PRIVACY MATTERS
HARDWARE:
-
Novena
-
Purism’s Librem (on CrowdSupply), Puri.sm, PureOS
-
Cryptophone
-
Silent Pocket Faraday Cage Sleeves
KILL ADS/MALWARE:
-
uBlock Origin: Chrome, Opera (uBlock), Mozilla, Safari (uBlock)
-
hosts: someonewhocares.org
KILL GOOGLE & FACEBOOK TRACKING:
-
SRWare Iron - no-spyware Chrome compilation (Windows/Mac OS X/Linux)
-
Pale Moon - XSS-filtering Firefox compilation (Windows/Linux, unofficial Mac OS X)
-
Disconnect.me
-
Track_me_not - Chrome, Firefox
-
Google Redirect Remover - Firefox
-
Remove Facebook Redirection - Chrome, Opera, Firefox
-
Facebook Redirect Fixer - Chrome
-
Self-destructing cookies - Firefox
-
Vanilla Cookie Manager - Chrome
-
Cookie Killer for Facebook - Chrome
-
Reader View - Opera, Chrome
-
Facebook Unseen - Chrome
-
Facebook Chat Privacy - Chrome
EMAIL, MESSAGING & MORE:
-
OpenPGP on Windows, Mac OS X, and Linux
-
Tor Project
-
Qubes OS (mature, with Whonix, Windows 7 TemplateVM’s)
-
Subgraph OS (alpha)
-
TAILS (The Amnesic Incognito Live System)
-
HTTPS Everywhere
-
+TrueCrypt v. 6.3a (!!!!)
-
Qubes versus Whonix versus Tor
-
Ricochet
-
The Great Fire - Circumvention Central
-
Unfiltered News
-
Security Without Borders
-
Prism-Break
-
Signal - Open Whisper Systems
-
ProtonMail
-
coreboot
-
Marble (google/bing maps replacement)
-
FreedomBox
-
Bromium - commercial security layer on top of Windows, and a security blog
VULNERABILITY & PENETRATION TESTS (PENTESTING)
-
FREAK Attack test & description
-
Panopticlick test & description
-
SHAttered
ARTICLES / LECTURES / PAPERS
2017’s
2016’s
-
Berlin Logan CIJournalism Symposium 2016: Future of OS - with Joanna Rutkowska (Qubes), David Mirza Ahmad (Subgraph), Tails, and Jakob Appelbaum as moderator
“In an era of mass surveillance the need for independent, reliable and usable Operating Systems is fundamental. In previous times, political movements needed their own printing press for circumventing propaganda and repression. In the digital age we need independent Operating Systems to protect our freedom of speech and freedom of action. The creation of independent OS is both a technological challenge and a social, political and economic challenge. To protect and encrypt yet offer transparency of control, and make it easy to use for all of us, is a great challenge. Trusting hardware, software and organisational structure is an issue from building all the way to using the OS.”
-
Berlin Logan CIJournalism Symposium 2016: Fighting the Global Arena with David Mirza Ahmad, Alison Macrina and Julian Assange, Jérémie Zimmermann as moderator
“From journalists to techies, from artists to activists, from experts to entertainers; everybody is needed to fight for the right to privacy, transparency and revolution. Our special guests will present a spectrum of spectacular actions.
More than five years ago Julian Assange built a sophisticated submission system that both promised and delivered security for whistleblowers around the world. It has led to a virtual explosion of publicly accessible information that governments and corporations have desperately tried to conceal. Disclosures of corruption, mass murder and illegal governmental activities on a huge scale are now irretrievably in the public domain.
The battle began with WikiLeaks and expanded dramatically with the Snowden revelations. Sadly, the universality of surveillance has meant that conventional computer systems are so compromised and vulnerable that radical new solutions are required.
In defence of personal freedom and privacy, the Subgraph team has built a highly secure new operating system that will be launched at this session. This long awaited new OS will hopefully provide a framework of protection for the future.” -
Jacob Appelbaum at the Berlin Logan CIJ Symposium 2016: “Your politics are in everything that you write”
-
33c3 - Will Scott and Philipp Winter: State of Internet Censorship - 2016
-
(papers) Selected Research Papers in Internet Censorship
-
(paper) Robust De-anonymization of Large Sparse Datasets
-
33c3 - Claudio Guarnieri: Hacking the world
-
33c3 - Bill Marczak and John Scott-Railton: Uncovering Nation-State Mobile Espionage in the Wild
-
Snowden: FBI doesnt require Apple’s help to unlock an iPhone, they already know everything
-
We Want You In Charge: Iceland’s Pirates Now Largest Political Party
-
More than 1 million People now access Facebook Over Tor Network.
2015’s:
-
32c3 - Roger Dingledine, Jacob Applebaum, Mike Perry, Shari Steele, Alison Macrina: State of the Onion
-
Top 5 Jacob Applebaum’s responses - 2015 Cybersecurity - Tor - Snowden
-
32c3 - Joanna Rutkowska: Towards (reasonably) trustworthy x86 laptops / (Intel ME/AMT/vPro considered harmful) + whitepaper (PDF) + wikipedia article
-
Free Software Foundation article: “Active Management Technology”: The obscure remote control in some Intel hardware
“In principle there is no problem with the concept of AMT, as long as the owner of the machine controls the remote access to it. Unfortunately, that is not the case with AMT, because it is entirely proprietary and its specs are secret.
[..] When you buy new hardware, don’t buy Intel hardware that has AMT. AMD chipsets do not contain anything like AMT. Note, however, that there are other comparable problems in hardware from both Intel and AMD.” -
Tom’s Hardware article: Intel vPro: Three Generations Of Remote Management
“…there’s really no way to set up a story like this one using AMD-based hardware. An enthusiast or system builder interested in remote management really only has one game in town…”
-
32c3 - Matthew Garrett: Beyond Anti-Evil Maid
-
CrowdStrike’s 2015 Global Threat Report (with webcast recording)
-
OpenPGP experimental feature in facebook’s profile (an article by facebook about it’s new Tor gate (https://facebookcorewwwi.onion/)
2014’s:
-
CopyCamp 2014 - Birgitta Jónsdóttir
-
Libreplanet 2014 - Jacob Applebaum: Free software for freedom, surveillance and you (transcript)
-
Jacob Appelbaum - People Think They’re Exempt From NSA
-
Jacob Appelbaum - 2 Hour Talk in India + Q&A on Drone Attacks, CypherPunks & Alternate Systems
2013’s:
-
30c3 - Claudio Guarnieri, Morgan Marquis-Boire: To protect and infect part 1
-
30c3 - Jacob Applebaum: To protect and infect part 2
-
30c3 - Annie Machon: The Four Wars - Terror, whistleblowers, drugs, internet
OLDER:
-
1996 - A Declaration of the Independence of Cyberspace
-
2008 - whitepaper “Report on dangers and opportunities posed by large search engines, particularly Google” (PDF)
H. Maurer, Co-author, editor and responsible for the project, Institute for Information Systems and Computer Media, Graz University of Technology. Co-authors in alphabetical order: Dipl. Ing. Dr. Tilo Balke, L3S Hannover Professor Dr. Frank Kappe, TU Graz Dipl. Ing. Narayanan Kulathuramaiyer, TU Graz Priv. Dozent Dr. Stefan Weber, Uni Salzburg Dipl. Ing. Bilal Zaka, TU Graz
-
29c3 - Jacob Appelbaum: NSA Utah Spy Data Center
-
27c3 - Sylvia Johnigk: INDECT an EU-surveillance project
-
23c3 - Joanna Rutkowska: Stealth malware - can the good guys win?
-
21c3 - Joanna Rutkowska: Passive covert channels in the Linux kernel
-
1992 - The Crypto Anarchist Manifesto
MEDIA:
-
International Modern Media Institute
-
CitizenFour (2014) - an Oscar for Best documentary, 43 awards and 34 nominations
-
Silenced (2014) - 1 award and 1 nomination
-
Mr. Robot (2015)
BOOKS:
-
Cypherpunks - Freedom and the Future of the Internet
-
When Google met Wikileaks
-
Edwin Black - IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation