Edward Snowden’s Haven app turns your laptop into a security system

By Asad Gilani
Most sensitive users of technology, especially those in journalism and
This is a post from HackRead.com Read the original post: Edward Snowden’s Haven app turns your laptop into a security system
Continue reading Edward Snowden’s Haven app turns your laptop into a security system

Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools?

In August 2016, a mysterious entity calling itself “The Shadow Brokers” began releasing the first of several troves of classified documents and hacking tools purportedly stolen from “The Equation Group,” a highly advanced threat actor that is suspected of having ties to the U.S. National Security Agency. According to media reports, at least some of the information was stolen from the computer of an unidentified software developer and NSA contractor who was arrested in 2015 after taking the hacking tools home. In this post, we’ll examine clues left behind in the leaked Equation Group documents that may point to the identity of the mysterious software developer. Continue reading Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools?

New Snowden Doc Exposes How NSA’s Facility in Australia Aids Drone Strikes

The new documents leaked by former NSA contractor Edward Snowden has exposed a United States secretive facility located near a remote town in Australia’s Northern Territory for covertly monitoring wireless communications and aiding US military missions… Continue reading New Snowden Doc Exposes How NSA’s Facility in Australia Aids Drone Strikes

Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’

Nearly two years to the day since Andrew Lewman quit his job as executive director of Tor, the anonymity software meant to shield users from government intervention, he found himself rushing between meetings with European law enforcement. Boosted by endorsements from internet activists like Julian Assange and Edward Snowden, Lewman had been at the helm of Tor as it became synonymous with internet user privacy. Now, as the newly minted vice president of dark web intel firm OWL Cybersecurity, his meetings with governments have gone from educating officials on how people use Tor to helping law enforcement investigate criminal activity occurring on Tor. As Lewman spoke to CyberScoop last month in between two of those meetings, it became clear that his perspective on the software has shifted. “What’s changed most about Tor is the drug markets have taken over,” Lewman said. “We had all these hopeful things in the beginning but ever since Silk Road has proven you […]

The post Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’ appeared first on Cyberscoop.

Continue reading Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’

ShadowBrokers Dump More Equation Group Hacks, Auction File Password

The ShadowBrokers’ latest dump of Equation Group hacks focuses on UNIX systems and GSM networks, and was accompanied by an open letter to President Trump. Continue reading ShadowBrokers Dump More Equation Group Hacks, Auction File Password