Linux Privacy - Page 71

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Privacy advocates make plea to Echelon committee

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy organisation Cyber-Rights and Cyber-Liberties has submitted its objections to Internet surveillance ahead of a meeting in the European Parliament today. A European parliamentary committee is due to discuss the controversial global surveillance system Echelon and the . . .

Your E-Hancock Can Be Forged

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Czech information security firm has found a flaw in Pretty Good Privacy that permits digital signatures to be forged in some situations. Phil Zimmermann, the PGP inventor who's now the director of the OpenPGP Consortium, said on Wednesday that he . . .

Privacy's Price

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The potential for abuse - advertisers, for instance, could soon pinpoint cell-phone users and beam them messages based on their shopping habits - has prompted Congress to consider a series of bills that, taken together, would dramatically restrict retailers, . . .

Web Businesses Urged To Protect Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy protections will increasingly be seen as a way to add value and build brand loyalty, business leaders said Tuesday. Consumers want more customized services for promoting products and services they are interested in, said John Kamp, counsel for the CPExchange . . .

All That Data, All That Secrecy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you showed up at the Federal Trade Commission's workshop on the privacy implications of database marketing Tuesday, the answer is probably still no. The Commission took a hard look at the likes of Acxiom and Abacus, massive marketing databases that . . .

E-mail encryption use low despite potential for snooping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Elana Kehoe doesn't like the idea of governments and hackers reading her e-mail as it traverses the Internet. So a few weeks ago, she installed a tool to scramble her messages. But she's having trouble using Pretty Good Privacy encryption. She knows of only four other PGP users, including her husband, Brendan. That means everything else goes through regular e-mail, which is as private as sending a postcard. . . .

Want Info? Feds Happy to Share

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government should examine its own privacy practices before pointing a finger at the commercial sector, a report published Monday said. "The Federal government is the largest collector and user of citizens' personal and private information," said Jim Harper, operator . . .

Wireless: The Next Battle In Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy has been a hot issue in Washington and elsewhere for some time now, and anyone familiar with political trends could be forgiven for assuming the public spotlight will quickly find some new hot-button issue. But not so, according to Forrester . . .

Mitnick: Identity theft easy as pie

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Thanks to lame online security measures, stealing an individual's identity is like taking candy from a baby, said reformed hacker Kevin Mitnick. Passwords, user names and other data used by financial institutions and utility companies to verify identity, such as an . . .

Microsoft may disable upgraded PCs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Users who upgrade their PCs may find they will not work when switched back on, under the software giant's plan to use an artificial intelligence engine to deactivate illegal copies of Windows XP. "A new graphics card and new motherboard will mean the operating system will require reactivation," he said. To reactivate their operating system, users will have to send details of the installation, such as the product ID number and a hardware identifier, to a Microsoft-run clearing house. They will then receive a product activation code. . . .

Privacy at Work? Be Serious

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you feel your privacy at work has been eroding lately, it's probably more than just your imagination. Experts say companies are under increasing pressure to monitor employees electronically, and workers should assume they are being watched. . . .

Network Solutions sells its database

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet's phone book is up for sale - and though the listings may represent a treasure trove for marketers, the move also risks a serious privacy backlash. At issue are millions of entries in the domain-name database operated by the . . .