The risks we take every time we go online and generate our own content can be overlooked during the present moment. By creating a vision to help spread public awareness on how to protect your own user-generated content from prying eyes, whether it be governmental or hackers, the reality becomes apparent to why this is… Continue reading You Have Arrived at Your Destination
The idea of “information sharing” has received a lot of attention since September 11, 2001. Before then even the FBI and CIA did not share their online intelligence with each other. However, since then there has been a strong push by the government encouraging the sharing of as much information as possible between agencies. Information… Continue reading Privacy vs Security
The NSA has been spearheading the internal spying movement on American citizens for the sake of relishing the threat of domestic terrorism. This kind of ‘Big Brotheresque‘ oversight must be stopped on the sheer merit of how it undermines the fundamental privacy rights of the public under the fourth Amendment, because it is IllEGAL SEIZURES… Continue reading NSA Surveillance
The app Spygate for the android platform is gaining ground for becoming one of the first apps to stop other user downloaded apps from spying on the person’s location and other data. It is responsible for stopping apps from sending user data without the consent of the individual. It is becoming a favorite among the… Continue reading Spygate… Target Acquired, Target Destroyed
“It’s time we all came to our senses about the NSA,” former Deputy Director of the CIA, John McLaughlin states. McLaughlin argues that the NSA’s ability to tap into people’s phones and computers is the backbone to every government run agency and the country’s protection. He goes on to discuss how important the NSA is… Continue reading Why We Need the NSA…
What better way for presidential candidates to appeal to their audiences interests than to know exactly what they are interested in? For decades campaign managers and their teams have used internet users browsing histories to fine tune their election campaigns. Big data has become one of the most influential sources for advertisers due to its… Continue reading Data Mining in US Presidential Election Campaign
One of the best search fails I’ve seen in a while-Here
Article highlighting economic costs of NSA Article that talks about how expensive running the NSA is. An interesting factor generally not taken into consideration when internet privacy is debated.
Here is a link to the LA Times report of the North Korean internet outage of 2014.
The browser TOR is one of the many ways you can use an internet browser to protect yourself from prying eyes. By hiding your IP address by sending it to a variety of different proxies, you can hide your location and legitimate IP address, so you can browse SAFELY AND ANONYMOUSLY!