-
Content count
3,640 -
Joined
-
Last visited
-
Days Won
2
Everything posted by gatito
-
Exactly! And what's also funny is that the Poles and the British have been incited to bait the Bear by the Americans. Very bad idea: -
-
If that's the case, then at least he stopped Hillary from starting WW3.
-
Theresa May reveals 150 British troops to be deployed to Poland to 'deter Russian aggression' (And what's even funnier (if that were possible) is that it's fake news, as this deployment was announced by Michael Fallon last July). But that's typical of the Evening Standard.
-
Wei wu wei/Anarch users, please post your mod-of-your-thread credo/intent
gatito replied to Taomeow's topic in The Rabbit Hole
Sorry! Should have provided a few more details. -
Wei wu wei/Anarch users, please post your mod-of-your-thread credo/intent
gatito replied to Taomeow's topic in The Rabbit Hole
After a little bit of fine-tuning (and 100% sucessful testing) I'm very happy to announce that I've released v3.0 (final). -
www.lakshmanjooacademy.org/god-is-revealed/
-
Obama's dirty secret: the fossil fuel projects the US littered around the world Through the Export-Import Bank, the Obama administration has spent nearly $34bn on dirty energy plants in countries from India to Australia to South Africa www.theguardian.com/environment/2016/dec/01/obama-fossil-fuels-us-export-import-bank-energy-projects A villager living near the Sasan mine’s overburdened dumpsite pleads for relief and rehabilitation from the pollution hazards of the coal mine.
-
DAPL floodlights point at the Oceti Sakowin camp from dusk until dawn.
-
Wednesday 30 November 2016 11.00 GMT 'We opened eyes': at Standing Rock, my fellow Native Americans make history As an Indigenous American, Joe Whittle never questioned his need to travel to Standing Rock. The resolve he saw to protect a sacred space was transformative
-
Wednesday 30 November 2016 17.23 GMT 'Human caused' wildfires kill four in Tennessee near Dollywood park Fires in the Great Smoky Mountains have been tearing through the popular tourist town of Gatlinburg since Monday, forcing thousands to leave their homes www.theguardian.com/us-news/2016/nov/30/tennessee-wildfires-human-caused-gatlinburg-dollywood-theme-park
-
30 November 2016 'Bogus charges': Standing Rock activists say they face campaign of legal bullying Native American protesters claim that threats of fines and criminal charges, many which later unravel in court, are designed to silence their efforts www.theguardian.com/us-news/2016/nov/29/standing-rock-protest-north-dakota-shutdown-evacuation
-
Tuesday 29 November 2016 Standing Rock protesters hold out against extraordinary police violence Apprehension and distrust pervade North Dakota protest site as promises from state that there are no plans to forcibly remove people does little to assuage fears www.theguardian.com/us-news/2016/nov/29/standing-rock-protest-north-dakota-shutdown-evacuation
-
Tuesday, 29 November 2016 Tennessee wildfires kill three and force thousands to evacuate Fire near Gatlinburg, fed by high winds and drought conditions, has destroyed buildings, knocked out power and canceled school classes www.theguardian.com/us-news/2016/nov/29/tennessee-wildfires-gatlinburg-dollywood-pigeon-forge
-
3rd June 2016: Dear Britain, if you stay in the EU, you will ruin our lives. Here is why 25th November 2016: Boris Johnson is a clown who has united the EU against Britain Both articles by Jean Quatremer: More of his insightful and entertaining viewpoint can be found at Libération - Coulisses de Bruxelles e.g. Trump: l'UE sonnée
-
FYI Source: tails.boum.org/doc/about/warning/index.en.html Warning Even though we do our best to offer you good tools to protect your privacy while using a computer, there is no magic or perfect solution to such a complex problem. Understanding well the limits of such tools is a crucial step to, first, decide whether Tails is the right tool for you, and second, make a good use of it. Tails does not protect against compromised hardware Tails can be compromised if installed or plugged in untrusted systems Tails does not protect against BIOS or firmware attacks Tor exit nodes can eavesdrop on communications Tails makes it clear that you are using Tor and probably Tails Man-in-the-middle attacks Confirmation attacks Tails doesn't encrypt your documents by default Tails doesn't clear the metadata of your documents for you and doesn't encrypt the Subject: and other headers of your encrypted email messages Tor doesn't protect you from a global adversary Tails doesn't magically separate your different contextual identities Tails doesn't make your crappy passwords stronger Tails is a work in progress Tails does not protect against compromised hardwareIf the computer has been compromised by someone having physical access to it and who installed untrusted pieces of hardware (like a keylogger), then it might be unsafe to use Tails. Tails can be compromised if installed or plugged in untrusted systemsWhen starting your computer on Tails, it cannot be compromised by a virus in your usual operating system, but: Tails should be installed from a trusted system. Otherwise it might be corrupted during installation. Plugging your Tails device in a compromised operating system might corrupt your Tails installation, and destroy the protection that Tails provides. Only use your Tails device to start Tails. See the corresponding FAQ. Tails does not protect against BIOS or firmware attacksIt is also impossible for Tails to protect against attacks made through the BIOS or other firmware embedded in the computer. These are not managed or provided by the operating system directly, and no operating system can protect against such attacks. See for example, this attack on BIOS by LegbaCore. Tor exit nodes can eavesdrop on communicationsTor is about hiding your location, not about encrypting your communication. Instead of taking a direct route from source to destination, communications using the Tor network take a random pathway through several Tor relays that cover your tracks. So no observer at any single point can tell where the data came from or where it's going. The last relay on this circuit, called the exit node, is the one that establishes the actual connection to the destination server. As Tor does not, and by design cannot, encrypt the traffic between an exit node and the destination server, any exit node is in a position to capture any traffic passing through it. See Tor FAQ: Can exit nodes eavesdrop on communications?. For example, in 2007, a security researcher intercepted thousands of private email messages sent by foreign embassies and human rights groups around the world by spying on the connections coming out of an exit node he was running. See Wired: Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise. To protect yourself from such attacks you should use end-to-end encryption. Tails includes many tools to help you using strong encryption while browsing, sending email or chatting, as presented on our about page. Tails makes it clear that you are using Tor and probably TailsYour Internet Service Provider (ISP) or your local network administrator can see that you're connecting to a Tor relay, and not a normal web server for example. Using Tor bridges in certain conditions can help you hide the fact that you are using Tor. The destination server that you are contacting through Tor can know whether your communication comes from a Tor exit node by consulting the publicly available list of exit nodes that might contact it. For example using the Tor Bulk Exit List tool from the Tor Project. So using Tails doesn't make you look like any random Internet user. The anonymity provided by Tor and Tails works by trying to make all of their users look the same so it's not possible to identify who is who amongst them. See also Can I hide the fact that I am using Tails? Man-in-the-middle attacksA man-in-the-middle attack (MitM) is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. While using Tor, man-in-the-middle attacks can still happen between the exit node and the destination server. The exit node itself can also act as a man-in-the-middle. For an example of such an attack see MW-Blog: TOR exit-node doing MITM attacks. Again, to protect yourself from such attacks you should use end-to-end encryption and while doing so taking extra care at verifying the server authenticity. Usually, this is automatically done throught SSL certificates checked by your browser against a given set of recognized certificate authorities). If you get a security exception message such as this one you might be the victim of a man-in-the-middle attack and should not bypass the warning unless you have another trusted way of checking the certificate's fingerprint with the people running the service. But on top of that the certificate authorities model of trust on the Internet is susceptible to various methods of compromise. For example, on March 15, 2011, Comodo, one of the major SSL certificates authorities, reported that a user account with an affiliate registration authority had been compromised. It was then used to create a new user account that issued nine certificate signing requests for seven domains: mail.google.com, login.live.com, www.google.com, login.yahoo.com (three certificates), login.skype.com, addons.mozilla.org, and global trustee. See Comodo: The Recent RA Compromise. Later in 2011, DigiNotar, a Dutch SSL certificate company, incorrectly issued certificates to a malicious party or parties. Later on, it came to light that they were apparently compromised months before, perhaps as far back as May of 2009, or even earlier. Rogue certificates were issued for domains such as google.com, mozilla.org, torproject.org, login.yahoo.com and many more. See The Tor Project: The DigiNotar Debacle, and what you should do about it. This still leaves open the possibility of a man-in-the-middle attack even when your browser is trusting an HTTPS connection. On one hand, by providing anonymity, Tor makes it more difficult to perform a man-in-the-middle attack targeted at one specific person with the blessing of a rogue SSL certificate. But on the other end, Tor makes it easier for people or organizations running exit nodes to perform large scale MitM attempts, or attacks targeted at a specific server, and especially those among its users who happen to use Tor. Quoted from Wikipedia: Man-in-the-middle attack, Wikipedia: Comodo Group#Certificate hacking and Tor Project: Detecting Certificate Authority compromises and web browser collusion. Confirmation attacksThe Tor design doesn't try to protect against an attacker who can see or measure both traffic going into the Tor network and also traffic coming out of the Tor network. That's because if you can see both flows, some simple statistics let you decide whether they match up. That could also be the case if your ISP (or your local network administrator) and the ISP of the destination server (or the destination server itself) cooperate to attack you. Tor tries to protect against traffic analysis, where an attacker tries to learn whom to investigate, but Tor can't protect against traffic confirmation (also known as end-to-end correlation), where an attacker tries to confirm a hypothesis by monitoring the right locations in the network and then doing the math. Quoted from Tor Project: "One cell is enough to break Tor's anonymity". Tails doesn't encrypt your documents by defaultThe documents that you might save on storage devices will not be encrypted by default, except in the encrypted persistent volume. But Tails provides you with tools to encrypt your documents, such as GnuPG, or encrypt your storage devices, such as LUKS. It is also likely that the files you may create will contain evidence that they were created using Tails. If you need to access the local hard-disks of the computer you are using, be conscious that you might then leave trace of your activities with Tails on it. Tails doesn't clear the metadata of your documents for you and doesn't encrypt the Subject: and other headers of your encrypted email messagesNumerous files formats store hidden data or metadata inside of the files. Word processing or PDF files could store the name of the author, the date and time of creation of the file, and sometimes even parts of the editing history of the file, depending on the file format and the software used. Please note also, that the Subject: as well as the rest of the header lines of your OpenPGP encrypted email messages are not encrypted. This is not a bug of Tails or the OpenPGP protocol; it's due to backwards compatibility with the original SMTP protocol. Unfortunately no RFC standard exists yet for Subject: line encryption. Image file formats, like TIFF of JPEG, probably take the prize for most hidden data. These files, created by digital cameras or mobile phones, contain a metadata format called EXIF which can include the date, time and sometimes the GPS coordinates when the picture was taken, the brand and serial number of the device which took it, as well as a thumbnail of the original image. Image processing software tends to keep this metadata intact. The internet is full of cropped or blurred images in which the included EXIF thumbnail still shows the original picture. Tails doesn't clear the metadata of your files for you. Yet. Still it's in Tails' design goal to help you do that. For example, Tails already comes with the Metadata anonymisation toolkit. Tor doesn't protect you from a global adversaryA global passive adversary would be a person or an entity able to monitor at the same time the traffic between all the computers in a network. By studying, for example, the timing and volume patterns of the different communications across the network, it would be statistically possible to identify Tor circuits and thus match Tor users and destination servers. It is part of Tor's initial trade-off not to address such a threat in order to create a low-latency communication service usable for web browsing, Internet chat or SSH connections. For more expert information see the Tor design paper, "Tor Project: The Second-Generation Onion Router", specifically, "Part 3. Design goals and assumptions." Tails doesn't magically separate your different contextual identitiesIt is usually not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that you really want to keep separate from one another. For example hiding your location to check your email and anonymously publishing a document. First, because Tor tends to reuse the same circuits, for example, within the same browsing session. Since the exit node of a circuit knows both the destination server (and possibly the content of the communication if it's not encrypted) and the address of the previous relay it received the communication from, it makes it easier to correlate several browsing requests as part of a same circuit and possibly made by the same user. If you are facing a global adversary as described above, it might then also be in a position to do this correlation. Second, in case of a security hole or an error in using Tails or one of its applications, information about your session could be leaked. That could reveal that the same person was behind the various actions made during the session. The solution to both threats is to shutdown and restart Tails every time you're using a new identity, if you really want to isolate them better. As explained in our documentation about Tor Browser, its New identity feature is not a perfect solution to separate different contextual identities. And, as explained in the FAQ, Tails does not provide a global New Identity feature. Shutdown and restart Tails instead. Tails doesn't make your crappy passwords strongerTor allows you to be anonymous online; Tails allows you to leave no trace on the computer you're using. But again, neither or both are magic spells for computer security. If you use weak passwords, they can be guessed by brute-force attacks with or without Tails in the same way. To know if your passwords are weak and learn good practices to create better password, you can read Wikipedia: Weak Passwords. Tails is a work in progressTails, as well as all the software it includes, are continuously being developed and may contain programming errors or security holes.
-
A good example of the EU sytems working to block harmful clauses on CETA was Wallonia's ability to intervene. (The article was written by Paul Magnette, President of Wallonia.) www.theguardian.com/commentisfree/2016/nov/14/wallonia-ceta-ttip-eu-trade-belgium
-
I think you'll probably find that The Guardian's credible (and mainstream). See: www.theguardian.com/us-news/dakota-access-pipeline
-
There are certainly a lot of ways that a government can circumvent an individuals use of Tails/Tor. Nevertheless, using it takes a stand that's infinitely more effective in negating the effects of the Snoopers' Charter than signing a petition begging for a change in a longstanding, immoral practice. If a proportion of the population used that as well as using OpenPGP encryption of emails it would certainly tie-up a lot of BB's resources. Links: openpgp.org/about/ This may also be of interest: Source: https://en.wikipedia.org/wiki/Charter_of_Fundamental_Rights_of_the_European_Union And this: www.theguardian.com/technology/askjack/2016/nov/24/how-can-i-protect-myself-from-government-snoopers and this: www.theguardian.com/commentisfree/2016/nov/28/technology-our-lives-control-us-internet-giants-data At least, we all have the (informed) option of turning off our wifi and our mobile phones (for now...).
-
I’ve yet to watch the film itself but, having seen the trailer and a couple of interviews with Joseph Gordon-Levitt, I think you’ll find that it (the full film) will give you an understanding about mass surveillance and why it’s an important and highly effective act of civil defiance to use Tails/Tor as much as possible. Links: tails.boum.org/home/index.en.html www.torproject.org/
-
http://www.claudesteiner.com/osp.htm
-
Another shining example of the Oxymoron. I guess that's to be expected in Off Topic?
-
Lovingkindness Meditation - A Western Scientific Approach
gatito posted a topic in Buddhist Discussion
I thought that I might run a thread on the benefits and the pitfalls of Metta meditation (basing it on a rational Western scientific approach). Maybe this would be a good starting point? -
Lovingkindness Meditation - A Western Scientific Approach
gatito replied to gatito's topic in Buddhist Discussion
-
As fake news takes over Facebook feeds, many are taking satire as fact A lie can spread on Facebook before the truth has even been posted, and even the most savvy news consumers can be tricked. What can we do about it? www.theguardian.com/media/2016/nov/17/facebook-fake-news-satire https://www.theguardian.com/media/2016/nov/17/facebook-fake-news-satire