Category: Surveillance


Police Shooting Of Pre-Teen In Cleveland Caught On Surveillance Video That Contradicts Cops Claims

” Last week police in Cleveland shot and killed12-year-old Tamir Rice, claiming the boy tried to pull a (fake) gun out of his pants when ordered to put his hands up. The interaction was instigated by a 911 caller who said he saw someone with what was a “probably fake” gun.

  Now surveillance video appears to contradict police claims, as it shows the police officer shooting Rice immediately after getting out of a moving patrol car.

  There could be more than 300 million (real) guns in America, and an infinitesimally small proportion are used to commit crimes. Politically expedient fearmongering over guns, however, can lead to frivolous 911 calls that, in combination with trigger-happy yet largely immune cops, can be fatal. “

Reason

About these ads

Courtesy Of Rebel Z & The Free Thought Project

 

 

Ferguson Livestream

 

 

 

 

    While the live feed is offline for the moment there are hours of first person video available for viewing at Ustream and we are sure that Rebel Z will be back on line with live feeds very soon so stay tuned .

 

 

 

 

 

 

 

 

 

Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer

 

 

Regin-Architecture

 

 

” It was the spring of 2011 when the European Commission discovered it had been hacked. The intrusion into the EU’s legislative body was sophisticated and widespread and used a zero-day exploit to get in. Once the attackers established a stronghold on the network, they were in for the long haul. They scouted the network architecture for additional victims and covered their tracks well. Eventually, they infected numerous systems belonging to the European Commission and the European Council before being discovered.

  Two years later another big target was hacked. This time it was Belgacom, the partly state-owned Belgian telecom. In this case, too, the attack was sophisticated and complex. According to published news reports and documents leaked by Edward Snowden, the attackers targeted system administrators working for Belgacom and used their credentials to gain access to routers controlling the telecom’s cellular network. Belgacom publicly acknowledged the hack, but has never provided details about the breach.

  Then five months after that announcement, news of another high-profile breach emerged—this one another sophisticated hack targeting prominent Belgian cryptographer Jean-Jacques Quisquater. “

 

 

 

 

 

” Now it appears that security researchers have found the massive digital spy tool used in all three attacks. Dubbed “Regin” by Microsoft, more than a hundred victims have been found to date, but there are likely many others still unknown. That’s because the espionage tool—a malicious platform capable of taking over entire networks and infrastructures—has been around since at least 2008, possibly even earlier, and is built to remain stealth on a system for years.

  The threat has been known since at least 2011, around the time the EU was hacked and some of the attack files made their way to Microsoft, who added detection for the component to its security software. Researchers with Kaspersky Lab only began tracking the threat in 2012, collecting bits and pieces of the massive threat. Symantec began investigating it in 2013 after some of its customers were infected. Putting together information from each, it’s clear the platform is highly complex and modulated and can be customized with a wide range of capabilities depending on the target and the attackers’ needs. Researchers have found 50 payloads so far for stealing files and other data, but have evidence that still more exist.

“ It’s a threat that everyone has detected for some time, but no one has exposed [until now],” says Eric Chien, technical director of Symantec’s Security Technology and Response division.

  The researchers have no doubt that Regin is a nation-state tool and are calling it the most sophisticated espionage machine uncovered to date—more complex even than the massive Flame platform, uncovered by Kaspersky and Symantec in 2012 and crafted by the same team who created Stuxnet. “

 

The whole story may be read at Wired

 

 

 

 

 

 

 

 

 

Local Judge Unseals Hundreds Of Highly Secret Cell Tracking Court Records

 

 

 

 

” A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device.

  According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used.

  The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time.

  Relatively little is known about precisely how stingrays are used by law enforcement agencies nationwide, although more and more documents have surfaced showing how they’ve been purchased and used in limited instances. Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, security researcher Kristin Paget famously demonstrated a homemade device built for just $1,500.

  Worse still, local cops have lied to courts (at the direction of the United States Marshals Service) about the use of such technology. Not only can stingrays be used to determine a phone’s location, but they can also intercept calls and text messages. While they do target specific phones, they also sweep up cell data of innocents nearby who have no idea that such data collection is taking place. “

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

Justice Department Defends US Marshals’ Airborne Cell Tower Spoofers; Refuses To Acknowledge Program Exists

 

 

 

 

 

 

” The Justice Department has been summoned to say a few words in defense of the US Marshals’ Cessna-mounted cell tower spoofers. And while it tried to leave a lot unsaid, it actually said quite a bit.

  The Justice Department, without formally acknowledging the existence of the program, defended the legality of the operation by the U.S. Marshals Service, saying the agency doesn’t maintain a database of everyday Americans’ cellphones.

  Because America’s criminal element is forever only moments away from permanently escaping the grasp of law enforcement, the DOJ has refused to confirm or deny the existence of technology everyone already knows exists — IMSI catchers and single-engine aircraft. The DOJ’s caginess is commendable. I’m sorry, I mean ridiculous. Here’s the same official further protecting and defending The Program That Dare Not Confirm Its Existence, using statements that indicate the program exposed by the Wall Street Journal not only exists, but functions pretty much as described.

  A Justice Department official on Friday refused to confirm or deny the existence of such a program, because doing so would allow criminals to better evade law enforcement. But the official said it would be “utterly false’’ to conflate the law-enforcement program with the collection of bulk telephone records by the National Security Agency, a controversial program already being challenged in the courts and by some members of Congress.

  No one’s conflating the feds’ airborne ‘Stingray’ with the NSA’s ongoing bulk phone records collections. All people have done is note that surveillance technology of this sort has the ability to collect (and store) millions of unrelated phone records in a very short period of time. “

 

Read the rest at Techdirt

 

 

 

 

 

 

 

 

 

Mt Martha Woman Snapped Sunbaking In G-String By Real Estate Drone

 

 

 

” A BOARD showing a G-string-clad woman has been removed after she became the accidental attraction in a real estate advertising campaign for a house sale in Mt Martha.

  An ambitious agent enlisted a drone to take an aerial photograph of the property, which includes a sweeping image of the beach.”

 

 

 

 

 

 

” But the picture also captured small business owner Mandy Lingard, a mother of three and grandmother of one, sunbaking topless in the privacy of her back yard.

  The image, which includes Ms Lingard lying face down wearing just a G-string, was on the display advertising board outside her neighbour’s house before being removed today.

“I heard a noise and then I saw this odd thing flying around and thought it was a kid’s toy. It hovered around and luckily I was face down at the time,” Ms Lingard said.”

 

 

Read more at Perth Now

AT&T Stops Adding Web Tracking Codes On Cellphones

” AT&T Mobility, the nation’s second-largest cellular provider, said Friday it’s no longer attaching hidden Internet tracking codes to data transmitted from its users’ smartphones. The practice made it nearly impossible to shield its subscribers’ identities online.

  The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users’ identities based on their browsing habits.

  Verizon Wireless, the country’s largest mobile firm, said Friday it still uses this type of tracking, known as “super cookies.” Verizon spokeswoman Debra Lewis said business and government customers don’t have the code inserted. There has been no evidence that Sprint and T-Mobile have used such codes.

” As with any program, we’re constantly evaluating, and this is no different,” Lewis said, adding that consumers can ask that their codes not be used for advertising tracking. But that still passes along the codes to websites, even if subscribers say they don’t want their data being used for marketing purposes.

  The tracking codes are part of the latest plan by the cellular industry to keep tabs on users and their devices. While the codes don’t explicitly contain personal information, they’re unique and nonetheless sent to websites alongside personal details that a user may submit voluntarily — like a name or a phone number.

  That means enough data can transform a large chunk of random digits into a digital fingerprint that’s as identifying as a Social Security number. AT&T said Friday its tracker was part of a testing project that’s been phased off of its network.

” This is more like a license plate for your brain,” said Jacob Hoffman-Andrews, a senior staff technologist with the Electronic Frontier Foundation, a civil liberties organization that opposed the practice. “Everything you wonder about, and read, and ask the Internet about gets this header attached to it. And there are ad agencies out there that try to associate that browsing history with anything that identifies you.”

AP News

Americans’ Cellphones Targeted In Secret Spy Program

 

 

 

” The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

  The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

  Planes are equipped with devices–some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. BA, +0.26%  unit that produces them–which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.”

 

Market Watch

 

 

 

 

 

 

 

 

 

5 Must Have Apps For Freedom Lovers

 

 

aclu police tape

 

 

 

 

” The best thing about technology is that it has granted us access of information in our hand held devices. Your smart phone has more computing power than the Apollo spacecraft.  Instead of downloading wallpapers and different applications it is time for your phone to be updated with something more powerful.”

 

 

” 4: Tinfoil for Facebook
 Link: https://play.google.com/store/apps/details?id=com.danvelazco.fbwrapper&hl=en

 
tinfoil for facebook

This free software available on Google Play store for those of us who oppose governments and spying agencies and know that Facebook is one of those platforms where information is easily available and can be taken even if we set up our Facebook with a tight security.

  This is when Daniel Velazco developed Tinfoil, the application runs Facebook’s mobile site in a sort of an incognito type environment, keeping the cookies and tracking applications out thus limiting Facebook to track you. “

 

Read the rest at AnonHQ

 

 

 

 

 

 

 

 

 

House Committee Demands Answers On Truthy Project

 

 

 

 

 

 

” The House Science, Space, and Technology Committee sent a letter to the head of the National Science Foundation (NSF) on Monday, demanding answers about the origins of the nearly $1 million taxpayer-funded project to track “misinformation” on Twitter.

  The Truthy project, being conducted by researchers at Indiana University, is under investigation for targeting political commentary on Twitter. The project monitors “suspicious memes,” “false and misleading ideas,” and “hate speech,” with a goal of one day being able to automatically detect false rumors on the social media platform.

  The web service has been used to track tweets using hashtags such as #tcot (Top Conservatives on Twitter), and was successful in getting accounts associated with conservatives suspended, according to a 2012 book co-authored by the project’s lead researcher, Filippo Menczer, a professor of Informatics and Computer Science at Indiana University.

  Menczer has also said that Truthy monitored tweets using #p2 (Progressive 2.0), but did not discuss any examples of getting liberal accounts suspended in his book.

“ The Committee and taxpayers deserve to know how NSF decided to award a large grant for a project that proposed to develop standards for online political speech and to apply those standards through development of a website that targeted conservative political comments,” wrote Chairman Lamar Smith (R., Texas) in a letter to NSF Director France Cordova. 

“ While some have argued that Truthy could be used to better understand things like disaster communication or to assist law enforcement, instead it appears Truthy focused on examples of ‘false and misleading ideas, hate speech, and subversive propaganda’ communicated by conservative groups,” he said.”

 

    Latecomers can find out more on the “Truthy Project” here and read more about the Congressional investigation here .

 

 

 

 

 

 

 

 

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

” It shouldn’t be so easy to peer into a stranger’s bedroom, much less hundreds of strangers’ bedrooms. But a website has collected the streaming footage from over 73,000 IP cameras whose owners haven’t changed their default passwords. Is this about highlighting an important security problem, or profiting off creepy voyeurism—or both?

  Insecam claims to feature feeds from IP cameras all over the world, including 11,000 in the U.S. alone. A quick browse will pull up parking lots and stores but also living rooms and bedrooms. “This site has been designed in order to show the importance of the security settings,” the site’s about page says. But it’s also clearly running and profiting off ads. “

Gizmodo has more

Rap Sheets, Watchlists And Spy Networks Now Available With Single Click

 

 

 

” Law enforcement officials nationwide now have the ability to search multiple sensitive databases, including spy agency intranets and homeland security suspicious activity reporting – with a single login. 

  The breakthrough in interconnectivity is expected to close information gaps that, among other things, have contributed to the rise in homegrown terrorism and school shootings. 

” Let’s say you have a lone-wolf incident or an active-shooter incident, where you need to be able to securely share information in a timely way. With a single sign-on capability, there is no wrong door,” Kshemendra Paul, program manager for the Information Sharing Environment at the Office of Director of National Intelligence, said during an interview. “If you have an account, you can get to the virtual command center that the fusion center may be using – in a very direct way.” “

 

Read it all at NextGov.com

 

 

 

 

 

 

 

 

 

Watch A Drone Take Off From Another Drone

 

 

 

 

 

 

” In this video, a drone aircraft carrier takes off into the sky with another drone on top of it. That second, more normal airplane drone, then takes off from a runway that is itself already flying. It’s like something straight out of The Avengers, but instead of a fictional platform costing untold billions of dollars, this is a real thing that someone made and flew in their backyard:

  This isn’t the first homemade remote control helicarrier. A hobbyist built one in 2012 but that carrier didn’t also launch drones.

  This working model, made by hobbyists at Flite Test, is less stylized but more functional. The carrier looks like a modified quadcopter, with four rotors balanced two to a side along its rectangular length. It hovers a few feet of the ground, before a very small drone takes flight, dipping a little as it falls off the end before flying around towards the camera. It’s a neat feat, and one that’s probably confined to toy robots for now.

  What’s the likelihood of a human-sized version? Not great without some kind of major innovation. The energy needs for such a craft are tremendous, requiring the same amount of force as that generated by some 70 Space Shuttle Solid Rocket Boosters to lift it into the air. For now, it seems the Navy is content with floating runways instead of flying ones. And when an idea is so expensive that the Pentagon dismisses it, it’s really too expensive. “

 

Thanks to Popular Science

 

 

 

 

 

 

 

 

 

 

 

 

 

USA Today’s Susan Page: Obama Administration Most ‘Dangerous’ To Media In History

 

 

 

 

 

” At some point, a compendium of condemnations against the Obama administration’s record of media transparency (actually, opacity) must be assembled. Notable quotations in this vein come from former New York Times executive editor Jill Abramson, who said, “It is the most secretive White House that I have ever been involved in covering”; New York Times reporter James Risen, who said, “I think Obama hates the press”; and CBS News’s Bob Schieffer, who said, “This administration exercises more control than George W. Bush’s did, and his before that.”

  USA Today Washington Bureau Chief Susan Page has added a sharper edge to this set of knives. Speaking Saturday at a White House Correspondents’ Association (WHCA) seminar, Page called the current White House not only “more restrictive” but also “more dangerous” to the press than any other in history, a clear reference to the Obama administration’s leak investigations and its naming of Fox News’s James Rosen as a possible “co-conspirator” in a violation of the Espionage Act.”

 

 

     Read the entire piece as some in the media are finally coming to rue the “Frankenstein’s monster” of irrelevancy that their own slavish devotion to Obama’s rise and continued success re-election has given birth to .

 

 

 

    The sycophants are finally getting a feel of the same bite on the ass that we , the public , have been enduring these past six years .  The irony of the media , or parts of it anyway , finally coming to terms with their own self-destruction would be laughable if not for the terrible price this whole country has paid to see it come about .

Creepy Clown Sightings Go Nationwide

 

 

 

 

 

 

” The rash of creepy clown sightings in California appears to have spread nationwide, with reported en-clown-ters in Florida, Indiana and New Mexico.

  The Wasco Clown, a California photography project by a husband-and-wife team who said they wish to remain anonymous, appears to have inspired copycats that have been photographed and videotaped in Albuquerque, N.M.; Fishers, Ind.; and Jacksonville, Fla.”

 

 

 

 

 

 

” Jacksonville residents said people dressed in creepy clown costumes have been appearing in security camera footage. One recording shows a clown walking up to a resident’s porch, tearing apart a pumpkin and staring directly into the camera before walking away.”

 

UPI 

 

 

 

 

 

 

 

 

 

 

With This Tiny Box, You Can Anonymize Everything You Do Online

 

 

 

 

 

 

” No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

  Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

 

Wired has more

 

 

 

 

 

 

 

 

 

 

 

 

This Is How The Feds Illegally Obtain Evidence Of A Crime And Lie About It In Court

 

 

 

” The president continues to dispatch his National Security Agency (NSA) spies as if he were a law unto himself, and Congress—which is also being spied upon—has done nothing to protect the right to privacy that the Fourth Amendment was written to ensure. Congress has taken an oath to uphold the Constitution, yet it has failed miserably to do so. But the spying is now so entrenched in government that a sinister and largely unnoticed problem lurks beneath the surface.

  NSA documents released by Edward Snowden show that the feds seriously deceived Congress and the courts in an effort to spy upon all of us and to use the gathered materials in criminal prosecutions, even though they told federal judges they would not. Among the more nefarious procedures the feds have engaged in is something called “parallel reconstruction.” This procedure seeks to hide the true and original source of information about a criminal defendant when it was obtained unlawfully.

  Thus, in order to maintain the facade of spying only for domestic intelligence purposes, and to appear faithful to public and secret promises (the FISA court only sits in secret) that any evidence of criminal behavior inadvertently discovered by NSA spies will not be used in criminal prosecutions, and so as to keep the mechanisms of domestic spying hidden from non-FISA federal judges who are more likely to apply normative interpretations of the Fourth Amendment than their FISA court colleagues, the NSA and the DOJ began the process of parallel reconstruction.

  Parallel reconstruction consists largely of the creation of a false beginning—an untrue one—of the acquisition of evidence. This, of course, is criminal. Lawyers and agents for the NSA and DOJ may no more lawfully lie to federal judges and criminal defense attorneys about the true origins of evidence than may a bank robber who testifies in his own defense claiming to have been at Mass at the time of the robbery.

  While parallel reconstruction is deceptive, unlawful and unconstitutional, I suspect it is but the tip of a dangerous iceberg spawned by the unbridled NSA spying that Bush and Obama have given us. When you mix a lack of fidelity to the plain meaning of the Constitution with a legal fiction, and then add in a drumbeat of fear, enforced secrecy, and billions of unaccounted-for taxpayer dollars, you get a dangerous stew of unintended tyrannical consequences.”

 

Read the whole thing at Reason

 

 

 

 

 

 

 

 

 

 

 

 

How To Delete And Disable Your Google Location History

 

google map 1

 

 

” Google can track your location and show you on Google Maps and Google Earth where you have been recently, which you may find useful, interesting, or invasive. Here’s how to see if you have location history turned on and how to disable it.

  I had location history enabled for Google Maps and didn’t know it. I found it interesting to see which spots Google logged for me over the past week or month, and I don’t plan on disabling the service. It’s nice to know, however, that I can delete portions of my location history or all of it, as well as disable the feature from tracking me in the future.

  To see if you have location history enabled, head to the Google Maps Location history page. Click the gear-icon button to access History settings. Here, you can choose to disable or enable the service.”

 

 

 

 

 

 

” Disabling location history, however, does not remove your past history. If you’d like to erase the locations Google has stored for the past 30 days, head back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map.

  Use the pull-down menu below the calendar on the left to show your history, up to 30 days. If you choose a time period in which Google has tracked your location, you’ll see the points where you’ve been on the map. And below the calendar, you’ll see options to delete your history from the time period you have chosen or to delete all history.”

 

 

CNET has all the details

 

 

 

 

 

 

 

 

 

 

Windows 10 Preview Has A Keylogger To Watch Your Every Move

 

 

 

” This week Microsoft announced the next version of its Operating system, dubbed WIndows 10, providing Windows 10 Technical Preview release under its “Insider Program” in order to collect feedback from users and help shape the final version of the operating system, but something really went WRONG!

Inside Microsoft’s Insider Program you’ll get all the latest Windows preview builds as soon as they’re available. In return, we want to know what you think. You’ll get an easy-to-use app to give us your feedback, which will help guide us along the way.” Microsoft website reads.

  Well, how many of you actually read the “Terms of Service” and “Privacy Policy” documents before downloading the Preview release of Windows 10? I guess none of you, because most computer users have habit of ignoring that lengthy paragraphs and simply click “I Agree” and then “next“, which is not at all a good practise.”
” Do you really know what permissions you have granted to Microsoft by installing Free Windows 10 Technical Preview edition? Of Course, YOU DON’T. Well, guess what, you’ve all but signed away your soul .
 
  If you are unaware of Microsoft’s privacy policy, so now you should pay attention to what the policy says. Microsoft is watching your every move on the latest Windows 10 Technical Preview, Thanks to portions of Microsoft’s privacy policy, which indicates that the technology giant is using keylogger to collect and use users’ data in a variety of astounding ways without the user being aware.”
Hacker News has all the details

“Party At The NSA” (Party In The U.S.A. By Miley Cyrus Parody) By Chocolate Ghost House

 

 

 

 

 

 

This video came out over a year ago but is no less relevant today … HT/LaughRight

New Jersey Man Accused Of Shooting Down Neighbor’s Remote Control Drone

 

 

 

” A New Jersey man was arrested after police say he shot down a neighbor’s remote control drone.

According to investigators, officers with the Lower Township Police Department were called to a home in the 1000 block of Seashore Road on September 26th to investigate the report by a resident that his remote control helicopter (drone) was shot down.

  Investigators say the resident was taking aerial photographs of his friend’s home, which is under construction.

  While doing so, the resident told police he heard several gunshots as he simultaneously lost control of the drone.

  After retrieving the drone, the resident observed multiple holes in it that were consistent with a shotgun blast.”

 

CBS Philly

 

 

 

 

 

 

 

 

 

 

 

FBI Not Happy With Apple & Google’s Encryption Policy

 

 

 

 

” Users might have praised the technology companies for efforts to encrypt their latest devices that would prevent law enforcement agencies’ hands on users’ private data, but the FBI is not at all happy with Apple and Google right now.
 
  The Federal Bureau of Investigation director, James Comey, said Thursday he was “very concerned” over Apple and Google using stronger or full encryption in their Smartphones and Tablets that makes it impossible for law enforcement to collar criminals.
  According to Comey, the Silicon Valley tech giants are “marketing something expressly to allow people to place themselves above the law.”

There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper’s or a terrorist or a criminal’s device,” Comey told reporters.

I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well how come you can’t save this kid,’ ‘How come you can’t do this thing.’” “

Hacker News

The Great Facebook Exodus Begins

 

 

Ello Home Page

 

 

 

 

” A little known independent social network might be having its big moment. As the debate around Facebook’s naming policy rages on, a growing swath of Facebook users appear to be jumping ship into a smaller, social lifeboat of sorts. It’s invite-only, anti-ads, and it’s called Ello.

  Short of Google+—distrusted by many thanks to a similar recently reversed “real name” policy—no single social network could withstand a mass influx of Facebook’s 1.32 billion monthly active users. But if this week’s rumblings are any indication, disenchanted Facebook users could look to smaller, independent social networks like Ello for their next move. 

  After seeing chatter about Ello in my own social circles, I reached out to Paul Budnitz, creator of this buzzy new anti-Facebook. Budnitz is the founder of designer toy maker Kidrobot and also owns and operates Budnitz Bicycles. I explained what I’d observed in my own social circles (my 1,000+ Facebook friends admittedly skew toward LGBTQ identities) to see if users from what some are calling Facebook’s “queer mass exodus” had started showing up on his own social experiment.

Why Ello? And why now? “

 

 

From Ello’s About page:

 

 

” What is Ello?

Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

  We originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

Ad Free

Ello doesn’t sell ads. Nor do we sell data about you to third parties.

  Virtually every other social network is run by advertisers. Behind the scenes they employ armies of ad salesmen and data miners to record every move you make. Data about you is then auctioned off to advertisers and data brokers. You’re the product that’s being bought and sold.

  Collecting and selling your personal data, reading your posts to your friends, and mapping your social connections for profit is both creepy and unethical. Under the guise of offering a “free” service, users pay a high price in intrusive advertising and lack of privacy.

We also think ads are tacky, that they insult our intelligence and that we’re better without them.

Read more about our no-ad policy here.

Support Ello

Ello is completely free to use.

  We occasionally offer special features to our users. If we create a special feature that you really like, you may choose to support Ello by paying a very small amount of money to add that feature to your Ello account.

  You never have to pay anything, and you can keep using Ello forever, for free. By choosing to buy a feature now and then for a very small amount of money you support our work and help us make Ello better and better.

Privacy

  When you use Ello we collect some information related to your visit. This information helps us understand in a general way how people are using Ello, so we can make our social network better.

  Unlike virtually every other social network, on Ello you can opt out of information sharing. Read How Ello Uses Information to learn how.

Join Ello

  Ello is currently invitation-only. To join Ello, you need to know someone that is already on the network. Alternatively, you can request an invitation by visiting the Ello Home Page.”

 

 

 

Read more at The Daily Dot and visit Ello’s site here

 

 

 

 

 

 

 

 

 

 

New ‘Bash’ Software Bug May Pose Bigger Threat Than ‘Heartbleed’

 

 

 

 

” A newly discovered security bug in a widely used piece of Linux software, known as “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts warned on Wednesday.

  Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said.

  The Department of Homeland Security’s United States Computer Emergency Readiness Team, or US-CERT, issued an alert saying the vulnerability affected Unix-based operating systems including Linux and Apple Inc’s (AAPL.O) Mac OS X.

  The “Heartbleed” bug allowed hackers to spy on computers but not take control of them, according to Dan Guido, chief executive of a cybersecurity firm Trail of Bits.”

 

Reuters

 

For those who are interested here are some links to further stories about the newly discovered cyber-threat …

 

The Switchboard: Meet Shell Shock, the security bug experts say is worsethan Heartbleed

Bash Security Bug is Worse than Heartbleed

‘Worse than Heartbleed:’ Shellshock bash bug blasts OS X systems

‘Bigger than Heartbleed’ Shellshock flaw leaves OS X

Worse than Heartbleed? Today’s Bash bug could be

 

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,853 other followers