Lamassu: Bitcoin ATM Machine

"This is the Bitcoin Machine. Here's how it works: 1. Scan your Bitcoin QR code. 2. Insert cash. 3. You have bitcoins! Buy yourself something pretty. [..] Do I require a license or permit to operate the Bitcoin Machine? Some jurisdictions may have regulatory requirements (such as KYC/AML). We would advise to consult with an attorney prior to operating these machines. If you are located in the US, we require a signed due diligence questionnaire prior to shipping." Continue reading

Continue ReadingLamassu: Bitcoin ATM Machine

Crypto-currency for NSA leaker: Snowden fund accepts Bitcoin

"US fugitive Edward Snowden’s defense fund, launched recently by WikiLeaks to raise money for the legal protection of the NSA leaker, has announced it now accepts donations in virtual currency Bitcoin. The Journalistic Source Protection Defence Fund (JSPD) was set up on August 9 with the goal to provide legal as well as campaign aid to journalistic sources. Snowden, who is behind the biggest intelligence leak in the history of the US National Security Agency (NSA), has been selected the first such source." Continue reading

Continue ReadingCrypto-currency for NSA leaker: Snowden fund accepts Bitcoin

Old Assets Revitalized by the Energy Boom

"The 'shale gale' energy boom is pumping billions of new dollars into otherwise old, worn-out economies. The results are stunning. For example, near Youngstown, the French company Vallourec has built a new plant to process oilfield tubular goods. The gigantic facility cost over $650 million to build. Now it cranks out 350,000 tons of steel oil pipe and related products per year. Even more impressive, this is no dirty, grimy old industrial shed, like those that formerly dotted the region for much of the past century. No, this Vallourec site is almost a 'clean room' environment, filled with high-tech jobs that pay impressive wages." Continue reading

Continue ReadingOld Assets Revitalized by the Energy Boom

Google Bus Hate: Give It a Rest

"Some San Franciscans define themselves by what they oppose. This spring they found a new focus for their outrage: the Google (GOOG) bus. Since 2007 the company has been using big, Wi-Fi-equipped, white-and-black coaches to collect employees around the Bay Area and bring them to the Mountain View Googleplex, 45 minutes south of the city. In early May there was a public protest against them at a Mission District transit stop. More than 20 cops were on hand—roughly a 1:1 ratio with protesters. The high point? Two slackers smashing a Google bus piñata." Continue reading

Continue ReadingGoogle Bus Hate: Give It a Rest

On 10th anniversary, Pirate Bay launches PirateBrowser to evade filesharing blocks

"The PirateBrowser website explains that the application combines Tor client Vidalia – which anonymises data connections – with the FireFox Portable Edition browser, the FoxyProxy add-on and 'some custom configs'. The site also claims that the browser is an anti-censorship tool rather than purely for piracy, citing countries including Iran and North Korea alongside the UK, the Netherlands, Belgium, Finland, Denmark, Italy and Ireland as places it expects PirateBrowser to be particularly useful." Continue reading

Continue ReadingOn 10th anniversary, Pirate Bay launches PirateBrowser to evade filesharing blocks

Treating Surveillance as Damage and Routing Around It

"Even as the U.S. security state becomes more closed, centralized and brittle in the face of NSA whistleblower Edward Snowden’s leaks, civil society and the public are responding to the post-Snowden repression by becoming more dispersed and resilient. That’s how networks always respond to censorship and surveillance. Each new attempt at a file-sharing service, after Napster was shut down — Kazaa, Kazaa lite, eDonkey, eMule, The Pirate Bay — was less dependent on central servers and other vulnerable nodes than the one before it. Wikileaks responded the same way to U.S. government attempts to shut it down." Continue reading

Continue ReadingTreating Surveillance as Damage and Routing Around It

Point-and-shoot scanner copies and creates almost any item using a 3D printer

"A British has inventor has unveiled the ultimate Star Trek gadget - a £650 handheld scanner that could be used to copy almost any item. The Fuel3D scanner, originally developed at Oxford University, can capture everything from a flower’s petals to the contours of human skin. It is able to capture images in seconds, and they can then be sent to a computer for processing. When combined with a 3D printer, it could be used to create 3D copies of everything from broken parts to 3D portraits." Continue reading

Continue ReadingPoint-and-shoot scanner copies and creates almost any item using a 3D printer

Dotcom: Surveillance and Copyright Extremism Will Cost United States Dearly

"'The US government and the other Five Eyes partners (UK, Canada, Australia and New Zealand) have an agreement to push for new spy legislation that will provide them with backdoors into all Internet infrastructure and services. The NZ government is currently aggressively looking to extend its powers with the GCSB and the TICS act, which will force service providers with encryption capabilities to give them secret decryption access,' Dotcom explains. 'The US is on a path of destroying its massive lead in the Internet economy. Mass surveillance and copyright extremism will cost the US economy more than any terrorist attack or piracy,' Dotcom says." Continue reading

Continue ReadingDotcom: Surveillance and Copyright Extremism Will Cost United States Dearly

Mega to run ‘cutting-edge’ encrypted email after Lavabit’s ‘privacy seppuku’

"Kim Dotcom’s Mega.co.nz is working on a highly-secure email service to run on a non-US-based server. It comes as the US squeezes email providers that offer encryption and Mega’s CEO calls Lavabit’s shutdown an 'honorable act of Privacy Seppuku.' The concept he was referring to was developed by secure service providers such as Cryptocloud, which made a ‘corporate seppuku’ pledge to oppose the mass surveillance and shield the privacy of their users’ data. The name for the move apparently derives from a Japanese ritual suicide, which was originally practiced by samurai to preserve honor." Continue reading

Continue ReadingMega to run ‘cutting-edge’ encrypted email after Lavabit’s ‘privacy seppuku’