Jeśli chcecie mnie wesprzeć to zapraszam do kupna mojego poradnika "Jakim jesteś Makiem?".

Signal – app do nawiązywania szyfrowanych połączeń telefonicznych, których nie można podsłuchać →

30 lipca 2014 · 10:45

Russell Brandom:

It’s called Signal, a free iOS app aiming for the simplest and easiest encrypted call you’ll ever make. (No relation to the telecom startup of the same name.) The sign-up is as close to seamless as it gets: Just enter your phone number, put in the confirmation code, and you’ll be ready.

Aplikację znajdziecie w App Store, tutaj.

NSA rzekomo ma dostęp do każdego iPhone’a

2 stycznia 2014 · 10:54

Kilka dni temu zaczęły pojawiać się informacje, że NSA ma zdalny dostęp nie tylko do telefonów z Windows Phone, Androidem czy innych, ale przede wszystkim do iPhone’a. Kompletny dostęp bez żadnych ograniczeń, po uprzedniej fizycznej ingerencji osób trzecich w telefon. Do telefonów … Czytaj dalej

NSA i TAO – metody działania, które Was zadziwią →

30 grudnia 2013 · 17:04


If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called „load stations,” agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the „most productive operations” conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks „around the world.”

List do Obamy od AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter i Yahoo →

9 grudnia 2013 · 06:56

Dear Mr. President and Members of Congress,

We understand that governments have a duty to protect their citizens. But this summer’s revelations highlighted the urgent need to reform government surveillance practices worldwide. The balance in many countries has tipped too far in favor of the state and away from the rights of the individual — rights that are enshrined in our Constitution. This undermines the freedoms we all cherish. It’s time for a change.

Dwa sposoby pobierania danych przez NSA — PRISM i „upstream” →

10 lipca 2013 · 22:16

Craig Timberg:

A classified NSA slide obtained by The Washington Post and published here for the first time lists “Two Types of Collection.”

One is PRISM, the NSA program that collects information from technology companies, which was first revealed in reports by the Post and Britain’s Guardian newspaper last month. The slide also shows a separate category labeled “Upstream,” described as accessing “communications on fiber cables and infrastructure as data flows past.”

Pod linkiem slajd, którego jeszcze nie widzieliście.