This is default featured slide 1 title

This is default featured slide 1 title

You can completely customize the featured slides from the theme theme options page. You can also easily hide the slider from certain part of your site like: categories, tags, archives etc. More »

This is default featured slide 2 title

This is default featured slide 2 title

You can completely customize the featured slides from the theme theme options page. You can also easily hide the slider from certain part of your site like: categories, tags, archives etc. More »

This is default featured slide 3 title

This is default featured slide 3 title

You can completely customize the featured slides from the theme theme options page. You can also easily hide the slider from certain part of your site like: categories, tags, archives etc. More »

This is default featured slide 4 title

This is default featured slide 4 title

You can completely customize the featured slides from the theme theme options page. You can also easily hide the slider from certain part of your site like: categories, tags, archives etc. More »

This is default featured slide 5 title

This is default featured slide 5 title

You can completely customize the featured slides from the theme theme options page. You can also easily hide the slider from certain part of your site like: categories, tags, archives etc. More »

 

How to get a non English keyboard on Mint, Windows & Android

Linux Mint:

Changing the system language:

First, Open System settings.

Open ‘languages’ under preferences.

 

Select install / remove languages

The page you land on should be called ‘Install / Remove languages’ In the bottom left corner, click ‘Add…’

Select your language of choice and click install. There may be more than one. We won’t be going one by one on which to install for each language in this tutorial. However, it usually does no harm to install multiple.

 

When you have returned to the ‘Install / Remove window’ be sure that the new language pack you installed does indeed say ‘Fully installed’. If not, select it, and click ‘Install language packs’ at the bottom of the window.

 

After that you may change the language of your Linux Mint device on the language window.

 

Keyboard:

Note: It does not work for Japanese, and may not work for others that do not use latin characters. I also use a theme in this tutorial. Your operating system may look slightly different. The instructions are the same.

Under the Hardware section of System Settings, select Keyboard.Layout Screenshot

On the top right of the window select Layouts.

Next, select the plus icon near the bottom left section of the window.

 

Select your language of choice, then add it.

Restart your device.

In the bottom right corner of your screen you should now see a flag.

Select it, and you should see the new keyboard software you have added.

Android:

Install the application GBoard from the Google Play Store, once the install has completed open the app and follow the steps to activate the keyboard. These may be different depending on the version of your Android device.

Go to any search or text area so your new keyboard opens, then, click the Google G logo in the top left side of the keyboard.

Then, click the three dots on the top right side of your keyboard.GBoard settings image

 

 

Click the settings button on the right side.

GBoard settings image

 

The following windows may look different depending on your device and Android OS version but the process should be the same. The next page should look similar to the following.

The Languages text is a button. Click it.

 

Finally, click ‘Add keyboard’ and select your keyboard of preference. The keyboard should automatically and instantly be available.

 

icon

Globe icon

To switch between languages, click the globe icon while the GBoard is open, or hold down the space bar.

 

 

Windows, unfortunately, has a different way of changing the keyboard language software in each version of their operating system. To keep this article a reasonable length, we’ll share articles to websites with instructions for each Windows operating system.

Windows 7 and 8: https://support.microsoft.com/

Windows 10: https://www.windowscentral.com/

 

Join a Team Internet Event

Chrome & Opera collect your data, here is what you can do about it

Opera Chrome logos crossed out

Both Opera and Chrome collect various information from it’s users. For example Operas Privacy Statement states,

“What data do we collect?” “The information we collect may include: personal data, for example your name, email, IP-address, location; and non-personal technical data, for example who manufactured your device, your screen’s resolution, your mobile operator’s region and code. A complete list of the data we collect and purpose of collection may vary between our products and services. You can find detailed descriptions in the product/service-related sections below.”

Luckily there are several alternative browsers that respect user privacy, and may have more features than both Chrome and Opera.

Brave Browser:

The Brave Browser does not collect any information on it’s users, anonymous or personal and no browser history is stored in the the cloud. Brave is based on Chromium, an open source project which Chrome was also based off of. Due to this Brave has nearly all the features Chrome has. Additionally, Brave has tracking protection and adblock installed and enabled by default. Fingerprinting protection and script blocking can also be enabled easily by clicking on the Brave logo on the top right corner of the browser and selecting it under Advanced Controls. Brave desktop also claims to load two times faster than Chrome and Safari on major news websites.

Pros:

  • Faster speeds
  • Open source
  • Fingerprint protection
  • Most Chrome features
  • Micro payment option built in.
  • HTTPS everywhere enabled by default
  • Adblocking and tracking protection by default
  • Available on Windows, iOS, Android, and major Linux platforms.

Cons:

  • Limited customizability
  • Limited language support
  • Not compatible with Chrome extensions by default. The Brave extension store only contains nine extensions at this time. (16/11/17)

 

 

Epic Privacy Browser Logo

 

Epic Privacy Browser:

Similarly to Brave, the Epic Privacy Browser does not collect personal info. Epic automatically blocks scripts, advertisements, and has advanced tracking protection. Out of all browsers listed Epic likely has the most advanced tracking protection. This additionally increases loading speed significantly. Similarly to Opera, Epic has a built in free and encrypted proxy.

Pros:

  • Open source
  • Built in free and encrypted proxy
  • Fingerprinting protection enabled by default
  • Advanced tracking protection enabled by default

Cons:

 

New Firefox Browser Logo

 

 

 

 

 

 

 

Firefox:

Although Firefox has faced scrutiny recently for it’s anonymous data collection, which was used for purposes of creating the New Firefox Browser. This data collection can easily be disabled in the Firefox settings, and, unlike Chrome & Opera, Firefox has been built with privacy and security in mind. Due to the open source nature of the Firefox Browser, Firefox can legally be modified and customized to one’s needs. Unfortunately, and unlike Brave & Epic, Firefox does not enable tracking protection off of private windows by default and if you did not disable the option to allow Firefox to collect anonymous data, it mus be changed in the settings.

To do so, click the hamburger button on the top right corner of the Firefox Browser.

Then, click preferences, and Privacy & Security afterwards.

Scroll to tracking protection and select “Always”, then scroll to Firefox Data Collection and Use and deselect everything.

Firefox automatically saves changes to the settings.

Firefox does not have adblocking or a built in proxy by default, so, Firefox may not be the best browser for privacy unless you’re willing to install extensions. However, Firefox does have a much larger following and has more developers at it’s disposal, if any security issue or breach occurs in the future Firefox is more likely to have it patched before Brave and Epic.

Pros:

  • Open source
  • High customizability
  • Faster user support
  • More support and developers

Cons:

  • No built in vpn
  • No fingerprint protection
  • No adblocking, or HTTPS everywhere
  • Tracking protection not enabled by default

Interested in online Privacy? Read our article on which three common software and websites track and collect your data!

Three common software & websites that track or sell your data

Three common software & websites that track or sell your data

tracking visualization

In an age were consumers have become the product, user data has often been, collected, stored and sold with and without consent. In this article we’ll go over which software does this and how to avoid it.

Windows 10:

Do you remember choosing your privacy settings when installing Windows 10? Chances are your probably don’t and left the default settings unchanged. Doing so gives Windows permission to store and use your search history for advertising. As long as Windows saves your search history on their servers, hackers and requesting Gov’ts can access that data.

How can i change this?

From the start menu click Settings > Privacy > General.
Or click here

 

Opera:

Operas VPN is useful, but it may come as a surprise that, of the major browsers Opera most likely stores the most data. Although Opera has stated that collected data is used responsibly, and is not used for advertising purposes, it does not negate the fact that it is collected.

“What data do we collect?” “The information we collect may include: personal data, for example your name, email, IP-address, location; and non-personal technical data, for example who manufactured your device, your screen’s resolution, your mobile operator’s region and code. A complete list of the data we collect and purpose of collection may vary between our products and services. You can find detailed descriptions in the product/service-related sections below.”

How can I change this?

You cannot. However other browsers may be better alternatives such as Firefox. Firefox shares a small amount of data with it’s non-profit parent organization, Mozilla. The data shared is non identifiable and can be disabled in the settings.

 

Google:

Google tracks users that visit websites with Adsense, and Google searches. The data is used for advertising and is stored and connect to your account and IP on Google servers.

 

How can I change this?

To avoid Google search tracking use an alternative search engine such as DuckDuckGo. Unfortunately, DuckDuckGo is not available as one of the default Chrome search engines available in the settings. To change the default browser to DuckDuckGo on Chrome, use the DuckDuckGo for Chrome extension.

Preventing tracking on websites with Adsense is just as easy. Adblocking software or web extensions that block web trackers such as Ghosterly will protect your privacy online.

 

Mauritius: With blockchain assets to credit?

The second-largest bank, Mauritius, the State Bank of Mauritius (SBM), wants to test the use of digital assets as collateral for loans together with the start-up SALT.

SALT (Secured Automated Lending Technology) connects lender and borrower through the use of blockchain assets as collateral for lending. On Friday, the start-up has announced that it has partnered with SBM to provide liquidity for digital assets.

Motivation: Financial Inclusion

The island state of Mauritius calls itself an advanced financial center in Africa and also wants to position itself as a target for blockchain start-ups. In May, BTC-ECHO reported on the ambitious plans that the chairman of SBM Group, K.C. Kwong Wing emphasized once again in the course of the cooperation:

“We are very interested in offering banking services to this innovative company. This relationship will make a significant contribution to reaching our nation’s goal of becoming a hub for outstanding blockchain companies and promoting financial inclusion. “

“Financial Inclusion” is the aim of providing access to formal financial services for all people. While in the industrialized countries the possibility of opening or opening credits is considered self-evident, more than two billion people worldwide have no access to such financial services.

Mauritius and the start-ups

Already in the summer of this year, the Mauritian government was negotiating with a start-up to develop the role of the island as a blockchain center. Representatives of the New York Ethereum start-up ConsenSys met with members of the public and private sector. The aim of the talks was the creation of a so-called “Ethereum Island”. This is to support blockchain innovators in the search for branch offices in Africa, Asia and elsewhere. With the partnership between SBM and SALT, Mauritius is already on the right track to achieving its ambitious goal.

 

~Written by happy_c0der

 

If you have any questions just email me (info.rci@protonmail.com) or join our discord chat ?

Microsoft Windows 10 violates it’s users privacy. Again.

Microsoft logo as of 2017

Yet again, Windows has been accused of violating it’s consumers privacy and this time it may have broken the law. The Dutch Privacy Authority (DPA) claims that Microsoft has broken Dutch privacy laws.

The DPA detailed that Microsoft would automatically opt in Windows 10 Home and Pro users to a setting which allowed Windows to collect personal information. An move which is not enough to consent to the privacy violation in the Netherlands, and, therefore, the DPA has claimed that Windows has broken the law. The regulator also states that Windows Creators Update has further ignored consumer privacy by not respect the previous operating systems settings on the matter.

Windows Privacy

Image source: http://d.ibtimes.co.uk/

 

 

 

“…people cannot provide valid consent for the processing of their personal data, because of the approach used by Microsoft. The company does not clearly inform users that it continuously collects personal data about the usage of apps and web surfing behaviour through its web browser Edge, when the default settings are used. “

Data on app usage, web surfing behaviour, and parts of handwritten documents via inkpad are recorded by Microsoft according to the DPA. Microsoft uses collected data from opted in users to fix errors,  security and to give personalized advertisements on Microsoft Edge and in the Windows Store.

Microsoft has since published a response and seeks to adhere to the Dutch law, however it’s questioned the accuracy of the Dutch regulators concerns. The DPA has stated that they will sanction Microsoft if they do not adhere to Dutch law.

“We have also shared specific concerns with the Dutch DPA about the accuracy of some of its findings and conclusions … A summary of the points in the DPA’s announcement, which we believe do not accurately reflect the data protection compliance of Windows 10 Home and Windows 10 Pro under Dutch law, can be found here.”

 

How To Use Private Encrypted Messaging Over Tor

 Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we’ll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet, and XMPP.

Ricochet, as described on its website, “uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address.” This technique leads to Ricochet being one of the most secure messaging programs available, visible in the Secure Messenger Scorecard by Yawnbox, which was based on the prior work of the Electronic Frontier Foundation.

This chart compares XMPP and Richochet with legacy SMS and voice calls, showing the difference in features behind each messaging platform. XMPP is not inherently secure in itself, but it can be combined with other technologies to make it very secure while offering some features that Ricochet does not. Unlike Ricochet, XMPP traffic is passed over a server which isn’t under the control of the user, offering less privacy in this sense than Ricochet. However, this setup allows for messages to be carried even when users are not necessarily online.

XMPP can be used with a variety of clients, and indeed combined with Tor and message encryption on a variety of clients as well. Clients such as Tor Messenger offer OTR (Off-The-Record) encryption and carry all traffic over Tor, but the client does not support multipoint encryption. Other clients, such as Gajim and Pidgin, as used in this tutorial, require a bit of additional configuration, but can be configured to use Tor and multipoint encryption while offering a very usable interface.

 

Step 1: Downloading Ricochet

While Ricochet binaries are available from the Richochet homepage, the Tor version packaged with the messaging application is relatively outdated, with the last build from November 5, 2016. While the program itself is still known to be secure, the Tor version should be updated for maximum security.

As such, rather than downloading a binary, it will be best to build Ricochet from source. We can fetch a copy of the source code from git.

        git clone https://github.com/ricochet-im/ricochet 

 

Step 2: Installing Ricochet

After downloading the Ricochet source, we’ll need to make sure we have all dependencies before compiling. On Debian/Ubuntu, the following commands should work assuming all dependencies are found in the repositories.

        sudo apt-get install qt5-qmake qt5-default qtbase5-dev qttools5-dev-tools qtdeclarative5-dev qtmultimedia5-dev
        sudo apt-get install qml-module-qtquick-controls qml-module-qtquick-dialogs qml-module-qtmultimedia
        sudo apt-get install build-essential libssl-dev pkg-config libprotobuf-dev protobuf-compiler

Install Tor, or build it from source to ensure complete trustworthiness. Otherwise, it can be installed with apt.

        sudo apt-get install tor

Next, move into the Ricochet directory with the command cd.

        cd ricochet

To build and install Ricochet, use qmake first for Qt building. The qmake process should be relatively quick.

        qmake

Finally, run make to complete the build process. This may take slightly longer to build.

        make

After the build process is completed successfully, Ricochet can be run.

 

Step 3: Using Ricochet

We can launch Ricochet by running “./ricochet” from within the Ricochet directory. Errors and warning messages will be logged to the terminal from which this is launched. On the first run, Ricochet will prompt the user to configure their Tor connection. Unless you wish to use bridges or have a censored or proxied connection, simply clicking “Connect” should be sufficient.

Once Ricochet is running and connected to Tor, we should first click the “Preferences” cog icon and then the “Tor” tab to confirm the Tor version in use. If the Tor version is at least 0.3.X.X, Ricochet is safe to use as of October 2017.

The interface of Ricochet is relatively straightforward. The plus icon at the upper left of the window allows you to add other users based on their ricochet identifiers, formatted as “ricochet:” followed by a string of random characters. The nicknames or contact names assigned to a given ID are entirely client-side, however, when adding a new user, one can include a short message to help identify oneself.

Chatting in Ricochet works like any other instant messaging application, type and then press enter. There are no special characters or peculiar text formatting, save for a message capacity limit. The only peculiarity is that for security purposes, messages are only visible while the window remains open, and conversations can only be carried out while both parties are online.

 

Step 4: Installing Pidgin for XMPP

While Ricochet is extremely secure and has been thoroughly audited, the program itself has several limitations, including the lack of group chat functionality and the need for both users to be online at once.

Instead, we can use XMPP, Tor, and several encryption plugins by using an alternate client. Pidgin is a multi-protocol instant messaging client available for Windows, OS X, and Linux. To be able to route it over the Tor network, it’s simplest to point it towards the Tor service on a Linux distro such as Ubuntu, Debian, or Kali. Pidgin is available at the Pidgin homepage and in most Linux repositories.

On Ubuntu based systems, it can be installed using apt, as seen below.

        sudo apt-get install pidgin

If Tor is not yet installed, it will need to be as well. Type the following to install it.

        sudo apt-get install tor

After Pidgin is installed, launch it by running “pidgin” on the command line or navigating to it through the applications menu.

 

Step 5: Configure Pidgin

On the first launch, Pidgin prompts the user to add accounts. We can add an account immediately at this time, but it may be worthwhile to take special care in choosing servers and configuring our network connection first.

Some XMPP servers will allow inline registration through Pidgin, however, others require registration through a website. When choosing an XMPP server, consider the location of the server, their state policies, and their uptime. A list of XMPP servers is available at this link.

If one plans to communicate only over Tor, it may be worth considering an XMPP server with an onion hidden server for extra privacy, but keep in mind that a hidden service server will only be able to communicate with members whose accounts are also on hidden services.

Keep in mind that while the contents of messages will be private from a server administrator due to encryption, other metadata including messages times, conversation participants, and contact lists may be logged. To avoid this, it is possible to host one’s own XMPP server, but otherwise, it generally will be sufficient to keep this metadata logging potential in mind and take the necessary operational security precautions.

For this example, I registered an account at the XMPP homepage. If you wish to remain anonymous, it’s important to register your account over Tor, a VPN like PIA, or both, so to maintain separation between your personal IP and the account you register.

If you already feel your internet connection is private and secure, you can click “Add” within Pidgin. Otherwise, it will be best to close the window and configure our Tor connection, first by ensuring that the Tor service is running. We can start this as a daemon using systemd by typing the following.

        service tor start

We can alternatively launch it in its own terminal window with error logging by typing the command below.

        sudo tor

Once Tor is running, and after closing the “Accounts” window, we can access preferences by pressing Ctrl+P or opening it under the “Tools” menu.

With this menu open, we’ll want to click on “Proxy” in the left pane. On this window, the “Proxy Type” drop-down menu should be changed to select “Tor/Privacy (SOCKS5)” rather than “No Proxy.” As the Tor service is running on our local system at port 9050, we should change “Host” to 127.0.0.1 and “Port” to 9050.

After configuring our global proxy settings, we can add our account by opening “Manage Accounts” under the “Accounts” menu of the main Pidgin window.

Here we can add our XMPP account details. Select “XMPP” as the “Protocol” and add one’s username and password. The “Domain” is the server on which you registered your account and the “Local alias” is what your account is named locally. If you’re registering an account on a server which allows online registration, you may wish to check the “Create this new account on the server” box.

While Global Proxy Settings should be sufficient for this process, the Tor configuration data can also be added to the “Proxy” tab of the Modify Account window.

If the account successfully connects when the “Enable” box is checked, the account is ready to communicate, but not necessarily securely. We need to install a plugin called pidgin-otr (Off-the-Record).

Open the “Plugins” manager under the “Tools” menu in Pidgin, and look for OTR, or Off-The-Record messaging, and ensure that it is enabled.

If you wish to encrypt group chats, it may be useful to install Lurch for Pidgin, an implementation of OMEMO, or OMEMO Multi-End Message and Object Encryption. OMEMO is an adaptation of the Signal Protocol, created by Open Whisper Systems.

After making sure that OTR is enabled, we’ll generally want to enforce it as a requirement for all chats. This can be done by returning to the “Modify Account” menu, opening the “Advanced” tab, and changing the “Connection Security” drop-down menu to select “Require Encryption.”

With this completed, Pidgin and XMPP should be ready to use!

 

Step 6: Using Pidgin

Using Pidgin over XMPP is much like using any other instant messaging client. Contacts appear in the main Pidgin menu, and new contacts added, messages started, and chats joined through the “Buddies” drop-down menu at the top left of the window.

Once buddies are added, we can open a chat with them by simply double clicking on their name in this panel.

After opening a new chat window, we can ensure encryption is active by viewing the status at the lower right of the window. If “Not Private” or a similar message is visible, we can begin using OTR by opening the “OTR” menu at the top of the chat window and clicking on “Start Private Conversation.”

With these programs installed and configured, you’re ready to chat more securely using Ricochet or XMPP! Using encryption and privacy tools effectively is vital in the face of increasingly sophisticated surveillance which makes private communication less and less guaranteed. It’s up to you, the user, to take responsibility for your privacy in the world we live in, and learning tools like encrypted messengers are the best way to do so.

 

~Written by happy_c0der

 

If you have any questions just email me (info.rci@protonmail.com) or join our discord chat ?

Youtube removes RT from Premium Youtube Advertising

YouTube logo

The American based company YouTube, which is owned by Google, has removed RT (formerly Russia Today) from it’s premium advertising program, in a surprising and unprecedented move against freedom of press.

Since 2010 Google had placed RT as a part of its premium list of channels for marketing agents called Google Preferred, RT’s removal came without warning and was first discovered and reported by Bloomberg, citing Alphabet Incs CEO (Googles parent company) as the source.

This follows the U.S. Gov’t and medias, continued harassment of Russian news since the alleged Russian hacking and leaks of the DNC in September of  2016.

RT is a state owned news entity, and is partially funded by the Russian Gov’t, similar to Americas NPR and it’s member stations. Nevertheless, according to RT America, the US Department of Justice sent a letter in September of 2017, demanding that they register as a foreign agent under the FARA. (Foreign Agents Registration Act) Such registration would violate employee privacy of the US based branch, due to conditions which require companies registered under the FARA to disclose personal information on their employees.

YouTube has been accused of bias many times in the past and has often gained mass media attention, yet, unsurprisingly, with the exception of Bloomberg, no major western networks have reported on, or spoken against YouTubes actions as of 11/10/17.

Is deleted data really deleted?

It is often believed that moving a file to the rubbish bin, and emptying it is a permanent deletion. After all, Windows and other operating systems ask if you would like to permanently delete the items inside when you attempt to empty the bin. They may also say that the files cannot be recovered after deletion. Both statements are misleading and false.

When a file is deleted on most operating systems, the only item that is truly deleted is the reference file. The reference file only pinpoints were in your operating system the date for the file is. The data itself is still on the operating system and can be recovered by governments, hackers, people with your stolen device or yourself with free software such as Recova, Puran File Recovery and many others. The data is recoverable until it’s overwritten. Something which may never occur on large disks. This may be a serious blow to privacy and security, of individuals who handle sensitive information on their devices. Fortunately there are options.

Encryption: By encrypting files and operating systems deleted data is already scrambled. If it were recovered it would be unreadable and would not be useful to hackers or investigators.

Secure deletion: Secure deletion not only deletes the reference file, but scrambles, or replaces the bits of data (the binary 0s and 1s your files are made of) on your hard drive with zeros. No recovery tool is able to recover scrambled or zeroed data. Unfortunately Windows doesn’t offer a secure deletion feature and third party software is required to safe delete. Eraser does the job with relative ease and efficiency for Windows. It is an open source program available on sourceforge for free. After it’s installation right click folders or files and  hover over eraser.  Then select erase. The file will be safely deleted and will truly be permanently deleted.

Unfortunately Eraser only has a Windows version. For Linux alternatives click here or go to the link below.

http://askubuntu.com/questions/57572/how-to-delete-files-in-secure-manner

Introduction to the Minds Button Generator

Minds

The Minds Button Generator is a free to use button generator created by @saz  By courtesy of Cerberusbyte.com it is hosted at the url above.

How it works:

  1. Go to the generator and click on the checkbox next to your preferred button
  2. Put in the required information.
  3. The first block of code is the HTML. Place it were you want the button to appear.
  4. The second block is the CSS. Place it anywhere in a css stylesheet or in a <style> Be sure it’s on all the pages the HTML code is on!

Can i use my own button?

Sure! Feel free to edit the code as much as you’d like. Please give credit to @saz And link back to the button generator if you share your modification! If you’d like to add a button to the generator, contact me by one of the methods listed below.

 

Questions and Bug Reports:

Submit questions and bug reports to the Cerberusbyte contact form, Saz’s email (listed below), or on Minds

saz [at] cerberusbyte [dot] com

Questions are usually answered within 3-4 business days. We cannot guarantee anything. Cerberusbyte, Saz, and the button are not affiliated with the Minds.com staff or Ottman.

 

Notice:

The button does not work in Tor.

The button will only work if Javascript is enabled.

Skip to toolbar