Tag - encryption

What is the FBI trying to achieve?
Use LinkNYC wireless public network from New York in a secured way
Encryption – A Guide for Everyone
One year after Snowden declared war to the NSA…

What is the FBI trying to achieve?

In the past few days, media reported about how parts of the US IT industry resist the espionage plans of the US government – triggered by Apple’s refusal to hack the phone of a suspect and prospectively install backdoors for secret services. What exactly is Apple required to do? And why is the company’s resistance so important? Also concerning VPNs …

For the first time in history, the government asks a company not just to assist in the investigation of an offense, request that no one would actually complain about; but publicly demanding Apple to develop a completely new software that makes the onsite security of its devices and features superfluous. This demand is affecting the security features that impact all Apple users and anyone who communicates with Apple’s users, and which are essential in the prevention of digital crimes. Bottom line, the company is forced to develop a master key that unlocks every single iOS device.


What would be the new changes? If FBI is successful, three major changes should be implemented by Apple:

  • Currently, iOS can be adjusted so that it clears the internal keys after 10 unsuccessful password entries. FBI wants the software without this feature.
  • After each unsuccessful password entry to unlock a device, iOS prolongs the time until another attempt can be made. The FBI wants the new software to accept an infinite number of entries without breaks.
  • iOS requires that passwords are entered manually. The FBI would like the possibility to enter passwords electronically, so one can run automatically a variety of options in a short period of time.
FBI's demand is affecting all Apple users and anyone who communicates with them. #PrivateLivesMatter Click to Tweet

If FBI’s requests will be approved, not only would Apple suffer of a bigger image loss than the one triggered by the Snowden revelations, but there would arise a fatal situation for citizens and businesses alike. By default, built-in back doors would not only be available for the US government, but potentially for others as well, especially for known enemies of the western countries like Iran, North Korea and Russia, but also the competing national economies, hackers and cybercriminals.

It’s rather naïve to believe that for the sake of all citizens, governments are the only ones trying to keep an eye on encrypted data. This rather reveals how much the thinking of law enforcement agencies has developed in only one direction: understanding total surveillance with themselves as luminaries of the planet, morally unassailable and almost uncontrollable anyway.

Another step towards 1984 2.0

And it would be only the first step, because once the protection of devices is gone, VPNs are just the next target on the hit list. If Apple’s refusal fails in court, the enforcement of backdoors for encrypted Internet access via virtual networks is only a matter of time. And besides: US companies operate globally. What arguments will be used for denying the Chinese government to do the same? And the Iranian? Who then has the last word when it comes to separate the evil from the good? And how exactly is the Russian mass surveillance different from the US one?


Use LinkNYC wireless public network from New York in a secured way


Credit: The Verge

New Yorkers have a new subject to talk about!

A network of Wi-Fi public hubs will replace over 7,500 pay phones across the entire New York with new street hubs called Links.

The first Links were launched, and there are many more to come, helping more than 8 million people to connect to the fastest and free metropolitan Wi-Fi.

Even more, according to PC magazine, the speed of these Wi-Fi’s is really super fast, gigabite internet, faster than Starbucks they say, so whatch out, Starbucks.

Cool facts about Link networks: Read More

Encryption – A Guide for Everyone

Did you know that even the great Caesar used a cipher to hide his military
correspondence between 100 – 44 B.C?  The key in this case was simply
to shift to the right by three.

Encryption is not a new concept but it keeps getting more and more complex and useful. We thought that a guide to encryption accessible to everyone would be more than welcomed, either to understand it better or to share it with people who would need it.

Just a short intro: encryption is the process through which information or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed.
The information thus becomes available only to the authorized parties. This authorization works based on keys. Encoding the information is made by using an encryption key while decoding the information is made by using a decryption key.


You can read the entire guide here.

Feel free to share it with people interested.

One year after Snowden declared war to the NSA…

One year has passed since Edward Snowden left the US. He showed the world the NSA abusive use of online surveillance and how a real hero looks like.

One man sacrificed his life and welfare so that a world could benefit again from their privacy and dignity. We will never be able to thank you enough for this, Edward Snowden!

We want to celebrate this important moment with you, our readers, and encourage every internet user once more to start using one of the best anti-NSA weapon there is: CyberGhost VPN!


Now, there are some things that all of us can do, from professionals to every single citizen of this world and that is to take our online privacy seriously and do the right steps to protect it, starting from today.

This means using the right privacy protection tools, being more aware of what we post online and generally, being more aware that what we say online may be interpreted different by different entities and organizations.

Even if you're not doing anything wrong

For one year now, we know that 2.7 billion people are possibly being mass surveyed by the NSA huge systems (physical size of 6 of the biggest IKEA stores, capable to store our entire lives).

Facebook doesn’t even charge for giving away data to NSA and 98% percent of the PRISM data has been collected from Google, Yahoo and Microsoft, but AOL, YouTube, Apple or Skype are also involved, according to Wikipedia and other important sources. Read More

© 2015 CyberGhost