Michael from Beta Boston writes, "The privacy protections offered by tools like Tor aren't just for journalists and spies; they're important for everyone.
Almost every modern abusive relationship has a digital component, from cyberstalking to hacking phones, emails, and social media accounts, but women's shelters increasingly have found themselves on the defensive, ill-equipped to manage and protect their clients from increasingly sophisticated threats. Recently the Tor Project stepped in to help change that, and we took a long look at the work cut out for them."
This is an important point: when you make it so that no one can keep secrets from the state and its enforcement arm, you also make it so that no one can keep secrets from crooks, thugs, stalkers, and every other kind of bad guy.
Staff members ask questions to determine if cases contain a digital component earlier in the screening process. They are wary of client cell phones and compromised communication channels. If they feel a victim carries a bugged phone they replace it. If the abuse is happening across social media they encourage not using the platform in question.
However digital abuse often remains hidden until well after a victim’s first contact with the organization, making it vulnerable to compromised communication lines, Mednick said.
In more severe cases the Tor Project gets involved and introduces some of their anonymizing tools to provide an added layer of security.
As domestic abuse goes digital, shelters turn to counter-surveillance with Tor
Runa Sandvik (previously) is a legendary security researcher who spent many years as a lead on the Tor Project; in 2016, the New York Times hired her as "senior director of information security" where she was charged with protecting the information security of the Times's newsroom, sources and reporters. Yesterday, the Times fired her, eliminating […]
Japan's Henn na Hotel chain, owned by the HIS Group, uses "bed-facing Tapia robots" in its rooms; these robots turn out to be incredibly insecure: you can update them by pairing with them using a NFC sensor at the backs of their heads. The robots do not check the new code for cryptographic signatures, meaning […]
In 2017, Equifax admitted that it had doxed America by leaking the nonconsensual dossiers it builds on the nation, covering up the info while its key employees sold off their stock, and then repeatedly lying about the scope of the breach.
Most people don’t spare a lot of thought on the potting for their plants. Perhaps something with a color that matches the walls, but that’s as far as it goes. After all, the plants don’t care what they’re wearing. Do they? Actually, they might. As eye-catching as the AIRSAI Floating Bonsai Plant Pot is, its […]
With the gains real estate has made over stocks in the past 25 years, it’s easy to see why the rich constantly use it to expand their wealth. What’s slightly less obvious is why only the rich seem to ever break into real estate investment. There are a lot of reasons, but a couple of […]
If you’re a coder, there’s a multitude of avenues for you to take your skills. Whether you’re just jumping into the world of programming or looking to rise up the ranks as an established professional, a wide base of knowledge is key. And this Premium 2020 Learn to Code Certification Bundle is a resource that’s […]