How to secure your nude photos?

Behind closed doors, a lot of us may have the urge to capture intimate, naughty, private and winkwink moments; and given the latest internet leaks of nude celebrity photos, a lot of you out there may be thinking of all your previously taken shots. 
 
While I may be taking the fun and thrill out of the said process, my sense of Cyber Security paranoia feels the need to set out some instructions to those who prefer not to have their privates circulating the interwebs.
 
The first most basic rule is: simply do not take them. That's the foremost technique to nip the propagation of private photos.
 
"Revenge porn" is sexually explicit media that is distributed online, without the consent of the pictured individual for the purpose of humiliation. It is the last resort a broken hearted psychopath would use. 
 

Deliver yourself from yourself

Why do people look over the universe for a solution that is right at their doorstep?
Sometimes, the answer is around and seeking beyond is just stupid.
 
Mankind is amazing, it's hilarious how people lean on spiderman-like characters that never showed up, never intervened, just a thought only a thought, a need for release that sadly vacuums then explodes - and still, it's still believed to deliver from evil.
 
Brain control is a trojan horse, thought injection is the payload and hunger is the exploit; humankind evolved to a state of devolution, rendering the world lust for a new governance system. It's time to prove to our ancestors that we can pursue.
Break out, Smell the coffee, unlearn, isolate, revolt, escape, live and keep loose.
 
For you are dust, cosmic dust and to cosmic dust you will return.
 
Here are some recent photos from the 21st century - yes we surpassed year 2000 and that's us below...

[Timelapse] Camelopardalids Meteor Shower over Bcharre, Lebanon

This timelapse was shot in Lebanon at Bcharre cedars during the occasional Camelopardalids meteor shower on May 24 2014 - Not eveyrthing moving in this video is a meteor. 

Many of the IFO (Identified Flying Objects) in this video are meteors, while not everything that glitters and slides during nights is one. Investigations are still running to count the exact meteors number spotted during the shooting time. 

While comparing playback quality of the most notorious video sharing services, I realized the lack of a free, decent and lossless video upload service when it comes to delicate details like Meteor Showers and moving stars. Since Vimeo and Youtube HD playback quality was disappointing, I decided to upload this video to this site so it would be available with maximum juicy details. Make sure you check the downloadable version down below.

Under the hood:

  • 107 frames were shot during 53 minutes, each frame was of 30 seconds exposure or 3600 ISO.
  • Manual inspections for all frames revealed 33 dancing objects on the milky way stage, some of them are meteors while others aeroplanes, satellites and Iridium flares.
  • You'v got to watch then in HD to be able to spot the maximum
  • Video was rendered 15 frames per seconds resulting 7 seconds
  • Photos were straight fed to the timelapse without any processing.

I wish I reached there earlier and shot for longer.

24 common bloggers mistakes with fixes

You wake up at 4:23 AM on an SMS saying: "your blog is hacked!". 
What would you do?
What if, you weren't able to access your server because hackers changed your passwords?
You manged to reset your passwords, accessed your server to apply corrections and things are running smoothly (w heik), what if your backup dates from the last month?
What if, you had no backups at all? 
Would you cry? I would have definitely cried.
Back to the realm, when it comes to blogs and websites security, it's not always your programmer's mistake (though most of time it is), sometimes it's yours; and it's doubled when you are your own programmer.
Wordpress, Drupal and other platforms installations are secure but common mistakes come from the publisher's level, especially when you are a journalist on the fly publisher.
Considering security in general, it is a trade of Usability and Functionality. Too much ease-of-use and functionality kills security, where too much security kills them both.
You don't know your enemies, nor their skills, nor their resources; hacking techniques became so easy that unexperienced kids can hack you within 3 clicks - occasionally, hackers are hired to unethically hack other people, others hack just because they can. Are you afraid? 'guess you are or else you wouldn't have been reading this.
On the other hand, human hackers are not the ones who only attack you, Gauss White is a typical cyberespionnage example that targeted the Lebanese banking sector back in August 2012.
 

Here are the commonly met security mistakes/misconfiguration

Would 2014 be another dark year for cybernauts?

"Everything you said on the internet might be soon used against you"
(photo from 
https://www.team-cymru.com/)
 
Internet security and privacy during the upcoming weeks might dive into disastrous repercussions :
Due to the solemnity of the recently discovered security loopholes (stated subsequently), 2014 is nominated to be the year of credential theft, online payment fraud and privacy violation.
Taking into consideration hackers' notorious motivations and skills: "not profiting from this occasion will go unforgivable"; By exploiting the discovered vulnerablities all together, internet security might face the darkest ages that internet itself will strive to disremember.
If you are too lazy reading technical stuff, you may directly jump down to the recommendations section.
 
While music genres differ in the types of neurological stimulation they evoke, listeing to music in the morning affects the mind deeper than any other time of the day, results in terms of physiological and psychological progressions have always been underrated.
#DailyZouwedeh or زَوّادَة اليَومِ has been my each-and-almost-every morning musical food since summer 2009: It is the musical track that suites my morning coffee and cigarette depending on my state of mind.
 
In this post, I wrapped up all the daily zouwedet from 2013 in one post just for the record of musical mood progression/regression over the year.
It's important to note that the hashtag is not proprietary and everybody is invited to make use of it (especially when I die).

17 tips you should know before dating a Hacker

People don't ship with user manuals, same applies to the other type : `The Security Phreaks`.
Whether you dated on purpose or by mistake the `security girl `or `security guy` (a.k.a. InfoSec, Information Security, IT Security or simply a Hacker), here are some instructions that might be helpful to tweak and maintain a sustainable, fruitful relationship full of joy, happiness and those shits.
If you are into security stuff, the below will help you understand yourself more.
 

November 3 2013 - Partial Solar Eclipse seen from Lebanon

Today featured the 2nd Solar eclipse for this year, the first one (on May 10, 2013) where the total phase was seen by australian citizen and dolphins of the pacific ocean. The 2nd one happened today (Nov 3, 2013) its full phase was seen by citizen of equatorial Africa and dolphins of the North Atlantic.

As for Lebanon, the full phase wasn't visible and the eclipse didn't reach more than 20% between 15:14 and 16:38 of the day, reaching a peak at 15:58.

While fake photos about this event went viral showing more than 50% of lunar penetration in the solar disk (shown at the bottom of this page), below are some of my photos shot today from Bhannes, North Maten.

October 18-19 2013 - Penumbral eclipse of the moon seen from Lebanon

While a full moon is supposedly omnilighten (same light level distributed over the disk surface), yesterday night wasn't any regular case. The moon underwent a Penumbral Lunar Eclipse where the surface showed subtle changes and the bottom part  looked darker than the rest of the dish.

An Umbra is the innermost part of the shadow where the ligh source is totally blocked.
The Penumbra is the 2nd layer of the shadow where only a part of the light source is blocked.

Yesterday's phenomenon was a Penumbral Eclipse, this happens when the moon passes through the earth's penumbra where only slight changes happened over the moon surface. 

Comparing the below photos, the moon a bit darkish from its left down side (2nd photo) caused by the shadow of the earth. Note that this effect cannot be easily detected by a naked eye.

Bonofa Cube7 - Scam your Friends or die trying

Supposedly you don't intend to swindle your friends, if any of your mates invites you to an event at Hotel Le Royal Dbayeh to propose a business plan - Don't go, unless your time is free as a free bird and the invitation is free as a free beer.

Some people are renting halls there and will try to persuade you, rip you off and rip off your friends under the title of "The future is now". This post resumes my prematurely-ended story with Bonopha/Kyoob7 scam and its connection with the real world order.

The main purpose behind is to make people aware of the rencently propagating scam and prevent future one that might affect our society and Before proceeding this, I suppose you are familiar with the Pyramid Scheme fraud concept and Gold Mine Int. (GMI) - the scam that invaded Lebanese universities for the last 6 years where many of our friends lost big amounts of money.

Syndicate content