Linux Privacy - Page 54

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Google Censorship - How It Works

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google is arguable the world's most popular search engine. However, contrary perhaps to a naive impression, in some cases the results of a search are affected by various government-related factors. That is, search results which may otherwise be shown, are deliberately . . .

'Honest, We're the Good Guys'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

American businesses feel a little like a rope that's being used in a tug of war between privacy and patriotism. Their customers want the personal information that businesses collect to be kept private, but the government wants access to some of that data for use in various homeland security plans. . . .

URU joins authentication service fray

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The URU Web service will identify individuals online without invading their privacy - and says it can alert people to attempted identity theft. A service is being developed that will help businesses check the identity of people they are dealing with -- without increasing the number of places where personal data is stored.. . .

Six/Four: The Internet Under Cover

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Six/Four System is peer-to-peer technology that makes it possible to carry out almost any Internet activity securely and -- more importantly, for all sorts of reasons -- anonymously. The Hacktivismo system, or anything based on it, just may become the . . .

PhotoSpam Wars Make Strange Bedfellows

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ask two Internet users a question and you'll get three opinions, all of them fiery, heartfelt, and contradictory... unless the subject is unsolicited commercial e-mail. The only difference of opinion on spam will be who gets first crack at the cretins who send it out. . .

New Rules Tackle Text Adverts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies sending text message or e-mail adverts will have to get the permission of users before they do so under new rules. Regulations on new media have now been included in the latest edition of the code of advertising practice, . . .

Experts: Copyright Law Hinders Technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Speaking Friday at a University of California at Berkeley conference on the law and policy of digital rights management, experts from all circles seem to agree that more is going wrong than right with the current approach to protecting digital content. . . .

Going to Extremes to Fight Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Felix Lin and Linus Upson want to make it harder to send and receive e-mail. They believe it's the best way to deal with the problem of spam. On Monday, the two co-founders of AvantGo launched a new spam filter . . .

ACLU Admits Another Privacy Gaffe

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Protecting personal information on the digital frontier remains a tough task, even for the most ardent privacy activists. That's the lesson the American Civil Liberties Union learned this week after sending out an e-mail newsletter that inadvertently contained the names . . .

"Trusted" Computing and Digital Rights Management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recent reports available with news sites and also published in the Economic Times of India suggest that Microsoft [hereinafter referred to as MSFT] will be pushing through the Windows Rights Management Architecture & Services [WRMA & WRMS] by the 1st week of March, 2003. In the light of such an event, this article proposes to establish the fallacy of the Trusted Computing paradigm as made available in public document(s) from TCPA [https://www.trustedcomputing.org] . . .

Antispam Tools Multiplying Like Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As spam continues to roll over corporate networks in ever-larger quantities, the cavalry of vendors offering defenses continues to grow as well. No fewer than five vendors are shipping or are about to release new products designed to keep spam . . .

Don't Read This [confidentiality notices]

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Of all the ineffectual e-mail disclaimers I see, one I received earlier this week takes the prize for self-defeating impotence. A public relations flak wrote me trying to get publicity for a security conference. His was the standard spiel: the whos who would be there, the whats that would be learned, the wheres and whens and whys.. . .

The Best-Laid Plans of Copyright Law

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's no surprise the entertainment industry uses copyright law to protect its products. But a printer maker? Lexmark International (LXK ) is doing just that--and it could cost you money. If you have an Optra T620 laser office printer, you can . . .

Spam Offers: Some Legit, Most Not

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The human gene pool should be incapable of producing enough idiots to financially support the vast number of spammers whose scat litters so many inboxes. So how do spammers make any money when no one with even half a clue . . .

Spammers Break Law With Covert Tracking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many spammers are ignoring laws forbidding them to insert covert tracking codes in their messages, according to a survey by out-law.com, the IT and ecommerce legal service arm of law firm Masons, and network security outfit iomart. The survey highlights . . .

The Big Business of Fighting Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What do Viagra, stock tips, personal ads and activities with farm animals have in common? They are all the subject lines of unwanted, unsolicited e-mail messages, not-so-affectionately known as spam. The sheer volume of electronic junk mail has overwhelmed users' inboxes . . .