Tagged: liberty Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 7:07 am on 7th March 2019 Permalink | Reply
    Tags: adblocker plugins, autodelete cookies plugin for firefox, Bloody vikings, decrease productivity, , liberty, plugin to produce misleading browser data, plugins for firefox, , protection against deanonyimzation of browser data, protection against surveillance while browsing, secure internet browsing, , temporary email address plugin, tracker blockers   

    12 Browser Plugins That Enhance Your Privacy And Security 


    NOSCRIPT
    “Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks, “Spectre”, “Meltdown” and other JavaScript exploits.”
    This plugin disables scripts by default, and lets you choose which ones to activate. This feature is crucial for browsing the web securely. Webpages with javascript are like computer programs– opening random webpages with javascript is almost like installing random software without an antivirus.
    https://addons.mozilla.org/en-US/firefox/addon/noscript/
    SCRIPTSAFE
    This is an alternative to NoScript that is also available for Chrome.
    https://addons.mozilla.org/en-US/firefox/addon/script-safe/
    UMATRIX
    This is like a hardcore version of NoScript. By default it blocks all sorts of content, and only allows what you enable. You can choose the exact types of content to block and the exact web addresses, all displayed on a handy grid. Highly customizable.
    https://addons.mozilla.org/en-US/firefox/addon/umatrix/
    PRIVACY BADGER
    This plugin blocks trackers and also learns to detect new trackers, unlike other adblockers which only block content from a list.
    https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/
    UBLOCK ORIGIN
    This plugin blocks ads, trackers, and malicious content. Highly configurable. May not work optimally in combination with Privacy Badger.
    https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
    HTTPS EVERYWHERE
    This plugin ensures that webpages are always loaded with secure (encrypted) connections when possible. This feature is also an option in Ublock Origin.
    https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/
    CHAMELEON
    This plugin anonymizes your browser data (data about your browser and location, etc. that is sent to websites), making you less susceptible to de-anonymization.
    https://addons.mozilla.org/en-US/firefox/addon/chameleon-ext/
    COOKIE AUTODELETE
    This plugin automatically deletes old cookies and cookies from pages that are no longer open.
    https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/
    DECENTRALEYES
    “Protects you against tracking through “free”, centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.”
    https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/
    MULTI-ACCOUNT CONTAINERS
    “Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.”
    https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/
    DECREASE PRODUCTIVITY
    This plugin helps you browse anonymously in the physical proximity of other people. It will dim images and make every webpage look the same, so you can read anything while at work, until your boss finds out you have this plugin. It’s also useful if you find the diverse images and colors around the internet annoying.
    https://addons.mozilla.org/en-US/firefox/addon/decreased-productivity-andryou/
    BLOODY VIKINGS!
    “Simplifies the use of temporary e-mail addresses in order to protect your real address from spam. Supports inter alia 10minutemail.com and anonbox.net.”
    https://addons.mozilla.org/en-US/firefox/addon/bloody-vikings

     
  • Earthling 10:08 am on 26th January 2019 Permalink | Reply
    Tags: counterrevolutionary pigdog fascists, , , , , legality of spy gadgets in russia, liberty, prc, uyghur holocaust   

    January Internet Freedom Update 

    “You want to say something? Or you started to think deeply?”


    RUSSIA
    Bills providing punishment for insulting the authorities and false information are in reading
    Odious bills on punishment for insulting the authorities on the internet and spreading false news have been under discussion by the State Duma. These bills have been subject to debate in society and within the government.
    Vladimir Zhirinovsky said that “the groaning against the authorities” in the past led to the collapse of the USSR and the Russian Empire, so the introduction of responsibility for the relevant insults — is “protection of the country.” The head of the LDPR spoke approvingly about the “law on fake news”, because, in his opinion, it is necessary to suppress panic in society caused by fake news from the Internet and the media.
    (https://roskomsvoboda.org/44508/)
    Hundreds of millions of rubles to be spent searching for “anti-social phenomena and subcultures” on the web
    Russia’s Ministry of Education and Science plans to allocate 628-million rubles for searching online for information that is dangerous to the health of children. The subsidy will be provided to the non-profit organization ‘Center for the Study and Online Monitoring of the Youth Environment’, whose activity is aimed at monitoring the distribution of information on telecommunication networks. This non-profit organization was created on behalf of Russian President Vladimir Putin on May 31, 2018.
    (https://roskomsvoboda.org/44255/)
    Putin signs laws that partially decriminalize reposting illegal content
    The penalties for posting illegal content on the internet have been changed from criminal to administrative, if they do not pose a public threat and are committed for the first time
    The laws in question punish people for inciting racial, national, religious and other hostility through the internet or media. Under the new amendments, criminal liability will only be for repeat offenders.
    The fine for first-time offenders will range from 10,000 to 20,000 rubles, or consist of compulsory work for up to 100 hours, or administrative arrest for up to 15 days. For legal entities the fine will be from 250,000 to 500,000 rubles.
    (https://roskomsvoboda.org/44116/)
    Russian Supreme Court partially legalizes “spy gadgets”
    A new Supreme Court ruling decided that it is only necessary to punish people for the purchase of “spy” devices if they were used to “infringe upon the constitutional rights of citizens”.
    What is meant by “spy” technologies is technological means intended for secretly obtaining information. Smartphones, video recorders and voice recorders can be recognized as such, if they are specially modified. The Supreme Court recommends not to punish people who bought “spy” pens or other devices for personal safety (to monitor their house, apartment, the safety of their relatives, animals) or by accident, according to the new decision.
    According to the Criminal Code of the Russian Federation, illegal circulation of special technological means intended for secretly obtaining information is punishable by imprisonment of up to four years.
    According to the statistics of the Judicial Department of the Armed Forces, from January to June 2018, 86 people were convicted under this law, and only one acquitted. Cases against 50 people were dismissed during the investigation.
    (https://roskomsvoboda.org/44061/)
    Libraries to limit number of simultaneous users of ebooks
    The SKOLKOVO Foundation has developed amendments to the Civil Code, among which are rules that libraries will not be able to provide access to the same electronic copy of a publication to several users.
    In March, the State Duma is scheduled to make amendments to determine the nature of free use of educational and scientific works electronically stored in libraries. The text of the proposed amendments is:
    “allow libraries to provide remote access to electronic copies of books, provided that the user will not be able to copy the materials, as well as if the purpose is not to make a profit (currently the reader can access the electronic version of the book only in the library or archive);
    allow people to read scientific and educational materials in electronic form, of any year of publication (currently this opportunity applies only to works that have not been reprinted in Russia for more than ten years).
    Maxim Proksh, Chairman of the Intellectual Property Group, said that this would be a right, not an obligation of libraries, and also clarified that they would not be able to provide access to the same copy of an electronic work to several users at once: if a single copy is stored in the library, only one person can view it at a time, if 50 copies — then 50 users.
    “We are talking mostly about literature, because access to knowledge is the goal of the bill,” said Proksch. “However, sometimes fiction can also have an educational character, for example, for students of Humanities faculties or schoolchildren, but this applies mainly to the classics, which already has the status of the public domain. According to him, the bill applies to those books that are protected by copyright: “we have no goal to bring down the publishing market, we focus solely on making educational and scientific literature available to any resident of the country without the need to make an expensive trip to the library, where the desired copy is located.”
    The project is currently undergoing internal coordination, after which it will be submitted to the Commission of Deputy Prime Minister Maxim Akimov. According to the plan, the document can be adopted in May this year.
    (https://roskomsvoboda.org/44578/)
    (Above content is translated and paraphrased from RoskovSvoboda.org, which is available under CC4 License)
     
    CHINA
    China undertakes manual internet censorship by visiting people
    https://www.techdirt.com/articles/20190106/09204741342/chinese-police-now-performing-door-to-door-twitter-censorship.shtml
    LinkedIn supports China’s censorship regime
    https://www.techdirt.com/articles/20190109/18043041366/linkedin-is-helping-chinese-government-silence-critics.shtml
    Pyscho bourgeois pigdog dictators of China use information warfare to cover up Uyghur holocaust

    Save the 3 million Uyghur Muslims in Chinese concentration camps!


    China releases app showing locations of nearby people who are in debt
    https://www.businessinsider.com/china-app-shows-map-of-people-in-debt-for-social-credit-system-report-2019-1
     
    AFRICA
    Gabon, DRC, Zimbabwe shut down internet in response to conflicts
    http://www.itwebafrica.com/security/513-africa/245309-internet-shutdown-in-gabon-dr-congo-condemned
    https://www.upi.com/Top_News/World-News/2019/01/18/Zimbabwe-shuts-down-Internet-access-amid-growing-unrest/4461547825545/
     
    US
    Conservative legislators try to clean the internet, protect children with internet porn filtering act
    http://humantraffickingpreventionact.com/

     
  • Earthling 12:08 am on 29th November 2018 Permalink | Reply
    Tags: air pollution in palestine, breathing freedom, , gaza toxic biosphere, liberty, palestine forever, palestine freedom songs, say no to genocide, say no to mass murder, say no to zionism   

    Gaza Genocide Harms the Environment 

    Gaza now has a toxic ‘biosphere of war’ that no one can escape
    Air Pollution in Palestine

    Gaza’s drinking water spurs blue baby syndrome, serious illnesses

    With the resources at its disposal, Israel can take measures to prevent the land under its control from becoming uninhabitable toxic wasteland. Palestine has no such resources.
     
    I BREATHE FREEDOM

    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    You will never be able to abolish me
    You must listen to me and talk to me
    And if you think you’re healing me
    This is not medicine
    If only you would listen to me
    In spite of everything that’s happened
    Power is what fails
    If it goes against thoughts
    This world is big enough for everyone
    Only the truth prevails
    And if you want we can find a solution
    If only we think together
    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    The voice of freedom is louder than everything else
    No matter how much the wind of darkness blows,
    And the night covers the distances.
    You can’t color this whole world
    With the same color
    And change the order of the earth
    And the flow of the air
    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    More freedom songs at https://palestineforever.home.blog/
    See also International Day of Living Together and Judaism’s Final Solution: Compassion

     
  • Earthling 7:37 am on 11th November 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, , gafam, , healthy living, , liberty, linux, malware, , private life, qubes, , spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 


    On the internet, security is a prerequisite for privacy.
    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.
    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:
    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.
    • Encrypt your hard drives.
    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.
    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.
    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.
    • Use encrypted communication when possible.
    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)
    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.
    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.
    • Don’t use public wifi connections. If you do, use a VPN.
    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?
    • Use a firewall on your computer and phone to control which applications use the internet.
    • Use a firewall on your router to filter out bad content as it’s coming in.
    • Use a family internet filter on your computer to block malicious sites (porn, gambling).
    • Keep everything updated regularly.
    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.
    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.
    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.
    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.
    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.
    • Use an antivirus on Windows or OS X, but don’t rely on it.
    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.
    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.
    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.
    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.
    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.
    • Don’t use the same password everywhere. Use strong passwords.
    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.
    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.
    SERVICES TO AVOID IF YOU WANT PRIVACY
    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.
    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.
    HOW TO TELL IF YOUR DEVICE HAS BEEN COMPROMISED
    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.
    WHAT TO DO WHEN YOUR PRIVACY IS INVADED
    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.
    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.
    RELIABLE PRIVACY
    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.
    Further information on surveillance: https://ssd.eff.org/en#index
    Article by Anonymous Man

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel