Facebook wants you to share as much information about yourself as possible. It wants your friends to do the same. After all, the more personal details you feed into the network, the less likely you are to pack your data suitcase and leave. Advertisers tend to like all that data too. All this means your default privacy settings probably don’t jibe with how you want to actually share your information.
Luckily, you’re not defenseless. With a few small setting adjustments, you can take back control and make sure you share only what you want with the world.
One key thing to remember before we proceed though: The Internet is forever. Once you have posted something online, it does not belong to you anymore. If you’ve shared a photo or status update with anyone, it’s possible that they could screenshot it and share it with the world. So when in doubt, don’t post it.
via Use These Facebook Privacy Settings to Eradicate Over-Sharing | Gadget Lab | Wired.com.
One of those methods, though, is hinted at in the Clapper summary — and it’s interesting. Clapper briefly notes some programs the intelligence agencies are closing or scaling back, as well as those they’re pouring additional funds into. Overhead imagery captured by spy satellites was slated for reduction, for example, while SIGINT, the electronic spying that’s been the focus of the Snowden leaks, got a fresh infusion.
“Also,” Clapper writes in a line marked “top secret,” “we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.”
The Post’s article doesn’t detail the “groundbreaking cryptanalytic capabilities” Clapper mentions, and there’s no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget — around $11 billion — is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces.
via New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking | Threat Level | Wired.com.
He took the basic ideas behind Bitcoin — a currency created by a pseudonymous character who goes by the name Satoshi Nakamoto — and refined them. Litecoin was designed to pump out four times as many coins as Bitcoin, in an effort to keep the digital currency from becoming scarce and too expensive. It processes transactions more quickly, and discourages the kind of high-volume but very small transactions that have become a nuisance on the Bitcoin network. And it lets regular folks more easily “mine” coins — i.e. provide the online currency system with the computing power it needs, in exchange for digital money.
via Ex-Googler Gives the World a Better Bitcoin | Wired Enterprise | Wired.com.
The Tor network operates by rerouting your Web traffic around the world before delivering it to you. Doing this prevents your identity from ever being attached to your browsing history, so its easy to see why it became a popular choice in browser after the PRISM news.
via Tor and PRISM – Business Insider.
Culinary experimentation with microbes has gotten super trendy. Celebrity chef David Chang of Momofuku has opened a fermentation lab in New York that’s engineering things like pistachio miso and chickenbushi (chicken prepared in the style of Japanese katsuobushi, which is made from fish that is boiled, smoked, and then fermented). At Copenhagen’s NOMA, which has topped several lists of the world’s best restaurants in recent years, chef René Redzepi is playing around with fermenting everything from plums (mmm) to puréed grasshoppers (hmm).
via These Funky Microbes Make Your Favorite Foods More Delicious – Wired Science.
In 1896, the Hartford Electric Light Company proposed a recharging infrastructure. People could buy a car from General Electric and exchange their battery through Hartford Electric as a means of “gassing up.”
via Tesla And The History Of Electric Cars – Business Insider.
The past four days have seen one of California’s biggest fires in history burning its way toward one of the country’s most beloved national parks. The Rim fire has burned around 160,000 acres so far, including 21,000 acres inside the park.
The images above were taken each night from August 23 to August 26 by NASA’s Suomi NPP satellite. The size of the fire can be clearly seen (especially when compared to familiar nearby cities like Las Vegas, Reno and San Francisco as well as Lake Tahoe in this bigger image, taken by the same satellite).
via See the Huge Rim Fire Move Into Yosemite in These Views From Space – Wired Science.
Q: People get passionate when Apple comes out with something new — the iPhone; of course, the iPod. Is that something that you’d want them to feel about Microsoft?
Ballmer: It’s sort of a funny question. Would I trade 96% of the market for 4% of the market? (Laughter.) I want to have products that appeal to everybody.
Now we’ll get a chance to go through this again in phones and music players. There’s no chance that the iPhone is going to get any significant market share. No chance. It’s a $500 subsidized item. They may make a lot of money. But if you actually take a look at the 1.3 billion phones that get sold, I’d prefer to have our software in 60% or 70% or 80% of them, than I would to have 2% or 3%, which is what Apple might get.
via Steve Ballmer’s Most Epic Mistakes As CEO Of Microsoft – Business Insider.
Google+, which gained momentum after a successful launch in 2011 but then suffered from a slowdown in growth, is now surging in popularity, defying the predictions of many pundits who said it would fade away. L2 Think Tank Founder Scott Galloway says that’s because Google has effectively integrated Google+ with its most popular products, such as Search and Gmail, which places the social network in front of Google users throughout the day.
via Google+ Is Regaining Momentum – Business Insider.
Statements to TNW from Melbourne IT explain that the SEA was able to enter its IT system by using a reseller’s username and password. It’s not clear which reseller was breached, or how the SEA landed the details, [Update] Melbourne IT has confirmed that the SEA used phishing tactics to get hold of the log-in details, and its efforts show that the organization went to great lengths to plan this operation. It was not a quick hack for lulz.
Once inside Melbourne IT’s system, the group had access to a range of data and information. It presumably knew exactly what it was looking for and proceeded to change the DNS records of “several domain names,” Melbourne IT says, one of which was nytimes.com.