• ISIS OPSEC manual advice:

    There are no surprises among the documents. Most of the recommendations are the same that other civil liberties and journalist groups around the world advise human rights workers, political activists, whistleblowers and reporters to use to secure their communications and obscure their identity or hide their location. The appearance of this and other OPSEC documents in ISIS forums and social media accounts indicate that the jihadis have not only studied these guides closely, but also keep pace with the news to understand the latest privacy and security vulnerabilities uncovered in apps and software that could change their status on the jihadi greatest-hits list.

    It contains advice on:
    – How to use Twitter securely
    – How to take photos bearing in mind Exif, tagging, geolocation etc
    – The usage of encrypted phones (Cryptophone, Blackphone, SilentCircle)
    – How to transmit info when public networks are (made) unavailable
    – VPN software to use (Freedome, Avast SecureLine)
    – safe browsing (TorBrowser, also on Android & iPhone, Aviator browser, Opera Mini, TrueCrypt, VeraCrypt)
    – Use e-Mail security (HushMail, #ProtonMail, Tutanota
    – Instant Messaging (Threema, Telegram, SureSpot, Wickr, CryptoCat, IO SwissCom, PQChat, Sicher, even #iMessage)
    – How to use encrytped VoIP (Linphone, IO Swisscom, Silent Circle, RedPhone, Signal, and also #FaceTime)
    – safe Cloud storage (MEGA, SpiderOak, SugarSync,,


  • THE challenge for self-proclaimed Hackers among seenthis users: 50.000 for those who are able to hack into Tresorit.

    There are several services that offer secure storage in the cloud - Mega and Spideroak being a couple of examples (reviewed below) - but to our knowledge none of them have offered a cash incentive for hackers to actually break into them. None, that is, except for Tresorit. This Swiss company is so confident in its product that there is a standing reward of $50,000 for anyone who can overcome its security systems. So far, the company reports, one thousand hackers have been actively trying for around five hundred days but the system remains intact. So if your data is valuable, then you could do a lot worse than try out the Tresorit offering.

  • Document: FBI Surveillance Geeks Fear, Love New Gadgets | Threat Level |

    Each technology section includes a discussion of the potential challenges to #surveillance, but most of these discussions were redacted by the #FBI before releasing the document. The document covers #net_neutrality, #4G, public Wi-Fi, anonymity services like #Tor, and cloud storage and file-sharing services such as #Dropbox, #SpiderOak and #SugarSync.

    In a show of irony, the document holds an uncharitable view of another cutting edge technology: an #Apple patent for a “killswitch” that uses voice and facial recognition to shutdown an iPhone or its data if the device detects that the person using it is not the rightful owner. The FBI calls Apple’s concept “Big Brother-ish”.