" nsa Archives - LuxSci FYI Blog: Learn about HIPAA email encryption, secure email encryption, and more
LUXSCI

Posts Tagged ‘nsa’

Kick Your Privacy Up a Notch with Tor

Monday, May 8th, 2017

Online privacy is becoming more important as our lives increasingly migrate to the internet. With government surveillance intensifying, you may have come across the term Tor as a way to protect yourself. So what exactly is it?

The Onion Router (TOR), is an open source project that aims to provide anonymous communication for its users. The underlying technology was initially developed by the United States Naval Research Laboratory in the nineties as a way to protect communications within the intelligence community. Tor has since moved over to the open source community, supported by a range of volunteers, privacy advocacy groups, various US government departments and others.

Tor - The Onin Router

Tor allows web browsing, messaging and chat, as well as access to .onion websites, which are a secretive side of the internet. Unfortunately, Tor cannot give a user complete anonymity, particularly from government level surveillance. This is because these entities have the capability to correlate the traffic that goes into Tor with the traffic that exits. Despite this, it is still a useful tool that can help to enhance privacy in a range of use cases.

Read the rest of this post »

The Latest Leaks From The Shadow Brokers: Where Do We Stand?

Wednesday, April 19th, 2017

The Shadow Brokers have been trickling out leaks since late last year. Their April 8 release was somewhat lackluster, but the exploits released on April 14 had the infosec world on edge. This latest set of tools includes what was initially thought to be a bunch of zero-day exploits, as well as code that seems to enable access to the SWIFT international banking system.

Shadow Brokers Impact as of August 2016.

Read the rest of this post »

Gmail is Always Playing Catch Up

Monday, April 7th, 2014

In case you missed it, Gmail’s “big announcement” last week was that it would:

  1. Only allow secure (over https / SSL) web connections from users to its servers, and
  2. Make sure that all email traveling between its servers over the Internet uses SSL so it can’t be eaves dropped upon.

This is generally a very good thing.   Its always nice when companies catch up to normal standard procedures by improving their policies.  This makes the Internet an incrementally more secure and safe place.

Just be careful not to give them too much credit as this is really a case of playing “catch up” and not doing anything new or special.  

Read the rest of this post »

Why isn’t a Blackberry Secure Enough for Barack Obama?

Thursday, January 22nd, 2009

As you may have heard, Barack Obama is tethered to his Blackberry.  It’s great to have a highly technical President of the United States, but it is really shaking things up.  All of the policies and procedures date back to times before PDAs and smart phones.  Obama is really struggling to cling to the same technical edge in his day-to-day affairs that he has enjoyed to date. But the security team at the Oval Office has other plans.

No Blackberry for Obama!

Instead, he gets what is being dubbed the “BarackBerry” — a high security blackberry replacement.  Why is the Blackberry (and similar devices) such a security concern?

Read the rest of this post »

LUXSCI