yes downloaded it about a month ago. although it's an OS. also Tor Browser Bundle and Blackbelt Privacy.
that file is part of a newer version of the old jet database we used do get rid of in windows xp. as far as the change. from what i read it is used by a lot more nowadays and the file size maximum is 2 TiB. there's a wikipage that goes into a lot of detail.
No your post does not offend me, the contrary I like people posting their opinion. The pdf is interesting it confirms what I knew about... You are talking about collecting meta data. The encryption cannot be broken (so far) not even by the NSA. So they cannot read any content. What they can is to create meta data profiles (if at all) of Threema IDs which are totally anonymous until otherwise shared. There is no reference to a personal address except one gets hands on the device physically and pass is located in RAM. That what you name user a,b,c etc. are anonymous threema IDs which can be profiled by collecting meta data. I am not speaking of absolute terms, but people using messengers such as whatsapp would do it much better when using threema instead..and of course some common sense is needed when using threema (using strong pass, prevent physical access for anybody, or if one ('officials') should get ones hands on the device then reboot to remove decrypted pass in RAM) I do not recommend frequently, but I post about things that convinced myself. The problem is many people do not want to move from whatsapp, because their friends are still on whatsapp and don’t also move. It is pure laziness or unawareness, or they simply don’t care. Each person needs to decide on their own, though. I deleted whatsapp as soon as Suckerberg acquired it for 15 billion. 15 billion for an app, that is insane. Think about what could be done with that amount (humanitarian aid) or the like....
here's another interesting one: hxxp://sseblog.ec-spride.de/2014/05/easily-extracting-encrypted-messages-from-threema-textsecure-and-co/. the last part is the most relevant.
To read out the notification / status bar is a good point. Anyway I think the problem is a general problem. It's actually no problem it is common and can become a problem if one is not careful. To read the messages on the screen they need to be decrypted sooner or later. A part then is located in clear text in physical memory (RAM or video RAM). Regardless of one needs special rights to read out RAM or not (to read out the bar), there is a potential vulnerability. The threema app itself decrypts only a small part of the messages, never the entire chat. This is common sense. So the user needs to cultivate own behavior to minimize risks. Threema is to blame for that the preview in the notification bar is enabled per default, but for nothing else. The user should switch off the preview since nobody really needs it. The Android service itself can stay enabled, threema does not show any letter then... The issue isn’t that one can read out the notification bar without to have special rights, the issue is that the message sooner or later is found in clear text in memory AND people installing (free) apps without to read what rights they demand. A service/ app could read parts of threema messages directly from RAM…. Best is to keep the times where messages are decrypted in RAM as short as possible. But we’re talking here already about malware then and an infected device.
Tor project is one of the best solutions for me. I also use VPN and proxies. When I want to hide my online identity I use VPN by HideMyAss or go for proxies with Citrio browser. It is up to you, what service or applications to use for VPN and proxies though. Anyway those 3 pillars make up my privacy protection tool set.
http://www.amnesty.org/en/news/dete...surveillance-questions-and-answers-2014-11-20 is new today... ran it. apart from putting one of my cores at 100% and managing to start my desktop`s fan [ it rarely runs..] there was zero indication of what it actually does, just said it found nothing, after ~10 mins. [ i5 iveybridge, w7 ] still. i like the iniative. it is a new approach, which is better than messing with tor, firefox, and other obsolete rubbish.. so thought i would share it here. for what it is worth.
I don't know if anyone posted this so on the off chance you don't know about it, here it is: This is the good bit from the article, btw... [h=2]Inside the NSA's War on Internet Security[/h] http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html For the nitty-gritty, not so rosy stuff for us, invest some time in reading this enlightening article fully! WARMLY RECOMMENDED!!! VPN secure only virtually, e-commerce, online banking etc. protocols are cr@p and so on and so forth... AYAYAYAYAAAAAAAAAAAAAAAAAYYYYYYYYYYYYY!!!!!!!!!
VPN is no encryption! It is a way to connect 2 different networks through a tunnel. VPN generally says nothing about security at all, people should know.... It depends on 'what' comes through it. Something I had posted already: http://forums.mydigitallife.net/thr...opinions/page9?p=821273&viewfull=1#post821273 An additional end-to-end asymmetric encryption makes the VPN NSA secure. Additional drive encryption on the fly in case of seizure of the devices.... Vulnerable by infection are always the end devices due to their 'different use', though. Nobody should forget that. There're different ways of to spy. To spy on a particular person, a particular device (routers, nodes), a particular service....and finally general data collection / collection of meta data. It strongly depends on that all what actually can be made readable and what not. BTW: A very informative article, it confirms what I knew so far...
Huge Security Flaw Leaks VPN Users’ Real IP-Addresses 1-30-15 News VPN users are facing a massive security flaw as websites can easily see their home IP-addresses through WebRTC. The vulnerability is limited to supporting browsers such as Firefox and Chrome, and appears to affect Windows users only. Luckily the security hole is relatively easy to fix. ....continued.... A demo published on GitHub by developer Daniel Roesler allows people to check if they are affected by the security flaw. ....continued....
yup, that is a big one. Although it is an easy fix, it still shows why there should be a VPN with its own built in browser/tools to work as one with its own security set. Too many cooks in the kitchen trying to protect your privacy cannot always be good. That is like putting a chicken in the oven, and it comes out hagus.
Been using the Chrome fix a while now https://chrome.google.com/webstore/...dm?utm_source=chrome-app-launcher-info-dialog
Greetings! I've read this thread (and many others) from start to finish, and I'm a bit confused by this thread about privacy. Maybe it's something in my browser settings (Firefox, with StartPage as my only search engine) but every time I've done a search WITHIN MDL it always displays search results through Google. I know StartPage uses Google (supposedly anonymously) when I do an ordinary web search in my browser, but given the content of many threads here, why would MDL trust Google to do searches within its forum??? Isn't that a big privacy risk to the forums as well as to members? I've done many searches within MDL since I joined, and they've always shown up in Google, but I never use Google directly in my browser since they do too much data collection for me. Searching recently within MDL I've had a few bot-queries from Google and from my ISP on account of some of those searches, including one today that brought me to this very thread about -- wait for it -- Privacy!!! Can MDL do something to make its in-site searches more private, or is it something I need to do in Firefox? Although a lot of the info in MDL is far beyond my comprehension, it seems too valuable to put it in jeopardy if Google really is the search-master. Please, somebody tell me if I'm wrong, and/or what I should do on my end to make MDL searches more secure. Thanks!
Hiya ktgrrl, If you're worried about search privacy, try https://duckduckgo.com/ Oh, and Welcome to MDL. :MJ
Hi Michaela Joy, Thanks for the welcome, the suggestion, and the amazingly quick reply! I've just changed my search default back to DuckDuckGo. (It used to be my default until I discovered StartPage.) Then I came back and did another search inside MDL, and it still shows me results through Google. Google isn't in my list of allowed search engines. Is this something in MDL or am I doing something wrong? I appreciate any advice. Thanks!
For the answer to that question, you might PM Yen. He is an Admin here and He's very nice. I'm sure that He will give you an answer that makes sense. :MJ