The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: February 17, 2015
NSA hiding Equation spy program on hard drives
Posted: February 17, 2015 at 6:49 am
Kaspersky Labs
Equation infection: Kaspersky Labs says the highest number of machines infected with Equation programs were in Iran, Russia and Pakistan.
The US National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.
That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.
Kaspersky Labs
The areas of government Equation has been able to infect by nation.
The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran's uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.
A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.
NSA spokeswoman Vanee Vines declined to comment.
Go here to see the original:
NSA hiding Equation spy program on hard drives
Posted in NSA
Comments Off on NSA hiding Equation spy program on hard drives
Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules
Posted: at 6:48 am
The Fourth Amendment says that warrants must state where the government will search and what evidence the government will seize. In recent years, some federal magistrate judges, when asked to sign warrants for computer searches, have began imposing a new third requirement: limits on how computers can be searched. As I wrote in this 2010 article, I dont think such limits are permissible. In my view, questions about how a computer is searched must be reviewed after the search in adversarial litigation challenging its reasonableness, rather than guessed at beforehand and written into the warrant by an individual magistrate judge.
At present, however, there isnt much in the way of caselaw on which side is right. Theres a ton of circuit precedent saying that search protocols are not required. But theres only one appellate case on whether they are permitted, a Vermont Supreme Court case which concluded that that some restrictions are permitted but others arent. No Article III court has yet ruled on the question.
In light of that ongoing debate, I thought I would flag a recent opinion by Magistrate Judge David Waxse in Kansas, In the Matter of the Search of Cellular Telephones within Evidence Facility Drug Enforcement Administration, Kansas City District Office. The opinion rejects an application for a warrant to search cell phones in DEA custody because the investigators refused to provide the court with a search protocol. If the government seeks review, it may generate the first Article III precedent that grapples with whether such restrictions are permitted. (The case happens to involve cell phones, but there is no Fourth Amendment difference between a cell phone search and any other computer search.)
Waxses opinion is pretty unusual. It includes a long section titled Applying Constitutional Protections in the Digital Era that offers an interesting theoretical account of the role of precedent. According to Waxse, magistrate judges should not be overly beholden to Supreme Court precedent when technology changes:
With technological developments moving at such a rapid pace, Supreme Court precedent is and will inevitably continue to be absent with regard to many issues district courts encounter. As a result, an observable gap has arisen between the well-established rules lower courts have and the ones they need in the realm of technology. Courts cannot, however, allow the existence of that gap to infiltrate their decisions in a way that compromises the integrity and objectives of the Fourth Amendment. . . . The danger, of course, is that courts will rely on inapt analogical reasoning and outdated precedent to reach their decisions. To avoid this potential pitfall, courts must be aware of the danger and strive to avoid it by resisting the temptation to rationalize the application of ill-fitting precedent to circumstances.
Judge Waxse then concludes, relying heavily on the reasoning of the Vermont Supreme Court, that he has the authority to deny applications for computer warrants unless they detail how the search will be executed. Although the Supreme Court has indicated that the reasonableness of a warrant execution should be reviewed ex post, not ex ante, Waxse concludes that its more efficient to have the review occur ex ante:
The fact of the matter is that a court is attempting to avoid entirely the harm that ex post remedies are meant to assuage. By only deciding reasonableness of the governments actions ex post, the government not only possesses a substantial portion of an individuals private life, but it also fails to prevent a person from having to defend against subsequent unreasonable searches stemming from the initial search and seizure. Requiring search protocol in a warrant allows the court to more effectively fulfill its duty to render, as the Supreme Court put it, a deliberate, impartial judgment as to the constitutionality of the proposed search, thus avoiding the need for ex post remedies resulting from an unconstitutional search.
He concludes:
If the Court were to authorize this warrant, it would be contradicting the manifest purpose of the Fourth Amendment particularity requirement, which is to prevent general searches. Given the substantial amount of data collected by the government upon searching or seizing a cell phone, as discussed in Riley, requesting an unrestricted search is tantamount to requesting disclosure of a vast array of intimate details of an individuals private life. For the reasons discussed in this opinion, to issue this warrant would swing the balance between an individuals right to privacy and the governments ability to effectively investigate and prosecute crimes too far in favor of the government.
Accordingly, the Court again finds that an explanation of the governments search techniques is being required in order to determine whether the government is executing its search in both good faith and in compliance with the Fourth Amendment. The Court does not believe that this request will overburden the government. In fact, in Riley, the government advocated and it can be concluded that the Supreme Court endorsed the implementation of search protocols: Alternatively, the Government proposes that law enforcement agencies develop protocols to address concerns raised by cloud computing. Probably a good idea, but the Founders did not fight a revolution to gain the right to government agency protocols.
More:
Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules
Posted in Fourth Amendment
Comments Off on Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules
Privacy advocates want amendment to protect personal data
Posted: at 6:48 am
Privacy advocates are pushing to allow Minnesota voters to decide whether their electronic communication should be protected from unreasonable search and seizure.
A bipartisan group of lawmakers and political organizations is encouraging the Legislature to put the question on the 2016 ballot.
State Rep. Peggy Scott, R-Andover, worries that law enforcement is overstepping its authority in acquiring data like financial and telecommunications records without getting search warrants.
"If data was what it is today if it would have been that way back when the constitution was being written I believe they would have included a person's technological communications as part of those things that would have been protected by the Fourth Amendment," Scott said.
A committee in the Republican-controlled House has scheduled a hearing on the bill this week. No committee hearing is scheduled in the Senate and DFL Senate Majority Leader Tom Bakk said he's reluctant to put any measures on the ballot next year.
"I think it would be unlikely that we're going to consider something additional for the ballot in 2016," Bakk said. "It's a conversation that I haven't had with the speaker yet if they have any interest to propose something."
Privacy issues are a major theme at the Capitol this year. There are also discussions about the privacy implications of police body cameras and police use of license plate readers.
Go here to read the rest:
Privacy advocates want amendment to protect personal data
Posted in Fourth Amendment
Comments Off on Privacy advocates want amendment to protect personal data
Jeremy Gardner – College Cryptocurrency Network [EN] – Video
Posted: at 6:47 am
Jeremy Gardner - College Cryptocurrency Network [EN]
http://bitcoinet.pl.
By: bitcoinet
Read this article:
Jeremy Gardner - College Cryptocurrency Network [EN] - Video
Posted in Cryptocurrency
Comments Off on Jeremy Gardner – College Cryptocurrency Network [EN] – Video
Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 – Video
Posted: at 6:47 am
Silver Gold Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15
Free Trading Strategies @ http://www.connectingdots1.com/ "Colecta is almost a Crypto Currency Mutual Fund"..ya right BS! It #39;s rather just another Illuminati...
By: connectingdots3
More here:
Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 - Video
Posted in Bitcoin
Comments Off on Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 – Video
Mining Bitcoin with Excel – Video
Posted: at 6:47 am
Mining Bitcoin with Excel
Learn how to mine Bitcoin with an Excel spreadsheet. We explain the algorithm behind Bitcoin mining and show you how you could (in theory) do it yourself! Download the spreadsheet here: https://w...
By: Knowledge
Originally posted here:
Mining Bitcoin with Excel - Video
Posted in Bitcoin
Comments Off on Mining Bitcoin with Excel – Video
Bitcoin Online Wallet – A Quick Way to Get Started With Bitcoin – Video
Posted: at 6:47 am
Bitcoin Online Wallet - A Quick Way to Get Started With Bitcoin
http://www.bitcoinreport.info - Bitcoin Online Wallet There are four types of Bitcoin wallet - online, mobile, desktop and offline. When using the description "Bitcoin online wallet" we usually...
By: David MacGregor
See the rest here:
Bitcoin Online Wallet - A Quick Way to Get Started With Bitcoin - Video
Posted in Bitcoin
Comments Off on Bitcoin Online Wallet – A Quick Way to Get Started With Bitcoin – Video
Buy Bitcoin With a Credit Card – Video
Posted: at 6:47 am
Buy Bitcoin With a Credit Card
http://www.bitcoinreport.info - Buy Bitcoin With a Credit Card The most common way of buying Bitcoin is to do so using a trading exchange. But this takes a bit of time. So if you #39;re in a hurry...
By: David MacGregor
More here:
Buy Bitcoin With a Credit Card - Video
Posted in Bitcoin
Comments Off on Buy Bitcoin With a Credit Card – Video
Andreas M. Antonopoulos – The Potential of Blockchain Technology 2 – The Bitcoin Address – Video
Posted: at 6:47 am
Andreas M. Antonopoulos - The Potential of Blockchain Technology 2 - The Bitcoin Address
Andreas Antonopoulos talks about Bitcoin, the blockchain and Smart contracts at the Melbourne Bitcoin Technology Center (Full). (coworking.biz) Brought to yo...
By: Technology Videos
Read more from the original source:
Andreas M. Antonopoulos - The Potential of Blockchain Technology 2 - The Bitcoin Address - Video
Posted in Bitcoin
Comments Off on Andreas M. Antonopoulos – The Potential of Blockchain Technology 2 – The Bitcoin Address – Video
Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute – Video
Posted: at 6:47 am
Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute
NavajoCoin: http://www.navajocoin.org / http://www.navajocoin.org/about CryptoTraders: http://twitter.com/CryptoTraders / cryptotraders@xs4all.nl Tim Frost: http://twitter.com/coinproz / http://tec...
By: World Crypto Network
See the rest here:
Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute - Video
Posted in Bitcoin
Comments Off on Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute – Video