{"id":1303,"date":"2011-12-10T20:19:37","date_gmt":"2011-12-10T20:19:37","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2011\/12\/10\/trade-fair-for-trojans-f-secure-weblog-news\/"},"modified":"2023-07-28T16:29:57","modified_gmt":"2023-07-28T20:29:57","slug":"trade-fair-for-trojans-f-secure-weblog-news","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/10\/trade-fair-for-trojans-f-secure-weblog-news\/","title":{"rendered":"Trade Fair&#8230; For Trojans &#8211; F-Secure Weblog : News from the Lab"},"content":{"rendered":"<p>Via <a style=\"font-weight:bold;font-size:16px\" href=\"http:\/\/www.scoop.it\/t\/rights-liberties\/p\/800802261\/trade-fair-for-trojans-f-secure-weblog-news-from-the-lab\" target=\"_blank\" rel=\"noopener\">Scoop.it<\/a> &#8211; <a href=\"http:\/\/www.scoop.it\/t\/rights-liberties\" target=\"_blank\" rel=\"noopener\">Rights &amp; Liberties<\/a><br \/><a href=\"http:\/\/www.scoop.it\/t\/rights-liberties\/p\/800802261\/trade-fair-for-trojans-f-secure-weblog-news-from-the-lab\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"http:\/\/img.scoop.it\/DeWo_F4vDTU-hc_cS-oiJjl72eJkfbmt4t8yenImKBXEejxNn4ZJNZ2ss5Ku7Cxt\" \/><\/a><br \/> Trojans, backdoors, keyloggers and eavesdropping is used by online criminals. The same techniques are also used by governments. Some government do this to spy on their own people or to find dissidents. Other governments do this while investigating criminal suspects. \u00a0  Most of the technology used in such intrusions are not developed by the governments themselves. They are made by private companies which are specializing in providing exploits, infections proxies and backdoors to governments.<br \/><a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002279.html\" target=\"_blank\" rel=\"noopener\">Via f-secure.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Via Scoop.it &#8211; Rights &amp; Liberties Trojans, backdoors, keyloggers and eavesdropping is used by online criminals. The same techniques are also used by governments. Some government do this to spy on their own people or to find dissidents. Other governments &hellip; <a href=\"https:\/\/melange.dmaculate.me\/home\/2011\/12\/10\/trade-fair-for-trojans-f-secure-weblog-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-1303","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1328,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/02\/wikileaks-docs-reveal-that-governments-use-malware\/","url_meta":{"origin":1303,"position":0},"title":"Wikileaks docs reveal that governments use malware for surveillance","author":"aslam","date":"December 2, 2011","format":false,"excerpt":"Via Scoop.it - Rights & Liberties Wikileaks has published a collection of confidential brochures and product presentations that companies use to market intrusive surveillance products to governments and law enforcement agencies.Via arstechnica.com","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1369,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/11\/13\/governments-turn-to-hacking-techniques-for\/","url_meta":{"origin":1303,"position":1},"title":"Governments turn to hacking techniques for surveillance of citizens","author":"aslam","date":"November 13, 2011","format":false,"excerpt":"Via Scoop.it - Rights & Liberties Surveillance firms that recently attended a US conference are accused of offering their services to repressive regimes.Via www.guardian.co.uk","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1670,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/05\/28\/bchr-report-documents-governments-attempts-to\/","url_meta":{"origin":1303,"position":2},"title":"BCHR report documents government&#8217;s attempts to stifle online free expression &#8211; IFEX","author":"aslam","date":"May 28, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesIn this report, BCHR focuses on the repression of free expression on the web. Bloggers and online activists have been targeted via death threats and detention orders, leading to a state of extreme self-censorship.Show original","rel":"","context":"In \"Bahrain\"","block_context":{"text":"Bahrain","link":"https:\/\/melange.dmaculate.me\/home\/tag\/bahrain\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":905,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/08\/10\/the-united-nations-and-the-internet-its\/","url_meta":{"origin":1303,"position":3},"title":"The United Nations and the Internet: It&#8217;s Complicated &#8211; By Rebecca MacKinnon","author":"aslam","date":"August 10, 2012","format":false,"excerpt":"See on Scoop.it - Rights & LibertiesWhen it comes to the Internet, however, Congress, the White House, technology companies, and civil liberties groups are all on the same page: All agree that the United Nations \u2013 a body representing the interests of governments \u2013 should not be given control over\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1039,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/04\/25\/containing-weapons-of-mass-surveillance-by\/","url_meta":{"origin":1303,"position":4},"title":"Containing Weapons of Mass Surveillance &#8211; By Rebecca MacKinnon","author":"aslam","date":"April 25, 2012","format":false,"excerpt":"See on Scoop.it - Rights & LibertiesIn an effort to thwart what he called a \u201cmalign use of technology\u201d by the governments of Syria and Iran, on Monday U.S. President Barack Obama issued an executive order authorizing sanctions against individuals and entities that supply or aid governments\u2019 use of technology\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1535,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/07\/27\/the-politics-of-surveillance-the-erosion-of\/","url_meta":{"origin":1303,"position":5},"title":"The Politics of Surveillance: The Erosion of Privacy in Latin America","author":"aslam","date":"July 27, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesWhile most Latin American countries have democratically-elected governments, many still fail to respect human rights, including the right to privacy.Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=1303"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1303\/revisions"}],"predecessor-version":[{"id":3084,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1303\/revisions\/3084"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=1303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=1303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=1303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}