28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter Two: Who Else Is Reading Your E-mail?

1. In case yyou’re wondering, images of child sexual abuse are identified

and tagged byy the National Center for Missing and Exploited Children,

which is how Google and other search engine companies’ automated

scanning syystem distinguishes those images from the nonpornographic

images on their networks. See http://www.dailyymail.co.uk/news/article-

2715396/Google-s-email-scan-helps-catch-sex-offender-tips-policeindecent-images-children-Gmail-account.html.

2. http://www.braingle.com/brainteasers/codes/caesar.php.

3. https://theintercept.com/2014/10/28/smuggling-snowden-secrets/.

4. For example, see the list here:

https://en.wikipedia.org/wiki/Categoryy:Cryyptographic_algorithms.

5. Mailvelope works with Outlook, Gmail, Yahoo Mail, and several other

Web-based e-mail services. See https://www.mailvelope.com/.

6. To see the metadata on yyour Gmail account, choose a message, open it,

then click the down arrow in the upper right corner of the message.

Among the choices (“Replyy,” “Replyy All,” “Forward,” and so on) is

“Show Original.” In Apple Mail, select the message, then choose

View>Message>All Headers. In Yahoo, click “More,” then “View Full

Header.” Similar options appear in other mail programs.

7. http://www.bbc.com/future/storyy/20150206-biggest-myyth-about-phoneprivacyy.

8. https://immersion.media.mit.edu/.

9. http://www.npr.org/2013/06/13/191226106/fisa-court-appears-to-berubberstamp-for-government-requests.

10. You can tyype “IP Address” into the Google search window to see yyour

own IP address at the time of the request.

11. https://playy.google.com/store/apps/details?id=org.torproject.android.

12. http://www.wired.com/threatlevel/2014/01/tormail/.

13. https://www.theguardian.com/technologyy/2014/oct/28/tor-usersadvised-check-computers-malware.

14. http://arstechnica.com/securityy/2014/07/active-attack-on-tor-networktried-to-decloak-users-for-five-months/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!