Skip to main content

Home/ Future of the Web/ Group items tagged verification

Rss Feed Group items tagged

Paul Merrell

Verification Handbook: homepage - 0 views

  • A definitive guide to verifying digital content for emergency coverage Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
Gonzalo San Gil, PhD.

Pirate Bay's .org Domain Suspended Pending ICANN Verification - TorrentFreak [Note] - 0 views

  •  
    " Ernesto on December 7, 2015 C: 0 Breaking Pirate Bay's original .org domain was suspended by EuroDNS a few hours ago, after the registrant failed to verify the contact details. Even though it's no longer the main domain name for the site, the bookmark was still in use by many people as a redirect to Pirate Bay's latest home base. "
Gary Edwards

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Ent... - 0 views

  •  
    TAILS anonymous Operating System- excerpt: "When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you're pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user's internet traffic by routing it through a network of computers run by volunteers around the world. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally. This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources. "The installation and verification has a learning curve to make sure it is installed correctly," Poitras told WIRED by e-mail. "But once the set up is done, I think it is very easy to use." An Operating System for Anonymity Originally developed as a research project by the U.S. Naval Research Laboratory, Tor has been used by a wide range of people who care about online anonymity: everyone from Silk Road drug dealers, to activists, whistleblowers, stalking victims and people who simply like their online privacy. Tails makes it much easier to use Tor and other privacy tools. Once you boot into Tails - which requires no special setup - Tor runs automatically. When you're done using it, you can boot back into your PC's normal operating
Gonzalo San Gil, PhD.

Fail: Anti-Piracy Outfits Send Takedown Request For Non-Existent Torrents - TorrentFreak - 0 views

  •  
    " Ernesto on August 21, 2016 C: 24 Breaking HBO, Paramount Pictures and other copyright holders are sending takedown notices for torrent links that have never existed. The notices accuse sites of distributing recent movies and TV-shows. However, the services in question have been down for a year, showing that anti-piracy groups automatically generate links based on hashes without any verification."
1 - 4 of 4
Showing 20 items per page