New project site up and running

The concept note site is now live at


A PGP key and a couple emails addresses
We’ve set up contact email addresses and PGP keys. More easy to use forms coming from these two ingredients soon, but in the meantime. Find both here.

779D 75C4 3CEE 7ADA 9E86  1049 0334 9543 55AA 9797

On Github
It’s just a few markdown pages for now.

Follow @drew3000 Watch Star Fork Issue Download

President pussy grabber

Hash: SHA512

DATE: Friday, 20th of January 2017

I'll keep this short. Today sees the inauguration of president pussy grabber. I’ve been critical of White House administrations from both parties and candidates from just about every party. Here we have a different creature. He is an outwardly xenophobic, hate-baiting carpet bagger. He is a robber baron with no work experience that doesn’t include dodging taxes, filing for bankruptcy, swindling people and shouting random obscenities at his critics. America now owes the world new apologies on top of those still outstanding. There will be more to list in the coming days. There’s plenty of blame to go around, but chiefly responsible are those currently cheering President No. 45's installation into the White House. These are the ones to be wary of. Watch out. Collaborate. Stay safe. Find your own way to be dangerous to this machine.

Comment: GPGTools -


You are being watched

See something

Via Privacy International

Research something

By Transparency Toolkit, and the org mentioned above

Do something

From EFF

The current strategy against Labour Leadership candidate Jeremy Corbyn is nothing new

From Fear & Loathing On The Campaign Trail ’72, by Hunter S. Thompson:

Make Them Deny It

…(I)n both the Ohio and Nebraska primaries, back to back, McGovern was confronted for the first time with the politics of the rabbit-punch and the groin shot, and in both states he found himself dangerously vulnerable to this kind of thing. Dirty politics confused him. He was not ready for it….

This is one of the oldest and most effective tricks in politics. Every hack in the business has used it in times of trouble, and it has even been elevated to the level of political mythology in a story about one of Lyndon Johnson’s early campaigns in Texas. The race was close and Johnson was getting worried. Finally he told his campaign manager to start a massive rumor campaign about his opponent’s life-long habit of enjoying carnal knowledge of his own barnyard sows.

“Christ, we can’t get a way calling him a pig-fucker,’ the campaign manager protested. “Nobody’s going to believe a thing like that.”

“I know,” Johnson replied. “But let’s make the sonofabitch deny it.”

Better secret sharing

I like this one because it reminds me of the scene in War Games where both military guys have to turn their keys simultaneously to get the launch codes. Below is the method for sharing information with two or more people, but they won’t be able to access it unless all of them agree to use their keys. Below, you’ll see this is a kind of strategy that could be used by corporates, governments and service providers, so they can agree to, for example, break into your device. I want to create an App that does this for individuals, since it’s quite a good proof of concept and would have some interesting application in the wild. Who’s with me?

Cookie crumbs that don’t wash

While it was last year that researchers found that Verison had been tracking website visits of each of its 123 million mobile customers using “perma-cookies,” It’s become news again with Verison’s recent incredibly confusing statement about it: You can opt out, but we may still track you.

This just checks one kind of potential mobile tracking method. Even if this one is false, yes your mobile is being tracked.
This just checks one kind of potential mobile tracking method. Even if this one is false, yes your mobile is being tracked.

Even if you were using mobile or browser settings to block tracking, it wouldn’t matter. Not only is this aimed at building up an extensive profile to target market users, it creates an impressive profile for any government agencies with access to the provider’s database. AccessNow.Org set up a site you can visit with your mobile to see if this is effecting you at AmIBeingTracked.Com.

Superfish detector

Superfish is a bit of adware that was surreptitiously installed on Lenovo machines running Windows, for the purpose of injecting ads into your browser. The little program acts like a man-in-the-middle attack, only without a man, and diverts your supposedly secure https connections so it can target you with the exact right wording to buy viagra or go on a holiday somewhere.

As an extra feature, it also makes your PC less secure to malicious hacks and more open to targeted surveillance. While researchers discovered it on Lenovo machines, it’s likely operating on others as well. You can check your computer here.

What you get when you're rocking Linux.
What you get when you’re rocking Linux.

Meanwhile, Lenovo has announced it’s removing it from new machines, offering patches for existing machines, doesn’t understand why people didn’t like it and doesn’t regret doing it. Thinkpads deserved better.

Regarding Israel’s ‘Jewish Nation-State’ bill

This is possibly the most significant vote of America’s special friend. Read these three perspectives on it to get a sense of the worse things to come later.

Simona Sharoni: The Israel of your dreams has turned into a nightmare: A letter to Jewish students

Diana Buttu: There Are No Centrists in Israel

Max Blumenthal: A Rightward Shift in Israel Would Reflect What’s Always Been True

Who would support such a thing?