Find out who Edward Snowden is following on Twitter, why Peeple is the worst and what Cyber Security Awareness Month is from this week’s news roundup.
If the world really needed more proof to realise the scale on which the NSA machinery operates, a new and irrefutable proof was released today.
On January 17 2015, Spiegel.de published an article based on documents obtained from Edward Snowden and provided a copy of a malicious program named “QWERTY” ), supposedly used by several governments in their Computer Network Exploitation (CNE)operations.
Today, the same news publication released an article, demonstating the same code provenience and indentical functionality of “QWERTY” malware to the Regin 50251 plugin.
Given the fact that the QWERTY keylogger doesn’t function as a stand-alone module, only in tandem with kernel hooking functions provided by the Regin module 50225, it was concluded that the QWERTY malware developers and the Regin developers are the same or working together.
You can read here all the mind-binding conclusions of this ground breaking analysis that states once again that mass-surveillance is more than a fact, it’s a threat.
One year has passed since Edward Snowden left the US. He showed the world the NSA abusive use of online surveillance and how a real hero looks like.
One man sacrificed his life and welfare so that a world could benefit again from their privacy and dignity. We will never be able to thank you enough for this, Edward Snowden!
We want to celebrate this important moment with you, our readers, and encourage every internet user once more to start using one of the best anti-NSA weapon there is: CyberGhost VPN!
Now, there are some things that all of us can do, from professionals to every single citizen of this world and that is to take our online privacy seriously and do the right steps to protect it, starting from today.
This means using the right privacy protection tools, being more aware of what we post online and generally, being more aware that what we say online may be interpreted different by different entities and organizations.
For one year now, we know that 2.7 billion people are possibly being mass surveyed by the NSA huge systems (physical size of 6 of the biggest IKEA stores, capable to store our entire lives).
Facebook doesn’t even charge for giving away data to NSA and 98% percent of the PRISM data has been collected from Google, Yahoo and Microsoft, but AOL, YouTube, Apple or Skype are also involved, according to Wikipedia and other important sources. Read More
I don’t know if you have noticed, but we are really passionate about privacy and all the NSA events going on right now.
This is one of the main reasons why we created a YouTube show, right now we are at episode 8, about all the exciting and mind-blowing things happening in the online privacy.
We have a new episode presented by our host, the British journalist, Michael Bird, with fresh news every other week, so you have time to share our show and debate our subjects with your friends until the next episode. Read More
Following the latest rumors about NSA and its connected Intelligence Services, many of you Ghosties are concerned about the decryption program called ‘Bullrun’ which is said to be able to hack SSL and VPNs – along with the equal alarming news that a lot of US companies have been forced to implement backdoors to their services.
But, and it’s a big ‘BUT’ here, we need to differentiate between an eligible concern and unfounded fears. The encryption line of battle has not been broken yet. It’s under heavy attack, no doubt about that, but good encryption still works the way it should: Protecting your data!
It’s true, that an encryption program called ‘Bullrun’ exists, and it really seems it’s able to compromise security barriers like SSL (as you use with your online banking) – but it doesn’t work as good as the NSA hoped it would. That’s why they force companies to implement backdoors and influence the programming of encryption standards (so they can easily break it). In a way that bad news is a good news, because it shows that despite all the money and the man power that goes in there, less than expected came out.
If you think a tin foil hat makes you look silly, I totally approve that. And if you wonder how I came to this point, here’s the story:
As Edward Snowden exposed the NSA program Prism, I was surprised to find out that reality is far worse than any science fiction scenario or conspiracy theory. Even as a co-founder and CEO of a VPN company, I found the scale of these operations through an US government agency hard to believe until everything was confirmed and approved. Then, the first picture that popped into my mind were these people wearing tin foil hats designed to block their thoughts from being intercepted and controlled. And for the first time I could really empathize with them.
Then, it all got even worse with Tempora, the program assigned with the full record of all internet traffic through the British secret service, GCHQ. And from there on it was pretty clear that Prism and Tempora are just small pieces of the puzzle and maybe by the end we’ll all end up wearing tin foil hats.
The next level was to realize that our politicians are either not willing or able to defend our basic human rights, such as privacy. Then I heard Barak Obama, the Nobel Peace Prize Laureate reacting to the scandal by stating that we can’t have 100% security and 100% privacy. In other words, we all should have 0% privacy to maybe get a bit more security. Hans-Peter Uhl, the German spokesman for interior security of the CDU/CSU faction in the Bundestag says that the state anyway can’t help and people should encrypt their data by their own, if they want to have privacy. Sounded like they were making fun of each and every single one of us.
I talked to a lot of people in the last weeks about the above mentioned topics and I got a lot of replies, ranging from “yes, I always knew that” or “Your fault, if you use Facebook” to“I have nothing to hide” – but one reaction was always the same: “What can we do? Nothing.” And I thought that this is not true. We can do something. We can’t wear a tin foil hat. Or we shouldn’t. Seriously, that thing looks silly. But CyberGhost VPN is a great tool for locking your metadata away from this massive violation of privacy! Use it instead of a tin foil hat and take your privacy seriously.
And in response to that I put my tin foil hat on to show the world that a VPN works like a charm:
Don’t forget: Here at CyberGhost, we believe that privacy is for everyone and with our current campaign, we’ve been striving to make it accessible and convenient.
You just have to go on www.worthofprivacy.com, decide how much your privacy is worth to you and we deliver you 12 month of CyberGhost VPN with no questions asked.