State of Surveillance with Edward Snowden and Shane Smith (Vice) on HBO
In the following video Vice’s Shane Smith heads to Moscow to meet and interview NSA whistle blower Edward Snowden about digital privacy and security. This year, when Apple refused an FBI court order to access the iPhone of suspected San Bernardino Terrorist Syed Farook.
Norton explores the secretive world of bulletproof hosting also known as uncensored hosting. Bulletproof hosts are no stranger to security they will often place there data centers in isolated areas such as at sea or inside underground nuclear bunkers. Using bulletproof hosting hackers can create a virus, botnets, C&C servers, malware, ransomware, piracy, black market trading and other menacing activities with very little risk this is becuase bulletproof hosts ignore any abuse complains or are often hosted in a country or region where laws can differ.
Bulletproof hosts such as HavenCo in Sealand ,Sealand is its own Sovereign State Located in international waters, on the military fortress of Roughs Tower, Sealand is the smallest country in the world. The country‘s national motto is E Mare, Libertas (From the Sea, Freedom), reflecting its enduring struggle for liberty through the years. Sealand has been an independent sovereign State since 1967 and is subject to its own laws Sealand also has very little to none tax laws.
HavenCo was founded in Sealand and follows Sealand law read the Constitution of the principality of Sealand.
DEFCON – The Full Documentary Defcon is the world’s longest running and largest underground hacking conference hosted in Las Vegas it was Started in 1992 by the Dark Tangent (Jeff Moss) an American hacker from the state of California, DEF CON . Hackers, corporate IT professionals and hobbyists all meat every year to discus and trade … Read more
Anonymous – Web Warriors Full Documentary focuses on the world famous computer virus Blaster a self-replicating Worm. Blaster was so powerful your Network and Systems could be effected only by having it left online and did not require any additional software to replicate its self through out other computer networks.