"We're heavily involved in Drupal. I'm a member of the Drupal security team and the former lead of the team for over two years," Knaddison said. "So it's an area where we have a fair amount of expertise and depth, and we feel that our situation is best served by fixing vulnerabilities directly in the software itself."
A new story published on the German site Tagesschau and followed up by BoingBoing and DasErste.de has uncovered some shocking details about who the NSA targets for surveillance including visitors to Linux Journal itself.
While it has been revealed before that the NSA captures just about all Internet traffic for a short time, the Tagesschau story provides new details about how the NSA's XKEYSCORE program decides which traffic to keep indefinitely. XKEYSCORE uses specific selectors to flag traffic, and the article reveals that Web searches for Tor and Tails--software I've covered here in Linux Journal that helps to protect a user's anonymity and privacy on the Internet--are among the selectors that will flag you as "extremist" and targeted for further surveillance. If you just consider how many Linux Journal readers have read our Tor and Tails coverage in the magazine, that alone would flag quite a few innocent people as extremist.
The Blackphone is something that had debuted back in February as an anti-surveillance device in the wake of the severe NSA threats which had emerged around that time. This device has been priced at $629 and it comes equipped with an Android-based operating system which kicks in an array of security traits.
Blackphone, an Android-based smartphone developed by Silent Circle, SGP Technologies and Geeksphone, is now shipping. The phone became a sensation during Mobile World Congress as it offered extreme privacy of communication. After the NSA revelations made by Edward Snowden, there is a huge demand for services or devices which offer privacy from NSA and other surveillance agencies. However even the Blackphone doesn’t offer any protection from NSA. Phil Zimmermann, one of the creators of the phone, said that Blackphone doesn’t make you NSA proof.
About the only thing GNU Project founder Richard Stallman and I can agree on when it comes to software freedom is that it's "Free as in free speech, not free beer."
I really hope the Heartbleed vulnerability helps bring home the message to other communities that FOSS does not materialize out of empty space; it is written by people. We love what we do, which is why I'm sitting here, way past midnight on a Saturday evening, writing about it; but we are also real people with kids, cars, mortgages, leaky roofs, sick pets, infirm parents, and all kinds of other perfectly normal worries.
The only way to improve the quality of FOSS is to make it possible for these perfectly normal people to spend time on it. They need time to review patch submissions carefully, to write and run test cases, to respond to and fix bug reports, to code, and most of all, time just to think about the code and what should happen to it.
Ever since WhatsApp, a massively popular messaging app was acquired by Facebook, many of its users have started looking for alternatives to the service. Facebook, which itself, doesn't have a good track record when it comes to privacy, is the only reason users are on the lookout for good replacements to the service.
The landmark acquisition deal that happened several months ago shocked many people, especially those who used WhatsApp as a regular chatting tool. As part of the deal, Facebook offered WhatsApp a whopping $4 billion in cash and $12 billion worth of shares. Starting 2014 with a big bang, the deal is one of the biggest deals that have ever happened in the tech industry. Biggies like Google and Microsoft were keen on buying WhatsApp but finally Facebook managed to woo the emergent startup and make history. WhatsApp has over 450 million monthly users, 72% of whom use the app everyday.
Based on some recent experience, I'm of the opinion that smartphones are about as private as a gas station bathroom. They're full of leaks, prone to surveillance, and what security they do have comes from using really awkward keys. While there are tools available to help improve the security and privacy of smartphones, they're generally intended for enterprise customers. No one has had a real one-stop solution: a smartphone pre-configured for privacy that anyone can use without being a cypherpunk.
Providing a common gateway for web services, caching web requests or providing anonymity are some of the ways organizations use proxy servers. Commercial proxy products, especially cloud offerings, are plentiful, but we wondered if open source or free products could provide enterprise-grade proxy services.