Linux Privacy - Page 20
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Most of us would agree that the NSA has spread its nets too far and cut deeply into our personal privacy. Ultimately, and perhaps ironically, I am hopeful this transgression will leave us with better protection for our personal communication than ever before.
The tech giants, along with Yahoo, Facebook, and AOL, call upon the Senate Judiciary Committee to substantially reform the US government's mass surveillance practices.
his is a long article about the FBI's Data Intercept Technology Unit (DITU), which is basically its own internal NSA. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies -- an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
Web creator Sir Tim Berners-Lee has warned that government surveillance and censorship will threaten the democratic nature of the web.
Could online privacy one day be a thing of the past as we share more and more details about ourselves through social networks? Vint Cerf certainly believes that privacy will become much harder to ensure.
Requests from governments worldwide for user information have more than doubled since three years ago. Worse still, says Google, is what the US won't let us tell you.
This article talks about applications in retail, but the possibilities are endless. Every smartphone these days comes equipped with a WiFi card. When the card is on and looking for networks to join, it's detectable by local routers.
SecureDrop is an open-source whistleblower support system, originally written by Aaron Swartz and now run by the Freedom of the Press Foundation. The first instance of this system was named StrongBox and is being run by the New Yorker.
Just because the National Security Agency hasn't cracked the anonymizing service Tor doesn't mean that people who use the service are free from surveillance.
The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.
A major American computer security company has told thousands of customers to stop using an encryption system that relies on a mathematical formula developed by the National Security Agency (NSA).
The NSA has been widely monitoring international banking and credit card transactions, a new report says referencing Edward Snowden
The Brazilian television show "Fantastico" exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet. The point of the story was that the NSA engages in economic espionage against Petrobras, the Brazilian giant oil company, but I'm more interested in the tactical details.
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
Experts on privacy and Internet security have blasted the National Security Agency over reports it has secretly been working with the British government to crack encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data secure.
David Burnham is a reporter in The Times's Washington bureau. This article is adapted from Mr. Burnham's book ''The Rise of the Computer State,'' to be published by Random House in May.
Really good article by Susan Landau on the Snowden documents and what they mean.
It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the Internet. Most of the largest Internet companies provide information to the NSA, betraying their users.
The Pirate Bay introduced its own browser that can be used to circumvent censorship and blockades.