Freedom

Top Security test checks for your Browser

Internet SecurityWhen you visit a website, you are allowing that site to access a lot of information about your computer’s configuration. Combined, this information can create a kind of fingerprint — a signature that could be used to identify you and your computer. “Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies. Some companies use this technology to try to identify individual computers. How secure is your browser from attack from Internet. Here are our favorite free online Continue reading

Share

Mustang Wanted-Roofer and Urbex Climber

selection_034

One of the craziest guys – MustangWanted. Ukrainian urban climber and Internet celebrity. He is known for the high-altitude stunts he performs around the world with no safety equipment. On 19–20 August 2014, he climbed Kotelnicheskaya Embankment Building, one of the Seven Sisters (a group of skyscrapers in Moscow designed in the Stalinist style), painted the spire in blue and raised the Ukrainian flag on the top Continue reading

Share

Exploring the new territory By Manfred Karrer

bitsquare-home2

With the recent Bitfinex heist models for decentralized exchanges have received a bit more attention as usual.

This is a repeating pattern happening every few months after a major incident.

And it goes back to business as usual after people are entertained by the next soap opera.
So I do not expect that the majority of cryptoland citizens will radically change their behavior. And that has several understandable reasons.
But beside that, Continue reading

Share

Bitcoin has died again-It was for 109th time till today

bitcoin-obituary-351x185

Bitcoin Obituaries or 99bitcoins.com is keeping archive of all news-feed from online and print media when bitcoin died in the last few years. The dead count is good reminder for all enemies of the Crypto King. You can kill something which just get alive and coming stronger and stronger every year.

Death count 107:

Russo’s glaring point remains, Bitcoin has created a class hierarchy divided by computational power. The cryptocurrency as is can not deliver on the promises of decentralization, anonymity, or full Continue reading

Share

Suspicious TTIP’s reports used freely by US ambassadors in Bulgaria

10600672_10152724523480470_8178733259921348457_nLooks like that the American ambassador in Bulgaria Eric Rubin is great supporter of TTIP (Transatlantic Trade and Investment Partnership). The problem is that he and some other close to TTIP fans, started to use statistics from one very strange “report”. The report, itself is labeled “Made in Bulgaria” by the Bulgarian Academy of Science. It is all full with expected positive effects which can be experienced almost immediately after TTIP become reality. The main problem now is that the Bulgarian Academy of Science never create, order or

Continue reading

Share

Hero of the month 6: Jeremy Hammond

jhRevolutionary greetings on this June 11! Solidarity with all Earth warriors and anarchists behind bars!

We are up against a system of power and profit, a system which is destroying the planet and forcing the people into poverty and imprisonment. Many of us who have fought back found ourselves in the crosshairs of an extensive counter-intelligence apparatus who use trumped-up “terrorism” charges and entrapment by informants to put us in prison for years. There are many lessons Continue reading

Share

Analyzing metadata in UK

devildetails_590_463
Jeff Parker, Cagle Cartoons, Florida Today and the Fort Myers News-Press

Collecting metadata “can be more intrusive than traditional communications data,” Scotland Yard’s deputy assistant commissioner has admitted to Ars.

Neil Basu made his comment during a briefing session on law enforcement requirements for investigatory powers. The UK government claims that the new Internet connection records (ICRs) at the heart of the Investigatory Powers Bill are “only” metadata, and therefore no more intrusive than traditional communications data.

However, this contradicts the view of many experts who believe Continue reading

Share
Page 2 of 1612345678910...Last »