Pages

Saturday, June 27, 2015

Google Chrome taps into your microphone

Now we know that Google Chrome has a backdoor setting that turns on your microphone, anyone plans to uninstall it? - FUA

Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.

It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".

chrome-voicesearch

Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.

A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.

Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.

This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.

Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.

Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):

1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.

2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.

3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.

If you think this is an excusable and responsible statement, raise your hand now.

Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.

This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.

Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )

Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.

Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.

Privacy remains your own responsibility.

Source Link - Privacy Internet Access

Thursday, June 25, 2015

Senate Passes TPP ‘Fast-Tracking’ That Could Make GMO Labeling Illegal

Monsanto (or Monsatan, dubbed by others) would rather stay in business than to be put out of business, thanks to the TPP that will prevent GMO labeling, thus keeping its food and crop genetic manipulation activities under the rug. - FUA

It is a sad day in the fight against Monsanto, GMO labeling, and the future of the planet. The Senate has adopted a law that would give ‘fast-track’ ability for the so-called Trans-Pacific Partnership (TPP) — a highly secretive bill that could restrict GMO labeling in the United States and abroad. In fact, some legal experts believe it could make GMO labeling completely illegal.

I have been spreading the word about the TPP since I first asked my team members at Natural Society to start writing on it back in 2014. It was then that we told you the secretive truth behind the TPP, writing:

“Just in case you aren’t familiar with The Trans-Pacific Partnership (TPP) and Transatlantic Trade and Investment Partnership (TTIP), they are huge multinational ‘trade’ deals written by corporations, which are being pushed by the White House and many of our politicians in order to support the ongoing monopoly of our food supply. They are toxic, just like the products these companies sell, but you can stop them with a twitter storm and grass-roots activism.”

Read more - Before It's News

Amazon Staff: Government Ordered Us Not to Sell Confederate Flag

Turns out the feds were behind the bans of Confederate merchandise in most stores, least that’s what an Amazon staffer said to a customer. Many conspiracy insiders who predicted this had it right. - FUA

Amazon.com staff are telling irate customers that the company was ordered by the federal government not to sell items featuring the Confederate flag in the aftermath of the Charleston shooting.

Amazon made the announcement this week, along with eBay, Sears and Walmart, that it would no longer sell products bearing the rebel flag, but according to a conversation posted on YouTube between a customer and an Amazon sales rep, the decision could have been made as a result of pressure from the government.

At first the Amazon staffer claims that the items were banned because they were deemed to be offensive, but when pressed by the customer, the sales rep tells a different story.

Government Ordered Us Not to Sell Confederate Flag - Alex Jones' Infowars.com

The TPP Isn't Over: It Can Still Be Stopped - Alex Jones

Even if the Trans-Pacific Partnership is passed, it's not quite the beginning of the end. - FUA

Alex Jones breaks down how the TPP can still be stopped if we are willing to stand up and fight.


Wednesday, June 24, 2015

Tell ICANN: Don't expose WHOIS data

Bad news for top level domain name users everywhere – ICANN threatens to expose the WHOIS data, and take a guess on who’s really behind this? The RIAA, MPAA and others that backed the Stop Online Piracy Act in the past. Will you take action and make sure your domain name registry is protected between you and your domain name provider? Sounds urgent. - FUA

Tell ICANN: "Respect our privacy. Don't expose WHOIS data."

Did you know that your privacy rights are currently under threat? ICANN* – the overseers of the Internet’s domain name system – are considering introducing a rule that would impact all netizens. If you care about your online privacy, this is a big deal.

Save Domain Privacy: Respect our privacy. Don't expose WHOIS data.

eBay, Amazon and others to ban sale of Confederate flag merchandise

Well if they can ban Confederate flag merchandise, they can ban and/or restrict almost anything, essential or not, something we need to watch out for. - FUA

eBay will ban the sale of Confederate flag merchandise, the auction site announced Tuesday, in a decision that follows in the steps of major retailers like Walmart and Sears.

"We have decided to prohibit Confederate flags, and many items containing this image, because we believe it has become a contemporary symbol of divisiveness and racism," eBay spokesperson Johnna Hoff said in an email to CNN. "This decision is consistent with our long-standing policy that prohibits items that promote or glorify hatred, violence and racial intolerance."

Hoff added that the company continually monitors and evaluates its 800 million products on its site to ensure that they are "consistent with our core purpose."

The company's decision mirrors that of Walmart and Sears, which have also removed Confederate flag products from their stores.

eBay to ban sale of Confederate flag merchandise - CNNPolitics.com

Google Secretly Spying On Computer Users Via Microphones

There’s been a discovery that Google has used its Chrome browser to spy on computer users through their microphones, without their knowledge or consent. This shows that while software can be accessed for free or at a cost, there’s something happening in the background that many Internet users do not know about.

Same applies to consumer electronics, you can expect to have chips/backdoors in them that may do the same. - FUA

Almost a decade after Infowars first warned that corporations may be spying on computer users via PC microphones, it has now come to light that secretly installed Google software is doing precisely that.

“The Chromium browser – the open source basis for Google’s Chrome – began remotely installing audio-snooping code that was capable of listening to users,” reports the London Guardian.

The software was designed to work with Chrome’s ‘OK, Google’ hotword detection, which functions in response to voice commands given by the user – but in some cases the software was installed and activated without permission.

“Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room,” writes Pirate party founder Rick Falkvinge. “Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by … an unknown and unverifiable set of conditions.”

Google has denied the accusations, asserting that users have to “opt-in” before the software is activated, but developers insist otherwise.

“The default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement,” said Falkvinge.

Alex Jones' Infowars: There's a war on for your mind!

Thursday, June 18, 2015

Not so true that mass shootings do not happen in advanced countries, here’s the proof

While Obama said that mass violence do not happen in other advanced countries, let’s start digging for the truth about mass killings stretching back decades. All it takes is an Internet search, and the evidence you will see is massive.

This one took place days ago in China before the Charleston SC shooting, out of all advanced third world countries on the planet. Perhaps rare, but it’s still happening throughout all the world.

If you go to Google search, type the phrase “Mass Killings/Shootings in [insert country name]” or “Massacres in [insert country name]” and you will find past and present cases of mass violence in urban, city and remote rural areas of populated nations. let it be the criminals or the state carrying out the atrocities. More proof that governments are caught in a lie. - FUA

-- Some of world's worst mass shootings:

July 20, 2012: At least 12 people are killed when a gunman enters an Aurora, Colo., movie theater, releases a canister of gas and then opens fire during opening night of the Batman movie "The Dark Knight Rises."

July 22, 2011: Confessed mass killer Anders Behring Breivik kills 77 in Norway in twin attacks: a bombing in downtown Oslo and a shooting massacre at a youth camp outside the capital. The self-styled anti-Muslim militant admitted both attacks.

Nov. 5, 2009: Thirteen soldiers and civilians were killed and more than two dozen wounded when a gunman walked into the Soldier Readiness Processing Center at Fort Hood, Texas, and opened fire. Army psychiatrist Maj. Nidal Hasan is charged with 13 counts of premeditated murder and 32 counts of attempted premeditated murder.

April 30, 2009: Farda Gadyrov, 29, enters the prestigious Azerbaijan State Oil Academy in the capital, Baku, armed with an automatic pistol and clips. He kills 12 people before killing himself as police close in.

March 10, 2009: Michael McLendon, 28, killed 10 people – including his mother, four other relatives, and the wife and child of a local sheriff's deputy – across two rural Alabama counties. He then killed himself.

Sept. 23, 2008: Matti Saari, 22, walks into a vocational college in Kauhajoki, Finland, and opens fire, killing 10 people and burning their bodies with firebombs before shooting himself fatally in the head.

Nov. 7, 2007: After revealing plans for his attack in YouTube postings, 18-year-old Pekka-Eric Auvinen fires kills eight people at his high school in Tuusula, Finland.

April 16, 2007: Seung-Hui Cho, 23, kills 32 people and himself on Virginia Tech campus in Blacksburg, Va.

April 26, 2002: Robert Steinhaeuser, 19, who had been expelled from school in Erfurt, Germany, kills 13 teachers, two former classmates and policeman, before committing suicide.

April 20, 1999: Students Eric Harris, 18, and Dylan Klebold, 17, opened fire at Columbine High School in Littleton, Colo., killing 12 classmates and a teacher and wounding 26 others before killing themselves in the school's library.

April 28, 1996: Martin Bryant, 29, bursts into cafeteria in seaside resort of Port Arthur in Tasmania, Australia, shooting 20 people to death. Driving away, he kills 15 others. He was captured and imprisoned.

March 13, 1996: Thomas Hamilton, 43, kills 16 kindergarten children and their teacher in elementary school in Dunblane, Scotland, and then kills himself.

Oct. 16, 1991: A deadly shooting rampage took place in Killeen, Texas, as George Hennard opened fire at a Luby's Cafeteria, killing 23 people before taking his own life. 20 others were wounded in the attack.

June 18, 1990: James Edward Pough shoots people at random in a General Motors Acceptance Corp. office in Jacksonville, Fla., killing 10 and wounding four, before killing himself.

Dec. 6, 1989: Marc Lepine, 25, bursts into Montreal's Ecole Polytechnique college, shooting at women he encounters, killing nine and then himself.

Aug. 19, 1987: Michael Ryan, 27, kills 16 people in small market town of Hungerford, England, and then shoots himself dead after being cornered by police.

July 12, 1976: Edward Charles Allaway, a custodian in the library of California State University, Fullerton, fatally shot seven fellow employees and wounded two others.

Aug. 20, 1986: Pat Sherrill, 44, a postal worker who was about to be fired, shoots 14 people at a post office in Edmond, Okla. He then kills himself.

July 18, 1984: James Oliver Huberty, an out-of-work security guard, kills 21 people in a McDonald's restaurant in San Ysidro, Calif. A police sharpshooter kills Huberty.

Aug. 1, 1966: Charles Whitman opened fire from the clock tower at the University of Texas at Austin, killing 16 people and wounding 31.

Deadliest Mass Shootings Around The World - Huffington Post (2012)

Charleston Shooting: What They're Not Telling You - Paul Watson

Paul Joseph Watson's video may have more to the Charleston, SC church shooting than most of us thought.  Again, decide for yourself.


Charleston, SC church shooter had a history of crime

It’s relieved that the shooter was caught, but did he recently took SSRI drugs? Conspiracy theorists at Infowars.com seem to suspect so, but you can decide for yourself. - FUA

It has emerged that the suspected shooter who killed nine people in a Charleston, S.C. church last night was recently arrested twice on a drug charge and a trespassing charge.

Researchers familiar with the patterns of high profile shootings in the US will immediately be asking if 21 year old Dylann Storm Roof was a user of SSRI drugs which have been linked to many cases of mass murder and suicides.

WISTV reports that public records show Roof was most recently arrested in March in Lexington County on drug charges.

The Lexington County Sheriff’s Department told reporters that Roof was booked in the detention center on February 28 and again on April 26 after being arrested by the Columbia Police Department.

Infowars.com - Charleston SC shooter recently faced drug charges

Monday, June 8, 2015

Bill Gates supports turning sewer water to drinking water

Would you drink water that was "purified" from sewer water? Unfortunately for us, we will all be drinking this kind of water under Agenda 21.

And the sewer systems that "purifies" it, you can bet that it is not far from perfect.

So the power elite engineer a drought with scalar weather weapons, steal water for profit, and sell us dirty water... what do you know about that?

Note: There are sewer treatment centers in the U.S., but they only send the treated water back into the environment, not into our faucets.


Friday, June 5, 2015

Transhumanist Kurzweil Predicts Human/Computer Hybrids By 2030

Still believe that humans will one day evolve and merge with machines? The world power elite still holds on to this belief and wants to achieve this goal. It’s also part of their alien agenda as well, to make hybrids/cyborgs out of us. - FUA
Futurist Ray Kurzweil has repeated his prediction that humans will meld with computers in the future, but has revised down the time scale by up to 15 years, suggesting that it will be a reality by the 2030s. Kurzweil, now the director of engineering at Google, told the Exponential Finance conference in New York Wednesday that people will soon be able to to connect their brains directly to the cloud, and augment their existing intelligence with thousands of computers. “Our thinking then will be a hybrid of biological and non-biological thinking,” Kurzweil said, explaining that the brain will use DNA nanobots to make the connection. “We’re going to gradually merge and enhance ourselves,” he said. “In my view, that’s the nature of being human — we transcend our limitations.”



Transhumanist Kurzweil Predicts Human/Computer Hybrids By 2030s - Alex Jones' Infowars.com

US lawmaker: Next, we stop the NSA from weakening encryption

Now we’ll see how lawmakers in Congress will handle the NSA’s ability to decrypt data on the Internet and cell phones. Until then, keep on encrypting your personal and private info. - FUA

NEW YORK -- With one surveillance reform package out the door, lawmakers are working the big "what's next."

Hot on the heels of President Barack Obama signing the Freedom Act into law Wednesday, a bipartisan congressional effort is now focusing their efforts on preventing the government from weakening encryption.

An amendment put forward by Rep. Thomas Massie (R-KY, 4th) to a recent appropriations bill passed by overwhelming majority of 383-43 late in the day Wednesday.

Massie, a strong advocate for privacy and civil liberties, explained on the phone Thursday that his eight-line amendment will prevent the NSA, which remains an encryption expert, from working with the National Institute of Standards and Technology (NIST) to weaken or compromise encryption.

US lawmaker: Next, we stop the NSA from weakening encryption | ZDNet

Thursday, June 4, 2015

N.S.A. Secretly Expands Internet Spying at U.S. Border

Whether the NSA spying portion of the Patriot Act expires or not, you can bet the NSA isn’t stopping or slowing down their data grab that is targeting seven billion people around the world. Plus, they have their own hacking unit. - FUA

WASHINGTON — Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents.
 
In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the documents show.
 
The Justice Department allowed the agency to monitor only addresses and “cybersignatures” — patterns associated with computer intrusions — that it could tie to foreign governments. But the documents also note that the N.S.A. sought permission to target hackers even when it could not establish any links to foreign powers.

Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border - NYTimes.com