Do not think you are safe using a tor browser! You can get malware infested by a certificate pinned altered NoScript extension for instance, because Mozilla can not protect you against such an attack: https://medium.com/@movrcx/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95

Again a user is helpless against a direct attack from a party with enough resources (Spooks, spies whether corporational or government related - does not matter). Could it be your surveilling government organization this time - NSA, CIA, FBI or one of their global counterparts?

So refrain from sharing with the Internet that what you do not want to share with others. We have arrived in a situation where we can trust no one with our private digital information. It is all a question of trust and do you know who you can trust with your e2e encrypted info and where it lands eventually?

If you do not hide my warnings, you’d only have yourself to blame.

Three instances where we saw SSL security crumbling

Consider how three recent examples involving sub-CAs being used to produce phony certificates show that the classical root certificate authority-based trust model is breaking down:
Trustwave. In 2012, Trustwave issued a sub-CA to a private organization [2]. This sub-CA was to be loaded into a device performing a man-in-the-middle attack, and its sole purpose was to allow that device to generate trusted certificates for arbitrary domains, allowing interception against all devices on the network. This approach avoided the need to install a custom root certificate across all device, and also prevented certificate warnings, by chaining the phony certificates to Trustwave.
TURKTRUST. In 2013, a sub-CA issued by TURKTRUST, a root certificate authority based in Turkey, issued a phony certificate for the google.com domain. The certificate pinning capabilities added to Chrome by Google detected this certificate in the wild [4].
ANSSI. Also in 2013, ANSSI, a root certificate authority controlled by the French government, issued a sub-CA to the French treasury department, IGC/A, and IGC/A in turn used the sub-CA to intercept and monitor employee web traffic [15].
quote taken from source article: case study fighting back against SSL Inspection, conducted by Jacob Thompson and directed by Stephen Bono.

polonus (volunteer website security analyst and website eror-hunter)

“We have arrived in a situation where we can trust no one with our private digital information. It is all a question of trust and do you know who you can trust with your e2e encrypted info and where it lands eventually?”
We have been at this juncture for many years but no one believed those of us preaching this fact.
There were always those that thought that with enough encryption and the use of back doors, they still had an assurance of privacy.
Maybe now it’s finally starting to sink in. Privacy on the internet is dead

Linux Security: A Closer Look at the Latest Linux Threats
http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-security-a-closer-look-at-the-latest-linux-threats

H1N1 Malware Adds Support for Infostealing Features, UAC Bypass
http://news.softpedia.com/news/h1n1-malware-adds-support-for-infostealing-features-uac-bypass-508408.shtml

iSpy Keylogger Returns with New Version and New Attacks
http://news.softpedia.com/news/ispy-keylogger-returns-with-new-version-and-new-attacks-508452.shtml

Update on add-on pinning vulnerability
https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/

Malvertising Campaign Using RIG EK Detected Pushing CrypMIC Ransomware
http://news.softpedia.com/news/malvertising-campaign-using-rig-ek-detected-pushing-crypmic-ransomware-508475.shtml

Over 840,000 Cisco Devices Affected by NSA-Linked Flaw
http://www.securityweek.com/over-840000-cisco-devices-affected-nsa-linked-flaw

Paying attention to these threats for years now at the “virus and worms”,
now also mentioned here:
https://blog.sucuri.net/2016/09/hacked-website-report-2016q2.html

7000 WP sites hacked lately.
PDF report available from link given,

polonus (volunteer website security analyst and website error-hunter)

According to TrendMicro 71% of known ransomware families arrive as mail attachments
http://blog.trendmicro.com/trendlabs-security-intelligence/rar-javascript-ransomware-figures-fluctuations-email-attachments/

always upload and test attachments at a online multiengine scanner before you open
www.virustotal.com
www.metadefender.com
www.jotti.org

Yahoo Confirms At Least 500 Million Accounts Were Hacked
http://fortune.com/2016/09/22/yahoo-hack/

http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
http://www.nbcnews.com/tech/tech-news/your-yahoo-account-was-probably-hacked-company-set-confirm-massive-n652586

Qadars Trojan Returns Bigger and Badder than Ever Before
http://news.softpedia.com/news/qadars-trojan-returns-bigger-and-badder-than-ever-before-508546.shtml

Drupal Core - Critical - Multiple Vulnerabilities - SA-CORE-2016-004
https://www.drupal.org/SA-CORE-2016-004

OpenSSL Security Advisory [22 Sep 2016]
https://www.openssl.org/news/secadv/20160922.txt

Krebs Website Hit By 620 Gbps DDoS Attack :o
http://www.infosecurity-magazine.com/news/krebs-website-hit-by-620-gbps-ddos/

This is from the BBC

http://www.bbc.com/news/world-us-canada-37447016

The problem being this is from 2014 - so that horse has bolted long ago - if your data got stolen then it’s probably a little late.

Research: AV vendor’s privacy policy:

https://www.av-test.org/en/news/news-single-view/data-protection-or-virus-protection/

All AV vendors share your data with third parties.

If its free, you are the product. If it aint free you are still the product anyway!!

polonus

What about Avast!?@polonus :smiley:

They have an Avast Free Privacy Policy and a VPN Privacy Policy: they share a lot of things: https://www.reddit.com/r/technology/comments/3lass7/avasts_privacy_policy_also_states_that_they_share/
Main and solely third partner = Google (Google Tag Manager) - they say they only use your private data statistically, but as Google has acces and on android Google Admob, it is out of sight and Google can sit on it and sell it or turn it over to surveillance if requested and under gag-order),

pol