Nick Morganti

38 Flips | 1 Magazine | 41 Likes | 2 Following | 2 Followers | @NickMorgant2014 | Keep up with Nick Morganti on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Nick Morganti”

AG on encryption: we don’t want back doors, just back doors

Encryption has become a very thorny subject of late, particularly in but not just limited to the US, which isn’t that surprising considering most of …

Numbers don’t lie—it’s time to build your own router

With more speed available and hardware that can't adapt, DIY builds offer peak performance.<p>I've noticed a trend lately. Rather than replacing a …

Wi-Fi

New NSA documents reveal plans to deliver malware through the Google Play store

The NSA developed a plan to deliver malware through Google and Samsung app stores, according to newly published documents obtained by Edward Snowden and published by <i>The Intercept</i>. The documents details a program called IRRITANT HORN, which delivers malware by intercepting web traffic to and from …

Google Play

Encrypting Your Email: What Is PGP? Why Is It Important? And How Do I Use It?

The basics of encrypted communication.<p>In the summer of 2013, the U.S. woke up one morning to learn that NSA subcontractor Edward Snowden had dumped some of the federal government’s biggest secrets on the front pages of newspapers worldwide. As we would later learn, Snowden’s revelations became …

The best Linux distro for privacy and security in 2018

The awesome operating system Linux is free and open source. As such, there are thousands of different ‘flavours’ available – and some types of Linux …

Congressman with computer science degree: Encryption back-doors are ‘technologically stupid’

By Andrea Peterson<p>, Reporter<p>The debate over whether companies should be forced to build in ways for law enforcement to access communications protected by encryption took a tense turn this week in a congressional hearing.<p>On one side were law enforcement officials, including a high-ranking FBI …

From Kaspersky To Webroot, Major Security Firms Can't Even Get Basic Android Encryption Right

When recently-appointed president of RSA, Amit Yoran, opened his company’s flagship conference yesterday, he warned the security industry was living in the dark ages. Protections just aren’t working, he said. Various anti-virus firms, including big names like Kaspersky and Webroot, have offered …

New Dark-Web Market Is Selling Zero-Day Exploits to Hackers

Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch …

Op-ed: Why the entire premise of Tor-enabled routers is ridiculous

Unless you use Tor Browser Bundle for everything, you're going to be spied upon.<p>Nicholas Weaver is a staff researcher at the International Computer …

The NSA wants a multi-part encryption key for ‘front door’ access to your data

The US National Security Agency (NSA) appears to be increasingly concerned about the growing adoption of encryption and its ability to thwart the …

Privacy

Snowden's 'Sexy Margaret Thatcher' Password Isn't So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his …

The Pirate Bay is down, and CloudFlare’s cache is no help (Update: It’s back)

After only a few months of reliable service, The Pirate Bay is down again. The cause of the outage is unknown (we somehow doubt Game of Thrones pirates have overloaded the servers), but the outage has been ongoing for a few hours, so it’s not a minor blip.<p>All we know is that The Pirate Bay’s host …

Game of Thrones

How To Make A Secret Phone Call

To show how hard phone privacy can be, one artist examined the CIA, consulted hackers, and went far off the map (with a stop at Rite Aid).<p>There’s a lot you can find in the depths of the dark web, but in 2013, photographer and artist Curtis Wallen managed to buy the ingredients of a new identity. …

New Firefox version says “might as well” to encrypting all Web traffic

Ready or not, "opportunistic encryption" goes live. (Some configuration required.)<p>Developers of the Firefox browser have moved one step closer to an …

Information Security

Pentagon Personnel Now Talking on 'NSA-Proof' Smartphones

The Defense Department has rolled out supersecret smartphones for work and maybe play, made by anti-government-surveillance firm Silent Circle, …

Encryption is the REAL threat – Head Europlod

Europe’s top cop has taken to the BBC to once again slam encryption as the biggest threat to counter-terrorism and law enforcement.<p>Europol Director …

Pew Survey: Snowden Leaks Are Affecting the Way Americans View Privacy

It’s been nearly two years since former National Security Agency (NSA) contractor Edward Snowden first leaked to the Guardian that the NSA was spying …

Surveillance

Surveillance And The Encryption Boogeyman

In January of this year, British Prime Minister David Cameron let it be known that he intended to dumb down encryption so that law enforcement could monitor all of the information streaming across the country. A direct attempt to capitalize on the Paris attacks. This was an unfortunate overture …

Europol chief warns on computer encryption

<b>A European police chief says the sophisticated online communications are the biggest problem for security agencies tackling terrorism.</b><p>Hidden areas of the internet and encrypted communications make it harder to monitor terror suspects, warns Europol's Rob Wainwright.<p>Tech firms should consider the …

Privacy

NSA Spy Agency Behind “Malware” Infection of Computer Hardware Used by “Enemies” of the U.S.? | Global Research - Centre for Research on Globalization

<i>The NSA’s “Equation Group” is apparently behind the infection with malware of hard drive firmware on computers used by nations considered “enemies”</i> …

FBI Quietly Removes Recommendation To Encrypt Your Phone... As FBI Director Warns How Encryption Will Lead To Tears

Back in October, we highlighted the contradiction of FBI Director James Comey raging against encryption and demanding backdoors, while at the very …

Privacy

NSA Doesn't Need to Spy on Your Calls to Learn Your Secrets

Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives. Often this …

Malware Can Steal Data From Non-Networked Computers, Via Heat

"Hot or not?" comes to computer security<p>Back in 1999, Neal Stephenson's novel <i>Cryptonomicon</i> introduced me to the idea of Van Eck phreaking—intercepting the weak electromagnetic radiation from a computer monitor to recreate what the person is seeing on the screen. Now security researchers have come …

The Pirate Bay's new network is making ISP blocks useless

Despite global efforts to put the kibosh on infamous torrent site The Pirate Bay (TPB), the lair of internet swashbucklers is proving almost impossible to sack. Swedish police succeeded in taking the site down late last year, only for it to reappear the following month. And stronger than ever it …

How To Anonymize and Encrypt Your BitTorrent Traffic

Whether you’re trying to dodge an angry government, a connection throttling ISP, or the watchful gaze of media conglomerates, anonymizing and …

How to Turn a Raspberry Pi into an Always-On BitTorrent Box

It’s ideal to have a dedicated machine for your BitTorrent client, so you can seed 24/7. But it’s energy intensive to leave a full rig powered up and …

BitTorrent

Most Of The Web Is Invisible To Google. Here's What It Contains

A roadmap of the Internet's darkest alleys<p>You thought you knew the Internet. But sites such as Facebook, Amazon, and Instagram are just the surface. There’s a whole other world out there: the Deep Web.<p>It’s a place where online information is password protected, trapped behind paywalls, or requires …

Exponential Finance Conference

How To Use I2P | I2P Tutorial & Setup Guide

You've probably heard the term 'Darknet' thrown around a lot. It seems to be a buzzword that either invokes fear or a sense of l33t h4ck3r skills. A …

Ross Ulbricht Calls For New Trial, Alleging Feds Hacked Tor

Before Ross Ulbricht has even been sentenced for his conviction last month of running the Silk Road's massive online narcotics operation, his defense …