Tagged: freedom Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 12:08 am on November 29, 2018 Permalink | Reply
    Tags: air pollution in palestine, breathing freedom, freedom, gaza toxic biosphere, , palestine forever, palestine freedom songs, say no to genocide, say no to mass murder, say no to zionism   

    Gaza Genocide Harms the Environment 

    Gaza now has a toxic ‘biosphere of war’ that no one can escape

    Air Pollution in Palestine

    Gaza’s drinking water spurs blue baby syndrome, serious illnesses

    With the resources at its disposal, Israel can take measures to prevent the land under its control from becoming uninhabitable toxic wasteland. Palestine has no such resources.

     

    I BREATHE FREEDOM

    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    You will never be able to abolish me
    You must listen to me and talk to me
    And if you think you’re healing me
    This is not medicine
    If only you would listen to me
    In spite of everything that’s happened
    Power is what fails
    If it goes against thoughts
    This world is big enough for everyone
    Only the truth prevails
    And if you want we can find a solution
    If only we think together

    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall
    The voice of freedom is louder than everything else
    No matter how much the wind of darkness blows,
    And the night covers the distances.
    You can’t color this whole world
    With the same color
    And change the order of the earth
    And the flow of the air
    I breathe freedom, don’t take my air
    Don’t push too hard, it’s better that we don’t both fall

    More freedom songs at https://palestineforever.home.blog/

    See also International Day of Living Together and Judaism’s Final Solution: Compassion

     
  • Earthling 7:37 am on November 11, 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, freedom, gafam, , healthy living, , , linux, malware, , private life, qubes, security, spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 

    On the internet, security is a prerequisite for privacy.

    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.

    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:

    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.

    • Encrypt your hard drives.

    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.

    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.

    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.

    • Use encrypted communication when possible.

    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)

    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.

    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.

    • Don’t use public wifi connections. If you do, use a VPN.

    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?

    • Use a firewall on your computer and phone to control which applications use the internet.

    • Use a firewall on your router to filter out bad content as it’s coming in.

    • Use a family internet filter on your computer to block malicious sites (porn, gambling).

    • Keep everything updated regularly.

    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.

    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.

    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.

    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.

    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.

    • Use an antivirus on Windows or OS X, but don’t rely on it.

    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.

    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.

    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.

    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.

    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.

    • Don’t use the same password everywhere. Use strong passwords.

    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.

    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.

    SERVICES TO AVOID IF YOU WANT PRIVACY

    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.

    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.

    HOW TO TELL IF YOUR DEVICE HAS BEEN COMPROMISED

    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.

    WHAT TO DO WHEN YOUR PRIVACY IS INVADED

    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.

    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.

    RELIABLE PRIVACY

    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.

    Further information on surveillance: https://ssd.eff.org/en#index

    Article by Anonymous Man

     
  • Earthling 12:55 am on June 4, 2018 Permalink | Reply
    Tags: columbine communities, freedom, Permsky Krai, Permsky Krai surveillance, preventing school attacks, protecting children, protecting children from harm, , Social network surveillance, , Surveillance of children, Surveillance of children in Russia, surveillance on social networks, Vkontakte surveillance   

    Russia: Permsky Krai authorities plan internet surveillance of children 

    slezhka-za-detmi-v-inete

    Under the guise of “implementing a system of measures to reduce family and child deprivation,” the regional government is launching a system that monitors and analyzes the behavior of adolescents on social networks.

    In the Perm region, a new information system will analyze the behavior of adolescents on social networks and collect information about their mental health, problems in the family, and communication with their peers and the law. Information on the implementation of internet surveillance for minors was announced at a meeting of the regional government.

    Maxim Reshetnikov, Governor of the Perm Territory, justifies the introduction of such a system by the fact that, although in the last 2 years there has been a decrease in juvenile delinquency by a quarter, violations of the law occur more often with the participation of children from well-off families than those from the “risk” group and the “socially dangerous situation” group. “The reasons here are, as they say, collective. Parents with a modern rhythm of life do not always have time to deal with children, while teachers have a big load, an orientation toward the educational process. And sometimes there are no skills present to recognize when children are in difficult situations. The current prevention system is mainly oriented towards working with children who are already in the zone of attention of social services. Obviously, we need new approaches and solutions. First and foremost, we need an interdepartmental and multi-level preventive system that will identify risks at the earliest stages, when the problems are only beginning to appear.”

    Deputy Prime Minister Tatyana Abdulina said that the system will be formed before the end of 2018. It will collect information from various sources and “provide a comprehensive solution.” “It will be … constantly monitoring social networks to identify participation in destructive groups. The diagnostic tools of psychologists have been significantly changed in terms of risk factors,” she said, adding that since the beginning of September, parents in Permsky Krai will begin to educate on the issue of education through specially created lessons.

    The special system is intended to help identify at an early stage children who are predisposed to crimes or suicide and to help them. The auction for its creation should take place before October 1, 2018.

    It is not known whether the consent of the children and their parents will be required for the collection of information.

    A similar social surveillance project for children was organized in February last year by the Tyumen League of Internet Safety. After agreeing with the regional education authorities, the League started collecting data on the pages of schoolchildren in the social network VKontakte. It was formed on the base of teachers, and access to it was given to the activists of the BizInternet League (WithoutInternet League). This league’s head Denis Davydov also reported that they intend to introduce this initiative in other regions — certain agreements were already available at that time.

    Let us recall that since the beginning of this year, the media has reported several cases of attacks on schools by students with the use of cold weapons, firearms or traumatic weapons. Authorities attribute this to a trend of the so-called “Columbine” community on social networks, but the social networks themselves have denied this. In the wake of media hype, certain politicians, in particular Irina Yarovaya and Elena Mizulina, have repeatedly voiced the idea of ​​further tightening legislation. Recently Yarovaya submitted a bill to the State Duma “aimed at protecting the lives of children from Columbine communities and promptly identifying criminals involving minors in life-threatening situations.”

    Translated from RosKomSvoboda: https://roskomsvoboda.org/39324/

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
Bitnami