Runa Sandvik (previously) is a legendary security researcher who spent many years as a lead on the Tor Project; in 2016, the New York Times hired her as "senior director of information security" where she was charged with protecting the information security of the Times's newsroom, sources and reporters. — Read the rest
The New York Times is now available as an "Onion Service" on the Tor network, at the address https://www.nytimes3xbfgragh.onion/ — meaning that anyone with Tor access can securely and privately access the Times without giving away any information about what they're looking at, even to state-level actors who control the ISPs.
Michael from Muckrock writes, "When the National Reconnaissance Office (NRO) announced the upcoming launch of their NROL-39 mission back in December 2013, they didn't get quite the response they hoped. That might have had something to do with the mission logo being a gigantic octopus devouring the Earth. — Read the rest
The $13,000 Trackingpoint sniper rifle is vulnerable to wifi-based attacks that allow your adversary to redirect bullets to new targets of their choosing.
At Freedom of the Press Foundation, we're excited to announce the release of a brand new version of SecureDrop, our open source whistleblower system which media organizations can use to communicate and receive documents from sources.
— Read the rest
See Runa Sanvik's feature on this
Phil writes, "Runa Sandvik of Freedom of the Press Foundation is systematically documenting the arrests of journalists in Ferguson, Missouri made during protests of the August 9 officer-committed shooting death of Michael Brown."
Before Edward Snowden went on the run and effected the first-ever leak of documents from the NSA, he threw a cryptoparty in Hawai'i, coordinating with Runa Sandvik from the Tor Project and Asher Wolf from the Cryptoparty movement to plan an event where everyday people were taught to use crypto. — Read the rest
The TOR team have discovered a fake certificate in the wild. The certificate, issued by a US company called Cyberoam, was used in an attempt to trick a user in Jordan into believing that her/his connection to the TOR website, was private and secure, though in fact it was being spied upon by a Cyberoam device. — Read the rest