"A federal judge in Washington has issued a key order in one of the many ongoing mass-BitTorrent piracy lawsuits in the United States. The judge ruled that a complaint from the “Elf-Man” movie studio is insufficient because the IP address evidence does not prove that an account holder is guilty of copyright infringement."

phoxbox:

The man who appeared before Congress last week to explain the security pitfalls of HealthCare.gov took to Fox News on Sunday to explain just how easy it was to penetrate the website.

Hacking “expert” David Kennedy told Fox’s Chris Wallace that gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes and required nothing more than a standard browser, the Daily Caller reported.

“And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know, I’m sure it’s hundreds of thousands, if not more, and it was done within about a 4 minute timeframe. So, it’s just wide open.”

“You can literally just open up your browser, go to this, and extract all this information without actually having to hack the website itself,” he said.

thinksquad:

This ruling means there is no one who can protect us from ISPs that block or discriminate against websites, applications or services.

If you want to contact the FCC about restoring Net Neutrality, click here.

antigovernmentextremist:

If you haven’t heard of them already, make yourself aware.

"Though e-books are rising in popularity, print remains the foundation of Americans’ reading habits,” Pew researchers wrote in a release on the survey’s results. “Most people who read e-books also read print books, and just 4% of readers are “e-book only.” Overall, 89% of those who had read an e-book had also read a book in print."

fishingboatproceeds:

isnerdy:

npr:

"Every Job In America, In 1 Graph"

This is a really cool graph, and confirms just how much of a service-based economy we now live in.

You gotta click through to see the full image. Fascinating.

(Source: freeoldglory)

youranonnews:

Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. We might not all be able to prevent the NSA and GCHQ from spying on us, but we can at least create more obstacles and make surveillance more expensive. The more infrastructure you run, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.

THIS GUIDE IS A VERY BRIEF INTRODUCTION TO ONLINE SECURITY IN THE HOPES THAT YOU’LL INVESTIGATE FURTHER. DON’T TRUST YOUR LIFE TO IT.

1. TOR BROWSER BUNDLE

Includes all you’ll need to access the Tor Network.

Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).

2. BLEACH BIT

Many features to help you easily clean your computer, free-up space and maintain privacy.

3. TAILS

A live operating system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.

Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more.

4. TRUECRYPT

Create virtual hard drives which encrypt any files you save onto them. Many types of encryption.

5. PIDGIN

Chat software that allows use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.

6. OFF THE RECORD

A simple plugin for Pidgin. It encrypts all conversations held using the software.

7. THUNDERBIRD

Free email software. Add your existing mail account to it.

8. ENIGMAIL

A security extension to Thunderbird. Write/receive emails signed and/or encrypted with the OpenPGP standard.

9. GNUPG

Free implementation of the OpenPGP standard. Encrypt and sign your emails.

- See more at: http://theoccupiedtimes.org/?p=12362#sthash.NZiOcymS.dpuf
joewinograd:

Digital stop-motion animation loop (GIF)
January 10, 2014

joewinograd:

Digital stop-motion animation loop (GIF)

January 10, 2014

txchnologist:

Our imagination is stretched to the utmost, not, as in fiction, to imagine things which are not really there, but just to comprehend those things which are there.

-Richard Feynman, The Character of Physical Law

The Canada Foundation for Innovation created this infographic that touches on the powerful future applications of quantum mechanics. Click here to see it in full size at Visual.ly.

Read More