‘With the look of Google Plus and Facebook-like elements, a new social network named “Syme” feels as cozy as a well-worn shoe.
‘But beneath the familiar veneer, it’s quite different. Syme encrypts all content, such as status updates, photos and files, so that only people invited to a group can view it. Syme, which hosts the content on its Canada-based servers, says it can’t read it.
“‘The overarching goal of Syme is to make encryption accessible and easy to use for people who aren’t geeks or aren’t hackers or who aren’t cryptography experts,” said co-founder Jonathan Hershon…’
Use a cloud camera to secure your home during holiday travel
‘In this article, I’ll describe how to set up a simple surveillance system using cloud-based cameras, so you can keep an eye on your castle no matter where you celebrate the season.
‘To get started, all you need is a web-connected camera and a cloud-based video-recording account. Many newer webcams now include features and services that let you monitor the video stream remotely. There are also stand-alone cloud recording services that let you use your existing camera. So if you’ve already got some gear, you can be up and recording in minutes…’
A Really Useful Harmless Drone
This Drone Acts as Your Tour Guide
‘Engineers at the Massachusetts Institute of Technology’s Senseable City Lab have developed a small drone that can potentially lead you wherever you want to go.
‘Called Project SkyCall, the drone and its accompanying app provide directions to students and visitors, much like a campus tour guide. The app lets you call a flying robot and request directions, while the drone uses your smartphone’s GPS to locate you. After typing in your desired location, the drone buzzes off in that direction, but continues to track you, so that it doesn’t fly too far ahead…’
Death and the NSA
Motherboard Meets Bruce Schneier
What do you think about intrusive surveillance? Is it about anonymity or secrecy or about control?
‘Thinking about intrusive surveillance doesn’t need to be overly philosophical or difficult or even creepy.
‘Bruce Schneier knows the debate well. He’s an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field’s basic resources, “the book the NSA never wanted to be published,” raved Wired in 1994. He knows the evidence well too: lately he’s been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency’s top secret and highly complex spying programs.
‘To do that, Schneier has taken his careful digital privacy regime to a new level, relying on a laptop with an encrypted hard drive that he never connects to the internet. That couldn’t prevent a pilfered laptop during, say, a “black bag operation,” of course. “I know that if some government really wanted to get my data, there’d be little I could do to stop them.”…’