Linux Privacy - Page 65
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
With the debate surrounding identification cards firmly back on the news agenda, what exactly are the logistical issues associated with their potential compulsory implementation? The current debate seems to centre on civil liberty groups protesting that the cards are a breach of human rights. But how much of the discussion has addressed the processes and make-up of the cards?. . .
An international day of protest designed to jam the US-led communications spy system Echelon was a "rousing" success according to its organisers, who claim that the cyber-demonstration helped to raise public awareness about the surveillance system. Jam Echelon Day took . . .
The Internet Content Rating Association (ICRA), backed by Microsoft Corp., AOL Time Warner Inc. and Yahoo Inc., presented its Web content labeling scheme in the U.S. The labels allow users to restrict access to Web sites based on their own criteria and the information in ICRA labels.. . .
Web shoppers will have to deal with the watered-down version of a promising new privacy technology that will likely generate an early reputation for being unstable and frustrating. The latest release of Microsoft's Internet Explorer 6.0 should have been the . . .
Privacy groups, led by the Electronic Privacy Information Center, said the Federal Trade Commission should have taken action when they filed their first complaint this summer. The complaint, signed by 13 organizations, alleges the new operating system coerces consumers into . . .
Expect the FBI to expand its Internet wiretapping program, says a source familiar with the plan. Stewart Baker, a partner with law firm Steptoe & Johnson, is a former general counsel to the National Security Agency. He says the FBI has . . .
What a total idiot I am. I never asked Web anonymizer SafeWeb exactly what they mean when they say they "collect NO logs or user data beyond what is required for performance tuning and security monitoring of our servers. Any such . . .
ISPs can keep logs of who does what online if Home Secretary David Blunkett relaxes the Data Protection Act in response to terror fears. An emergency package of anti-terrorism measures rushed forward by the UK government to allow data surveillance across . . .
The recording industry is experimenting with new technology it hopes can smother online song swapping by targeting music traders' computers directly. The record, movie and software industries have long pursued a controversial campaign that identifies people trading large numbers of songs . . .
As an IT security professional Neil Barrett welcomes moves to record online activity, but as a private citizen he doubts that increased online surveillance is healthy So, the terrorists who hijacked the planes and caused heart- and commerce-stopping panic used email, . . .
WASHINGTON -- Look out, music pirates: The recording industry wants the right to hack into your computer and delete your stolen MP3s. It's no joke. Lobbyists for the Recording Industry Association of America (RIAA) tried to glue this hacking-authorization amendment . . .
McNealy again in the news on his idea to create an identity in a database for everyone. "Scott McNealy, chairman and CEO of Sun Microsystems Inc., said Thursday his long-held belief the United States needs a national identity system has gained a lot of traction since the Sept. 11 attacks on the World Trade Center and the Pentagon.. . .
A high-stakes showdown over the future of U.S. eavesdropping law is taking place behind closed doors on Capitol Hill. With scant time remaining before possible votes in the House and the Senate as early as Wednesday, the Bush administration is lobbying for permanent surveillance ability over the objections of top legislators.. . .
Despite calls for tighter national security, delegates at the ISPcon tradeshow here expressed concern over a proposed bill that could pave the way for broader implementations of Carnivore, the FBI's top-secret Internet monitoring program, arguing that the advanced packet sniffer could compromise civil liberties.. . .
Information technology (IT) managers have long known that privacy rules can have a direct impact on database design and customer relationship systems. Now, they're also learning that international privacy requirements can affect IT in ways that you wouldn't expect. Take the case of Eaton Corporation.. . .
Why, then, all the talk now about implementing a national identification system as part of the war on terrorism? The Bush Administration is not actively pushing legislation. Yet Represenative George Gekas (R-Pa.), who heads a subcommittee on immigration, says his office has been flooded with calls requesting a legislative debate.. . .
The company that pushed encryption and networking technology to the limits to enhance people's privacy said Thursday that it has decided to close its flagship anonymity network and focus on security software for home users. Security software maker Zero-Knowledge Systems announced . . .
Federal Trade Commission chairman Timothy J. Muris is to announce Thursday that his agency will not seek stronger consumer privacy laws. His position is a reversal of Clinton-era policy that said consumer privacy laws were needed to protect personal data on . . .
The legal you is an increasingly documented entity, a single record in a vast and growing database. A political data point that was born with, has earned or has been granted certain rights and permissions - everything from driving a car . . .
Civil liberties groups are concerned that the anti-terrorism bill proposed by the Bush Administration would lump small-time hackers in with murderous terrorists. The draft proposal from Attorney General John Ashcroft would expand law enforcement's freedom to catch and punish terrorists. It . . .