Linux Privacy - Page 61

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Privacy team works on RIP killer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the Home Office prepares to publish a draft code of practice for part three of the Regulation of Investigatory Powers (RIP) Act due in June, a small band of privacy advocates are rushing to develop a tool capable of undermining it. The RIP Act proposes to give the government the right to demand the plain text and/or encryption keys for any "information protected by encryption".. . .

Privacy bill carries high IT price

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A privacy bill that's pending in Congress could have significant IT ramifications for U.S. companies, since passage of the bill would require them to give customers access to personal information they have collected. For firms without centralized databases of that information, compliance would likely be expensive, critics warn.. . .

Net effect: Antiterror eavesdropping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the seven months since the passage of a sweeping law to combat terrorism, Internet and telecommunications companies have seen a surge in law enforcement requests to snoop on subscribers. Privacy advocates fear that expanded police power under the Patriot . . .

Gov. Ventura Signs Internet Privacy Bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Gov. Jesse Ventura has signed a bill that makes Minnesota the first state to enable Internet users to decide how ISPs handle their personal data. Ventura on Wednesday signed the legislation, which was overwhelmingly approved by state lawmakers late Saturday. Internet service providers are now required to notify subscribers that they can control whether their personal data is disclosed and how it is to be used. . . .

Web privacy bill sent to Senate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Senate committee Friday sent an online privacy protection bill to the full Senate, but business lobbyists vowed to keep trying to derail the measure before it becomes law. "It's time Congress acted on privacy," declared South Carolina Democrat Sen. Ernest Hollings, chairman of the Senate Commerce Committee that voted 15-8 to approve his bill. . . .

Privacy: Are you aware of the trade-offs?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Online privacy isn't the issue it once was, if indeed people really ever cared about it. Oh sure, everyone's in favor of privacy in the same way that they're in favor of Mom and apple pie, but exactly how software should preserve privacy is a more controversial issue.. . .

Latest privacy threat: Monitor glow

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Law enforcement and intelligence agents may have a new tool to read the data displayed on a suspect's computer monitor, even when they can't see the screen. Marcus Kuhn, an associate professor at Cambridge University in England, presented research Monday . . .

New Web spyware eschews cookies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers in Scotland are developing a new kind of Web monitoring software that they claim can collect enormous amounts of data on Web surfers while remaining nearly undetectable. The technology came to light when it was chosen as one of 40 . . .

Securing Privacy, Part Two: Software Issues

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the second article in a three-part series that will examine privacy concerns as they relate to security. The first installment in the series examined hardware-based privacy issues and solutions. This article will discuss software-based issues and solutions. As we shall see, some software is designed to safeguard privacy, while other software seems designed to compromise it. . . .

We're Watching You

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The security chief at a big name brokerage firm in New York had a problem. Proprietary information was being leaked from the trading floor to a competitor and he didn't know how. . . .

‘Dr. Damn’ hits file-swapping firms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The record companies had their Napster, and the stream of file-swapping companies that followed. The file-swapping companies now have their "Dr. Damn." For the past several weeks, the pseudonymous programmer, a college student who declines to give his real name, has been releasing versions of popular file-swapping programs online with the advertising and user-tracking features stripped out.. . .

CFP: Should privacy technologies be built in?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While most attendees of the Computers, Freedom and Privacy (CFP) conference in San Francisco this week agreed that more needs to be done to protect consumers' privacy against the onslaught of rapidly advancing technologies that track, store and share sensitive data, how that privacy should be guarded remained a subject of fiery discussion. . . .

Carnivore's New Leash on Life?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A graduate student at Dartmouth College wants to tame the FBI's Carnivore surveillance system. Alex Iliev has proposed a way to force anyone who wants to monitor e-mail or Web browsing to follow the rules -- and not snoop on private . . .