Linux Privacy - Page 61
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
As the Home Office prepares to publish a draft code of practice for part three of the Regulation of Investigatory Powers (RIP) Act due in June, a small band of privacy advocates are rushing to develop a tool capable of undermining it. The RIP Act proposes to give the government the right to demand the plain text and/or encryption keys for any "information protected by encryption".. . .
A privacy bill that's pending in Congress could have significant IT ramifications for U.S. companies, since passage of the bill would require them to give customers access to personal information they have collected. For firms without centralized databases of that information, compliance would likely be expensive, critics warn.. . .
The Register writes, "Fundamental design flaws in the FBI's infamous Carnivore packet sniffer have led to the destruction of evidence related to a suspect possibly involved in Osama bin Laden's Al Qaeda network which had been obtained legally under a Foreign . . .
In the seven months since the passage of a sweeping law to combat terrorism, Internet and telecommunications companies have seen a surge in law enforcement requests to snoop on subscribers. Privacy advocates fear that expanded police power under the Patriot . . .
Gov. Jesse Ventura has signed a bill that makes Minnesota the first state to enable Internet users to decide how ISPs handle their personal data. Ventura on Wednesday signed the legislation, which was overwhelmingly approved by state lawmakers late Saturday. Internet service providers are now required to notify subscribers that they can control whether their personal data is disclosed and how it is to be used. . . .
Today at an FTC (Federal Trade Commission) public workshop on consumer information security, Dr. Larry Ponemon, CEO of Privacy Council, outlined a series of cyber security challenges facing corporate America. In his remarks, Dr. Ponemon focused on cyber-risk management and corporate . . .
Indiana State University accidentally posted personal information about 10,000 of its students -- including names and Social Security (news - web sites) numbers -- on the Internet for two weeks.. . .
A popular Internet privacy service that lets Web surfers visit sites anonymously has fixed several serious flaws, and now the service's founder is offering a reward to the finder of the bugs.. . .
A Senate committee Friday sent an online privacy protection bill to the full Senate, but business lobbyists vowed to keep trying to derail the measure before it becomes law. "It's time Congress acted on privacy," declared South Carolina Democrat Sen. Ernest Hollings, chairman of the Senate Commerce Committee that voted 15-8 to approve his bill. . . .
Online privacy isn't the issue it once was, if indeed people really ever cared about it. Oh sure, everyone's in favor of privacy in the same way that they're in favor of Mom and apple pie, but exactly how software should preserve privacy is a more controversial issue.. . .
Law enforcement and intelligence agents may have a new tool to read the data displayed on a suspect's computer monitor, even when they can't see the screen. Marcus Kuhn, an associate professor at Cambridge University in England, presented research Monday . . .
Researchers in Scotland are developing a new kind of Web monitoring software that they claim can collect enormous amounts of data on Web surfers while remaining nearly undetectable. The technology came to light when it was chosen as one of 40 . . .
Several U.S. lawmakers introduced a long-awaited privacy bill Wednesday that would allow U.S. businesses to share information about customers who have not explicitly forbidden them to do so. . . .
This is the second article in a three-part series that will examine privacy concerns as they relate to security. The first installment in the series examined hardware-based privacy issues and solutions. This article will discuss software-based issues and solutions. As we shall see, some software is designed to safeguard privacy, while other software seems designed to compromise it. . . .
The security chief at a big name brokerage firm in New York had a problem. Proprietary information was being leaked from the trading floor to a competitor and he didn't know how. . . .
The record companies had their Napster, and the stream of file-swapping companies that followed. The file-swapping companies now have their "Dr. Damn." For the past several weeks, the pseudonymous programmer, a college student who declines to give his real name, has been releasing versions of popular file-swapping programs online with the advertising and user-tracking features stripped out.. . .
While most attendees of the Computers, Freedom and Privacy (CFP) conference in San Francisco this week agreed that more needs to be done to protect consumers' privacy against the onslaught of rapidly advancing technologies that track, store and share sensitive data, how that privacy should be guarded remained a subject of fiery discussion. . . .
A graduate student at Dartmouth College wants to tame the FBI's Carnivore surveillance system. Alex Iliev has proposed a way to force anyone who wants to monitor e-mail or Web browsing to follow the rules -- and not snoop on private . . .
Businesses in the UK, including U.S. firms with branch offices there, may soon face limits on their ability to monitor employee Web surfing and e-mail activity under a new privacy code due to be released by a government body in the . . .
The W3C endorses the Platform for Privacy Preferences, a standard for automating privacy decisions online The World Wide Web Consortium has endorsed a new standard for privacy online.. . .