Sign the petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
Read the letter from Tim Cook http://www.apple.com/customer-letter/
function setCookie(cname, cvalue, exdays) { const d = new Date(); d.setTime(d.getTime() + (exdays*24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/"; }
Sign the petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
Read the letter from Tim Cook http://www.apple.com/customer-letter/
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG without too much hassle.
One shouldn't need to set up sophisticated encryption tools to protect their private mail, documents and records. Amendment IV to the U. S,. Constitution reads:
James Bamford’s Wired article on Edward Snowden from August 2014. http://www.wired.com/2014/08/edward-snowden/#ch-1
Slides from the talk Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS by Jonathan Zdziarski at the 2014 Hope X conference in New York.
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Read the full article here.
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. FULL ARTICLE
• Secret files show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply
By Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
Celebrate July 4th and the 4th Amendment with this EFF article about the recently released NSA documents.