Chrome Data Compression <b>Proxy</b> Extension To Improve <b>Browsing</b> <b>…</b>

Data Compression Proxy is a free Chrome extension to improve browsing speed. As the name pretty much makes it clear, Data Compression Proxy lets you browse the web a little bit faster while using Chrome, by compressing the traffic. Data Compression Proxy essentially routes all of the regular HTTP web traffic through Chrome’s own Compression Proxy server, utilizing the proprietary SPDY (pronounced as Speedy) protocol. An experimental extension, Data Compression Proxy brings the data compression goodness of Chrome’s mobile version to its desktop counterpart. Apart from standard data compression features, Data Compression Proxy also includes a built-in ad blocker with customizable rule based blocking. It even includes a bypass filter which can be used to exclude certain servers from being proxied at all. And the best part is that you can enable or disable it with a single click. Sounds too good to be true? Keep reading and find out for yourself!

data compression proxy in action
Sponsored Links

How To Use This Free Chrome Data Compression Proxy Extension To Improve Browsing Speed?

Before you can get started with Data Compression Proxy to supercharge your web browsing, the installation part needs to be completed. Installation is a simple affair, akin to installing any other extension to Google Chrome. All you have to do is head over to the Chrome Web Store, search for Data Compression Proxy and when found, hit the Add to Chrome button. Once installed, it’s all up and ready to work. Let’s see how this thing does what it does:

Step 1: Once Data Compression Proxy is successfully installed, you will notice the extension’s icon on the Chrome options bar. By default, the color of this icon is Red, indicating that the proxy features are disabled. Here’s a screenshot:

data compression proxy icon

Step 2: Now, what do you do to turn on Data Compression Proxy’s mojo in order to make your web browsing better? It’s ridiculously simple. All you have to do is click the Data Compression Proxy icon. Once you do that, the thing will turn from Red to Green, indicating that the extension is now activated. From now on, all of your HTTP web traffic will be routed through Chrome’s own Compression Proxy server, utilizing the SPDY protocol. As you browse the web using Data Compression Proxy, you should notice a slight increase in the browsing speed. Pretty cool, right?

As mentioned before in the article, Data Compression Proxy also includes a built in ad-blocker and bypass list, both of which are customizable. If you want to dig in and configure these tweaks, you can easily do so via the extension’s options.

data compression proxy options

Also See: Free Chrome Extension To Browse Anonymously: GeoProxy


Data Compression Proxy is a nifty free Chrome extension to improve browsing speed. It uses Chrome’s mobile version’s data compression goodness to improve your web browsing experience on the desktop. Although the difference in performance might not be that big in some cases but hey, any improvement is always welcome, right? Do give it a try, and let me know what you think in the comments below.

Get Data Compression Proxy for Google Chrome Here.

Home Page: Click Here
Works With: Google Chrome
Free / Paid: Free

Link to This Page:

free of <b>proxy browser</b> |

[unable to retrieve full-text content]Enabled will Its to Browsing QuestionsFeedback. IP Proxy Proxy. Free FOR FREE Proxy Browse Servers connection proxy hidden free in online, download downloading option proxy is browsing VERSION or Web Chrome …

CyberGhost VPN – Free <b>Proxy</b> extension – Opera add-ons

CyberGhost’s Opera browser extension is FREE to use for everybody. It’s also very easy to use. Just hit our Power button and your IP will be changed in a second.

CyberGhost is a trusted VPN provider, with over 3,9 million satisfied customers worldwide.

Here’s what you get with our Free Proxy Plugin:

✔ Fast online anonymity
With just a click, your identity when browsing online is protected.

✔ New IP
We change your IP address with one of ours.

✔ Encrypted connection
Just like the encryption used in military organizations, we’ll protect your browser data with 256-bit AES encryption.

✔ Unblock Online content
Having troubles watching YouTube videos, or Hulu or BBC? Turn this proxy plugin on and all your problems will fade away. Local restrictions no longer apply to you.

Please note that this browser plugin is not secure when accessing Flash content. For full online protection, we recommend you to install our desktop and mobile VPN solution: CyberGhost VPN (

Got questions? Write to our support team at
Do you want more? Try out CyberGhost VPN, available for Windows, Mac, iOS and Android, today:

Join also our online communities:

CyberGhost VPN – Free <b>Proxy</b> extension – Opera add-ons

CyberGhost’s Opera browser extension is FREE to use for everybody. It’s also very easy to use. Just hit our Power button and your IP will be changed in a second.

CyberGhost is a trusted VPN provider, with over 3,9 million satisfied customers worldwide.

Here’s what you get with our Free Proxy Plugin:

✔ Fast online anonymity
With just a click, your identity when browsing online is protected.

✔ New IP
We change your IP address with one of ours.

✔ Encrypted connection
Just like the encryption used in military organizations, we’ll protect your browser data with 256-bit AES encryption.

✔ Unblock Online content
Having troubles watching YouTube videos, or Hulu or BBC? Turn this proxy plugin on and all your problems will fade away. Local restrictions no longer apply to you.

Please note that this browser plugin is not secure when accessing Flash content. For full online protection, we recommend you to install our desktop and mobile VPN solution: CyberGhost VPN (

Got questions? Write to our support team at
Do you want more? Try out CyberGhost VPN, available for Windows, Mac, iOS and Android, today:

Join also our online communities:

Gearhouse orders huge EVS upgrade – Televisual

Gearhouse Broadcast is upgrading its entire 115-strong fleet of EVS machines worldwide.

The upgrade includes migrating all of Gearhouse’s EVS kit to the latest 10 Gigabit Ethernet connectivity and means all of its 8-channel XT3 production servers will have onboard low res proxy recording.

All EVS equipment, designed for the management and production of live video, will have the latest XFile 3 software enabling them to manually or automatically archive content from EVS servers to transportable hard drives.

Gearhouse will also be able to restore content from hard drives to EVS servers.

The company is also investing in the first 4K licensed XT3 server and all of its OB trucks will have C-Cast live connection technology.

The upgrade brings additional tools to Gearhouse’s EVS kit, including the C-Cast Xplore live content web-browsing interface and OpenCube MXF server and media interoperability software applications.

Also included in the upgrade is EVS’ multi-review system and Epsio FX.

This provides immediate access to live effects while saving post-production costs and enables the addition of artistic replay effects and highlights enhancements for viewers by inputting simple parameters.

Gearhouse Australia sales and marketing director Manny Papas said: “We are aligning all 115 EVS machines in our fleet to the very latest EVS workflows making us one of the biggest EVS providers in the world and giving our clients access to the very best production tools available.”

Giving Good Technology a History Lesson on Secure <b>Browsing</b> <b>…</b>

In a July 10, 2014 blog post, Good Technology claims that it was the first to provide an “enterprise class secure browser to deliver support for Proxy auto-configuration files,” more commonly known as PAC files. Enterprise users that have multiple proxy servers may use PAC files to access URLs via web browsing or other applications. To simplify, just as a TV guide tells you what channel to select for a specific program, a PAC file will tell the device which proxy server to use to reach a specific URL destination.


Good needs a #BBFactCheck.

BlackBerry has been supporting PAC files on BlackBerry devices for years. We had it way back in 2003 with BlackBerry OS. So of course our latest platform, BlackBerry Enterprise Service 10, supports PAC files – BlackBerry 10 OS starting on January 31, 2013, Secure Work Space for iOS on October 9, 2013 and Secure Work Space for Android on June 26, 2014.

With an 11-year difference between BlackBerry and Good support of PAC files, it’s inaccurate for Good to claim that they were the first. Even if they were only comparing from an Enterprise Mobility Management perspective, we still have them beat.

This is another example of Good’s marketing being misleading– which should not be “Good Enough” for customers looking for a mobility partner.

About BlackBerry Fact Check

BlackBerry Fact Check is a place for BlackBerry to set the story straight on our products and our company. We are in a volatile, fast-moving industry, and misinformation – whether the source is a competitor, an analyst report or simply a rumor –creates uncertainty. In light of the inaccuracies and misleading comments flooding the public domain where BlackBerry is concerned, our best offense is to present the facts directly, and you can find them with #BBFactCheck.

Follow the latest BlackBerry Fact Checks and share your suggestions with us in the comments, on social media with #BBFactCheck or by emailing

This is how you invent a person online – Quartz

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio. Inside was a blank thank-you note and an Ohio state driver’s license. The ID belonged to a 28-year-old man called Aaron Brown—6 feet tall and 160 pounds with a round face, scruffy brown hair, a thin beard, and green eyes. His most defining feature, however, was that he didn’t exist.

I know that because I created him.

Fake drivers license

(Curtis Wallen/The Atlantic)

As an artist, I’ve long been interested in identity and the ways it is represented. My first serious body of work, Springfield, used the concept of a Midwestern nowhere to explore representations of middle-American sprawl. A few years later, I became interested in the hundreds of different entities that track and analyze our behavior online—piecing together where we’re from, who we’re friends with, how much money we make, what we like and dislike. Social networks and data brokers use algorithms and probabilities to reconstruct our identities, and then try to influence the way we think and feel and make decisions.

It’s not an exaggeration to say everything you do online is being followed. And the more precisely a company can tailor your online experience, the more money it can make from advertisers. As a result, the Internet you see is different from the Internet anyone else might see. It’s seamlessly assembled each millisecond, designed specifically to influence you. I began to wonder what it would be like to evade this constant digital surveillance—to disappear online.

From that question, Aaron Brown was born.

* * *

My project started at a small coffee shop in Bed-Stuy, Brooklyn. With the help of Tor—a software program that uses layers of encryption to anonymize online activity—I searched Craigslist and tracked down a handful of affordable laptop computers for sale in New York City. I registered a new email address with the (now-defunct) Tormail anonymous email provider and arranged to buy a used Chromebook. (1/27/13 – 11:23):

I’m punctual, I will be there on time at 1. Theres an atrium at citi center, will let you know when I’m there. (1/27/13 – 11:25):

Perfect. See you there. (1/27/13 – 12:59):

Im here in the atrium at 53rd and lex… Gray jacket, blonde hair. Sitting at a table

The meeting was quick. I wore a hat. I kept my head down. The man at the table in a gray jacket was a real person—in a busy public place full of cameras—who could later potentially connect me to the computer. These face-to-face moments left me the most vulnerable. If I was going to evade online surveillance, I had to avoid any ties between my digital footprint and the physical world.

When I got home I immediately reformatted the computer’s hard drive and installed a Linux partition. This meant I could encrypt and cosmetically “hide” the part of my computer that was using Linux. My new laptop would boot up Chrome OS like any other Chromebook, unless I gave it the command to boot up Linux instead. I never connected to anything using  Chrome OS. And on the Linux side, I never accessed the Internet without Tor, and I never logged into anything that had any connection to Curtis Wallen.

For a couple months I poked around on the darknet—a hidden network that relies on nonstandard connections. At first, my goal was simply to exist as an anonymous user. However, I realized that this meant fundamentally changing my relationship to the Internet. I couldn’t log in to Facebook, I couldn’t send emails as Curtis, I couldn’t use the Internet the way most of us normally do. I simply couldn’t be me if I wanted to stay hidden. So my original idea began to shift. Rather than simply evade digital tracking, I began to play with the idea of generating a new digital person, complete with the markers of a physical identity. I gathered my roommates and took a series of portraits that fit the requirements for passport photos. I then carefully isolated various features from each one in Photoshop and composited a completely new face: Aaron Brown.

Faces used to create Aaron Brown

(Curtis Wallen/The Atlantic)

Up to that point, I had been largely operating on instinct and common sense. Now that my project was expanding, I figured it’d probably be a good time to reach out to someone who actually knew what she or he was doing.

I created a new Tormail account, the first evidence of my new person—––and sent an encrypted email to the enigmatic researcher Gwern Branwen, asking what advice he’d give to someone “new to this whole anonymity thing.” Branwen replied with a simple but crucial piece of advice:

“Don’t get too attached to any one identity. Once a pseudonym has been linked to others or to your real identity, it’s always linked.”

Taking Branwen’s advice to heart, I put a sticky note next to my keyboard.

Post it note

(Curtis Wallen/The Atlantic)

When most people think of Internet surveillance, they imagine government bureaucrats monitoring their emails and Google searches. In a March 2014 study, MIT professor Catherine Tucker and privacy advocate Alex Marthews analyzed data from Google Trends across 282 search terms rated for their “privacy-sensitivity.” The terms included “Islam”, “national security”, “Occupy”, “police brutality”, “protest”, and “revolution.” After Edward Snowden’s leaks about NSA surveillance, Tucker and Marthews found, the frequency of these sensitive search terms declined—suggesting that Internet users have become less likely to explore “search terms that they [believe] might get them in trouble with the US government.” The study also found that people have become less likely to search “embarrassing” topics such as “AIDS”, “alcoholics anonymous,” “coming out,” “depression,” “feminism,” “gender reassignment,” “herpes,” and “suicide”—while concerns over these more personal terms could have as much to do with startling Google ads, the notable decrease observed in the study suggests the increased awareness of surveillance led to a degree of self-censorship.

In other words, people are doing their best to blend in with the crowd.

The challenge of achieving true anonymity, though, is that evading surveillance makes your behavior anomalous—and anomalies stick out. As the Japanese proverb says, “A nail that sticks out gets hammered down.” Glenn Greenwald explained recently that simply using encryption can make you a target. For me, this was all the more motivation to disappear.

Aaron had a face, but lacked “pocket litter”—an espionage term that refers to physical items that add authenticity to a spy’s cover. In order to produce this pocket litter, I needed money—the kind of currency that the counterfeit professionals of the darkweb would accept as payment. I needed bitcoin, a virtual currency that allows users to exchange goods and services without involving banks. At that time, one of the few services that exchanged cash for bitcoin was a company called Bitinstant. I made my way to a small computer shop in the Chinatown neighborhood of Manhattan to make the transfer.

At a small, teller-like window, I filled out the paperwork using fake information. Unwisely, I wrote down my name as Aaron Brown—thus creating one of the links to my real identity I should have been avoiding. As a result, my receipt had “Aarow Brown” printed on it. It seemed fitting that the first physical evidence of Aaron’s existence was a misspelled name on a receipt from a computer shop.

Moneygram image

(Curtis Wallen/The Atlantic)

When I got home, 10 bitcoin were there waiting for me in my virtual wallet, stored on an encrypted flash drive. I made the necessary contacts and ordered a counterfeit driver’s license, a student ID, a boating license, car insurance, an American Indian tribal citizenship card, a social security card scan (real social security cards were a bit out of my budget), and a cable bill for proof of residency. The final bill came out to just over 7 bitcoin, roughly $400 at the time.

As I waited for my pile of documents, I began crafting Aaron’s online presence. While exploring message boards on the darknet, I came across the contact information for a self-proclaimed hacker called v1ct0r who was accepting applications to host hidden services on a server he managed. I messaged him with a request to host Aaron’s website. He was happy to offer a little space, under two conditions: “no child porn nor racism; Respects the rules or i could block/delete your account.”

I also set up a simple web proxy so that anyone could contribute to Aaron’s online presence. The proxy serves as a middleman for browsing the Internet, meaning any website you visit is first routed through the proxy server. Anyone who browses using the proxy is funneling traffic through that one node—which means those web pages look like they’re being visited by Aaron Brown.

Aaron’s Twitter account worked much the same way. There was a pre-authenticated form on the project website, allowing anyone to post a tweet to Aaron’s feed. As Aaron’s creator, it was fascinating to see what happened once strangers started interacting with it regularly. People would tweet at their friends, and then Aaron would received confused replies. Under the guise of Aaron, people tweeted out, jokes, love messages, political messages, and meta-commentaries on existence. I even saw a few advertisements. Ultimately, the account was suspended after Spanish political activists used it to spam news outlets and politicians.

Aaron Brown Twitter feed

(Curtis Wallen/The Atlantic)

In a sense, I was doing the opposite of astroturfing, a practice that uses fake social media profiles to spread the illusion of grassroots support or dissent. In 2011, the Daily Kos reported on a leaked document from defense contractor HBGary which explained how one person could pretend to be many different people:

Using the assigned social media accounts we can automate the posting of content that is relevant to the persona. … In fact using hashtags and gaming some location based check-in services we can make it appear as if a persona was actually at a conference and introduce himself/herself to key individuals as part of the exercise … There are a variety of social media tricks we can use to add a level of realness to all fictitious personas.

Aaron Brown turned that concept inside out. With a multitude of voices and interests filtering through one point, any endeavor to monitor his behavior or serve him targeted ads became a wash. None of the information was representative of any discrete interests. The surveillance had no value. I’d created a false human being, but instead of a carefully coordinated deception, the result was simply babble.


“The Internet is what we make it,” wrote security researcher Bruce Schneier in January 2013, “and is constantly being recreated by organizations, companies, and countries with specific interests and agendas. Either we fight for a seat at the table, or the future of the Internet becomes something that is done to us.”

For those of us who feel confident that we have nothing to hide, the future of Internet security might not seem like a major concern. But we underestimate the many ways in which our online identities can be manipulated. A recent study used Facebook as a testing ground to determine if the company could influence a user’s emotional disposition by altering the content of her or his News Feed. For a week in January 2012, reseachers subjected 689,003 unknowing users to this psychological experiment, showing happier-than-usual messages to some people and sadder-than-usual messages to others. They concluded that they had “experimental evidence for massive-scale contagion via social networks” because users responded by publishing more positive or negative posts of their own, depending on what they saw in their own feeds.

The US Department of Defense has also figured out how influential Facebook and Twitter can be. In 2011, it announced a new “Social Media in Strategic Communication” (SMISC) program to detect and counter information the US government deemed dangerous. “Since everyone is potentially an influencer on social media and is capable of spreading information,” one researcher involved in a SMISC study told The Guardian, “our work aims to identify and engage the right people at the right time on social media to help propagate information when needed.”

Private companies are also using personal information in hidden ways. They don’t simply learn our tastes and habits, offering us more of what want and less of what we don’t. As Michael Fertik wrote in a 2013 Scientific American article titled “The Rich See a Different Internet Than the Poor,” credit lenders have the ability to hide their offers from people who may need loans the most. And Google now has a patent to change its prices based on who’s buying.

Is it even possible to hide from corporate and government feelers online? While my attempt to do so was an intensely interesting challenge, it ultimately left me a bit disappointed. It is essentially impossible to achieve anonymity online. It requires a complete operational posture that extends from the digital to the physical. Downloading a secure messaging app and using Tor won’t all of a sudden make you “NSA-proof.” And doing it right is really, really hard.

Weighing these trade-offs in my day-to-day life led to a few behavioral changes, but I have a mostly normal relationship with the Internet—I deleted my Facebook account, I encrypt my emails whenever I can, and I use a handful of privacy minded browser extensions. But even those are steps many people are unwilling, or unable, to take. And therein lies the major disappointment for me: privacy shouldn’t require elaborate precautions.

No one likes being subliminally influenced, discriminated against, or taken advantage of, yet these are all legitimate concerns that come with surveillance. These concerns are heightened as we increasingly live online. Digital surveillance is pervasive and relatively cheap. It is fundamentally different than anything we’ve faced before, and we’re still figuring out what what the boundaries should be.

For now, Aaron’s IDs and documents are still sitting inside my desk. Aaron himself actually went missing a little while ago. I used Amazon’s Mechanical Turk marketplace to solicit descriptions from strangers, and then hired a forensic artist to draw a sketch. He resurfaced on Twitter. (You can go here to try tweeting as Aaron Brown.) But other than that, no word. I have a feeling he’ll probably pop up in Cleveland at some point.

Everyone always seems to get sucked back home.

This post originally appeared at The Atlantic. More from our sister site: 

Why the NSA keeps tracking people even after they’re dead

What is Hezbollah doing in Europe?

Anti-surveillance camouflage for your face

Where the sidewalk ends – Real Change News

In a memoir of her parents’ decline, cartoonist Roz Chast explores the anxiety of aging in America

In her new graphic memoir, “Can’t We Talk About Something More Pleasant?” (Bloomsbury), acclaimed New Yorker cartoonist Roz Chast shares the poignant and often darkly humorous story of the final years of her elderly parents and her own complicated feelings as she took on their care and navigated the bewildering worlds of elder law, geriatric medicine, assisted living, dementia, incontinence and hospice care.

With her trademark nervous drawings as well as photographs and documents, Chast’s book vividly recounts her parents’ tumultuous journey on what she calls “The Moving Sidewalk of Life (Caution: Drop-Off Ahead).” She dedicated the book to her father George, a talented foreign language teacher, who died in 2007 at age 95, and her mother Elizabeth, a no-nonsense assistant school principal, who died in 2009 at 97 — a close couple who grew up together and forged a remarkable bond.

Chast spoke recently at a standing-room-only gathering at Seattle’s Elliott Bay Bookstore. With humor and compassion, she told stories of her own worries as her parents confronted the realities of failing health. She described her sensitive, anxious father and his struggle with dementia, and her brilliant but domineering mother who suffered physical injuries and eventual delusions. As they aged and their conditions worsened, care became ever more expensive, stressful and complex.

The Seattle audience members responded enthusiastically to Chast’s account of the agonizing and absurd aspects of the plight of George and Elizabeth. Chast has drawn cartoons since her childhood in Brooklyn. She attended Rhode Island School of Design and majored in painting but, soon after graduating — according to her website — she “reverted to type and began drawing cartoons once again.” In addition to The New Yorker, her cartoons have appeared in a wide range of publications from Scientific American and the Harvard Business Review, to National Lampoon, Redbook and Mother Jones. She has written several other books including, “Theories of Everything; What I Hate From A to Z” “Mondo Boxo;” and “Unscientific Americans,” as well as children’s books such as “Too Busy Marco.”

Chast interrupted her book tour to talk by telephone about her work and her new book.

At your jammed event in Seattle so many people commented on how your humor and candor about your parents was helpful. Was helping others one of the reasons your wrote the book?

I’m really happy and enormously moved and grateful if it helped somebody out, but I found it hard to understand so many aspects of how to deal with the situation and I wouldn’t want to presume that it would be helpful to anybody. I’m really happy if it is, but it wasn’t really my intention.

You must be hearing similar stories on your book tour.

It’s been astonishing. I’m also getting a lot of letters from people. I didn’t know so many people were just starting the process of dealing with elderly parents who are no longer able to care for themselves and the difficulties of it.

In recalling your childhood, you showed a cartoon self-portrait at age nine, and your head is in “The Big Book of Horrible Diseases” and other books around on illness and even a Merck Manual of medical diagnoses are scattered around. Where did your fascination with morbid subjects come from?

I think I absorbed it from my parents. We always had the Merck Manual around. Definitely who had what illness and who was suffering from what was part of what I heard. And I thought I could wake up and be bleeding from every pore in my body. 

And lockjaw was a concern in Brooklyn because of all the metal playground equipment?

Yeah. It’s funny. Kids don’t talk about lockjaw anymore. When I was growing up in my little cosmos, lockjaw was something people knew about and thought about. 

What drew you to art?

I drew from the time I was a little kid, like most little kids. In high school, I went to the Art Students League in New York City. It was wonderful. I did a lot of life drawing. I’m not by any stretch of the imagination an anatomy-based figure drawer, but I spent many, many hours drawing from life and I loved that. And I had a great teacher.

When I went to art school, it was much different and, in the seventies, it was very serious. It seemed to me that the art that got attention from the teachers was theoretical [and] the artist would have a complicated theory about it, about the biomorphic, architectonic validity of it. I was just a kid from Brooklyn and had never been exposed to any of that talk.

And I stopped drawing cartoons in art school. I majored in painting and wanted to be a painter, but I was just a terrible painter. My senior year, I was doing painting, but I was secretly drawing cartoons in my journal. After I got out of art school, I went back to drawing what I really wanted to.

Did your parents encourage your art?

They knew that that’s what I was, but I think that they very sensibly hoped that I would become a teacher, maybe even an art teacher. My mother thought that I’d go into the family business which, of course, was education.  But I really didn’t want to do that.

I think they were proud of my work. They were definitely happy and they subscribed to the New Yorker. It was scary to them also that I did not get a regular salary, which was also scary to me, but oh well.

And you started drawing for Christopher Street and The Village Voice?

Yes. Christopher Street paid ten dollars a cartoon, which was terrible even back in 1978, and The Village Voice paid fifty. And I did some cartoons for the National Lampoon and, in April 1978, I started with The New Yorker.

In your new book, you write that you hadn’t visited your parents’ apartment in Brooklyn for several years. Then, in September 2001, when they were both nearing 90, you decided to stop by and you were stunned by their situation.

I hadn’t visited their apartment for a long time, but when I started visiting them, it was clear that they were getting older and gradually less able to keep up with day-to-day things in life like the mail, cleaning out the refrigerator, dealing with groceries. So I realized I had to get more actively involved in if not actually caring for them, then in monitoring it and keeping an eye on them and making sure I was more aware of what was going on than I had been before.

You soon contacted an elder lawyer. Do you remember what prompted you to contact that lawyer?

Yes. I had a conversation with a friend. Her mother was older than my mother, and she had recently gone through this, and she knew this elder lawyer. I didn’t even know there was such thing — a person who specialized in things like wills and health care proxies and knowing what questions to ask, and that was very helpful. I was so grateful to this friend who recommended him. Also, he was in Brooklyn, so he could come to my parent’s apartment and I was there when he was there. I didn’t even know what a health care proxy was. I was totally in the dark about all of this.

You have helpful hints in your book for caregivers. For example, you kept a notebook and documented everything that happened.

Yes. The two pieces of very practical information I’d give would be to get an elder lawyer to help you and to keep all of the information in one place. If you’re the person that is now paying your parents’ taxes, dealing with pensions, and paying bills — I didn’t know anything about any of this. I had one place for all of this information — important phone numbers, the conversations I’d have with a caretaker or agency or a bank, or a person with the Board of Education Pension Bureau. I noted the date I talked and who I spoke to and the telephone number. It sounds like minutiae, but it helped to have it organized in this one notebook.

A talk about aging and death is difficult for any family.

It’s a horrible talk. I totally understand why you want to avoid it as long as possible. The title, “Can’t We Talk About Something More Pleasant?” comes from my father. He would say that. My parents and I all wanted to talk about something more pleasant. I haven’t had that talk with my kids yet. It’s a very hard thing to talk about.

You were worried constantly about your parents. How did this stress affect your work and your family life?

I blanked some of it out. The worst was when they were still living in Brooklyn. The year after my mother got out of the hospital in 2006 — the last year they were in the apartment — was really scary. She kept falling and my father’s dementia was getting worse. I felt so far away from them and didn’t know what to do. I would visit them and sometimes bring them food or have Meals on Wheels come. But I couldn’t stay there forever because I had my own family.

Like everybody else, you just go through it, and put one foot in front of the other and say, “A catastrophe didn’t happen today.” Hopefully, I won’t get that dreaded phone call that anybody who’s responsible for an elderly parent fears.

And your parents resisted your help?

I think it’s partly generational and part of their not wanting to ask for help. Especially to my mother, any expression of being other than strong or not being on top of everything was just bellyaching, just weakness. She would give it “a blast from Chast.” She was very determined not to show weakness. I think that’s a generational trait and how she grew up. That’s what helped her survive and that’s who she was.

The story of your cleaning their apartment with your photos of their rooms was exceptionally poignant. What was the process of going through a half century of accumulation?

I didn’t go through all of it. I could not hack it. I went back several times, armed with Hefty bags. I thought I’ll just go through one area and try to sort through stuff. Once I started, it looked even worse. It was so much stuff packed into closets and drawers filled with newspapers from a million years ago. I’d open a drawer and the bottom had rotted out and it would fall to pieces. You saw the photos. I’d find Band-Aid boxes. A drawer of jar lids. They just never threw anything away.

I took a few things. The photo albums of course. And a few things off the wall. And, as I said in the book, I paid the super to take the rest. I told him he could take what he wanted, sell what he wanted. I didn’t want any of it. It was stuff. 

You look at things differently once you’ve been through something like that. The change was that I used to like browsing in second-hand shops a lot, but now it just looks like dead people stuff and it’s depressing.

But you also found a treasure trove of hundreds of letters that your parents exchanged during your dad’s service in World War II.

Yes. I haven’t even gone through a tenth of them, there were so many. At some point, maybe I’ll hire somebody to transcribe them. They probably put that box of letters on top of the closet in 1959, and I had no idea it was there. That was really a find.

Your book is very thoughtful in dealing with your parents’ eccentricities and their failing health. Was writing the book healing for you?

In a certain way it helped me to not forget them and I’m really glad of that. Writing in some ways is a way of holding onto things that otherwise would [be lost to] memory. When I read a page, I can remember their voices or the moment better. I have a dread of forgetting who they were and what they sounded like and what they looked like. I’m really glad when I look at this book because it brings them back to me.

It cost about $14,000 a month to keep your parents at an assisted living facility. How did you deal with the incredible expenses?

There’s not a lot a person can do. All of their savings went to end-of-life care. When my mother died, there was money for about two months’ worth of care left in the bank. I am getting the impression that this is pretty much the way it is for most middle-class people.

You combine your skills as an artist, humorist, researcher and an accomplished writer in this book. Were you inspired by other artists?

Everybody who’s done a graphic memoir. There’s Alison Bechdel, Art Spiegelman, Harvey Pekar. These are amazing people who tell stories in a way that resonates for me and that’s one of the wonderful things about the cartoon medium.

Is there anything you’d like to add about your book?

Well, we’re all on the moving sidewalk and our kids are probably going to be writing books like this about us. “I can’t believe all the crap I found in my parents’ apartment.”

Orlando entrepreneur’s ‘iCloak’ gadget aims to boost Internet privacy – Orlando Sentinel

Eric Delisle, entrepreneur and CEO of DigiThinkIT, shows off… (George Skene, Orlando Sentinel )

July 11, 2014|By Kate Santich, Orlando Sentinel

In an age when online privacy is elusive at best, an Orlando tech entrepreneur has launched a project to protect your cyber self from the prying eyes of government, criminal hackers and data marketers.

Eric Delisle and his startup company have created the iCloak Stik — a pinky-sized USB drive that offers online anonymity for the layperson — and they're doing it with support from the crowd-funding platform Kickstarter. A little more than halfway into the four-week funding effort, it has drawn more than 1,300 backers from 30 countries and $70,000 of its $75,000 goal.

That ranks iCloak in the top 20 among more than 150,000 Kickstarter campaigns.

"It has been insane — in a good way," said Delisle, CEO of DigiThinkIT Inc., a custom-software developer. "I totally underestimated the response."

Delisle, 43, said he began stewing about the need for such a tool in recent years as government "intrusion" in civilian life and well-financed corporate influence seemed to grow. The leaks by former National Security Agency subcontractor Edward Snowden revealing an extensive NSA surveillance program targeting American citizens were the final impetus.

"With Snowden, it clicked in my head: Everybody is being watched all the time," said Delisle, wearing a T-shirt sporting his "You Are Being Watched" iCloak logo. "And I saw a hole in the marketplace. There's no trusted, go-to brand that people can count on to protect their privacy or anonymity."

Those with technical savvy, Delisle and other experts said, already know how to access identity-cloaking tools online. The beauty of iCloak — if it works — would be its simplicity.

"It's so easy even a blind monkey could do it," Delisle said.

A Lake County resident, Delisle considers himself a serial entrepreneur. He has been a sales manager for Westgate Resorts, a market researcher for MTV Networks, CEO of a martial-arts event production company and a consultant to the National Science Foundation.

But his iCloak invention, he said, may prove to be his biggest venture yet.

The $50 basic model works by bypassing your hard drive and software to use a security-hardened operating system, secure Web browser and encrypted password management. According to the Kickstarter campaign page, "you can plug it into any machine — even the most unsafe and virus-filled — reboot the machine and start browsing as if you were using the safest, most secure and untraceable computer on the planet." Your location and identity are masked.

Lisa Macon, dean of the division of engineering, computer programming and technology at Valencia College, agreed that the device could make privacy more accessible. "I think what [he's] doing is a really cool idea," she said. "It certainly would be easier to pop in a USB device than to be thinking, 'OK, I need to cover the Web cam and go in through the proxy server…' "

The product is in the hands of 50 testers across the country, and results so far are successful, Delisle said. The money from the Kickstarter campaign would be used for independent testing. If all goes well, the iCloak could be produced and shipped as soon as this fall.

Macon said it could be appealing. Even those unbothered by government surveillance, she said, may be concerned by data brokers who snoop on shopping habits and personal information to compile online dossiers.

Such snooping is a lucrative and growing industry, said Paul Stephens, director of policy and advocacy at the nonprofit Privacy Rights Clearinghouse. And it presents problems.

"We know some retailers engage in discriminatory pricing based on the information they collect," Stephens said. "There's a lot of information that can be crammed into those cookies they place on your computer. They might look at what type of operating system you use, for instance, and adjust their pricing accordingly. Apple users are deemed to be less price-sensitive than those who use Windows."

But the iCloak taps into the extensive Tor network, a sort of underground railroad that routes your online interactions through random global relay points to make tracing the sender extremely difficult. The network is used for both legal and illicit purposes — just as the iCloak could be.

"It's another tool," Delisle said. "And, frankly, the bad guys have been using these tools for years. But the average John and Mary Smith haven't."

Yet Macon, for one, has concerns. "As soon as they have a solution to this, I think the nefarious parties as well as the government will figure a way around it," she said. "The real question is: How long would it last?"

And Seth Schoen, senior staff technologist at the nonprofit Electronic Frontier Foundation, cautions: "It's very easy to go wrong in this area." The Kickstarter claim of rendering your computer untraceable, he added, "seems massively overconfident."

Delisle acknowledges that what appears rock-solid today can be compromised tomorrow. And he vows to work with the "open source community," which freely shares computer coding to collectively solve problems.

"We mitigate this by staying abreast of all that's happening in the online anonymity, security and privacy space and evolving iCloak to keep up with these changes," he writes. "But the bottom line is that we want to enable people to make their own choices about privacy." or 407-420-5503

How many security researchers does it take to hack a light bulb? – E&T magazine

How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.

PCs are no longer the only devices with computing power inside our homes – wireless routers, smart TVs and connected printers are now commonplace and often have substantial data storage and processing capabilities. “A lot of these devices are running computers as powerful as the things people had on their desks ten years ago,” says Alex Chapman, senior security researchers at cyber-security specialists Context.

Those more in the know than the average computer owner will have heard about the growing number of attacks on wireless routers by malicious actors in an attempt to compromise home networks, with EE rushing out a patch a vulnerability on its Brightbox routers earlier this year.

Routers are an obvious target for hackers as they are intrinsically linked to the Internet making it possible for hackers to compromise them from a distance, but less attention has been given to some of the other network-enabled devices cropping up in people’s homes. Once a hacker has access to a person’s home network they have access to any device connected to it, and with an increasingly diverse suite of devices coming online the potential to break down the barrier between the cyber and the physical worlds is getting ever greater.

To demonstrate the concept, Context’s senior managers bought a case of beer and five network-enabled consumer devices from a mixture of start-ups and established vendors, configured them with the recommended security settings, set up a secure wi-fi network and set their best and brightest cyber-security researchers to the task of hacking this mock smart home.

The break-in

While compromising the wi-fi router would be a perfectly sensible approach to getting on the network, the researchers decided to take a more challenging path. The team focused on a set of LIFX lightbulbs, recently in the news for their team-up with Google-owned smart home specialists Nest, which connect to a wi-fi network so they can be controlled with a smartphone application. One bulb is always connected to the network and receives commands from the smart phone application before broadcasting them to the other bulbs over a wireless mesh network based on 6LoWPAN technology.

Using an ATMEL AVR Raven – a £30 USB network interface device that allowed the team to monitor and communicate over the mesh network – combined with network protocol analysing software Wireshark, the researchers were able to observe the largely unencrypted network protocol and simply re-engineer it so that they could craft messages to control the bulbs.

More importantly, they were able to identify the specific packets in which the wi-fi network credentials were transferred when the ‘master’ status switched from one bulb to another. By deciphering the protocol the team was able to request the encrypted credentials, which they were given without any authentication requirements.

To decrypt the credential the researchers had to get their hands on the device’s firmware. As LIFX is a fairly new start-up they had not released a firmware download to the public, so the team had to break open one of the LIFX bulbs to extract the data held on its chip before doing some basic binary reverse engineering to decode the encryption key. More detailed information on the process is available on the Context blog.

“We had to take it apart and attach probes to it and dump the actual firmware into the computer then interpret it,” explains Chapman. “We’re talking a reasonable amount of proficiency. An enthusiastic amateur could do this, but it took a reasonable amount of effort from people who do this day in day out.”

LIFX have been very quick to patch the bug, with a firmware update available now to download from their site that encrypts the mesh network traffic and adds additional security to the process for adding new bulbs. Head of marketing Simon Walker is keen to stress that this was in the face of a fairly complicated attack that delivered a relatively minor exploit – highlighting how seriously the firm took the issue.

Entering the cyber-physical realm

Complicated or not, once the team had the key they were on the network and compromising the rest of the devices became markedly easier. By far the easiest though was the Motorola Blink 1 wi-fi baby monitoring camera, which features a microphone and a camera that can be remote controlled from a smartphone app. The vulnerability the team exploited had been previously documented online, but the company has yet to fix it and failed to respond to a request for comment from E&T at time of publication.

A quick scan of the network allowed the researchers to identify the camera’s IP address, which they then used to try and open the camera’s web interface using a forced browsing attack – simply typing the URL of a restricted page into the web browser. The team tried the generic web interface marker index.html to no avail. They then tried index2.html and gained full access to devices web interface, which has the same functionality as the smartphone app.

“This one was relatively simple, what we actually found when doing our assessment operation pretty much just popped out at us,” says Chapman. “I don’t know if the device makes any claims on security, but you’d expect that sort of device to have security settings enabled as default.”

A D-Link ShareCenter DNS 320L – a network attached storage device designed to allow users to share files across their network and on the Internet – required a more technical approach. The team noticed the device was taking various parameters from web requests from web pages that didn’t require authentication and using them to create system commands. The team were able to use a command injection attack to insert malicious code into the parameters, which were then interpreted by the device and used as system commands, giving them remote root access to the devices' Linux operating system.

In finding the exploit, the team used a lot of the same technology that would be used in normal web app penetration testing, but Chapman concedes the step from finding the vulnerability to actually being able to exploit it was time consuming. As with all the vulnerabilities uncovered Context informed the vendor and D-Link confirmed that they have identified the bug and will shortly be releasing a firmware update that fixes the problem.

By far the most challenging of the devices to crack was a Canon PIXMA MG6450 printer, a task Context’s research director Michael Jordon took on as his own private project. He discovered the printer’s web interface, which requires no authentication to access, lets you trigger a firmware update, but also lets you edit the web proxy settings and the DNS server, allowing a malicious third party to redirect the printer to download doctored firmware that gives them control over the printer’s operating system.

The weak encryption on the firmware meant it was an easy task to reverse engineer it and encrypt a modified copy of the firmware. What was more of a challenge was the fact that the printer runs a proprietary operating system that required some complex firmware reengineering to be able to access the printer’s functionality.

“In the case of the D-Link NAS it runs Linux so once you’re there you’re home and dry as it’s all open source code. In the case of the printer it’s just one big binary program that’s custom to Canon,” explains Jordon. Despite this, the team has managed to gain full control of the little screen on the front of the printer where they have managed to run animations at about 20fps. Jordon has yet to give up his goal of getting classic 90s computer game Doom running on the printer, despite the fact that control over the input buttons continues to elude him.

A statement from Canon thanked Context for bringing the flaw to their attention, saying: “We intend to provide a fix as quickly as is feasible.  All PIXMA products launching from now onwards will have a username/password added to the PIXMA web interface, and models launched from the second half of 2013 onwards will also receive this update, models launched prior to this time are unaffected. This action will resolve the issue uncovered by Context.”

The final device the team focussed on was the Karotz ‘smart rabbit’ – a puzzling piece of kit featuring a microphone, camera, speaker, flashing lights and moving ears, as well as a host of downloadable applications that link it up with social networks, email accounts, weather and news feeds and even online radio.

A pair of vulnerabilities were revealed by cyber-security firm Trustwave's SpiderLabs team at the beginning of 2013 that have yet to be fixed, including the ability to run malicious code from a USB stick plugged into the device and the ability to eavesdrop on traffic between the device and apps. Context’s Chapman found three more vulnerabilities, including an authorisation bypass issue that allowed access to most of the Linux-based device’s functionality, but the has failed to return emails from Context or respond to a request for comment from E&T at time of publication.


So, what does this all mean? In terms of the potential abuses of these devices, compromising the D-Link could give a hacker access to private documents and photos as could control over the printer. The camera could be used to spy on a victim as could the Karotz, not to mention the unnerving possibilities of a flashing, talking rabbit under malicious control.

But considering the lengths the Context team went to, unless you are the sort of person whose main vices are Martinis, high stakes poker games and foiling evil geniuses it’s unlikely those with the ability and the inclination would waste their time on you. As Chapman says, “It is really just an effort versus reward consideration.”

But there are caveats to this.

The majority of the exploits the team revealed are model wide, and as Jordon points out, quite possibly product range wide. In recent research Context looked at the number of vulnerable Canon printers directly connected to the Internet. A scan of the web revealed 32,000 directly connected printers, of which Context sampled 9,000. They found that 6 per cent had firmware with known vulnerabilities, suggesting up to 2,000 vulnerable Canon printers are accessible over the Internet. Similar scans revealed 200 of the Motorola cameras directly connected to the Internet and a massive 14,000 of the D-Link NAS.

For cyber-criminals, the pay-off for hacking someone’s home devices is not obvious when they can better spend their time skimming card details or locking someone’s computer down with ransomware. But the hacker community is anything but predictable and there are plenty of people out there for whom money is not the principle object.

“As more hacks get into the standard tool kits, people who have got the motivation but not the skills will be able to do attacks,” argues Jordon. “If there are a million printers on the Internet, all of the same model, then it’s worth the effort. You could use them to create a botnet for spamming, DDOS attacks or simply to hide your traffic.”

There are clear analogies for these devices in the corporate world too. Many building management systems are based on a mesh network similar to the LIFX set-up using the ZigBee specification, which is very similar to 6LoWPAN. While they are more likely to require user authentication, corporate printers often run on the same firmware as their domestic cousins and are frequently found on an organisation's main network, according to Chapman. He also says the Karotz device is not unlike conferencing equipment such as Polycom’s HDX systems, which exhibitors at last year’s hackers’ conference Black Hat Europe managed to compromise.

Obviously corporate networks are normally protected by enterprise-level security, but Chapman says he often sees devices such as printers with out of the box credentials making them fairly easy to compromise. And he says organisations’ patching of devices like printers, conferencing kit, smart TVs or anything that’s not a standard computer is patchy at best, despite the fact they are vulnerable and valuable targets.

“It could actually be quite a good place to stay hidden from network security,” he adds. “These devices usually don’t have antivirus or anything like that running on them. If any malicious code did live on them it would be quite hard to find it.”

Security blind spot

The main lesson from this episode is the lack of consideration connected device manufacturers are giving to security in their consumer products, evidenced by the basic oversights and the failure to carry out simple, cheap and obvious solutions. As connected devices become more commonplace the trade-off for malicious actors in exploiting vulnerabilities becomes ever more lucrative.

“I think it’s really a symptom of the consumer devices market,” explains Chapman. “From what I’ve seen it looks like manufacturers are only looking to make things work rather than making things work securely. I know that’s a very sweeping statement, but obviously there’s a cost-to-market and a time-to-market that manufacturers need to consider and I don’t think security gets considered in either of those calculations.”

LIFX’s Walker agrees that companies in this market, many of which are cash strapped start-ups, often see the cost of good security as a luxury that can be dispensed with in the name of getting their product to market.

“Not investing time and money in appropriate security measures in the short term will definitely save you money, but in the long term, especially if it’s baked into the hardware of the chips you are using  or firmware that’s not easy to update, it's maybe not such a good idea,” he argues. “I can completely see both sides of the argument, but do you really want to make your device with shortcomings that may come back to bite you, with potential damage to the brand or potential recalls down the line when you realise it’s down to early security features embedded in the design?”

The problem is not one just for individual companies though. As Walker points out, the connected devices market is still in its infancy and consumers are yet to take to the idea of the Internet of Things wholeheartedly. Major security blunders like the one effecting Belkin’s WeMo home automation devices, which prompted the US Computer Emergency Readiness Team to issue a warning that the security flaws could affect more than half a million users, seriously damage consumer trust in the technology.

“If we’re all being hacked, and we’ve all got massive security problems, why is the general user going to have any confidence using these kinds of connected devices?” Walker concludes. “IoT security needs to take the approach, particularly as we become more reliant on this kind of technology, that we make these products just as secure as they were before they became smart.”


SEO Google
perumahan baru di tangerang
Free Anonymous Web Proxy | Maintain Privacy
Hosting Terbaik
Sewa Mobil DimasRentcar
Review Mobil Proton Indonesia Terbaik
Free and Speed Proxy
Free Web Proxy to Surf Anonymously Online
Asus Zenfone Smartphone Android Terbaik
Kursus Komputer Murah Terbaik di Jakarta
Rekomendasi untuk Cloud Dedicated Server Terbaik
ASUS ZenFone Smartphone Android Terbaik
ASUS ZenFone
Camry mobil hybrid terbaik indonesia
Yamaha R15
Top Proxy
Top Proxy
Top Proxy
Top Proxy
Top Proxy
Top Proxy
Top Proxy
Top Proxy
Top Proxy
ultras proxy
Sewa Mobil DimasRentcar
Toko online murah terbaik di Indonesia
Emka Tupang
Singgasana Hotels Indonesia
Sewa Mobil DimasRentcar
Vpn Proxy
Camry Mobil Hybrid Terbaik Indonesia
On Hosting Domain
hunter proxy
cheat game internet gratis
cheat game internet gratis
ADRO TEXTILE Konveksi Murah Indonesia
ADRO TEXTILE Konveksi Murah Indonesia
Kursus SEO dan Internet Marketing Terbaik di Jakar
obat penggugur kandungan
Opera proxy
web-site to dating coaching
Decoder TV Kabel Berbayar Piala Dunia 2014
voyance gratuite par tchat
spain proxy
spain proxy
Kursus SEO Jakarta
Hotel murah di Jakarta
Alfamart official partner
USA Proxy Golden
hide ip usa
deamen proxy
Hotel murah di Jakarta
Proxy Tube
Medo Proxy
Hide My IP
spain proxy
snake proxy
unblock instagram
pakistan proxy
provide free web hosting
Private IP
Give Me Proxy
ded proxy
ulimnate hide
super fastttttt
wamdpro free proxy service
obat penggugur kandungan
Hotel murah di jakarta
Alfamart Official Partner Merchandise Fifa Piala D
Unit Link Terbaik di Indonesia Commonwealth Life I
Kuliner Balikpapan
school proxy
super proxy free
PC Notdienst
Arif Hosting Harga Murah dan Hosting Terbaik di In
voyance gratuite en ligne sans inscription
proxy gratis
Alfamart official partner FIFA piala dunia 2014
Mobil Sedan Corolla terbaik

tarot de marseille
Eroxid - A Free Proxy
Newborn Pacifiers from Babvo Baby Shop
Escorts Services in Delhi
Mobil Sedan Corolla
Ojimo Phone Cases
voyance gratuite
Pakar SEO
vimax asli
maxproxyx toko kamera murah di indonesia
Jejak Seo
proxy ssl
Uk Web Proxy
Super Fast Proxy
Website Unblocker
college online proxy
Open Blocked Websites
Hide Me Thanks
Uk Web Proxy
Unblock Proxy
unblock facebook
Free Server Proxy
ip change
gag no ads
chat proxy
Mansy Proxy | Free Anonymous Browsing
Mansy Proxy | Free Anonymous Browsing
Mansy Proxy | Free Anonymous Browsing
Proxy 2 Fun
unblock facebook
Texas Proxy is not like any websites proProxy
The free proxy