fbpx
Rosa Jourdan

Rosa Jourdan

While Donald Trump busies himself battling beauty queens on Twitter and occasionally touting his slapdash, unworkable "concepts" on trade, taxes, and immigration, Hillary Clinton is busy being a normal American presidential candidate. For instance, she's releasing reasonably detailed papers on all manner of public policy issues. (I know, so very boring.) If this were a normal American presidential election, these proposals would be vigorously discussed and examined, particularly at the presidential debates. Instead we get extended back-and-forths on her network server management issues.

But these policy proposals really do deserve our attention. For instance, consider Clinton's speech in Toledo on Monday, in which she attacked the anti-competitive, anti-consumer business practices of "too many" in corporate America. The Democratic presidential nominee didn't go full Elizabeth Warren. But it was pretty close:

Look at Wells Fargo. Really shocking, isn't it? One of the nation's biggest banks bullying thousands of employees into committing fraud against unsuspecting customers. … It is outrageous that eight years after a cowboy culture on Wall Street wrecked our economy, we are still seeing powerful bankers playing fast and loose with the law. … Part of the problem is large corporations are amassing so much power in our economy. Sometimes it's called market concentration or even old-fashioned monopolies. … As president, I will appoint tough, independent authorities to strengthen anti-trust enforcement and really scrutinize mergers and acquisitions, so the big don't keep getting bigger and bigger. [Hillary Clinton]

All hail Hillary of the House Clinton, First of Her Name, Slayer of Monopolies and Megabanks.

Now, a competent Republican presidential campaign would take note of its opponent's tough, populist speech. It would place that speech in the context of what many left-of-center thinkers are saying these days about corporate power and inequality. For instance, the Obama economic team has put forward a thorough analysis of how American industry is getting more and more concentrated, potentially harming consumers and small business.

Moreover, a competent, policy-oriented Republican presidential campaign would note that many Democrats are using the reality of greater market concentration as a springboard for attacking Silicon Valley and the broader technology sector — one part of the American economy that seems to be working pretty well. (At least, that's the impression I get when I pull that small pane of glass from my pocket allowing me to instantly access the sum of human knowledge.)

This summer, Warren singled out Amazon, Apple, and Google as examples of concentrated corporate power. She even compared them to Wall Street's "too big to fail" megabanks. And in a New York Times op-ed last month, former Clinton labor secretary Robert Reich bemoaned the economic and political power of "Big Tech." Like Warren, Reich looks favorably on the European Union's efforts to break up Google's supposed monopoly powers and practices. Indeed, some on the left would actually dismantle some of these tech industry giants here in the U.S.

Interestingly, Clinton never mentioned tech in her Toledo speech, instead singling out banking and healthcare. Then again, she never gave the tech industry any sort of special dispensation due to the special economics of the digital economy where, for instance, the more users you attract to a platform, the more valuable it may get.

Would President Hillary Clinton aggressively pursue anti-trust actions against America's most successful and innovative companies as many in her party would like? We don't know. But how could Big Tech not be at least a bit worried about a regulatory war against them during another Clinton administration, especially given the Democratic Party's continued leftward shift?

Maybe they are worried. The day after Clinton's speech, Google's top economist Hal Varian had an op-ed in the Financial Times in which he made the case that tech giants are nothing like the robber baron monopolists of old. Rather, they are constantly subject to "disruption" while continuing to innovate and bring cool new products and services to consumers and small businesses alike.

A competent GOP nominee might be coming to the defense of Big Tech, and questioning Hillary's commitment to this vibrant sector of the American economy. And in doing so, he might broadly acknowledge that many sectors of the economy have grown more concentrated, perhaps making the economy less competitive and dynamic. But he also might explain, as Varian did, how the tech sector can be different. It wasn't so long ago that MySpace was the largest and most dominant social networking site. Fortune magazine once declared Yahoo the winner of the "search engine wars." The founders and executives at top tech firms hardly think their positions are forever secure. Will smart bots threaten Google's core search business? Will the fast-growing Chinese market undermine the iPhone in Asia? Look out Facebook, here comes Snapchat!

A competent GOP nominee might also point out all the ways — in addition, perhaps, to an anti-trust rethink on the right — to make the economy more competitive, including reforming occupational licensing laws, less stringent patent and copyright protection, and reviewing tax and regulatory rules that benefit incumbents over startups. He might also point out how the Obama administration's healthcare and banking overhauls might be driving increased business concentration in those sectors.

A competent GOP nominee might say some or all of these things as part of an intellectually honest agenda to promote a more open and dynamic economy. But instead, the GOP nominee is Donald Trump.

Source: theweek.com

Columnist Adam Dorfman explains how Google's recent local search algorithm update, "Possum," has impacted brick-and-mortar businesses.

For brick-and-mortar businesses, proximity to the searcher’s location has become even more important as a ranking signal thanks to a Google algorithm update nicknamed Possum. With the Possum algorithm change, Google is continuing down a path it has been traveling for quite some time, which is the merging of local and organic ranking signals.

Google is now applying filters to reward certain businesses that are not only physically closest to searchers but that also are optimizing their location data and content for search far better than anyone else. To understand the impact of Possum crawling into our lives, let’s look at the following scenario:

  • Before Possum: Let’s say Jim, a resident of San Mateo, California, requires orthopedic surgery and is doing a search for orthopedic specialists in the area. An area hospital, Hospital A, that publishes location pages for dozens of orthopedic surgeons might dominate the local pack results — not necessarily because Hospital A optimizes its content better than anyone else, but because it is the largest hospital in the area and has enough domain strength to make those pages relevant from an algorithmic standpoint.
  • After Possum: Jim conducts the same search for orthopedic specialists. Instead of a single hospital dominating search results, Google allocates more real estate to other hospitals nearby based on their location and the usual ranking signals — unless Hospital A’s content and data are so well optimized for search that they outperform other hospitals by a wide margin.

What Google is doing here is not new to search. For some time, Google has been making it harder for monster brands such as Amazon to dominate search results for product searches simply because of their size and prominence.

The Amazons and Walmarts of the world no longer dominate the top search results like they once did unless their search signals outperform competitors’ content by a wide margin. With Possum, Google is applying to local search a similar filter it has been using for organic search more generally.

Greater competition with your neighbors

Possum also affects local results in a more arcane, but important, way. As Joy Hawkins discussed in a recent Search Engine Land column, the algorithm is affecting search results for similar businesses that are clustered closely together, examples being:

  • Two or more retailers, such as mattress stores or restaurants, located across the street from each other or in the same strip mall.
  • Professionals, such as attorneys, insurance agents or accountants, who might share the same office space.

Before Possum, an unbranded search for, say, Greek restaurants in Chicago might yield the names of several Greek dining establishments clustered closely together in Chicago’s Greektown area. Such a result would make perfect sense if the person doing the search were located a block away from Greektown, which is located on the city’s near west side.

But what if the searcher were located in the north or south suburbs and wanted to find Greek restaurants in Chicago? Getting the names of a bunch of Greektown restaurants might not be a very good user experience if the searcher wanted to find locations closer to their physical location.

Possum has made it less likely that similar businesses clustered together will dominate location-based searches unless, as noted, the searcher is conducting the search close to the actual location of those businesses.

One implication of this, as local search expert Andrew Shotland uncovered, is that national to local brands may see positive shifts in rankings due to brand authority being turned up as a signal in the ranking algorithm.

Possum has a number of other implications for businesses, as Hawkins details in her article. But for brick-and-mortar businesses that rely on local foot traffic, the impacts I have described are especially important. As Hawkins wrote, “The physical location of the searcher is more important than it was before.”

How to beat the competition

If you are a business that operates brick-and-mortar locations, you should first check to see if your rankings for local search have been affected. You might not have been affected — or you might be seeing better results, not necessarily a drop in rankings.

Regardless of whether you’ve been affected, now is the time to get more rigorous about how you manage your data and content as assets to make your brand more visible where people conduct near-me searches. Ask questions like:

  • Is my data accurate and shared properly with the publishers and aggregators that distribute my data?
  • Are my data and content differentiated to make my brand stand out? Am I listing data attributes, such as the availability of free parking, which might differentiate me when near-me searches occur? Is my deep content, such as long-form description of my business, or visual imagery, optimized properly for search?

Now, more than ever, it’s time to boost your signal for local search to be found. Don’t let your business play possum with local search.

Source: Search Engine Land

Facebook is stealing the Stories format and invading countries where Snapchat isn’t popular yet. Today in Poland it launched “Messenger Day”, which lets people share illustrated filter-enhanced photos and videos that disappear in 24 hours, just like on Snapchat.

By using the international popularity of Messenger to spread the Stories format, Facebook could boost retention and return visits to its chat app while becoming the primary place where people post off-the-cuff lifecasting content before they get hooked on Snapchat.

facebook-messenger-day

Sources in Poland spotted Messenger Day and sent TechCrunch’s John Biggs these screenshots. We reached out to Facebook for comment, and it told us “We know that people come to Messenger to share everyday moments with friends and family. In Poland we are running a small test of new ways for people to share those updates visually. We have nothing more to announce at this time.”

Additionally, Facebook says it frequently runs small tests before rolling products out to other regions, but there’s no guarantee it will expand this feature beyond Poland. It’s unclear, but Facebook might not bring it to the US unless it really blows up abroad. 60 million people in the US and Canada already use Snapchat daily, and aggressively pushing Messenger Day there could annoy them. But in countries where people aren’t that familiar with Snapchat, it has nothing to lose by experimenting.

Share Suggestion Filters

Much of the feature works exactly like Snapchat Stories, with the ability to draw or add text to images. Facebook’s one big innovation with Messenger Day is the use of graphic filters as suggestions for what to share, instead of just to celebrate holidays and events or to show off your location like with Snapchat’s geofilters.

messenger_day_filters

 
At the top of the Messenger thread list, users see a row of tiles representing “My Day” and friends’ Days they can watch, but there are also prompts like “I’m Feeling”, “Who’s  Up For?” and “I’m Doing”. Tapping on these tiles provides a range of filters “I’m feeling…so blue” with raindrops and a bubbly blue font, “I’m feeling…blessed” with a glorious gold sparkly font, “Who’s up for…road trip” with a cute car zooming past, or “Who’s up for…Let’s grab drinks” with illustrated beer mugs and bottles that cover the screen.

messenger_day_shareThis feature allows people to share visually appealing images even if they aren’t great artists or especially creative. These prompts could also spur usage when people are bored, sparking their imagination.

Messsenger is already an app people use all day with close friends, so it could end up a better home for the Stories format than cramming it into Facebook’s core app, which the company tested as “Quick Updates” andscrapped.

The Stories slideshow format has proven to be a powerful way to share more than the perfectly polished pics people post to Instagram. That’s why Instagram launched its own clone of Snapchat Stories, but its CEO Kevin Systrom admitted “They deserve all the credit”. But Facebook suffers from the same problem of people only sharing their biggest life highlights, which don’t happen that often. Facebook is already so stuffed with features and probably isn’t opened as frequently as Messenger.

Now Messenger Day wants to make this casual sharing option ubiquitous before Snapchat can. That’s a similar strategy to Instagram Stories, which I hear is flourishing in places like Russia where Snapchat adoption is low. This is the benefit of Facebook being a giant company earning $2 billion in profit a quarter. It can clone fast thanks to its enormous team, translate and localize features for testing in certain markets, and cross-promote what works with its inescapable feed and chat apps.

Messenger Day might not lure many people away from Snapchat, but Facebook could stunt its competitor’s growth by racing to to bring its own Stories to the unclaimed corners of the earth.

Source: https://techcrunch.com

Sunday, 02 October 2016 21:26

Tor Browser 6.0.5 Has Been Released

Tor Browser 6.0.5

Tor Browser 6.0.5 is now available for download. The latest release of the Tor dark web browser comes with a number of improvements, one of which is a crucial security update.

Tor Browser 6.0.5 Addresses Mozilla Vulnerability

tor-browser-fixes-certificate-pinning-issue-but-bug-remains-in-firefox

Users will be glad to see that the new version comes with a bug fix in Mozilla Firefox – recently discovered extension update vulnerability.

There was a security loophole that allowed attackers with valid addons.mozilla.org certificates to masquerade as legit Mozilla servers in an effort to spread malicious updates – something that could potentially cause arbitrary code execution and also cause problems in Firefox’s default methods of handling certificate pinning.

Certificate pinning is a crucial HTTPS feature that protects the user’s SSL certificates from attacks by accepting only a specific certificate key per domain or subdomain and rejecting the rest.

Independent security researcher Ryan Duff posted a report which pointed out the vulnerability in most of the Firefox stable versions save for one nightly build that was released on the 4th of September 2016.

His report also indicates that the security vulnerabilities on Firefox stem from the use of a static key instead of the more secure HPKP method.

Access to a legit Mozilla certificate is hard to gain for the ordinary hacker.

According to security expert @movrcx, who stumbled upon the vulnerability, an attacker would need a minimum of $100,000 to pull off a successful man-in-the-middle attack.

Resourceful parties such as nation states can still carry out MITM attacks and compromise the anonymity of the Tor network.

New Upgrades

tor-browser-6-0-5

Apart from fixing the vulnerabilities discovered on Firefox, Tor Browser 6.0.5 also includes a stable version (0.2.8.7) and an update of the HTTPS-Everywhere (5.2.4).

The new version of the browser also fixes a number of other minor bugs such as site security clearing during New Identity, the storage of browser data in the home directory and the bug that caused the “Maximizing Tor Browser” notification to appear severally.

Alpha and Hardened Bundles to Follow Soon

Currently underway is the building of the alpha (6.5a3) and the hardened (6.5a3-hardened) bundles for alpha and hardened channel users.

Available for Windows, Mac, and Linux OS

The Tor Project has made significant steps to tackle its existing security loopholes and various administrative road bumps. It remains the most sought after means of obtaining anonymity.

The latest release is currently available for Mac OS X, Windows, and Linux platforms. To enhance user anonymity, it is well capable of running off a portable USB flash drive.

Source : https://darkwebnews.com

Are you trying to find out how to access the dark web?

Well, look no further, we have gone and done the research so we could show you step by step the best and safest way how to access the deep web.

We cover everything, from setting up Tor, how to choose a VPN, what not to do, finding the best sites to access, and extra steps to remain anonymous.

It is extremely easy to access the dark web and even easier to be detected on it if you don’t take precautions. If you are new to the deep web, this guide will help you on your way.

According to researchers, only 4% of the internet is visible to the general public.

Meaning that the remaining 96% of the internet is made up of “The Deep Web”.

Dark Web or Dark Net is a subset of the Deep Web where there are sites that sell drugs, hacking software, counterfeit money and more. We explain this further down the article if you are not up to speed.

If you are looking to access hidden marketplace’s or darknet websites (with a .onion domain) then dark web access is done using the TOR network with the TOR browser bundle. TOR is the most widely used dark web browser.

How To Access The Dark Web Guide

Step 1: Go and get yourself a good VPN (Virtual Private Network) here, use it ALL of the time, no matter if you are on TOR or not. This site herereviews the best VPN’s for use with TOR.

You should be taking your anonymity and security very seriously if you are visiting the Dark Web, especially if you are viewing any Darknet Markets.

Do not fool yourself and think that the ISP’s (Internet Service Providers) and Law Enforcement are not trying to track those who use Tor to access the Dark Web, they are, and they are good at it so don’t make it easy for them.

VPN for Dark Web Access

By using the simple VPN app, your dark web activities will be hidden from your ISP and government agencies as all of your internet usage will be encrypted. No one will even know you are using TOR, let alone browsing for darknet markets.

What’s even better is that the VPN will give you a fake IP address, in another country if you like, so even if Tor is compromised then the trace just leads back to somewhere else that can’t be linked to you.

The other benefit of using a VPN is to prevent hackers stealing your identity and or personal files and photos from your computer.

You need to use a good VPN that keeps NO LOGS, fast performance, preferably accepts bitcoin as payment, has a kill switch for DNS leaks, and is compatible with TOR.

>>Click Here to find a good VPN<<

Then install your VPN, if you buy one of the better VPN’s then it is usually just a one click install and one or two clicks to turn it on.

Step 2: You can’t access the deep web just using a common browser like Internet Explorer or Google Chrome. To get dark web access you will need to download the dark web browser called TOR browser bundle. Only get it from the official TOR website, never download it from anywhere else!

Now close all of your browsing windows and all apps connecting to the internet like Google Drive, Skype, OneDrive, iCloud etc.

Then open your VPN app and connect to another location other than where you are at, make sure to use the OpenVPN protocol as it is the most secure.

Open up your normal favorite browser and then download TOR

TOR Official Website:https://www.torproject.org/download/download.htmlTor Browser Download

Step 3: Install the TOR browser bundle on your PC or Mac. When the download is complete, double-click the downloaded file, choose the destination folder (the folder where you want to extract tor browser), and choose extract.

Step 4: Start TOR Browser. Open the folder where you extracted TOR browser and double-click “Start Tor Browser”. The TOR start page will open in a browser window (it’s actually a portable version of FireFox striped down).

From here, you now have a good level of anonymity and security and you are able to gain access to .onion websites through your dark web browser.

tor-folder

Congratulations…

Next, you will want to visit a dark web site.

Now you have dark web access you should Click HERE to view the Darknet Market List so you can visit some of the best black market websites on the Deep Web.

If you do want to check out some dark net markets then you should follow the guide for that specific market as it will show you step by step what to do to sign up, browse etc.
silkroad

If you are looking for the biggest list of hidden deep web links go hereso you can find exactly what you are looking for. We have compiled one of the biggest lists of tested .onion sites on the dark web complete with a search function, website name, description, categories, site status and even a screenshot of the landing page so you can see if your site is online or dead.

Now we have shown you how to access the dark web we have some very important tips to share…

Bonus Security Steps For the Dark Web:
cyber-security

Step 5: DO NOT change the TOR browser window size unless you like living dangerously. The FEDS have programs that can match identities on random things such and matching time online and other things with the browser window size, I shit you not. If you don’t change the size then it is the same as most other people.

Step 6: Please remember that TOR isn’t necessarily 100% anonymous, you should turn off JavaScript within the dark web browser settings to help.

tor-javascript-setting

Step 7: Disconnect your webcam or block the camera with some black tape. Hackers and governments have ways of getting into your computer and turning on the video and cameras.

You can have intimate images of you be used as blackmail or extortion, or even worse, used by the feds.

zuckerberg

Step 8: Disconnect your microphone or cover it with tape to muffle it good. The same goes for the microphone as the camera, the last thing you want is to be recorded saying incriminating things at home. It doesn’t even have to be while on the dark web. Even the Facebook creator Mark Zuckerberg does it as he knows the dangers.

Step 9: NEVER use your real name, photos, email, or even password that you have used before on the dark web. This is the fastest way to be tracked. Use an anonymous email account and aliases that have nothing to do with you that you have never used before.

Step 10: If you are using TOR on the dark web for anything other than looking at cute pictures of kittens, you should think seriously about your privacy and security. Jolly Roger has put together a comprehensive guide on how to stay safe on the deep web, view the guide here.

If you have read through this how to access the dark web guide and thought to yourself WTF? Then you are probably new to this and need a bit of background and information to get you up to speed. Please remember to share this post so everyone that wants to have a look on the Dark Web can do so and do it safely.

What is the Clear Web?

Firstly, there is the Clear Web/Clear Net. This is the normal internet where you do everyday things like check Gmail, Facebook, and Twitter and buy things from Amazon etc. All websites and web pages that a search engine like Google can find are on the Clear Net.

What is the Deep Web?

Then we have the Deep Web. This is a sub-set of the internet that can not be indexed (found) by search engines like Google. This includes all web pages that are behind membership logins, all company and organization web pages used internally and other data. The majority of the deep web does not have anything illegal on it.

deep-web-dark-web-differences

What is the Dark Web?

Then we have the Dark Web. This is a sub-set of the Deep Web that contains all sorts of websites, both legal and illegal. The types of sites include black markets that sell things like drugs, counterfeit goods, and weapons, you also have hacking sites, porn sites, bitcoin tumbling, and even sites for hitmen. The variety of sites on the Dark Web is quite astonishing.

Source : https://darkwebnews.com

Page 2 of 2

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media

Book Your Seat for Webinar - GET 70% OFF FOR MEMBERS ONLY      Register Now