Snowden – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 18 Jan 2018 06:42:55 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Snowden – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 NSA Unleashed | Unfilter 265 https://original.jupiterbroadcasting.net/121632/nsa-unleashed-unfilter-265/ Wed, 17 Jan 2018 22:42:55 +0000 https://original.jupiterbroadcasting.net/?p=121632 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Senate overcomes filibuster and advances FISA extension bill – CNNPolitics Trump’s medical exam inspires “girther” movement – Salon.com Porn actor Stephanie Clifford admitted affair with Trump in 2011 interview | US news […]

The post NSA Unleashed | Unfilter 265 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post NSA Unleashed | Unfilter 265 first appeared on Jupiter Broadcasting.

]]>
Extended Usefulness | TechSNAP 335 https://original.jupiterbroadcasting.net/118036/extended-usefulness-techsnap-335/ Tue, 05 Sep 2017 21:01:28 +0000 https://original.jupiterbroadcasting.net/?p=118036 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Extended File Attributes – What? Extended File Attributes Rock! – article from 2011 Extended file attributes are file system features that enable users to associate computer files with metadata not interpreted by the […]

The post Extended Usefulness | TechSNAP 335 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Extended File Attributes – What?

  • Extended File Attributes Rock! – article from 2011

  • Extended file attributes are file system features that enable users to associate computer files with metadata not interpreted by the filesystem, whereas regular attributes have a purpose strictly defined by the filesystem (such as permissions or records of creation and modification times). from Wikipedia

  • Different namespaces (or attribute spaces if you will), often system and user. You can use the user namespace as non-root.

  • Use them for your own purposes, e.g.backup tags, reminders

  • If you rely upon them, make sure your archive & restore tools suppor them. – test test test

  • Most Linux and BSD modern file systems have had this capability for years. So does Mac OS X. Apart from minor interface differences, the feature works identically on all three systems.

  • We mention this mostly to prompt ideas, perhaps you’ve been trying to solve a problem and suddenly this information will show you the solution you’ve been waiting for.

On internet privacy, be very afraid

  • In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.

  • In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine.

  • Right now, the answer is basically anything goes. It wasn’t always this way. In the 1970s, Congress passed a law to make a particular form of subliminal advertising illegal because it was believed to be morally wrong. That advertising technique is child’s play compared to the kind of personalized manipulation that companies do today.

  • …. The result is that there are more controls over government surveillance in the U.S. than in Europe. On the other hand, Europe constrains its corporations to a much greater degree than the U.S. does.

Inside the Massive 711 Million Record Onliner Spambot Dump

  • The mechanics of this spambot

  • The one I’m writing about today is 711m records which makes it the largest single set of data I’ve ever loaded into HIBP. Just for a sense of scale, that’s almost one address for every single man, woman and child in all of Europe. This blog posts explains everything I know about it.

  • I’ll take a stab at it and say that there’s not many legitimate drivers using the New South Wales toll road system with Russian email addresses!

  • A random selection of a dozen different email addresses checked against HIBP showed that every single one of them was in the LinkedIn data breach.

  • Yet another file contains over 3k records with email, password, SMTP server and port (both 25 and 587 are common SMTP ports):

  • This immediately illustrates the value of the data: thousands of valid SMTP accounts give the spammer a nice range of mail servers to send their messages from. There are many files like this too; another one contained 142k email addresses, passwords, SMTP servers and ports.


Feedback


Round Up:

Zsh Configuration From the Ground Up


The post Extended Usefulness | TechSNAP 335 first appeared on Jupiter Broadcasting.

]]>
Reheating Cold Wars | Unfilter 220 https://original.jupiterbroadcasting.net/105906/reheating-cold-wars-unfilter-220/ Thu, 05 Jan 2017 00:24:38 +0000 https://original.jupiterbroadcasting.net/?p=105906 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Assange: “Seth Rich Went Missing For 2 Hours Before Death, We Know Why.” (Inside Job) – Conservative Daily Post Seth Rich: Inside the Killing of the […]

The post Reheating Cold Wars | Unfilter 220 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Reheating Cold Wars | Unfilter 220 first appeared on Jupiter Broadcasting.

]]>
Pizza Bait | Unfilter 216 https://original.jupiterbroadcasting.net/105286/pizza-bait-unfilter-216/ Thu, 08 Dec 2016 00:16:39 +0000 https://original.jupiterbroadcasting.net/?p=105286 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links The FAA banned drones from flying at the Standing Rock oil pipeline protest – Recode State Dept Dan Rosen’s Arrest: Cheat Sheet for Journos Why Snapchat […]

The post Pizza Bait | Unfilter 216 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links

The post Pizza Bait | Unfilter 216 first appeared on Jupiter Broadcasting.

]]>
The Hunt for Red November | Unfilter 203 https://original.jupiterbroadcasting.net/102911/the-hunt-for-red-november-unfilter-203/ Wed, 07 Sep 2016 21:15:26 +0000 https://original.jupiterbroadcasting.net/?p=102911 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Episode Links Judicial Watch: New Abedin Emails Reveal Top Clinton Foundation Executive Doug Band Sought Diplomatic Passport from Clinton State Department – Judicial Watch Bears in the […]

The post The Hunt for Red November | Unfilter 203 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post The Hunt for Red November | Unfilter 203 first appeared on Jupiter Broadcasting.

]]>
The Shadow Knows | TechSNAP 282 https://original.jupiterbroadcasting.net/102761/the-shadow-knows-techsnap-282/ Thu, 01 Sep 2016 18:18:08 +0000 https://original.jupiterbroadcasting.net/?p=102761 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Shadow Brokers steal hacking tools from NSA linked Equation Group “On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it […]

The post The Shadow Knows | TechSNAP 282 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Shadow Brokers steal hacking tools from NSA linked Equation Group

  • “On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA.”
  • “The previously unknown group said that it broke into the cyberespionage organization known as the Equation Group and has now put the hacking tools that it acquired up for auction”
  • “In addition to selling the hacking tools to whoever would end up as the highest bidder, the Shadow Brokers said that if it will be paid 1 million bitcoins, which currently carries a value of about $568 million, the cyberweapons will be publicly released”
  • “To back up its claims, the Shadow Brokers uploaded what looks like attack code that focuses on the security systems of routers that direct computer traffic online. According to security experts, the code looks legitimate, affecting routers manufactured by three United States companies and two Chinese companies. Specifically, the companies involved are Cisco Systems, Fortinet, Juniper Networks, Shaanxi Networkcloud Information Technology and Beijing Topsec Network Security Technology.”
  • “Last year, researchers from Kaspersky Lab described the Equation Group as one of the most advanced hacking groups in the world. The compressed data that accompanied the post by the Shadow Brokers had a size of just over 256 MB and is said to contain hacking tools that are dated as early as 2010 belonging to the Equation Group”
  • Additional Coverage: The Intercept: The NSA Leak Is Real, Snowden Documents Confirm
  • “Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.”
  • This does not necessarily mean that the tools were stolen directly from the NSA, just that Shadow Brokers stole them from someone who had them. Maybe the Equation Group stole them, or maybe the NSA stole them from the Equation Group.
  • “The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.”
  • “The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.”
  • “SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.”
  • “SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.”
  • “Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.”
  • Additional Coverage: SoftPedia: List of Equation Group Files Leaked by Shadow Brokers
  • The list of names is quite amusing, likely computer generated by sticking two random words together. Reminds me of a domain-name generator I wrote when I was a teenager
  • Additional Coverage: Wired: Of Course Everyone’s Already Using the Leaked NSA Exploits
  • “All of which means anyone—curious kids, petty criminals, trolls—can now start hacking like a spy. And it looks like they are.”
  • “Curious to learn if anyone was indeed trying to take advantage of the leak, Brendan Dolan-Gavitt—a security researcher at NYU—set up a honeypot. On August 18 he tossed out a digital lure that masqueraded as a system containing one of the vulnerabilities. For his experiment, Dolan-Gavitt used a Cisco security software bug from the leak that people have learned to fix with workarounds, but that doesn’t have a patch yet.”
  • “Within 24 hours Dolan-Gavitt saw someone trying to exploit the vulnerability, with a few attempts every day since. “I’m not surprised that someone tried to exploit it,” Dolan-Gavitt says. Even for someone with limited technical proficiency, vulnerable systems are relatively easy to find using services like Shodan, a search engine of Internet-connected systems. “People maybe read the blog post about how to use the particular tool that carries out the exploit, and then either scanned the Internet themselves or just looked for vulnerable systems on Shodan and started trying to exploit them that way,” Dolan-Gavitt says. He explains that his honeypot was intentionally very visible online and was set up with easily guessable default passwords so it would be easy to hack.”
  • “The findings highlight one of the potential risks that come with hoarding undisclosed vulnerabilities for intelligence-gathering and surveillance. By holding on to bugs instead of disclosing them so they can be patched, spy agencies like the NSA create a potentially dangerous free-for-all if their exploits are exposed.”
  • Additional Coverage: Softpedia: Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool
  • Additional Coverage: Stephen Checkoway: Equation Group Initial Impressions
  • Additional Coverage: @musalbas: NSA’s BENIGNCERTAIN sends IKE packets to Cisco VPNs, then parses config and private keys from the response
  • Additional Coverage: @thegrugq: speculation that the ShadowBrokers leak was from another Snowden is “completely wrong”
  • Additional Coverage: Matt Blaze

Google Login Issue Allows Credential Theft

  • Attackers can add an arbitrary page to the end of a Google login flow that can steal users’ credentials. or alternatively, send users an arbitrary file any time a login form is submitted, due to a bug in the login process.
  • A researcher in the UK identified the vulnerability recently and notified Google of it, but Google officials said they don’t consider it a security issue. The bug results from the fact that the Google login page will take a specific, weak GET parameter.
  • “Google’s login page accepts a vulnerable GET parameter, namely ‘continue’. As far as I can determine, this parameter undergoes a basic check,” Aidan Woods, the researcher who discovered the bug, wrote in an explanation of the flaw.
  • The login page checks to ensure that the parameter points to .google.com/, but doesn’t determine which Google service the parameter is pointing to.
  • “The application fails to verify the type of Google service that has been specified. This means that is is possible to seamlessly insert any Google service at the end of the login process.”
  • Using this bug, an attacker could add an extra step to the end of the login flow that could steal a user’s credentials.
  • For example, the page could mimic an incorrect password dialog and ask the user to re-enter the password. Woods said an attacker also could send an arbitrary file to the target’s browser any time the login form is submitted.
  • Exploiting the flaw should be simple, an “Attacker would not need to intercept traffic to exploit – they only need to get the user to click a link that they have crafted to exploit the bug in the continue parameter,”
  • Woods opened three separate reports with Google about the vulnerability, but to no avail.
  • In a message to Woods, Google representatives said they saw phishing as the only attack vector, and didn’t consider this a security problem.
  • “The simplest action Google can take to address this would be to remove the redirect feature at login. If they want to retain that feature and also address this problem, they need to properly validate the contents of the parameter: Google needs to make sure the values they allow can’t be abused, and validate the allowed values are also safe themselves,” Woods said.
  • “This could be done by building a whitelist of [sub-]domains, (including paths if necessary) that they wish to redirect to.”
  • Aidan Woods: Google’s Faulty Login Pages

Researchers map the Netflix content delivery network, find 4669 servers

  • “When you open Netflix and hit “play,” your computer sends a request to the video-streaming service to locate the movie you’d like to watch. The company responds with the name and location of the specific server that your device must access in order for you to view the film.”
  • “For the first time, researchers have taken advantage of this naming system to map the location and total number of servers across Netflix’s entire content delivery network, providing a rare glimpse into the guts of the world’s largest video-streaming service.”
  • “A group from Queen Mary University of London (QMUL) traced server names to identify 4,669 Netflix servers in 243 locations around the world. The majority of those servers still reside in the United States and Europe at a time when the company is eager to develop its international audience. The United States also leads the world in Netflix traffic, based on the group’s analysis of volumes handled by each server. Roughly eight times as many movies are watched there as in Mexico, which places second in Netflix traffic volume. The United Kingdom, Canada, and Brazil round out the top five.”
  • “In March, Netflix did publish a blog post outlining the overall structure of its content delivery network, but did not share the total number of servers or server counts for specific sites.”
  • “Last January, Netflix announced that it would expand its video-streaming service to 190 countries, and IHS Markit recently predicted that the number of international Netflix subscribers could be greater than U.S. subscribers in as few as two years.”
  • “Steve Uhlig, the networks expert at Queen Mary University of London who led the mapping project, says repeating the analysis over time could track shifts in the company’s server deployment and traffic volumes as its customer base changes.”
  • “Traditionally, content delivery services have chosen one strategy or the other. Akamai, for example, hosts a lot of content with Internet service providers, while Google, Amazon, and Limelight prefer to store it at IXPs. However, Uhlig’s group found that Netflix uses both strategies, and varies the structure of its network significantly from country to country.”
  • “Timm Böttger, a doctoral student at QMUL who is a member of the research team, says he was surprised to find two Netflix servers located within Verizon’s U.S. network. Verizon and other service providers have argued with Netflix over whether they would allow Netflix to directly connect servers to their networks for free. In 2014, Comcast required Netflix to pay for access to its own network.”
  • “Tellingly, the group did not find any Netflix servers in Comcast’s U.S. network. As for the mysterious Verizon servers? “We think it is quite likely that this is a trial to consider broader future deployment,” Böttger says. Netflix did not respond to a request for comment.”
  • “Their search revealed that Netflix’s server names are written in a similar construction: a string of numbers and letters that include traditional airport codes such as lhr001 for London Heathrow to mark the server’s location and a “counter” such as c020 to indicate the number of servers at that location. A third element written as .isp or .ix shows whether the server is located within an Internet exchange point or with an Internet service provider.”
  • “To study traffic volumes, the researchers relied on a specific section of the IP header that keeps a running tally of data packets that a given server has handled. By issuing multiple requests to these servers and tracking how quickly the values rose, the team estimated how much traffic each server was processing at different times of the day. They tested the servers in 1-minute intervals over a period of 10 days.”
  • That counter is only 32 bit, and the larger Netflix servers push 80 gigabits per second (enough to wrap a 32 bit counter every 24 seconds)
  • “The U.K. has more Netflix servers than any other European country, and most of those servers are deployed within Internet service providers. All French customers get their films streamed through servers stationed at a single IXP called France-IX. Eastern Europe, meanwhile, has no Netflix servers because those countries were only just added to the company’s network in January.”
  • The researchers expected to see a lot more servers embedded in ISPs rather than at Internet exchanges. There are two reasons why this is not so: It would require more hardware, since machines at a specific ISP cannot service a second ISP, and: many ISPs like Comcast are resisting accepting Netflix CDN boxes
  • “In March, the company said it delivers about 125 million total hours of viewing to customers per day. The researchers learned that Netflix traffic seems to peak just before midnight local time, with a second peak for IXP servers occurring around 8 a.m., presumably as Netflix uploads new content to its servers.”
  • See Netflix and Fill – BSDNow 157 for more on how Netflix runs their FreeBSD powered CDN.

Feedback:


Round Up:


The post The Shadow Knows | TechSNAP 282 first appeared on Jupiter Broadcasting.

]]>
Russia’s Cyber Sneak Attack | Unfilter 201 https://original.jupiterbroadcasting.net/102486/russias-cyber-sneak-attack-unfilter-201/ Wed, 24 Aug 2016 20:29:19 +0000 https://original.jupiterbroadcasting.net/?p=102486 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Episode Links Clinton Foundation hired cyber firm after suspected hacking: sources | Reuters Rita Katz on Twitter: “Pro#ISIS media grp attempts to instill fear in #Canada after […]

The post Russia’s Cyber Sneak Attack | Unfilter 201 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Russia’s Cyber Sneak Attack | Unfilter 201 first appeared on Jupiter Broadcasting.

]]>
Internet for your Things | TTT 257 https://original.jupiterbroadcasting.net/102416/internet-for-your-things-ttt-257/ Mon, 22 Aug 2016 16:33:50 +0000 https://original.jupiterbroadcasting.net/?p=102416 RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed Become a supporter on Patreon Show Notes: SHADOW BROKERS HACK THE NSA!!! – YouTube Commentary: Evidence points to another Snowden at the NSA | Reuters How the NSA snooped on encrypted Internet traffic for a decade […]

The post Internet for your Things | TTT 257 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

Kickstarter of the Week

Submitted by: khaotic_kernel

The post Internet for your Things | TTT 257 first appeared on Jupiter Broadcasting.

]]>
CIA Rewrites History | Unfilter 189 https://original.jupiterbroadcasting.net/99976/cia-rewrites-history-unfilter-189/ Wed, 25 May 2016 20:11:08 +0000 https://original.jupiterbroadcasting.net/?p=99976 We break apart a grade A propaganda story designed to rewrite history in favor of the CIA. We discuss the remarkable lengths they’ve strived for to set the record straight about 9/11. Plus a quick update on EgyptAir 804, the best of the election cycle this week, the storm clouds forming around DNC Chairwoman Debbie […]

The post CIA Rewrites History | Unfilter 189 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We break apart a grade A propaganda story designed to rewrite history in favor of the CIA. We discuss the remarkable lengths they’ve strived for to set the record straight about 9/11.

Plus a quick update on EgyptAir 804, the best of the election cycle this week, the storm clouds forming around DNC Chairwoman Debbie Wasserman Schultz & a super important Overtime segment!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post CIA Rewrites History | Unfilter 189 first appeared on Jupiter Broadcasting.

]]>
Torturing the Truth | Unfilter 188 https://original.jupiterbroadcasting.net/99796/torturing-the-truth-unfilter-188/ Mon, 16 May 2016 20:23:18 +0000 https://original.jupiterbroadcasting.net/?p=99796 A quick update edition of Unfilter this week, we just couldn’t stay away! We cover some of the crazy things happening in the news, our favorite clips of the week & more! Direct Download: Video | MP3 Audio | OGG Audio | Torrent | YouTube RSS Feeds: Video Feed | MP3 Feed | OGG Feed […]

The post Torturing the Truth | Unfilter 188 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A quick update edition of Unfilter this week, we just couldn’t stay away! We cover some of the crazy things happening in the news, our favorite clips of the week & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Torturing the Truth | Unfilter 188 first appeared on Jupiter Broadcasting.

]]>
Encryption gets the Clap | TTT 241 https://original.jupiterbroadcasting.net/99091/encryption-gets-the-clap-ttt-241/ Tue, 26 Apr 2016 10:54:50 +0000 https://original.jupiterbroadcasting.net/?p=99091 Has Spotify been hacked? And our different approaches for preparing to reload an important personal computer. Plus piracy skyrockets, hacks go for a premium & one of our coolest Kickstarters of the week yet! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | […]

The post Encryption gets the Clap | TTT 241 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Has Spotify been hacked? And our different approaches for preparing to reload an important personal computer. Plus piracy skyrockets, hacks go for a premium & one of our coolest Kickstarters of the week yet!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

The post Encryption gets the Clap | TTT 241 first appeared on Jupiter Broadcasting.

]]>
Guarding Turkey’s Oil | Unfilter 168 https://original.jupiterbroadcasting.net/90991/guarding-turkeys-oil-unfilter-168/ Wed, 02 Dec 2015 20:50:07 +0000 https://original.jupiterbroadcasting.net/?p=90991 It’s been a busy week, and there’s a lot of important news that’s been buried under a lot of junk news. Your Unfilter show is a healthy serving of news that really matters, like the real reason Turkey shot down a Russian Jet & why the Obama administration had their intelligence reports altered. It’s not […]

The post Guarding Turkey's Oil | Unfilter 168 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s been a busy week, and there’s a lot of important news that’s been buried under a lot of junk news. Your Unfilter show is a healthy serving of news that really matters, like the real reason Turkey shot down a Russian Jet & why the Obama administration had their intelligence reports altered. It’s not what you’re being told.

Plus the latest crazy reasons to ban encryption, some breaking news & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Guarding Turkey's Oil | Unfilter 168 first appeared on Jupiter Broadcasting.

]]>
War: As Seen On TV | Unfilter 167 https://original.jupiterbroadcasting.net/90701/war-as-seen-on-tv-unfilter-167/ Mon, 23 Nov 2015 20:54:58 +0000 https://original.jupiterbroadcasting.net/?p=90701 Following the attacks in Paris we analyze the new momentum for a global state of war & debunk the continued scapegoating of encryption. Snowden comes under attack & some stark long term options in Syria and Iraq. Plus full coverage on the week’s “cyber warfare” and privacy stories & the great turkey shortage! Direct Download: […]

The post War: As Seen On TV | Unfilter 167 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Following the attacks in Paris we analyze the new momentum for a global state of war & debunk the continued scapegoating of encryption. Snowden comes under attack & some stark long term options in Syria and Iraq.

Plus full coverage on the week’s “cyber warfare” and privacy stories & the great turkey shortage!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post War: As Seen On TV | Unfilter 167 first appeared on Jupiter Broadcasting.

]]>
5 Blind Eyes | Unfilter 166 https://original.jupiterbroadcasting.net/90476/5-blind-eyes-unfilter-166/ Wed, 18 Nov 2015 22:01:46 +0000 https://original.jupiterbroadcasting.net/?p=90476 Brutal attacks in Paris are all the west need to pass new laws and launch new campaigns against their self created monster. Despite communicating in the clear text, the debate to break encryption is being pushed back into the public conversation with Telegram as the primary target. We explain why this was inevitable. We cover […]

The post 5 Blind Eyes | Unfilter 166 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Brutal attacks in Paris are all the west need to pass new laws and launch new campaigns against their self created monster. Despite communicating in the clear text, the debate to break encryption is being pushed back into the public conversation with Telegram as the primary target. We explain why this was inevitable.

We cover the complete timeline of events in the Paris attacks, with the absolutely latest information. Discuss the major cyber attack pinned on Iran, and wrap the whole thing up with a high note.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Links and Notes —

The above video, reportedly recorded outside of Aleppo, Syria and posted online Tuesday, features rebels from the U.S.-backed Free Syrian Army firing a U.S.-supplied anti-tank guided missile at what it is clearly a U.S.-made Humvee.

Bloomberg News has reported that on the same day as the Paris attacks, local emergency responders had gone through an exercise that simulated a mass shooting event. (Drills such as the one carried out Friday became regular occurrences after the Charlie Hebdo shootings in January, according to the report.)

Yet news emerging from Paris — as well as evidence from a Belgian ISIS raid in January — suggests that the ISIS terror networks involved were communicating in the clear, and that the data on their smartphones was not encrypted.

The post 5 Blind Eyes | Unfilter 166 first appeared on Jupiter Broadcasting.

]]>
Encryption McCarthyism | Unfilter 150 https://original.jupiterbroadcasting.net/84917/encryption-mccarthyism-unfilter-150/ Wed, 08 Jul 2015 21:52:53 +0000 https://original.jupiterbroadcasting.net/?p=84917 In the fight against ISIS, the FBI is making the case for US tech companies to build-in backdoors to their encryption across the board. At the same time new legislation compels social media companies to report all terrorism related activities. We’ll look at the big picture & the trends that have been leading to this. […]

The post Encryption McCarthyism | Unfilter 150 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In the fight against ISIS, the FBI is making the case for US tech companies to build-in backdoors to their encryption across the board. At the same time new legislation compels social media companies to report all terrorism related activities. We’ll look at the big picture & the trends that have been leading to this.

Plus the first possible olive branch has been extended to Edward Snowden, an update on Greece, the NYSE goes down & much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Encryption McCarthyism | Unfilter 150 first appeared on Jupiter Broadcasting.

]]>
Terror for the 4th | Unfilter 149 https://original.jupiterbroadcasting.net/84557/terror-for-the-4th-unfilter-149/ Wed, 01 Jul 2015 22:38:34 +0000 https://original.jupiterbroadcasting.net/?p=84557 Dire warnings of a holiday attack this weekend, your Unfilter show gets to the bottom of this week’s latest scare! The NSA’s vacuums are back to full, we’ll explain why, Russia turns off the gas, the Supreme court makes their big decision & we’re tracking the latest claimed threats from ISIS. Plus IRS emails recovered, […]

The post Terror for the 4th | Unfilter 149 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Dire warnings of a holiday attack this weekend, your Unfilter show gets to the bottom of this week’s latest scare! The NSA’s vacuums are back to full, we’ll explain why, Russia turns off the gas, the Supreme court makes their big decision & we’re tracking the latest claimed threats from ISIS.

Plus IRS emails recovered, the situation in Greece, some Red Book follow up & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Terror for the 4th | Unfilter 149 first appeared on Jupiter Broadcasting.

]]>
DuckDuckGoing Up | Tech Talk Today 185 https://original.jupiterbroadcasting.net/83942/duckduckgoing-up-tech-talk-today-185/ Thu, 18 Jun 2015 10:16:33 +0000 https://original.jupiterbroadcasting.net/?p=83942 DuckDuckGo sees 600% user growth since the Edward Snowden leaks, we’ll play highlights of an interview with their CEO. Uber has a mess in California, Apple Watch sales numbers are in & solving a major sleep issue for many. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube […]

The post DuckDuckGoing Up | Tech Talk Today 185 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

DuckDuckGo sees 600% user growth since the Edward Snowden leaks, we’ll play highlights of an interview with their CEO. Uber has a mess in California, Apple Watch sales numbers are in & solving a major sleep issue for many.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Episode Links:

The post DuckDuckGoing Up | Tech Talk Today 185 first appeared on Jupiter Broadcasting.

]]>
America the Hacked | Unfilter 148 https://original.jupiterbroadcasting.net/83857/america-the-hacked-unfilter-148/ Wed, 17 Jun 2015 20:21:30 +0000 https://original.jupiterbroadcasting.net/?p=83857 A massive breach of the Federal Government’s employment record has exposed millions of confidential details & the scope of the breach keeps expanding as the story develops. Plus a look at what really scares us about the Trans-Pacific Partnership, we’ll bust the attempted takedown of Edward Snowden over the weekend, the claims Russia and China […]

The post America the Hacked | Unfilter 148 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A massive breach of the Federal Government’s employment record has exposed millions of confidential details & the scope of the breach keeps expanding as the story develops.

Plus a look at what really scares us about the Trans-Pacific Partnership, we’ll bust the attempted takedown of Edward Snowden over the weekend, the claims Russia and China cracked his encrypted documents, an update on ISIS in America & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

The post America the Hacked | Unfilter 148 first appeared on Jupiter Broadcasting.

]]>
Unpatriotic Act | Unfilter 146 https://original.jupiterbroadcasting.net/83212/unpatriotic-act-unfilter-146/ Wed, 03 Jun 2015 22:11:00 +0000 https://original.jupiterbroadcasting.net/?p=83212 NSA Metadata collection provisions of the Patriot Act were suspended this weekend, followed by a nasty political battle. We examine where things stand now, the new powers granted to the NSA, who came down on which side & more! Direct Download: Video | MP3 Audio | OGG Audio | Torrent | YouTube RSS Feeds: Video […]

The post Unpatriotic Act | Unfilter 146 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

NSA Metadata collection provisions of the Patriot Act were suspended this weekend, followed by a nasty political battle. We examine where things stand now, the new powers granted to the NSA, who came down on which side & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

The post Unpatriotic Act | Unfilter 146 first appeared on Jupiter Broadcasting.

]]>
Reigning In Blood | Unfilter 145 https://original.jupiterbroadcasting.net/82922/reigning-in-blood-unfilter-145/ Wed, 27 May 2015 22:40:29 +0000 https://original.jupiterbroadcasting.net/?p=82922 The media is sure the “strategy” against ISIS has failed & the time has come for boots on the ground in Iraq again, but the real game is a much longer player & the intention is to sell the American public on arming more militants. We’ll break it down. The Senate fails to reform NSA […]

The post Reigning In Blood | Unfilter 145 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The media is sure the “strategy” against ISIS has failed & the time has come for boots on the ground in Iraq again, but the real game is a much longer player & the intention is to sell the American public on arming more militants. We’ll break it down.

The Senate fails to reform NSA spying & the Patriot Act is set to expire this Sunday. We’ll explain where things are at & why regardless of anything, the larger transgressions by the NSA are being left untouched.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

The Senate Fails to Reform NSA Spying, Votes Against USA Freedom Act

A last-minute bid to reform NSA spying before lawmakers break for a week-long recess failed early Saturday morning after hours of debate and filibuster overnight when Senate lawmakers voted 57-42 against the USA Freedom Act.

Senator Mitch McConnell then tried to lead an effort to extend the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1. But that vote also failed. Temporarily, that means the government’s bulk collection of phone records from U.S. telecoms is on hold.

USA Freedom Act aimed to put an end to that program, first uncovered by USA Today in 2006 and re-exposed in 2013 by NSA whistleblower Edward Snowden.

The bill called for records to be retained by telecoms and would have forced the NSA to obtain court orders from the Foreign Intelligence Surveillance Court to gain access to them. It also would have required the agency to use specific search terms to narrow its access to only relevant records.

A companion bill passed in the House earlier this month by a landslide vote of 338 to 88 but encountered trouble in the Senate where opponents said it would handicap the fight against terrorism and harm national security.

Proponents of the bill were pushing to get it passed before lawmakers could vote on whether or not to re-authorize sections of the US Patriot Act. Section 215, which the government has long said legally justifies its collection of phone records, is set to expire at midnight June 1.

Unlike many privacy and civil liberties groups, the ACLU has refrained from endorsing the USA Freedom Act and instead is advocating for allowing the Patriot Act provisions to sunset — i.e., to die a long overdue death rather than being “reformed.” Meanwhile, almost all of the 86 “no” votes in the House were based on the argument that the USA Freedom Act either does not go far enough in limiting the NSA or that it actually makes things worse.

The USA Freedom Act was rejected by the U.S. Senate on May 22, 2015. By a vote of 57-42, the Senate did not pass the bill that would have required 60 votes to move forward, which means that the NSA must start winding down its domestic mass surveillance program this week. The Senate also rejected, by 54-45, also short of the necessary 60 votes, a two-month extension for the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1, 2015.

Inside the battle for Ramadi: Iraqi soldier speaks

He believes that the order to withdraw was a betrayal. The Iraqi government has said it launched an investigation to find out what went wrong and how the order was issued, but so far, no one has given a viable explanation.

“I want to quit the army, I would, if I thought I wouldn’t get into trouble,” Al-Yassiri says. “I want to join the militias and go back to the fight.”

Ramadi Fell to ISIS Fighters Even Though They Were ‘Vastly Outnumbered’ by Iraqi

The city of Ramadi is controlled by “hundreds” of ISIS fighters who were able to seize the city after Iraqi military commanders ordered the withdrawal of several thousand Iraqi troops from the city.

That’s according to a U.S. official who also confirmed that the withdrawal of Iraqi troops from Ramadi may have been prompted by the unexplained pullout of the elite Iraqi counterterrorism force based in the city.

The pullout of the Iraqi counterterrorism unit from Ramadi first appeared in the Kurdish news agency Rudaw.

Ramadi occupies a highly strategic location on the Euphrates and the road west into Syria and Jordan. This has made it a hub for trade and traffic, from which the city gained significant prosperity. Its position has meant that it has been fought over several times, during the two World Wars and again during the Iraq War and Iraqi insurgency. It was heavily damaged during the Iraq War, when it was a major focus for the insurgency against occupying United States forces. Following the withdrawal of US forces from Iraq in 2011, the city was contested by the Iraqi government and the extremist group Islamic State of Iraq and the Levant (ISIL) and fell to ISIL in May 2015.

The King of Tech Talk Showed Everyone a (His?) Naked Dick

This particular incident occurred on May 24th, during an explanatory segment on Apple’s new Photos app. Most of the clip is the same sort of David Pogue explainer-mush that’s been Laporte’s bread and butter for years. While clicking through his photo library, Laporte brings up a grid of imported images: family, friends, food, and an erect penis.

The Tech Guy Leo Laporte Accidentally Shows A Penis Photo During His Live Tech Program! See The Awkward Moment HERE!

Wikileaks reveal massive haul of 1978 Documents

PlusD

Today WikiLeaks has released more than half a million US State Department cables from 1978. The cables cover US interactions with, and observations of, every country.

1978 was an unusually important year in geopolitics. The year saw the start of a great many political conflicts and alliances which continue to define the present world order, as well as the rise of still-important personalities and political dynasties.


The cables document the start of the Iranian Revolution, leading to the stand-off between Iran and the West (1979 — present); the Second Oil Crisis; the Afghan conflict (1978 — present); the Lebanon–Israel conflict (1978 — present); the Camp David Accords; the Sandinista Revolution in Nicaragua and the subsequent conflict with US proxies (1978 — 1990); the 1978 Vietnamese invasion of Cambodia; the Ethopian invasion of Eritrea; Carter’s critical decision on the neutron bomb; the break-up of the USSR’s nuclear-powered satellite over Canada, which changed space policy; the US “playing the China card” against Russia; Brzezinski’s visit to China, which led to the subsequent normalisation of relations and a proxy war in Cambodia; with the US, UK, China and Cambodia on one side and Vietnam and the USSR on the other.


Through 1978, Zbigniew “Zbig” Brzezinski was US National Security Advisor. He would become the architect of the destabilisation of Soviet backed Afghanistan through the use of Islamic militants, elements of which would later become known as al-Qaeda. Brzezinski continues to affect US policy as an advisor to Obama. He has been especially visible in the recent conflict between Russia and the Ukraine.


WikiLeaks’ Carter Cables II comprise 500,577 US diplomatic cables and other diplomatic communications from and to US embassies and missions in nearly every country. It follows on from the Carter Cables (368,174 documents from 1977), which WikiLeaks published in April 2014.

The Carter Cables II bring WikiLeaks total published US diplomatic cable collection to 2.7 million documents.

The post Reigning In Blood | Unfilter 145 first appeared on Jupiter Broadcasting.

]]>