Linux Privacy - Page 25
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Who is more likely to hand over their personal online information, a criminal hacker or an IT security professional? It seems they are all pretty bad if a female is involved, but
US ISP Sonic.net and Google have been forced to supply the US government with information about the email account of WikiLeaks volunteer Jacob Appelbaum; according to a Wall Street Journal report published on Monday (10 October), the companies were complying with a secret court order.
It's easy to set up a Virtual Private Network (VPN) for individuals. Trying to set up private networks over the public Internet for branch offices --
In an increasingly digital world, the real threat to citizens' privacy is data collection by corporations and not the Patriot Act, said former U.S. cybersecurity and counterterrorism advisor Richard Clarke.
The short version: Tor relays and bridges should upgrade to Tor 0.2.2.33 or Tor 0.2.3.4-alpha so users in Iran can reach them again.
Web spies are getting stealthier and stealthier. Recently they've been caught peering into our browser histories to determine the sites we've visited, even in so-called privacy mode with cookies disabled, as Dan Goodin described earlier this month on The Register.
Some 250,000 diplomatic dispatches from the US State Department have accidentally been made completely public. The files include the names of informants who now must fear for their lives. It is the result of a series of blunders by WikiLeaks and its supporters.
Judging by the frenzied claims of lawmakers like US representative Jackie Speier, enabling the Do Not Track feature ranks up there with locking doors and shredding credit card statements.
Google touts the Chrome OS as being free from traditional security concerns like malware, but it's still vulnerable to entirely different kinds of attacks, two researchers from the firm WhiteHat Security told Black Hat attendees here today.
Online privacy might be the biggest oxymoron of the early 21st century. Computer users are so ready to share the most innocuous details about their lives on social networks, for example, that it seems privacy has willingly been surrendered.
Code that exploits two iPhone flaws to allow people to jailbreak their devices could, ironically, force security-conscious users to use the vulnerabilities to jailbreak their own iPhones and apply a third-party patch.
The Electronic Frontier Foundation (EFF) has begun the EFF Tor Challenge to encourage the creation of more relays for the anonymising network. The Tor network relies on user-provided relays to handle the traffic that passes in, out and through the anonymising network which is used by activists around the world to protect their identity and circumvent internet censorship.
A high-rated Firefox extension with more than 7 million downloads secretly collects data about every website the open-source browser visits and combines it with uniquely traceable information tied to the user, an independent security researcher said.
Every time you turn around another company is reporting a serious data breach. Last week it was the LastPass online password management service that lost some e-mail addresses and master passwords, as CNET's Seth Rosenblatt reported in The Download Blog.
Almost everyone has a digital footprint these days. Think you could remove your tracks? Former skip tracer Frank Ahearn helps folks drop off the face of the Earth. In a world where we share more information online than ever before, it might seem impossible to disappear completely.
OK. This column may make me sound like I'm about to make a hat out of tinfoil but bear with me because my paranoia is completely justified. I know the truth and it's not "out there" as in "The X-Files," it's right here and it's a harsh reality that people really don't want to admit to: The reality is that there is no real privacy any more.
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones.
Web browsers are ground zero for Internet security threats, and the debate over responsibility for preventing those threats has resulted in a Gordian knot. The people behind the new add-on for Firefox called Cocoon (download) want to cut through debate by serving the entire Web to you via proxy. (Cocoon is also available at GetCocoon.com.)