Encryption Company Heads to Switzerland to Flee NSA

blackphone

Encryption Company Heads to Switzerland to Flee NSA
by technoguido

 

Philip Zimmermann, the creator of the world’s most popular email encryption software, has relocated his company Silent Circle from the US to Switzerland in an effort to avoid America’s spy agencies. Silent Circle, who are best known for their encrypted Blackphone, have been fighting an ongoing battle to keep their encryption services safe from the NSA. They even pre-emptively shuttered their secure email service Silent Mail to avoid being ordered to hand over customer data.

Silent Circle’s move comes amid rumours that there could be an exodus of UK tech companies if Digital Dave pushes ahead with plans to clamp down on encryption. Will we ever see a British Snapchat?
technoguido | May 26, 2015 at 1:13 pm | Tags: Privacy, Techno Guido | Categories: Techno Guido | URL: http://wp.me/pvx79-Q7Q

bsd.firetrench.com

brn.firetrench.com

adn.firetrench.com

ftd.firetrench.com

Book Review – Byng of Vimy, General and Governor General

B2175

READ THE FULL REVIEW

The author has written what must be regarded as the definitive biography of an effective soldier and Governor General who was highly regarded by those who served with him but who was also controversial and not regarded with as much favour by the Establishment. Those interested in WWI generally, and the land battle of the Western Front in particular, will greatly enjoy this biography, but it will also appeal to those with interests in politics, the Empire, Canada and statehood. The writing style is engaging and the illustrations add greatly to the book’s interest.

The reader will not only enjoy the book and its excellent supporting illustrations, but gain fresh insights into all of the places, people, conditions and politics touched beneficially by Byng. A Great Read!!

reviews.firetrench.com

adn.firetrench.com

brn.firetrench.com

bsd.firetrench.com

bgn.firetrench.com

nthn.firetrench.com

ftd.firetrench.com

Book Review – The Underground War, Vimy Ridge to Arras

B2169

READ THE FULL REVIEW

This book is the first of four planned volumes. When all four volumes become available, the much avoided, but important, subject of underground warfare on the Western Front will have been effectively completed for the first time. This first volume is comprehensive and balanced, drawing on material from both British and German archives. The very high standard of illustration is important to the support of the text. Can’t wait for the next volumes!!!!

reviews.firetrench.com

adn.firetrench.com

bgn.firetrench.com

brn.firetrench.com

nthn.firetrench.com

ftd.firetrench.com

GCHQ Given License To Hack

ChickenDaveSKY

Chicken Dave delivering on his threat to treat all citizens as criminals

gchq-hack

GCHQ Given License To Hack
by technoguido

The government has snuck through legislation that exempts the police and security services from prosecution for hacking people’s computers. The legislation was passed into law as an amendment to the Computer Misuse act, bypassing parliamentary debate. Coincidentally, the new legislation was revealed just hours before a hearing into a claim lodged by Privacy International that GCHQ’s hacking activities were unlawful under the Computer Misuse Act…

Not only was parliament not consulted, it appears that none of the relevant regulators such as the Information Commissioner’s Office were included in the decision that gives GCHQ and others carte blanche to launch cyber attacks in the UK. GCHQ, the police, the National Crime Agency, the Crown Prosecution SEvice and the Ministry of Justice were consulted…

technoguido | May 18, 2015 at 12:26 pm | Tags: GCHQ, Hacking, Techno Guido | Categories: Guido Fawkes, Techno Guido | URL: http://wp.me/pvx79-PXN

bsd.firetrench.com

brn.firetrench.com

adn.firetrench.com

ftd.firetrench.com

Book Review – The World of Mummies

B2160

READ THE FULL REVIEW

The author is a well-established specialist in the study of mummies and his original work has been translated into English by Cordula Werschkun. The translated version reads well and is likely to be error-free. Mummies have long prompted wide interest, and some horror, with the Egyptian mummies being arguably the most famous. What many readers may not know before reading this book is how the discovery of mummified remains stretches around the world and through the ages. Not all of these mummified remains were deliberately created by a complex process of human preparation. This book provides a comprehensive review of the natural and artificial processes with a range of examples indicating the distribution of ‘finds’. This may be the most extensive reference book to have been published on this intriguing subject.

reviews.firetrench.com

brn.firetrench.com

adn.firetrench.com

nthn.firetrench.com

ftd.firetrench.com

Book Review – The Archaeological History of Britain, Continuity and Change from Prehistory to the Present

B2158

The author has been responsible for a major achievement. Somehow he has managed to adequately cover the archaeology of 800,000 years of British history in a relatively short book that also includes a full colour plate section that captures some of the key points of that history. This is an essential text for students of history, archaeology and classical civilization, but it is also a book that deserves a wide readership. The fascination with history, and particularly in archaeology, has included a cross section of society and ages. It is a very readable text and presents case studies to illustrate the range across 800,000 years of history. An excellent book.

The case studies included and reviewed by the author produce some fascinating insights and dispel some of the myths and legends that have distorted our understanding of history in the past. Readers will take away from this book new understanding and improved understandings. As in the sub-title, the author has presented the continuity and changes from prehistory to the present. This is a book that is worth reading and enjoying.

reviews.firetrench.com

adn.firetrench.com

bgn.firetrench.com

brn.firetrench.com

bsd.firetrench.com

nthn.firetrench.com

Privacy versus Piracy: Security in Cyberspace

cyberwarfare

More and more personal and business information worldwide is rapidly migrating into digital form on open and globally interconnected technology platforms. This trend poses serious risks to data security and privacy. Hardly a day goes by without news of a new cyber threat or a major data breach. Hackers, criminals and foreign governments have adapted their theft, fraud and sabotage activities to this increasingly interconnected world. The growing threat of cybercrime — and the opportunities it brings — is a new facet of responsible investing.

adn.firetrench.com

brn.firetrench.com

ftd.firetrench.com

Continue reading