Tagged: freedom Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 7:07 am on 7th March 2019 Permalink | Reply
    Tags: adblocker plugins, autodelete cookies plugin for firefox, Bloody vikings, decrease productivity, freedom, , plugin to produce misleading browser data, plugins for firefox, , protection against deanonyimzation of browser data, protection against surveillance while browsing, secure internet browsing, , temporary email address plugin, tracker blockers   

    12 Browser Plugins That Enhance Your Privacy And Security 


    NOSCRIPT
    “Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks, “Spectre”, “Meltdown” and other JavaScript exploits.”
    This plugin disables scripts by default, and lets you choose which ones to activate. This feature is crucial for browsing the web securely. Webpages with javascript are like computer programs– opening random webpages with javascript is almost like installing random software without an antivirus.
    https://addons.mozilla.org/en-US/firefox/addon/noscript/
    SCRIPTSAFE
    This is an alternative to NoScript that is also available for Chrome.
    https://addons.mozilla.org/en-US/firefox/addon/script-safe/
    UMATRIX
    This is like a hardcore version of NoScript. By default it blocks all sorts of content, and only allows what you enable. You can choose the exact types of content to block and the exact web addresses, all displayed on a handy grid. Highly customizable.
    https://addons.mozilla.org/en-US/firefox/addon/umatrix/
    PRIVACY BADGER
    This plugin blocks trackers and also learns to detect new trackers, unlike other adblockers which only block content from a list.
    https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/
    UBLOCK ORIGIN
    This plugin blocks ads, trackers, and malicious content. Highly configurable. May not work optimally in combination with Privacy Badger.
    https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
    HTTPS EVERYWHERE
    This plugin ensures that webpages are always loaded with secure (encrypted) connections when possible. This feature is also an option in Ublock Origin.
    https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/
    CHAMELEON
    This plugin anonymizes your browser data (data about your browser and location, etc. that is sent to websites), making you less susceptible to de-anonymization.
    https://addons.mozilla.org/en-US/firefox/addon/chameleon-ext/
    COOKIE AUTODELETE
    This plugin automatically deletes old cookies and cookies from pages that are no longer open.
    https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/
    DECENTRALEYES
    “Protects you against tracking through “free”, centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.”
    https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/
    MULTI-ACCOUNT CONTAINERS
    “Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.”
    https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/
    DECREASE PRODUCTIVITY
    This plugin helps you browse anonymously in the physical proximity of other people. It will dim images and make every webpage look the same, so you can read anything while at work, until your boss finds out you have this plugin. It’s also useful if you find the diverse images and colors around the internet annoying.
    https://addons.mozilla.org/en-US/firefox/addon/decreased-productivity-andryou/
    BLOODY VIKINGS!
    “Simplifies the use of temporary e-mail addresses in order to protect your real address from spam. Supports inter alia 10minutemail.com and anonbox.net.”
    https://addons.mozilla.org/en-US/firefox/addon/bloody-vikings

     
  • Earthling 12:08 am on 29th November 2018 Permalink | Reply
    Tags: air pollution in palestine, breathing freedom, freedom, gaza toxic biosphere, , palestine forever, palestine freedom songs, say no to genocide, say no to mass murder, say no to zionism   

    Gaza Genocide Harms the Environment 

    Gaza now has a toxic ‘biosphere of war’ that no one can escape
    Air Pollution in Palestine

    Gaza’s drinking water spurs blue baby syndrome, serious illnesses

    With the resources at its disposal, Israel can take measures to prevent the land under its control from becoming uninhabitable toxic wasteland. Palestine has no such resources.
     
    I BREATHE FREEDOM

    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    You will never be able to abolish me
    You must listen to me and talk to me
    And if you think you’re healing me
    This is not medicine
    If only you would listen to me
    In spite of everything that’s happened
    Power is what fails
    If it goes against thoughts
    This world is big enough for everyone
    Only the truth prevails
    And if you want we can find a solution
    If only we think together
    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    The voice of freedom is louder than everything else
    No matter how much the wind of darkness blows,
    And the night covers the distances.
    You can’t color this whole world
    With the same color
    And change the order of the earth
    And the flow of the air
    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    More freedom songs at https://palestineforever.home.blog/
    See also International Day of Living Together and Judaism’s Final Solution: Compassion

     
  • Earthling 7:37 am on 11th November 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, freedom, gafam, , healthy living, , , linux, malware, , private life, qubes, , spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 


    On the internet, security is a prerequisite for privacy.
    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.
    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:
    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.
    • Encrypt your hard drives.
    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.
    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.
    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.
    • Use encrypted communication when possible.
    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)
    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.
    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.
    • Don’t use public wifi connections. If you do, use a VPN.
    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?
    • Use a firewall on your computer and phone to control which applications use the internet.
    • Use a firewall on your router to filter out bad content as it’s coming in.
    • Use a family internet filter on your computer to block malicious sites (porn, gambling).
    • Keep everything updated regularly.
    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.
    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.
    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.
    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.
    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.
    • Use an antivirus on Windows or OS X, but don’t rely on it.
    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.
    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.
    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.
    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.
    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.
    • Don’t use the same password everywhere. Use strong passwords.
    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.
    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.
    SERVICES TO AVOID IF YOU WANT PRIVACY
    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.
    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.
    HOW TO TELL IF YOUR DEVICE HAS BEEN COMPROMISED
    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.
    WHAT TO DO WHEN YOUR PRIVACY IS INVADED
    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.
    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.
    RELIABLE PRIVACY
    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.
    Further information on surveillance: https://ssd.eff.org/en#index
    Article by Anonymous Man

     
  • Earthling 12:55 am on 4th June 2018 Permalink | Reply
    Tags: columbine communities, freedom, Permsky Krai, Permsky Krai surveillance, preventing school attacks, protecting children, protecting children from harm, , Social network surveillance, , Surveillance of children, Surveillance of children in Russia, surveillance on social networks, Vkontakte surveillance   

    Russia: Permsky Krai authorities plan internet surveillance of children 

    slezhka-za-detmi-v-inete
    Under the guise of “implementing a system of measures to reduce family and child deprivation,” the regional government is launching a system that monitors and analyzes the behavior of adolescents on social networks.
    In the Perm region, a new information system will analyze the behavior of adolescents on social networks and collect information about their mental health, problems in the family, and communication with their peers and the law. Information on the implementation of internet surveillance for minors was announced at a meeting of the regional government.
    Maxim Reshetnikov, Governor of the Perm Territory, justifies the introduction of such a system by the fact that, although in the last 2 years there has been a decrease in juvenile delinquency by a quarter, violations of the law occur more often with the participation of children from well-off families than those from the “risk” group and the “socially dangerous situation” group. “The reasons here are, as they say, collective. Parents with a modern rhythm of life do not always have time to deal with children, while teachers have a big load, an orientation toward the educational process. And sometimes there are no skills present to recognize when children are in difficult situations. The current prevention system is mainly oriented towards working with children who are already in the zone of attention of social services. Obviously, we need new approaches and solutions. First and foremost, we need an interdepartmental and multi-level preventive system that will identify risks at the earliest stages, when the problems are only beginning to appear.”
    Deputy Prime Minister Tatyana Abdulina said that the system will be formed before the end of 2018. It will collect information from various sources and “provide a comprehensive solution.” “It will be … constantly monitoring social networks to identify participation in destructive groups. The diagnostic tools of psychologists have been significantly changed in terms of risk factors,” she said, adding that since the beginning of September, parents in Permsky Krai will begin to educate on the issue of education through specially created lessons.
    The special system is intended to help identify at an early stage children who are predisposed to crimes or suicide and to help them. The auction for its creation should take place before October 1, 2018.
    It is not known whether the consent of the children and their parents will be required for the collection of information.
    A similar social surveillance project for children was organized in February last year by the Tyumen League of Internet Safety. After agreeing with the regional education authorities, the League started collecting data on the pages of schoolchildren in the social network VKontakte. It was formed on the base of teachers, and access to it was given to the activists of the BizInternet League (WithoutInternet League). This league’s head Denis Davydov also reported that they intend to introduce this initiative in other regions — certain agreements were already available at that time.
    Let us recall that since the beginning of this year, the media has reported several cases of attacks on schools by students with the use of cold weapons, firearms or traumatic weapons. Authorities attribute this to a trend of the so-called “Columbine” community on social networks, but the social networks themselves have denied this. In the wake of media hype, certain politicians, in particular Irina Yarovaya and Elena Mizulina, have repeatedly voiced the idea of ​​further tightening legislation. Recently Yarovaya submitted a bill to the State Duma “aimed at protecting the lives of children from Columbine communities and promptly identifying criminals involving minors in life-threatening situations.”
    Translated from RosKomSvoboda: https://roskomsvoboda.org/39324/

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel