As time goes on I become increasingly frustrated by email. There are simply too many downsides to traditional e-mail for me to continue its use long-term. There currently exists a superior alternative. All that’s left is for individuals to start boycotting e-mail and make the switch. Unfortunately, as we’re all heavily vested in e-mail, it’s going to take some pioneers.
Archive for the ‘Online Security’ Category
If you’re a frequenter of the Bitcoin forums and chatrooms as I am you’ve likely heard of Bitmessage. It’s a new p2p distributed mail server that is completely free and open source software. I had first heard about it a few months ago but paid little attention. In the free software movement there are tons of ideas that come and go and are soon forgotten. Only after something stays around a while or a friend gets into it am I likely to give a project a closer examination. That happened last night when fellow bitcoiner and free stater Joshua Harvey announced that he had installed the software and was impressed.
After reading the Bitmessage wiki I, too, began to get excited. The software is very similar to a type of email protocol that I had found totally revolutionary in the past called i2p-Bote. The problem with i2p-Bote, however, is that it only existed on the i2p network, a very cumbersome onion network that isn’t yet accessible to non-techies. What Bitmessage has done is allow easy access to ground-breaking email software to the technophobe.
What is so revolutionary, though, about Bitmessage? It provides easy message encryption by default. It anonymizes both the sender and recipient of messages. It fights spam like no other, and because of its distributed nature it cannot be shut down. In other words the spam ridden, DDoS vulnerable, corporate data mined, NSA spyware called e-mail is eventually going to get replaced by Bitmessage. So, the next time I get a “Constitutionalist” in my face complaining about how the government is reading all of our emails, I’m going to direct them to Bitmessage and tell them to put up or shut up.
But enough from me. Here’s a nice video that will better explain what Bitmessage is. Enjoy!
Finally a well written and detailed expose on the vulnerabilities of laptop webcams! I’ve had a strong hunch for a long time that spying on laptop users is not only an easy feat, but commonplace. Of course, my biggest enemy is the state, mainly because with the amount of resources they wield, even daunting tasks can usually be overcome. But by the looks of it, spying on laptop users isn’t daunting at all.
It’s no secret that strong encryption is virtually uncrackable and there’s no denying its growing popularity. Creating encrypted volumes with TrueCrypt or Gnome Disk Utility is great for securing portable USB drives and sensitive material within a file system. But that doesn’t solve a major security problem. On most consumer computers the majority of personal information about its users’ life and habits is stored completely in the clear. Even with a login and password, when unencrypted computers or hard drives are stolen, presumably all of the data stored within it is very easily accessible through any number of means. Laptops are sweet targets for burglars. Hard drives are espionage gold to dumpster divers. Beyond that, computer systems are very frequently targeted during police and military raids of all sorts.
In the open-source movement, there is a split between those who emphasize “free as in cheap” and those who emphasize “free as in freedom.” But consumers demand freedom and privacy just as they do utility and affordability. Were that not the case, there would be no such things as drapes or pants.
Rather than getting into reasons why encrypting online communication is good practice, I’ll leave it at this: The technology is readily available and extremely easy to use.
In the past I’ve been told, and was convinced, that it is not possible to encrypt instant messaging(IM). Recently, however, I found out that it is possible and quite simple to implement. By no means am I a security expert, but I am always excited to share the learning experiences I gain from others I consider to be more knowledgeable than myself. If you have alternatives, relevant information, resources, or input on this topic, please share as well. (more…)
It was kind of strange to see the news stories last week on Apple tracking all of their iPad users. The story came in just as I was looking at notes for this article on Apple tracking Mac users.
MACS CALL HOME
There is a little-known feature built into Mac operating systems called Location Services. This feature provides a way for websites to locate you (if you let it). Interestingly enough, it also calls home to Apple a few times a day… probably to pinpoint your machine on an Internet map. We’re not sure how far back this feature goes, but it is for sure in Mac OS 10.5 and 10.6.
The good news is that there is an option for shutting it off in version 10.6. If you have an earlier version, I’ll suggest that you use a nifty little program called LittleSnitch to prevent unauthorized outgoing connections.
TURNING IT OFF
As I say, the phone-home feature can be turned off under Mac OS 10.6, and here’s how you do it:
1. Click on the Apple symbol at the top-left of your screen.
2. Choose System Preferences
3. Choose Security
4. Choose General
5. Choose Disable Location Services
Once you do that, your machine will stop calling home to Cupertino. But, as I say, you should install LittleSnitch to be sure that neither Apple nor others will abuse you that way.
One of the programs I recommend for the protection of your personal computer is TrueCrypt. It is well-designed, easy to use, and free. (But I’ll have more to say about “free” below.) TrueCrypt encrypts your hard drive, but does so in a way that provides both maximum usage and maximum functionality.
Daily Anarchist has gone through some behind-the-scenes changes in the last few days I would like to share with everybody. Keep in mind that all of this has been done by a total technophobe noob and that you too can take control of your online existence.
I think that most Internet users with an interest in privacy have heard of Tor, the system of what is called onion routing.
Onion routing is a technique for repeatedly encrypting and forwarding data through several network nodes called onion routers. Each router removes a layer of encryption to uncover routing instructions, then sends the message to the next router where this is repeated. Intermediary nodes are prevented from knowing the origin, destination, and contents of the message. (Exit nodes know both the destination and the contents.)
So, Tor is a very clever technology, and it is free, so why isn’t it used more? And why then, should anyone pay for an anonymity service?
Hawaii Motorcycle Rentals