(EFF) — This summer we proudly unveiled EFF’s fifth limited edition member t-shirt to DEF CON 22 attendees at the annual hacker conference in Las Vegas. Secretive organizations scheming global domination and watching everything you do may not be very far fetched, but we’ve turned that concept on its head with a digital freedom society-themed motif created by EFF Senior Designer Hugh D’Andrade. Together we are growing our own conspiracy to defend privacy and free expression for all. Hidden within the rich mystic symbolism of the crossing keypair, ethernet cable crest, lockpicks, and anti-surveillance eye is a secret puzzle for you to decipher.
The internet has grown so large that older border routers, (old hardware at the backbone that powers the web), may reach a breaking point causing outages. These backbone routers maintain a routing table (a map) of the entire internet which use a technique called Border Gateway Protocol (BGP). This protocol decides which router it will forward your data to and finds the best route to its destination. When a limit of 512K entries is reached (and it has), many routers crash and ignore new routes causing the outages.
Taking photographs of things that are plainly visible from public spaces is a constitutional right – and that includes federal buildings, transportation facilities, and police and other government officials carrying out their duties.
Amnesty International has deployed a human rights team for the 1st time ever in the US to #Ferguson, Missouri to observe police activity and also train local activists “on methods of non-violent protest”.
During a press conference on Monday morning, Julian Assange stated that he will leave the Ecuadorian Embassy…”soon”. He does not intend to hand himself over to British police who have stood guard 24 hours a day outside the Embassy and seeks safe passage.
Missouri’s Governor Jay Nixon has signed Executive Order 14-09 to authorize the National Guard to deploy into Ferguson, Missouri. The decision comes after protesters started throwing Molotov cocktails, shot one protester and fired at police.
You can get hacked just by watching a cat video on YouTube. Companies such as ‘Hacking Team’ accomplishes this by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team targets a user, waits for that user to watch a YouTube clip and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge.
Apple has begun to store personal data on servers in China. Apple claims it has done this in an effort to improve the speed and reliability of its iCloud service. The data will be kept on servers provided by China Telecom CorpLtd, a major wireless carrier. Apple has stated that all data will be encrypted and that China Telecom has no access to personal content.
[Militarized perspective] The militarization of the non-military police force from a military perspective.
It’s hard to contain my anger while watching my Twitter feed roll through tweets and pictures of abuses of authority and crimes against our nation’s core values. Mostly because the people I see committing these crimes are wearing the same uniforms and gear I used to wear as an Infantryman while serving in Iraq and back stateside. The only difference being that they’re not soldiers. They didn’t go through fifteen weeks of training; multiple stints at JRTC (Joint Readiness Training Center); mandatory daily physical training; hours of physical exhaustion;, the discipline gained from these activities; and multiple hours of FM (Field Manual), TM (Training Manual), and AR (Army Regulations) training and familiarization – and the successive “smoking’s” from not completing these activities properly. They didn’t go through the daily platoon bonding that comes along with these sort of activities either. And they most assuredly didn’t go through a deployment to Iraq together.