Thursday, May 31, 2012

Wednesday, May 30, 2012

Americans, it's time to protect your computers

Apparently Americans don't know how to protect their computers. Either that or they're ignorant of the risks. Don't believe me? Look at the numbers.

If you leave your machine wide open, bad guys will abuse it. They install malware, viruses, and worse on your machine. Your computer will be part of their botnet. Evil things will happen on your computer without your knowledge.

Stop it.

Monday, May 28, 2012

Stuxnet, Duqu, now Flame

If you're anything like me news of Stuxnet and Duqu sent shivers up your spine. These two pieces of malware can only be called "cyber weapons". Sophisticated cyber weapons.

Now comes news of Flame, which a.) is centered in the Middle East especially Iran and b.) appears to be the work of the Stuxnet/Duqu crowd. Here are some of the first reports: #1   #2   #3

This is not good news. Life will never be the same again.

Wednesday, May 23, 2012

Udemy Course Press Release

There's a new course at Udemy, "Introduction to Tor" that covers The Onion Router, how Tor preserves privacy online, and an overview of the Tor network topology.

Here's the press release announcing this free Udemy course on Tor.

Tuesday, May 22, 2012

"An Introduction to Tor", a video talk



This is a talk I gave about Tor, The Onion Router. I discuss how Tor works, the topology, servers (bridges, relays, & exits), and just what Tor does and doesn't do.

I cover some of Tor's weaknesses and vulnerabilities and best practices.

JetCityOrange.com/tor/

Tor & Your Online Privacy



JetCityOrange.com/tor/

Making Music With Condoms!

Condoms as musical instruments! No, really.

Thursday, May 17, 2012

Privacy, protect yours!

JetCityOrange.com/computer-security/

Wuala Offers Free Encrypted Cloud Storage

OK. Click here and get 6GB for free, instead of the usual 5GB, by signing up for Wuala. Safe, secure cloud storage. 256 bit AES secure.

Now read this to see what Alice & Bob can do with Wuala. An encrypted channel. Shared resources in the cloud. Auto-synchronizing computers. Friends and private groups.



Tell me, what would you do with Wuala...

Search Engines That Respect Your Privacy

Unlike Google there really are search engines that respect your privacy. Search engines that don't track, store, and sell your every move online. Try some of the search engines that respect your right to privacy online.

Wednesday, May 16, 2012

Monday, May 14, 2012

Sunday, May 13, 2012

Volunteer to Run a Tor Relay

Tor, The Onion Router, is an anonymizing network that protects your identity and guards your privacy. Use it, or better yet, volunteer to run a Tor relay.

Tuesday, May 08, 2012

Geolocation Is Ratting You Out

Social media + your cell phone = no privacy

Post to Facebook, tweet, or do any one of number of seemingly innocent things and you give yourself up. Online services that use geolocation pinpoint you, probably more than you realize. How? Here's how.

Wednesday, May 02, 2012

Eve is Always Among Us: The Threat of Persistant Monitoring Online

SEATTLE 03may12 - JetCityOrange published a new white paper challenging us to admit that no digital conversation is private and we're being monitored more often than not. "Eve is Always Among Us, persistant montoring of our online traffic" outlines why we have little or no privacy online and why our threat models need to be thrown out.

As more of our life is shared, communicated, published and stored online we all need to take a hard look at how has access to what and why. Just because it's your phone in your pocket full of your data don't think you're the only one with access to all that personal data. On your phone or across wireless networks, nothing about your phone is private and only a knave thinks otherwise. Don't trust your phone.

Before 9/11 only bad guys were deemed worthy of wiretaps and electronic surveillance. The FBI handle domestic affairs, the NSA international, they did't like each other and certainly didn't cooperate. Now it's all about homeland security, the war on terror, and sacrificing privacy for security. In many ways fighting the war on terror makes all of us, American or not, suspects.

The National Security Agency has grown in mission, scope, and influence. Construction of a huge new data center is underway in Bluffdale UT (described by Wired.com ). "Eve is Always Among Us, persistant montoring of our online traffic" discusses what the expanded NSA mission means for all of us, why they're buidling such a large data center in the middle of nowhere, and speculates what they'll do with all the data they're sweeping up.

"Until quite recently, two people assumed they enjoyed a large degree of privacy by default. As our lives have moved online we've given up our privacy. It's time for us to adjust our thinking and behavior in response to our phone calls, email, tweets, and browsing being monitored, analyzed, and stuffed into databases. Databases we don't know about or have control over." says Jerry Whiting, JetCityOrange's publisher. "If you're not vigilant, if you don't act now to protect yourself, you'll forfeit control over your digital life. Learn and adapt."

"Eve is Always Among Us, persistant montoring of our online traffic" is available online: www.JetCityOrange.com/computer-security/eve-among-us.html This is one of several computer security related white papers covering topics like Tor and hiding computers from others.

JetCityOrange is a Seattle-based website. It features a number of resources including updates about computer security, hacking'n'cracking, encryption, cryptography, etc.: www.JetCityOrange.com/computer-security/ & www.JetCityOrange.com/computer-security/feed.xml

=30=