Linux Privacy - Page 69

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Hackers delay censorship-busting software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of hackers has delayed introducing its planned Web software that is meant to allow users to evade government censorship of the Internet. The delayed project, code-named "Peekabooty," was originally scheduled for launch next month at the hackers' convention Def Con, the group Cult of the Dead Cow (CDC) said in an e-mail message to journalists.. . .

Consumers Are Key to Privacy Protection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to regulating online privacy protection, there seems to be only one thing that everyone here on Capitol Hill can agree on: Consumers need to be better informed. The Senate Republican High Tech Task Force hosted a talk titled . . .

Retool delays hackers' free-speech app

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An ambitious attempt by an international coalition of hackers to create a file-sharing program that can defeat censorship has gone back to the drawing board, the project's leader said Wednesday. Known as "Peekabooty"--and previously as Project X--the program could allow dissidents in authoritarian countries to speak out online by hiding the identity of its users.. . .

Internet Insecurity: Special Report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kind of a pithy article, but good fodder for convincing your boss it's a good idea to install ssh and using crypto. " Then he started opening his e-mail. The first was from our boss, about Joel's next column. I liked being a snoop in the loop. Another was from Joel's girlfriend's brother asking Joel to score free concert tickets. Then a chain e-mail from a few of our co-workers, with snarky comments about someone else on our floor they evidently don't like. Ah, isn't this what computer spying is all about? . . .

Keeping Watch On Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A plethora of bills aimed at regulating privacy on the Internet are pending in Congress. Though it's tough to predict if and when any of the legislation would become law, IT solution providers say they stand to gain if safeguarding customer data becomes a legal requirement.. . .

E-Commerce Fears? Good Reasons

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The little lock icon that appears in your Web browser's window is supposed to prove you are engaging in a safe transaction. But it may be nothing more than a visual placebo. The icon is intended to indicate that information is . . .

Privacy group pushes Web bug finder

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Privacy Foundation released free software Thursday that helps consumers detect when a site or e-mail contains a Web bug--a barely visible tracking tag, also known as clear GIFs, used mainly by marketers to monitor consumer habits online. Consumers can download . . .

Kill This Piracy Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Regarding Microsoft and Windows XP, "Microsoft says that the data it collects will be protected and that there is no ongoing secret pilfering of data from your machine. It's said to be a one-time process to connect you, your software and your computer as a legal entity. . . .

Keeping Secrets

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Interview with Michael Jacobs, information assurance director at the NSA. " ... to make sure commercial tools pass muster in terms of security, the NSA runs them through new software-testing programs. These programs, the Common Criteria Evaluation and Validation Scheme and the Cryptographic Module Validation Program, are part of the agency's National Information Assurance Partnership, a joint effort with the National Institute of Standards and Technology (www.niap.nist.gov), IT product vendors and users. . . .

Lawyers raise fears over AltaVista's search engine

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lawyers have warned that companies using AltaVista's new search engine technology are at risk of breaching data protection laws. Launched last week, AltaVista's new software lets people search entire corporate networks allowing employees to access all network folders, personal computers and . . .

Say Ahh, Then Remain Silent

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cops may someday be searching private medical records in search of criminals, according to some medical privacy experts who cite increasing automation of medical records combined with broad exemptions for law enforcement in new medical privacy regulations. "I'm very concerned about . . .

Privacy? Who Cares.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More and more Web-enabled gadgets collect data on customers. That makes privacy advocates mad, but the resulting furor doesn't last long. During the annual Computers Freedom and Privacy 2001 conference last March, privacy activist Richard Smith held up the SportBrain exercise . . .

The Case Against Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scott McNealy, once vexed privacy activists by claiming that "you have zero privacy anyway -- get over it."Now the Sun Microsystems CEO is saying that "absolute privacy is a disaster waiting to happen."In an opinionated article published in The Washington . . .

Identity Thieves Thrive in Information Age

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rise of Online Data Brokers Makes Criminal Impersonation Easier. The identity thieves began their scam the old-fashioned way, stealing credit card statements, new bank checks and other documents from mailboxes. Using an America Online e-mail account and one of the stolen . . .

Privacy becomes a strategic asset

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Privacy Amendment Act was put forward at the end of last year to ensure that the personal information kept by the private sector was both secure and accessible to individuals. But with a deadline of December this year, are companies . . .