In other words, Tor:
Solari said Winner’s laptop also contained software that could enable her to access online black-markets and buy items — such as a fake ID or passport — without revealing her identity or location.
Source: Accused NSA leaker wanted to ‘burn the White House down’ | New York Post
They can make the same allegation about encryption. Attempting to protect your medical, financial and educational records is a sign of nefarious intent?
Every journalist in existence, if they are any good at all, has Tor on their computer. So do private industry analysts reviewing competitor’s products and government policy plans. Tor is a browser that assists with anonymous browsing and accessing web sites as it hides one’s true IP address from the destination web server. There are numerous and valid reasons to use Tor to access publicly available information.
“WannaCrypt” is the malware that attacked and encrypted computer contents, globally, and then wormed its way through networks to other unpatched Windows computers.
The threat was so large and damaging, that Microsoft has released patches for no longer supported operating systems Windows XP, Windows Server 2003 and Windows 8. Of interest, according to Microsoft, the WannaCrypt malware exploited a previously patched vulnerability in Windows 7 and Windows Server 2008 and did not have any impact on systems running Windows 10.
For information see the Microsoft blog.
234 Android apps have been identified as using your phone to monitor TV advertising effectiveness:
The apps silently listen for ultrasonic sounds that marketers use as high-tech beacons to indicate when a phone user is viewing a TV commercial or other type of targeted audio. A representative sample of just five of the 234 apps have been downloaded from 2.25 million to 11.1 million times, according to the researchers, citing official Google Play figures. None of them discloses the tracking capabilities in their privacy policies.
Source: More Android phones than ever are covertly listening for inaudible sounds in ads | Ars Technica
Look around your home or office. To the left is a new Amazon Echo. To the right, your Siri-enabled iPhone. Across the hall is a Nest thermostat.And each device is collecting data on you, your habits, and your lifestyle – every minute.
Source: Five Big Privacy Risks Posed by Data Analytics | Bill McCabe | Pulse | LinkedIn
The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.
Source: Suspected CIA spying tools linked to hacks in 16 countries | PCWorld
Our phones track our location, what stores and restaurants we visit, ISPs may track our web wanderings, CCTV and license plate scanners monitor us in public, our expenses are tracked via credit card databases, Android phones log recordings of our voice in the Google cloud – and IoT enables the tracking of what we watch on TV, how often we open the refrigerator door … the primary business model of the Internet is 24 x 7 surveillance.
What do you think of this?
Source: The Whole POINT of the Internet of Things Is So “Big Brother” Can Spy On You | Global Research – Centre for Research on Globalization
Employers are monitoring employees activities across a broad spectrum of functions – including your health, your physical activity, even attempting to measure your mood. At least one company required employees to have an app on their smart phone – which was then used to track the employee’s whereabouts and activities 24 x 7, including when they were not on the job.
In the case of health tracking, comply or the company effectively makes your health insurance benefits cost more.
Stop and think and make a note of all the places your are monitored. Start making a list – you may be quite surprised at how much your activities are monitored.
Source: Workplace Surveillance Is The New Office ‘Perk’ – Vocativ