Runa Sandvik (previously) is a legendary security researcher who spent many years as a lead on the Tor Project; in 2016, the New York Times hired her as "senior director of information security" where she was charged with protecting the information security of the Times's newsroom, sources and reporters. — Read the rest
The New York Times is now available as an "Onion Service" on the Tor network, at the address https://www.nytimes3xbfgragh.onion/ — meaning that anyone with Tor access can securely and privately access the Times without giving away any information about what they're looking at, even to state-level actors who control the ISPs.
Michael from Muckrock writes, "When the National Reconnaissance Office (NRO) announced the upcoming launch of their NROL-39 mission back in December 2013, they didn't get quite the response they hoped. That might have had something to do with the mission logo being a gigantic octopus devouring the Earth. — Read the rest
The $13,000 Trackingpoint sniper rifle is vulnerable to wifi-based attacks that allow your adversary to redirect bullets to new targets of their choosing.
At Freedom of the Press Foundation, we're excited to announce the release of a brand new version of SecureDrop, our open source whistleblower system which media organizations can use to communicate and receive documents from sources. — Read the rest
Phil writes, "Runa Sandvik of Freedom of the Press Foundation is systematically documenting the arrests of journalists in Ferguson, Missouri made during protests of the August 9 officer-committed shooting death of Michael Brown."
Before Edward Snowden went on the run and effected the first-ever leak of documents from the NSA, he threw a cryptoparty in Hawai'i, coordinating with Runa Sandvik from the Tor Project and Asher Wolf from the Cryptoparty movement to plan an event where everyday people were taught to use crypto. — Read the rest
The TOR team have discovered a fake certificate in the wild. The certificate, issued by a US company called Cyberoam, was used in an attempt to trick a user in Jordan into believing that her/his connection to the TOR website, was private and secure, though in fact it was being spied upon by a Cyberoam device. — Read the rest