Forwarded from Neo Classic
Media is too big
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Some expressed doubts about the authenticity of the video we posted here
It’s indeed possible to stand on a trunk steering it down the river .. It was common practice for loggers in the Austria, Bavaria and also North America.
It’s indeed possible to stand on a trunk steering it down the river .. It was common practice for loggers in the Austria, Bavaria and also North America.
This media is not supported in your browser
VIEW IN TELEGRAM
Carl Gustav Jung is being asked :
“ Do You Believe in God?”
“ Do You Believe in God?”
Media is too big
VIEW IN TELEGRAM
“ I don't need to believe, I know"
When Carl Jung made this claim about God there was a lot of conversation over what he meant.
In a letter he later clarified his view on God …
Source
When Carl Jung made this claim about God there was a lot of conversation over what he meant.
In a letter he later clarified his view on God …
Source
Revealed: leak uncovers global abuse of cyber-surveillance weapon
Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests
The Guardian and its media partners will be revealing the identities of people whose number appeared on the list in the coming days. They include hundreds of business executives, religious figures, academics, NGO employees, union officials and government officials, including cabinet ministers, presidents and prime ministers.
The list also contains the numbers of close family members of one country’s ruler, suggesting the ruler may have instructed their intelligence agencies to explore the possibility of monitoring their own relatives.
The Pegasus Project
Article
Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests
The Guardian and its media partners will be revealing the identities of people whose number appeared on the list in the coming days. They include hundreds of business executives, religious figures, academics, NGO employees, union officials and government officials, including cabinet ministers, presidents and prime ministers.
The list also contains the numbers of close family members of one country’s ruler, suggesting the ruler may have instructed their intelligence agencies to explore the possibility of monitoring their own relatives.
The Pegasus Project
Article
the Guardian
Revealed: leak uncovers global abuse of cyber-surveillance weapon
Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests
。
None are more hopelessly enslaved
than those who falsely
believe they are free.
~ Johann Wolfgang von Goethe
。 。How NSO's Pegasus Is Used to Spy on Journalists
Israeli firm NSO's Pegasus software is used to infect journalists phones in what is called 'zero clicks'. Here's how they did it and what we found out
Article
Israeli firm NSO's Pegasus software is used to infect journalists phones in what is called 'zero clicks'. Here's how they did it and what we found out
Article
Haaretz.com
How NSO's Pegasus is used to spy on journalists
***
Data leak shatters the lie that the innocent need not fear surveillance
Article
Article
the Guardian
Huge data leak shatters lie that the innocent need not fear surveillance
Our investigation shows how repressive regimes can buy and use the kind of spying tools Edward Snowden warned us about
Cryptographers unearth vulnerabilities in Telegram's encryption protocol
Article,
Article,
CyberScoop
Cryptographers unearth vulnerabilities in Telegram's encryption protocol
An international team of computer scientists reported on Friday that they found four cryptographic vulnerabilities in the popular encrypted message app Telegram. The weaknesses range “from technically trivial and easy to exploit to more advanced and of theoretical…
The new ProtonMail has passed its independent security audit
Article,
Article,
Proton
The new Proton Mail has passed its independent security audit | Proton
Before we released the new Proton Mail, security experts conducted an independent audit of its open source code. You can read their report.