Google Reads All Emails Justifies Rightly

Google has admitted to reading  all the Email contents in , what it terms as to ‘to provide you personally relevant product features, such as customised

search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.”


Google reads emails as part of its service

Google says the change in its policy allowing the company to trawl through emails will give “people even greater clarity”. Photo: AP


Privacy goes through the Window!


But it may be added that if you need personalized recommendations from the Service provider, I do not think there is any other option but to agree to what Google says.

Google is right.

One can not have the cake and eat it too


Google Inc updated its terms of service on Monday, informing users that their incoming and outgoing emails are automatically analyzed by software to create targeted ads.

The revisions more explicitly spell out the manner in which Google software scans users’ emails, both when messages are stored on Google’s servers and when they are in transit, a controversial practice that has been at the heart of litigation.

Last month, a U.S. judge decided not to combine several lawsuits that accused Google of violating the privacy rights of hundreds of millions of email users into a single class action.

Users of Google’s Gmail email service have accused the company of violating federal and state privacy and wiretapping laws by scanning their messages so it could compile secret profiles and target advertising. Google has argued that users implicitly consented to its activity, recognizing it as part of the email delivery process.

Google’s updated terms of service added a paragraph stating that “our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.”

A Google representative did not immediately respond to a request for comment.


Source .Huffington Post.


Enhanced by Zemanta

Your Eye Saves Passwords Myris Scan

I find it difficult to remember passwords for websites.

Even a simple password I forget.

Eye Scan

Screenshot by Michelle Starr/CNET Australia)

The pass words my son , son-in-law make me swoon, so complicated.

So I save them in a folder.

Simple, you would think.

I create folders in such a fashion with such exotic names I find it difficult to locate them fast.

For people like me, A Gadget is on the way.

Myris Scanner would do it for me.


There are a number of password vaults on the market that aim to keep your passwords secure, locked behind one single master password that can let you into all your accounts and profiles. While this is a good way to keep your information safe, you could, potentially, still be caught out by a keylogger.


But what if your accounts could only be unlocked by using a physical part of your body? The iris of your eye is unique to you, and it’s by scanning your eye that the company EyeLock aims to keep your passwords secure. Its mouse-sized device, Myris, can perform a quick eye-scan to verify your identity before letting you in.

Connecting to your computer via USB, it scans your eye at a rate of 20 frames per second, looking at over 240 points on the iris to generate a 2048-bit signature unique to each user. To get into your accounts, which are linked via an application, you need to physically scan your eye — photos and videos will not work. And, although there’s a chance you can get a false match, it’s very slim — just one in 2.25 trillion. According to EyeLock, only DNA is more accurate.

This means that you could set highly complicated passwords for your internet banking, VPNs, email, shopping websites and social networks and not have to worry about remembering them.

“Usernames and passwords will soon be a thing of the past, and EyeLock’s introduction of Myris brings us one step closer,” said EyeLock chief marketing officer Anthony Antolino. “People are required to remember dozens of passwords in an effort to secure their data, while organisations and individuals are in a constant struggle to keep their digital, social and financial transactions safe from compromise, breach and theft. Until service providers take the step to eliminate usernames and passwords, Myris enables users to set passwords as complex as they’d like and forget them once linked to the device.”

Myris will be made available globally later this year, although a definite release date and pricing are yet to be announced.

Enhanced by Zemanta

Data Stealing Market What They Share About You

When I posted an article about NSA spying and overhearing about 540 Millions Conversations a month, at the back of my mind was the thought, if this were true, there should be people/companies making money out of this.

Data Brokers.

Data Stealing

Yes, I found this out from Pando.-Link provided at the close of this post.

The people who over hear or steal our information, from land Lines, Cell phones, Internet, either by way of advertising solicitations, Tele-calling or simple phishing, they sell this information.

Even giants like Google and Facebook do sell, though they do not admit it in so many words.

Some companies who collect this information call themselves Data Brokers.

They sell this information.

The market? $150 billions.

In 2012, the data broker industry generated 150 billion in revenue that’s twice the size of the entire intelligence budget of the United States government—all generated by the effort to detail and sell information about our private lives.”
— Senator Jay Rockefeller IV

There is also an estimate that the market is $ 200 Billion.

There are 4000 companies which specialize in data broking or put it simply stealing your personal information, though it is illegal.

And for this amount what do they share?

They share your,

Financial History, bank records, bankruptcies,

Purchase pattern,

Your health details including drug addiction, illnesses,medicines taken,if you have been raped, those details,

Read a Sample list at

For instance, if lists of rape victims aren’t your thing, MEDbase can sell dossiers on people suffering from anorexia, substance abuse, AIDS and HIV, Alzheimer’s Disease, Asperger Disorder, Attention Deficit Hyperactivity Disorder, Bedwetting (Enuresis), Binge Eating Disorder, Depression, Fetal Alcohol Syndrome, Genital Herpes, Genital Warts, Gonorrhea, Homelessness, Infertility, Syphilis…


MEBbase isn’t the only company exploiting these loopholes. By the industry’s own estimates, there are something like 4,000 for-profit intel companies operating in the United States. Many of them sell information that would normally be restricted under federal law. They offer all sorts of targeted dossier collections on every population segments of our society, from the affluent to the extremely vulnerable:

  • people with drug addictions
  • detailed personal info on police officers and other government employees
  • people with bad credit/bankruptcies
  • minorities who’ve used payday loan services
  • domestic violence shelter locations (normally these addresses would be shielded by law)
  • elderly gamblers..
  •  Source:


Cable TV Decline Google Facebook Rise

A  Study has revealed that the local cable TV connections are losing their way to Google and Facebook .

Though the figures are not alarming, it shows a clear pattern of preference to Online TV watching, provided by Google and Facebook.

One reason is the cost of the local cable.

Another is the technology.

The unlimited channels available Online can not be matched by Cable TV.

The quality of the videos are so fine that they can not be matched by the Cable TV.

On the concern side is also the fact that Smart TVs spy on you.

So are the internet sites.


A recent survey by Wedbush Securities of 2,500 U.S. consumers found 12% had cut premium cable services over the past year, with 7% axing cable altogether. After seeing the trend percolate for several years, market-research firm Parks Associates last December estimated that half a million households had so far cut the cable cord in favor of online-only content.

Now, the prospect of ESPN streaming live sports via Microsoft Corp.’s MSFT -0.77% Xbox 360, the emergence of alternative TV service Sezmi and the recent relaunch of Apple Inc. AAPL +1.84% ‘s Apple TV box could convince people that the cable bill—which has grown nearly 38% on average over the past 10 years—is an expense they can live without.

“There’s evidence this is going to happen,” said Forrester Research FORR -0.49% analyst James McQuivey, adding that data show people watch, on average, an extra half an hour of video a day more than a year ago, with much of this attributable to online video.

Betty Chen, for instance, no longer pays for cable television, but that doesn’t mean she can’t get what she calls her “trashy TV fix.”..


TVs being unplugged.

Time Warner Cable, for instance, lost 306,000 TV subscribers in Q3, and 24,000 broadband web subscribers, too.

And Tom Rutledge, CEO of Charter Communications, told Wall Street analysts he was “surprised” that 1.3 million of his 5.5 million customers don’t want TV – just broadband internet. “Our broadband-only growth has been greater than I thought it would be,” he said.

The following charts show the evidence that cable TV is dying, and that people are also unplugging from broadband internet service.



Deepnet , the other Internet

Deep Web,The Dark Side Of Internet Details

All of us know Internet.

*Scroll down for Videos.

The Deep Web Search browser.

What is a Tor? How to preserve the anonymity?
Tor is the acronym of “The onion router”, a system implemented to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers hiding user’s information eluding any activities of monitoring.
As usually happen, the project was born in military sector, sponsored the US Naval Research Laboratory and from 2004 to 2005 it was supported by the Electronic Frontier Foundation.
Actually the software is under development and maintenance of Tor Project. A user that navigate using Tor it’s difficult to trace ensuring his privacy because the data are encrypted multiple times passing through nodes, Tor relays, of the network.
Connecting to the Tor network
Imagine a typical scenario where Alice desire to be connected with Bob using the Tor network. Let’s see step by step how it is possible.
She makes an unencrypted connection to a centralized directory server containing the addresses of Tor nodes. After receiving the address list from the directory server the Tor client software will connect to a random node (the entry node), through an encrypted connection. The entry node would make an encrypted connection to a random second node which would in turn do the same to connect to a random third Tor node. The process goes on until it involves a node (exit node) connected to the destination.
Read more:
Follow us: @TheHackersNews on Twitter | TheHackerNews on Facebook

We are able to access them and the information is Indexed by Search Engines.

We can access the information by relevant queries.

This is a part of World Wide Web, www.


There is another side to the world wide web where you can not normally access the information , but is still a part of the world wide web.

This is called the Deepnet, the Invisible Web, the Undernet or the hidden Web.

Then there is the dark Internet, the computers that can no longer be reached via Internet, or with a Darknet distributed filesharing network, which could be classified as a smaller part of the Deep Web.

Mike Bergman, founder of BrightPlanet coined the phrase.

He explained searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed.

Most of the Web’s information is buried far down on dynamically generated sites, and standard search engines do not find it.

Traditional search engines cannot “see” or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web.

What the Deep Web is generally used for?

1.For Drug Sales.

2.For Hiring Contract Killers.

3.Seeking Contract Killers.

3.Sexual perversions.

4.Drug Trafficking, Money Transfers.

5.Child Trafficking.

6.Human Trafficking.

7.Mercenaries  recruitment and Advertisement.

8,Also being used by some Intelligence Agencies for Dark Operations.


Hiring a hitman has never been easier. Nor has purchasing cocaine or heroin, nor even viewing horrific child pornography.

Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it.

This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity.

And like The Silk Road, transactions are all made using the mysterious online currency Bitcoin. One site, whose name MailOnline has chosen not to publish, offers an assassination in the US or Canada for $10,000 and one in Europe for $12,000.

‘I do not know anything about you, you do not know anything about me,’ crows one self-styled assassin, according to The Daily Dot. ‘The desired victim will pass away. No one will ever know why or who did this. On top of that I always give my best to make it look like an accident or suicide.’

Deepweb is buried in the Internet where prohibited activities take place.

Ad in the Deep Web-Contract Killers.

Mercenaries advertise in the Deep Web.

DeepWeb advertisement by Mercenaries.


Tor – short for The onion Router – is a seething matrix of encrypted websites that allows users to surf beneath the everyday internet with complete anonymity.

It uses numerous layers of security and encryption to render users anonymous online.

Normally, file sharing and internet browsing activity can be tracked by law enforcement through each user’s unique IP address that can be traced back to an individual computer.

The Tor network on the Deep Web hides the IP address and the activity of the user.

Most of the Web’s information is buried far down on dynamically generated sites, unable to be found or seen by traditional search engines – sites or pages don’t exist until created as the result of a specific search.

An Internet search is like dragging a net across the surface of the sea – a great deal of information is caught, but a majority is deep and therefore missed.

‘I have gained endless experience(s) in this [sic] 7 years,’ he goes on. ‘It has changed me a lot. I don’t have any empathy for humans anymore.

‘This makes me the perfect professional for taking care of your problems and makes me better than other hitmen. If you pay enough I’ll do ANYTHING to the desired victim. If I say anything I mean anything.’

Many of the sites even use slogans and marketing techniques that, if it weren’t for their macabre subject matter, could be as at home on the website of a legitimate retail website.

‘The best place to put your problems is in a grave,’ boasts one.

Some even seem to offer others the chance to profit from their killing by allowing users to bet on when a victim will die by putting money in a pool. The closest guess takes home the pot.

And while many appear every inch the cold-blooded killer one would expect from a gun-for-hire, there is also apparently the odd humanitarian hitman.

‘Killing is in most cases wrong, yes,’ writes one. ‘However, as this is an inevitable direction in the technological evolution, I would rather see it in the hands of me than somebody else.’

‘By providing it cheaply and accurately I hope that more immoral alternatives won’t be profitable or trusted enough. This should primarily be a tool for retribution.’

Adding that murder should always be committed for ‘good reason’, he writes: ‘Bad reasons include doctors for performing abortions and Justin Bieber for making annoying music.

How To Surf The Deepweb.

You’ll need a browser named Tor. Open that up and get a new identity around every few minutes. The rest is up to you. I’d recommend checking out the Evil Wiki and learning about onion sites and seeing if you can find some links. That’s what I did the other night at least and found a bunch of weird shit. Like this one dude was selling “sex dolls” He cuts the legs and arms off children and abuses the shit out of them so they don’t feel pain. He pulls their teeth out so they can’t bite your you know what and so much more, so if that’s what interest you then go ahead, but honestly there isn’t really any reason to go to the “deep web”.

Has The Deep-web Closed after busting of the Silk Road by the Deep Web?

In an interesting post-mortem release by the creators of the defunct anonymous marketplaceAtlantis there is information that the former admins and users of the Silk Road are planning to resurrect the service. User RR writes: “We have SilkRoad v2.0 ready to launch and is now in its final testing stages. Our site has all the features of the original one and we have kept the same style of forum for your ease.”

The new SilkRoad will be sending out anonymous invites to former vendors and then open to the Tor-using public soon after.

The representatives of Atlantis write:

From a quick scout around I’ve counted at least 5 publicly stated projects with the said aim of replacing becoming “Silk Road 2.0″ and many many more gathering info and building alliances.
And this is what Law Enforcement is now parading as a victory? Over two years of investigation, millions of dollars spent and for what so a couple of armchair programmers can build it again in a few days while in the meantime vendors simply move to other site’s .

Users are already planning ways to keep the new site secure. This includes the creation of something called BitWasp, an “open source, anonymous bitcoin marketplace specifically built for use in conjunction with Tor or I2P via the hidden services such as .onion websites and eepsites.”


Image credit.

the above url has no API key