Tag Archives: Google

Screw The NSA, New Search Engine Claims To Have The Solution.

before we get any further, let me just say there is no way at the moment you will be able to access the web site. It’s been OVERLOADed all day. Or under attack.  LOL

—————————————————————————————————

NEW SEARCH ENGINE PROTECTS YOU FROM NSA

No data collected, so nothing to give feds if they ask

 

WND EXCLUSIVE        BOB UNRUH

 

Zeekly

Zeekly

Trust Google? The National Security Agency, which routinely collects its data, does.

After all, it’s one of the companies from which Washington apparently routinely pulls data about what Americans are reading, doing, seeing, researching, hunting and contemplating.

So an entrepreneur says he has started an alternative service, which offers encryption services to keep your details, well, your details. Out of Google’s files. And away from the NSA.

The website is called Zeekly.com and founder Jeffrey Sisk explains it doesn’t retain search history, and also runs on 2048-bit SSL encryption to keep private what Internet users don’t want public.

On his blog, he explains that there are a number of steps a consumer can take to make the options for the government to access personal information a lot harder.

One of those is an encrypted search function.

“Like millions of Americans, I was frustrated when The Guardian broke the story on June 6th that the NSA has a top secret program called Prism that collects personal data on American citizens from all of the most well known and trusted technology companies. This included tech giants such as Google, Yahoo, Microsoft/Bing, Facebook, Youtube & Twitter,” he said.

“What made this story especially heinous as it unfolded is that each of these companies is prevented by the actual FISA court orders they were served from disclosing to the public their information is being intercepted by the government. These trusted companies all have privacy policies and tell their users ‘we take privacy matters seriously,’ yet we now find out millions of records are being secretly turned over to the NSA every single day. From the documents leaked to The Guardian by the NSA whistleblower Edward Snowden, the government literally has unfettered ‘back door access’ to these vast databases.”

He said Americans now depend on the Internet.

“We find information, solve problems, pursue our interests, read news, make purchase[s], and socially connect with like minded people around the world. Granting access to American spy agencies to this level of information on American citizens is the most egregious assault on our constitutional rights regarding illegal search and seizure in the history of our country. As one of the original authors of the Patriot Act recently put it, they never intended the law to be used to snarf up mass amounts of data on unsuspecting American citizens. I think most of us already knew this was going on to some extent, but clearly this has far exceeded the original boundaries set forth by Congress.”

He continued, “I don’t think companies such as Google, Microsoft, Facebook or Yahoo are inherently bad. They collect this data to provide a higher level of targeted advertising and services for their users. Unfortunately, because of minimal oversight, the government is bending the rules to secretly obtain their data.”

And that’s the genesis for his Zeekly.com project.

It pulls information from all major search engines, but doesn’t store a users personal data, he said.

“This means that even if a court order [to obtain information] was presented, there’s no data.”

He said there are other steps that consumers also can take.

“Currently there are four main browsers that are popular in the market: Internet Explorer (owned by Microsoft), Chrome (owned by Google), Safari (owned by Apple), Firefox (open source owned by Mozilla).”

“Of these four browsers, the first three are owned by companies who are listed in the leaked NSA documents to be under FISA court order to turn over your search data. The last one Firefox seems to be exempt. This is because Firefox is an open source project (any software engineer/programmer from around the world can write code to improve the browser and then Mozilla coordinates what makes it into each new version of the software). Surely it is not impossible, but it is highly unlikely that Firefox has a mechanism to record your Internet searches. To me, this makes it currently the best choice,” he explained.

( I’ll Be resetting To Mozilla)

He also recommended the use of a Virtual Private Network. They are easy to install, he explained, and “it basically acts as your proxy when you are on the Internet. In other words, to the websites you are visiting, your requests are coming from the VPN’s server…. not your personal computer or cellphone/tablet.”

~Steve~
Read more at http://www.wnd.com/2013/08/new-search-engine-protects-you-from-nsa/#PmxOT0cKyWK45b0p.99

 

 

 

Have You Heard Of The Latest And Greatest? Of Course I’m Speaking Of Google Glasses.

A must have to make our lives so much more complete. here watch this vid  and just see how it will help.  LOL

Also just happened to see this on Drudge. Kinda amusing the implications.  LOL

‘CRACKED’ GOOGLE GLASS COULD MEAN HACKED ‘EYESIGHT’

http://www.carbonblack.com/cracked-google-glass-could-mean-hacked-eyesight/

~Steve~                                    H/T    My Newly Minted Teenage Son

 

5 tools to protect your privacy online

privacy

Every day it seems we hear more news about our online privacy being compromised and violated.

More than 2 years ago, we already were warned that companies and governments are gathering unprecedented amounts of data about every click, link, and status update you make. Google, for example, builds an online profile on its users, keeping track of our searches and the sites we visit.

Some very useful tips from Simon Black of SovereignMan.com, Feburary 15, 2013:

Online privacy is becoming more important by the day. And nobody is going to give it to you, you have to take steps yourself to secure it.

Below are five different tools and services that will get you started. You can set up most of the tools below in 5 minutes. Each of them will go a long way in securing your privacy online.

1. Tor Browser

Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit.

The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux.

Learn more about and download the Tor Browser Bundle here

2. Duck Duck Go

If you want privacy, don’t search with Google.

Google store all of your searches to customize ads for you, but even worse, they can hand over the whole list of searches to any government agency that are curious about what you’ve been looking at for the last couple years.

A better alternative is Duck Duck Go, a completely anonymous search engine that does not store any information about you or your searches. The search results are essentially identical to Google’s, so there’s no loss of quality.

Search with Duck Duck Go here

3. HTTPS Everywhere

HTTPS Everywhere (S is for security) is a plug-in for Firefox and Google Chrome that tries to force a website to connect in secure mode, thus encrypting your traffic with the website you are visiting. This makes your browsing more secure because it prevents eavesdropping thieves or state-mafia from intercepting your unencrypted Internet traffic.

Download HTTPS Everywhere here

4. Cryptocat

Cryptocat is an encrypted chat that beats Facebook and Skype when it comes to security and privacy. If you want to chat in private then this is one simple solution. It’s also open source, which means you can see the full code and be sure there are no government “backdoors” built in.

Read more about and download Cryptocat here

5. Silent Circle

Silent Circle is a new player on the market, but it is founded by “old” players in the security and encryption industry. One of the founders, Phil Zimmerman, is also the creator of PGP, one of the most-used encryption platforms in the world.

Silent Circle is a suite of products offering:

  • Encrypted email
  • Encrypted video chat
  • Encrypted phone calls
  • Encrypted text messaging

Silent Circle is the only service on this list that is not free. But having the gold standard of encryption may be worth it for you.

Read more about Silent Circle here

I’ve already started using Duck Duck Go as a search engine. Alas, Silent Circle does not yet offer encrypted e-mail service, but the site does say it’s “coming soon”.

~Eowyn

Warning: Your ZTE smart phone has a security hole

zte-score-m-metropcs_xl

Do you own a ZTE smart phone?

If so, you should know that there’s a security hole in your phone that could allow others to control it!

Employees of ZTE chat on the roof of its headquarters in Shenzhen, Guangdong provinceZTE headquarters in Shenzhen, China. (Photo by Reuters’ Tyrone Siu)

Jeremy Wagstaff and Lee Chyen Yee report for Reuters:

ZTE Corp, the world’s No.4 handset vendor and one of two Chinese companies under U.S. scrutiny over security concerns, said one of its mobile phone models sold in the United States contains a vulnerability that researchers say could allow others to control the device.

The hole affects ZTE’s Score model that runs on Google Inc’s Android operating system and was described by one researcher as “highly unusual.”

“I’ve never seen it before,” said Dmitri Alperovitch, co-founder of cybersecurity firm, CrowdStrike. The hole, usually called a backdoor, allows anyone with the hardwired password to access the affected phone, he added.

ZTE and fellow Chinese telecommunications equipment manufacturer, Huawei Technologies Co Ltd, have been stymied in their attempts to expand in the United States over concerns they are linked to the Chinese government, though both companies have denied this.

Most such concerns have centered on the fear of backdoors or other security vulnerabilities in telecommunications infrastructure equipment rather than in consumer devices.

[In April 2012] a U.S. congressional panel singled out Huawei and ZTE by approving a measure designed to search and clear the U.S. nuclear-weapons complex of any technology produced by the two companies.

Reports of the ZTE vulnerability first surfaced … in an anonymous posting on the code-sharing website, pastebin.com. Others have since alleged that other ZTE models, including the Skate, also contain the vulnerability. The password is readily available online.

ZTE said it had confirmed the vulnerability on the Score phone, but denied it affected other models. “ZTE is actively working on a security patch and expects to send the update over-the-air to affected users in the very near future,” ZTE said in an emailed statement. “We strongly urge affected users to download and install the patch as soon as it is rolled out to their devices.”

Alperovitch said his team had researched the vulnerability and found that the backdoor was deliberate because it was being used as a way for ZTE to update the phone’s software. It is a question, he said, of whether the purpose was malicious or just sloppy programming. “It could very well be that they’re not very good developers or they could be doing this for nefarious purposes,” he said.

While security researchers have highlighted security holes in Android and other mobile operating systems, it is rare to find a vulnerability apparently inserted by the hardware manufacturer. “I have never seen this before. There are rumors about backdoors in Chinese equipment floating around,” Alperovitch said. “That’s why it’s so shocking to see it blatantly on a device.”

A Google spokesman declined to comment.

~Eowyn

Scroogled? The Big Boys Get Ready to Rumble

I just caught my first view of what is probably a Declaration of War.  It’s the new Microsoft commercial on television in  metropolitan Seattle area —- a broadside fired at archrival search engine giant, Google.  

Google-Microsoft Map

While Google’s world headquarters is in California, a few years ago they built a new Google Campus in Kirkland, WA, less than 8 miles away from Microsoft’s headquarters and main campus.

I found the video on Google-owned Youtube.  The map is courtesy of Google, too.  LOL!

Slide show of the Microsoft Campus Redmond                                                               Slide show of Google Campus Kirkland

File a Ripoff Report on Local Agenda 21 Agencies

I just got a great tip from Roger Fredinburg!  ~LTG

Roger’s Recent Ripoff Report Reaps Rich Rewards!

Look how these fools at Southern, Oregon Regional Economic Development Inc. are responding to my web and FaceBook attack on them … LOL

 
I have filed a “Rip Off Report” at www.ripoffreport.com on these fools… Tell everyone to kick butt on this.
 
 
It’s popping up when people search them on Google. They are not happy.
Get everyone to file a Rip Off Report on agencies and groups who are trying to wreck the country. The search engines give Rip Off Reports HIGH PLACEMENT.
If we got hundreds or thousands of these up __ The enemy will just crap little green bricks … LOL  
Roger Fredinburg

Activist Post Deleted! Google Erases Popular Alternative News Source

Ahh, Don’t like the sound of this CRAP!!      ~ Steve~

——————————————  H/T   Joseph ————

Zen Gardner

Before It’s News

Sept 24, 2011

At mid-day on Friday, September 23, 2011, the popular alternative news blog, ActivistPost.com, was taken offline. Activist Post receives over one million views per month and has been hosted by Google’s Blogger since its founding in June 2010.

“We remain puzzled as to why Activist Post was erased completely by Google,” said chief editor and co-founder Michael Edwards. “When we tried to load our back-up file into our secondary Blogger account, that was blocked as well,” he added.

It remains unclear whether Google has acted to censor ActivistPost.com for their controversial reporting. Google is becoming somewhat notorious for clamping down on truth and liberty activists, of which Activist Post is known for.

“Clearly, this is a huge set back for us and the work we do,” said co-founder Eric Blair. “Our entire crew is working on resolving the issue and restoring the website. We certainly look forward to an explanation from Google.”

For Rest Pls. Go  HERE

 

Study Shows Social Media Censor Conservatives-Christians

I’ve received complaints from Facebook members that they are obstructed from “sharing” posts of Fellowship of the Minds.

Now our suspicions are verified by a new study that finds social media sites such as Facebook and Google, actively censor Christian and conservative viewpoints.

Early Christian martyr

Jeremy Kryn reports for LifeSiteNews, Sept 21, 2011:

The first report, conducted by National Religious Broadcasters (NRB) and the American Center for Law and Justice, examined the policies and practices of several major Internet-interactive “new media” communications platforms and service providers, including Apple and its iTunes App Store, Facebook, Google, and others.

The study found that some of the new media technology companies have outright banned Christian content, and that all social media sites, except Twitter, have speech policies more restrictive than the free speech rights guaranteed in the U.S. Constitution.

According to the study, seven of the major social media sites have banned “hate speech,” a term that the study authors point out “is often applied in the culture to stifle Christian communicators.”

The study authors also found that some of the media companies have been responsive to demands by pressure groups calling for censorship of conservative or Christian viewpoints.

The study notes that when Google established new guidelines for its “Google for Non-Profits” in March 2011, it refused to list “churches and other faith groups” that consider “religion or sexual orientation in hiring practices.” Christian churches that have applied for the suite of Google tools geared at non-profits have been rejected.

On another occasion the world’s most powerful search engine initially prohibited the British Christian Institute from purchasing space for an advertisement about abortion. It was only after the Christian Institute sued Google that the search engine permitted the ad.

Apple has twice removed applications that contained Christian content from its iTunes App Store, the study documented. In both instances, Apple admitted that these apps were denied access because it considered the Christian viewpoints expressed in those applications to be “offensive.”

“Of the 425,000 apps available on Apple’s iPhone, the only ones censored by Apple for expressing otherwise lawful viewpoints have been apps with Christian content,” observes the study.

For its part, Facebook has openly partnered with homosexual activists to “eradicate anti-gay comments on its platform,” the report found. “All of which suggest that Christian content critical of homosexuality, same-sex marriage, or similar practices will be at risk of censorship [by Facebook]” says the study. In fact, in some cases such content already has been removed by the social networking site.

Myspace, another social networking site similar to but less popular than Facebook, also has a policy banning “homophobic” content.

The pro-life organization Live Action has had a number of encounters with new media censorship. In a conversation with LifeSiteNews about the NRB study, Live Action Media Director David Schmidt recalled a censorship threat from Youtube earlier this year. “We were threatened earlier this year,” he said. “After our attorney sent a letter to YouTube, they didn’t remove our videos. Thankfully, they were considered ‘newsworthy,’ a standard not ‘cut-and-dry’ to all users.” Schmidt said that a majority of Live Action videos have been rejected for consideration as YouTube Promoted Videos because “it is a content issue of some sort.”

The authors of the NRB study point out that the attitudes of the new media companies to Christian content are important, since currently “a handful of ‘new media’ giants are the gatekeepers to new web-based communications platforms. There is a real and present danger that these companies can, and in some instances actually have, committed viewpoint censorship as a result of monolithic control over these technologies.”

+++

Truly, liberals are such tolerant, open-minded, pro-diversity people!

See also my follow-up post, “Apple, Google, Facebook Censor Christians.”

~Eowyn

Tech Advice From The Fellowship

 

Dear Tech Support,
Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed a distinct slow down in overall system performance, particularly in the flower and jewelry applications, which operated flawlessly under Boyfriend 5.0 .
In addition, Husband 1.0 uninstalled many other valuable programs, such as Romance 9.5 and Personal Attention 6.5 , and then installed undesirable programs such as NBA 5.0 , NFL 3.0 and Golf Clubs 4.1 .

Conversation 8.0 no longer runs, and Housecleaning 2.6 simply crashes the system. 

          

Please note that I have tried running Nagging 5.3 to fix these problems, but to no avail.
What can I do?

Signed,
Desperate.

 

 

 

DEAR DESPERATE,
First, keep in mind that Boyfriend 5.0 is an Entertainment Package, while Husband 1.0 is an operating system.

Please enter command: ithoughtyoulovedme. html and try to download Tears 6.2 and do not forget to install the Guilt 3.0 update. If that application works as designed, Husband 1.0 should then automatically run the applications Jewelry 2.0 and Flowers 3.5.

However, remember, overuse of the above application can cause

 

Husband 1.0 to default to Grumpy Silence 2.5, Happy Hour7.0 orBeer 6.1 . Please note that Beer 6.1 is a very bad program that will download the Flatulance and Snore Virus, Not good.
Whatever you do, DO NOT under any circumstances install Mother-In-Law 1.0 (it runs a virus in the background that will eventually seize control of all your system resources).

In addition, please do not attempt to reinstall the Boyfriend 5.0 program. These are unsupported applications and will crash Husband 1.0 .

In summary,

 

Husband 1.0 is a great program, but it does have limited memory and cannot learn new applications quickly. You might consider buying additional software to improve memory and performance. We recommend Cooking 3.0 and Hot Lingerie 7.7…
Good Luck!

Tech Support
~Steve~    H/T The I- Man