News from a World gone mad

yet there is still so much beauty




If you want privacy but don’t understand how to use VPN or TOR you can now download the new beta version of the Opera browser that allows you to use blocked sites like Pirate Bay or watch TV /Movie sites in your country ,It also encrypts all your online movements, a plus for people who value the right to privacy.For how and where to download plus the whole article on the subject go to TF

National Security Agency (NSA) actually has a real program named Skynet

Skynet actually exists!!! Skynet is a top secret program of NSA

Skynet actually exists!!! Skynet is a top secret program of NSA

source Techworm

Skynet, which was an evil military computer system that launches war on human race in the Terminator movies franchise, it is learnt that NSA has a program with the same name.

As per The Intercept reports, the NSA does have a program called Skynet. However, it has a less lethal but legally dubious aims. This one is a surveillance program that makes use of phone metadata to record the call activities and location of doubtful terrorists. An Al Jazeera journalist reportedly became one of its victims after he was kept on a terrorist watch list.

Chief bureau of Al Jazeera’s Islamabad office, Ahmad Muaffaq Zaidan got traced by Skynet after he was recognized by US intelligence as a possible Al Qaeda member and given a watch list number. Zaidan, a Syrian national has taken a number of exclusive interviews with senior Al Qaeda leaders, including Osama bin Laden himself.

According to a 2012 government presentation The Intercept obtained from Edward Snowden says that Skynet makes use of phone location and call metadata from bulk phone call records to identify fishy patterns in their communication habits and physical movements of the suspects.

Says Wired:

The presentation indicates that SKYNET looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” It also looks for suspicious behaviors such as someone who engages in “excessive SIM or handset swapping” or receives “incoming calls only.” The goal is to identify people who move around in a pattern similar to Al Qaeda couriers who are used to pass communication and intelligence between the group’s senior leaders.

In addition to its misleading name, SKYNET has a few problems though. It happened to misidentify an Al-Jazeera reporter as a member of al-Qaida based on the criteria mentioned above. (It seems that the journalists meeting with sources and terrorists meeting with terrorist group leaders move in patterns that look same to the computer.) This misidentification would be disturbing even if the government did not make use of such metadata to make life-and-death decisions about who to kill with drone strikes. However, it does.

The NSA one should note has a second program too that is very similar to the Terminator‘s Skynet. As revealed by Edward Snowden in an interview with WIRED and James Bamford last year, this one is called MonsterMind. Like the film version of Skynet, MonsterMind is a defense surveillance system that would immediately and independently disarm foreign cyberattacks against the US, and could be used to launch retaliatory strikes as well. Algorithms under this program would remove massive repositories of metadata and examine it to recognize normal network traffic from anomalous or malicious traffic. Equipped with this knowledge, the NSA could immediately and autonomously find, and block, a foreign threat.

Snowden also stated that MonsterMind could one day be designed to automatically return fire without human interference against an attacker. Because an attacker could twist malicious code to keep away from detection, a counterstrike would be more successful in neutralizing future attacks. Sounds a lot like Skynet. However, there is no news from the NSA on why the iconic film name was not used for its real-world Skynet.










Click bait: Tor users can be tracked by mouse movements

© Gleb Garanich

The way you move your mouse is unique, like fingerprints, and can be used by dark forces to track you on supposedly anonymous and secure networks like Tor, according to a Barcelona researcher.

Jose Carlos Norte discovered the snooping method in recent weeks.

“I have been able to fingerprint Tor browser users in controlled environments and I think it could be interesting to share all the findings for further discussion and to improve Tor browser,” he said on his website.

Using Javascript, a hacker could identify a user based on the movements in their mouse as Tor uses the programming language by default.

Networks such as Tor are vital resources for those wishing to use the internet securely like whistleblowers, journalists, and political dissidents.

Tor previously countered fingerprinting methods like analyzing local time, operating systems, and fonts through updates.

Norte was able to show the unique data a user creates through their mouse.

“It is easy to fingerprint users using Tor browser to track their activity online and correlate their visits to different pages,” he said.

Mouse wheel information contains scrolling speed, distance, and hardware used.

Mouse speed fingerprinting reveals how a cursor moves across the page, which is controlled by the operating system and hardware.

While the method has some limitations, like the variation of mouse movements based on different devices, there is scope to build an even more advanced method of tracking users through mouse movement.

A recent study showed users’ moods can be detected based on mouse clicks. A frustrated or annoyed mouse user will take larger and slower mouse movements. The scientists were able to detect negative emotions with 82 percent accuracy.

The solution to mouse fingerprinting is to deactivate Javascript altogether, although Tor is likely to address the issue, based on recent bug reports.











Zoom to Mars in 6 weeks with new Russian nuclear-fission engine

© Sputnik

A nuclear power propulsion system could propel a spacecraft to Mars in just over a month, a huge step forward from the current 18 months required. Russia might test a nuclear engine as early as 2018, the head of the Rosatom nuclear corporation revealed.

Another advantage of a nuclear engine is that it enables a spacecraft to maneuver throughout the flight, whereas existing technology only makes a defined trajectory flight possible.

A nuclear power unit makes it possible to reach Mars in a matter of one to one and a half months, providing capability for maneuvering and acceleration,” the head of Rosatom Sergey Kirienko said. “Today’s engines can only reach Mars in a year and a half, without the possibility of return,” Kirienko said.

The nuclear engine project was launched in 2010 and by 2012 an engineering design had been created. The project’s budget is estimated at 20 billion rubles (about $US274 million).

It has been reported that a prototype nuclear drive could start testing by 2018. Traditional rocket engines are believed to have reached the limit of their potential and can’t be used for deep space exploration.

An operable module with a nuclear drive would facilitate space exploration both for close-range expeditions to the Moon and deep-space autonomous robotic missions to the outskirts of the Solar system.

The Topaz-1 space reactor. © A. Solomonov

Using nuclear energy in space was a big deal in the Soviet Union, which launched a nuclear engine project in 1960 and fulfilled it by 1980. An operable engine was tested at the Semipalatinsk nuclear military range.

Between 1970 and 1988, the USSR launched 32 spacecraft equipped with thermoelectric nuclear power plants.

 source  RT









Researchers are a step closer to creating an untraceable ‘quantum Internet’ by FIONA MACDONALD

Scientists are figuring out how to create a ‘quantum Internet’ that will be totally secure and virtually unhackable. So secure, in fact, that even if someone did manage to listen in to your private communications, you’d immediately know about it.

That’s because the quantum Internet would store data in individual particles of light – known as photons – rather than beams of light, which are currently used to transmit information across our existing fibre optic networks. While information carried in classical light can be intercepted and read, photons can’t be measured without being destroyed – so any kind of hacking would be impossible.

Unfortunately, creating a quantum Internet is no easy feat, and scientists have been struggling for years to find a way to efficiently beam streams of single photons – or ‘quantum light’. Now a team from Stanford University may have done just that, by establishing a quantum light source that could become the basis of quantum connections.

The light source in question is a nanoscale laser, which beams light through a gallium arsenide chip, as shown below. This chip acts like a filter and allows classical light (pink) to pass through, while also producing quantum light (blue).


read more atScienceAlert





Eternal 5D Data Chip Can Record All Of Human History,by Robin Andrews

photo credit: 180 million books can be stored on a single chip. agsandrew/Shutterstock


In order to preserve our stories, we used to carve and paint rudimentary images and basic text into stone tablets and onto the walls of caves. Nowadays, any of us can store hundreds of thousands of documents onto a cheap, thumb-sized USB, preserving them for decades. Scientists at the University of Southampton have taken this one extraordinary step further,announcing that they have developed a method to record data that could outlast the human race itself.

Back in 2013, a new type of data storing technology was debuted by the team at the university’s Optoelectronics Research Centre (ORC). An abstract presented at a conference revealed that a 300 kilobyte copy of a text file was recorded into a specialized form of glass, a small “chip” that had been manipulated by a laser.

Extremely fast and intense pulses of light altered the nanostructure of the silica glass chip, creating incredibly small “dots” that could store up to three individual bits of information. Strings of these dots were aligned in three layers that, when aligned on top of each other, were no thicker than the width of a human hair.

This data was said to have been preserved in five dimensions (5D): the three-dimensional position of the data dot within the glass was recorded, along with two additional dimensions provided by the intensity and the wave pattern (polarity) of the laser used to form the dot. Scientists were then able to read the encoded text file, which in this case was the 2013 conference abstract itself.

full story at:IFLScience









AMA by a cybersecurity expert on reddit

For all that had questions about cybersecurity,the Government spying on us and anything to do with digital rights I’m Erka Koivunen, a Finnish cybersecurity expert. I know why governments want more access to your online data. And I know that not everything they want can be considered as balanced or proportional. AMA!

Baidu open-sources its WARP-CTC artificial intelligence software

No Backdoors But UK Government Still Wants Encryption Decrypted On Request…

Yesterday the U.K. Home Secretary, Theresa May, spent two hours giving evidence to a joint select committee tasked with scrutinizing proposed new surveillance legislation.

The draft Investigatory Powers Bill, covering the operation of surveillance capabilities deployed by domestic security and law enforcement agencies, is currently before parliament — with the government aiming to legislate by the end of this year.

During the committee session May was asked to clarify the implications of the draft bill’s wording for encryption. Various concerns have been raised about this — not least because it includes a clause that communications providers might be required to “remove electronic protection of data”.

Does this mean the government wants backdoors inserted into services or the handing over of encryption keys, May was asked by the committee. No, she replied: “We are not saying to them that government wants keys to their encryption — no, absolutely not.”

Encryption that can be decrypted on request

However the clarity the committee was seeking on the encryption point failed to materialize, as May reiterated the government’s position that the expectation will be that a lawfully served warrant will result in unencrypted data being handed over by the company served with the warrant.

“Where we are lawfully serving a warrant on a provider so that they are required to provide certain information to the authorities, and that warrant has been gone through the proper authorization process — so it’s entirely lawful — the company should take reasonable steps to ensure that they are able to comply with the warrant that has been served on them. That is the position today and it will be the position tomorrow under the legislation,” said May.

“As a government we believe encryption is important. It is important that data can be kept safe and secure. We are not proposing in this bill to make any changes in relation to the issue of encryption. And the legal position around that. The current legal position in respect of encryption will be repeated in the legislation of the bill. The only difference will be that the current legal position is set out in secondary legislation and it will be, obviously, in the bill,” she added.

full post at TechCrunch










Create a free website or blog at

Up ↑

%d bloggers like this: