
Man uses Raspberry Pi to create small spying tool
• dvice.comThat’s all it took for Brendan O’Connor to create a private, personalized NSA-like Internet spying device.
ON AIR NOW
Click to Play
That’s all it took for Brendan O’Connor to create a private, personalized NSA-like Internet spying device.
Update: Snowden commented Friday on the closure of the encrypted email service Lavabit, which he himself has used in the past.
Four million people laugh at the same cat in unison, probably.
Silent Circle, a prominent supplier of secure communications services has decided to shutter its e-mail service to avoid having to turn over confidential customer information to the government. The move comes hours after another e-mail service provid
Silent Circle's CEO Michael Janke admitted that some of its high-profile users would likely have authorities sniffing around soon. In the meantime, Silent Circle's phone, video and text encryption systems are still up and running.
Police forces around the world have had the problem that when their officers get a bit carried away and start pepper spraying tied captives there is someone on hand filming the event on their mobile phones.
Responding to allegations the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett denied it. Turns out that wasn't quite true
I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately,
Today, former-Congressman and presidential candidate Ron Paul announced the Ron Paul Channel (www.RonPaulChannel.com) would launch the week of August 12, 2013 and new details about the Channel.
A new trial in the U.K. lets people pay for items using the PayPal app, a mobile phone, and a photo to prove their identity.
U.S. cloud providers could lose between $21.5 billion and $35 billion in revenue over the next three years because of worries about the National Security Agency's PRISM program, which enables the government to access user data from U.S. Internet comp
Quietly, with almost no fanfare, the governing board of the internet (ICANN) approved a new .
The film and music industries have been waging a war against file sharing through the courts for years, but have more recently started working with governments and ISPs to stop sharing at the source.
Adolescents with mental health problems are particularly hard for therapists to engage. But a new computer game is providing a healthy conduit for effective communication between them
The Dollar Shave Club delivers cheap razor blades and butt wipes right to dudes’ doors so they don’t have to deal with the inconvenience of actually going to the store.
In a crackdown that FBI claims to be about hunting down pedophiles, half of the onion sites in the TOR network has been compromised, including the e-mail counterpart of TOR deep web, TORmail.
If you've noticed that YouTube and Netflix stream slowly during peak hours, you might chalk it up to a congested network.
Low-price retailer T.J. Maxx plans to open an online store this year, as does rival Saks Inc's Off Fifth outlets, making 2013 the year technology may have caught up with the speed of fashion.
Reputation.com says it’s ready to unveil a place where people can offer personal information to marketers in return for discounts and other perks.
Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
Before last NFL season kicked off, PopMech reviewed some of the best apps for fantasy football freaks.
Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to
"Silent Circle" has a password test. Note that longer passphrases, even if they are only lower case characters, are tougher to crack than shorter passwords with all sorts of numbers and non-characters.
Researchers reverse-engineered a list of keywords blacklisted on various messaging platforms.
Last week’s House debate on the Defense Appropriations bill for 2014 produced a bit more drama than usual. After hearing that House leadership would do away with the traditional “open rule” allowing for debate on any funding limitation amendment, it
Here Swartz describes the nature of the shift from centralized one-to-many systems, such as broadcast television, to the decentralized many-to-many topography of network communication. The end of scarcity in transmission capacity poses the question o
The US government has demanded major Internet companies divulge users' stored passwords, according to sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.
A watchdog in Ireland, home to the European headquarters of Apple and Facebook, says it will not investigate them for transferring personal data to a U.S. spy agency BECAUSE they have signed up to EU privacy principles. lol
Here's something we could all probably use at one time or another — it's an app for finding lost items.
A very typical day of me trying to get much less read a message from Dr. Paul.