enterprise failure

No executive is going to lug around this morbidly obese tablet in place of a smaller iPad or a real laptop.

Webmaster's Commentary: 

Plus the iPad Pro can freeze while being recharged, requiring a hard restart.

Nov 24 09:07

How to remove Dell's 'Superfish 2.0' root certificate - permanently

Dell's eDellroot certificate blunder exposes users to a range of malicious attacks but guidance is now available for its permanent removal.

Nov 24 08:57

Dell: How to kill that web security hole we put in your laptops, PCs

Dell has published a guide on how to remove the web security backdoor it installed in its Windows laptops and desktop PCs.

This confirms what we all know by now – that Dell was selling computers with a rather embarrassing hole it in their defenses.

Nov 24 08:56

Superfish 2.0: Dell ships laptops, PCs with huge internet security hole

Root CA certificate opens up folks to banking, shopping snooping, etc

Nov 24 08:55

World's most complex cash register malware plunders millions in US

The world's most complex sales till malware has been discovered ... after it ripped millions of bank cards from US retailers on the eve of post-Thanksgiving shopping frenzies.

The ModPOS malware has pilfered "multiple millions" of debit and credit cards from the unnamed but large retail companies incurring millions of dollars in damages.

The attackers have operated in a low-key, ultra professional manner since late 2013 and has only come to light after weeks of painstaking reverse-engineering efforts by malware experts.

They have kept mum, too. Cybercrime forums are entirely devoid of references to the malware.

"This is POS [point-of-sale] malware on steroids," iSight Partners senior director Steve Ward says.

Nov 24 08:37

Flashback: Hackers seed Amazon cloud with potent denial-of-service bots

Attackers have figured out a new way to get Amazon's cloud service to wage potent denial-of-service attacks on third-party websites—by exploiting security vulnerabilities in an open source search and analytics application known as Elasticsearch.

Nov 24 08:02

Jimmy Wales: "All major internet traffic is going to be encrypted very, very soon"

“A few years back we were in the golden age for spying on the general public,” says Jimmy Wales, founder of Wikipedia. He is giving the keynote address at the IP Expo Europe in London, and it’s clear that he is confident of two things: total internet encryption is coming, and this is a very good thing.

Nov 24 07:49

Dell installs self-signed root certificate on laptops, endangering users' privacy

Dell laptops are coming preloaded with a self-signed root digital certificate that lets attackers spy on traffic to any secure website.

Nov 24 06:40

What's inside a "Hello Barbie" surveillance toy?

Mattel's Hello Barbie has a microphone and a wifi interface, and it transmits the phrases it hears to a central server in order to parse them and formulate a response. Mattel claims that the data isn't being retained or harvested for marketing purposes, and assures parents that they can make Barbie stopping eavesdropping on them at will. But does it work? Somerset Recon has done a teardown on a Hello Barbie, examining its components and dumping its firmware. Part one of their report is online now, and it's a little dry: Hello Barbie has some standard IoT chips -- a sound codec, a wifi card, etc -- but until Somerset posts their analysis of the firmware dump, this is pretty preliminary stuff.

Nov 24 06:09

Debunking the Sandy Hook Debunkers: #5 bans NOBODY DIED AT SANDY HOOK

Webmaster's Commentary: 


James Fetzer's website.

Here is the link to download a PDF of the book Amazon does not want you to see.

Nov 23 16:33

Amazing Prosthetic Hand Can Be Created In 42 Hours And Costs Just $3,000

By Amanda Froelich

From 3D printed wheelchairs to casts that speed healing, the world of prosthetics is exciting. Unfortunately, investing in 3D printed limbs is also expensive, which is why Open Bionics set out to find a way to make a bionic hand quickly and cheaply.

As IFLScience reports, the company recently won the prestigious UK 2015 Dyson Award for its 3D printed artificial limb which can be created in just over 42 hours and costs about $3,000...

Nov 23 15:06

The Post-Paris War on Encryption Is an Opportunistic Attack on Our Civil Liberties

The feds have had it out for encryption for decades, but in the wake of the Paris attacks, the vilification of cryptography - the use of mathematical algorithms and other practices to protect web transactions and emails, "lock up" data at rest on a hard drive, protect the privacy of certain phone calls and more - has reached a dangerous new low.