Wikileaks Vault 7: CIA Tips for Git Workflow

Wikileaks has begun dumping a large number of files on the CIA's hacking tools. The dump is called Vault 7. It is a goldmine, not only for information about the CIA's activities, but also for information on things like how to set up a development environment or properly use Git in your everyday programming workflow. Here are a couple highlights from some cursory searches of the document dump:

CIA Git Tutorials

CIA Vim Tutorials

CIA Setting Up a Development Environment

Hide My IP Address: How to Browse a Website without Visiting It

In this article, we'll provide a few tips and tricks on how to use a couple simple advanced web searches to browse a website without actually visiting the target site, effectively remaining invisible to the site's proprietors. Maybe the website is blocked on the computer you are using. Maybe the site seems somewhat sketchy and you want to check it out before you actually visit it. Maybe you want to read some content on the site, while depriving them of your own web traffic. Maybe you don't want the site's proprietors to know your IP address. Whatever the case may be, if you have access to Google, you may very well be able to see the content you are looking for without ever connecting to the site in question.

County Government Computer System Taken Over by Ransomware

From The Newark Advocate:
A computer virus discovered late Tuesday night caused Licking County government to shut down its computers and phone systems indefinitely to prevent the virus from spreading, protect data and preserve evidence. The FBI and Bureau of Criminal Investigation have been notified. 
The virus, accompanied by a financial demand, is labeled ransomware, which has hit several local governments in Ohio and was the subject of a warning from the state auditor last summer.

The United States Pirate Party

Did you know there is a United States Pirate Party?

The United States Pirate Party (USPP) was founded in 2006 by Brent Allison and Alex English. Our platform is aligned with the International Pirate Movement. 
We support and work toward reformation of intellectual property (IP) laws, true governmental transparency, and protection of privacy and civil liberties. 
We strive for evidence-based policies and egalitarianism, while working against corporate personhood and welfare. We believe that people, not corporations, come first. 
We would like to encourage you to learn more about our name and values here. The Pirate National Committee (PNC), formed in 2012, tracks and assists the growth and development of newly-formed state parties across the nation. As of January 2013, there are 8 member-state parties of the PNC. 
The PNC includes delegates from member-state parties across the nation, and is the governing body of the United States Pirate Party.  Meetings of the PNC are open to the general public and are held biweekly on Wednesdays at 9PM over IRC.

How to Make Sense of the Wikileaks Clinton Campaign Email Document Dump and Controversy

It is becoming increasingly difficult to distinguish fact from fiction in the coverage of Wikileaks' ongoing publication of internal emails from Hillary Clinton's presidential campaign, known as the Podesta emails. There are internet hoaxsters pushing fake emails that are not contained in the actual published files. There are junk reports from prominent newsy websites that are based on obvious misreadings of the files in question. There is Clinton campaign and Democratic party spin seeking to distract from the content of the published emails. There is Trump campaign and Republican party spin exaggerating the content and import of what has been revealed by the leaked documents. And so on. In this article, we'll provide a bit of context on the leak itself, cover some examples of how it is being exploited by hoaxsters, how it is helping to reveal the incompetence of newsy sources of information, and how it is playing out within the context of the presidential campaign itself. We'll conclude with some tips on how to sift through the bullshit.

How to Spot a News Hoax and Prove that Its Source Is Fake

Image via Hoax Slayer
We all know the internet is rife with falsehoods, misinformation and disinformation. And, sooner or later, we're all bound to be taken in by an internet hoax, whether it is a fake news article, a photoshopped image, an advertisement masquerading as legitimate content, or even a government-sponsored propaganda campaign. In this article we'll use a real-world example to take a look at some simple sleuthing strategies on how to spot a hoax news article and prove that its source is fake.


Space Station Sunday: Fire It Up!

Good morning / afternoon / evening (depending where you are on this fine planet), space fans! Here's what's been up lately in low-earth orbit!

Lookin' good, homeworld!
 The Northern Lights were so strong this week,
Reykjavik, Iceland turned off their streetlights to watch the whole show.
(Image courtesy NASA.gov.)