Linux Privacy - Page 31

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Google Chrome to do away with unique IDs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

From the forthcoming version 4.1, Google is doing away with the Chrome feature which has attracted the most criticism: unique IDs. Until now, this token has been stored in the user_experience_metrics.user_id key in the User Data\Local State file in the Chrome installation folder (C:\User\[Name]\AppData\Local\Google\Chrome under Vista).

Seven Firefox Plug-ins That Improve Online Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As strange as it might sound, there are times when I wish for the old days of the Internet circa the early 1990's. The days of Mosaic and Lynx, where there was no Flash, no Javascript and no Java. A simpler time where protecting your privacy and security wasn't as essential as it is today.

Tool Automates Targeted Attacks On Social Network Users

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A researcher here today released a free tool that impersonates a Twitter user's account in order to execute automated targeted attacks on the person's followers. Pedro Varangot, a security researcher with Core Security Labs, says the group wrote the tool as a way to demonstrate and test for how social networks can be used for spear phishing.

Schneier-Ranum Face-Off: Should we ban anonymity on the Internet?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a discussion between Bruce Schneier, chief security technology officer of BT Global Services and the author of Schneier on Security, and a world-famous cryptographer, among other things, and Marcus Ranum, the CSO of Tenable Network Security and is a well-known security technology innovator, teacher and speaker. Both are highly-regarded security visionaries and this is a really great discussion of anonymity on the Internet today. Point: Bruce Schneier Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. Counterpoint: Marcus Ranum: Obviously, we need to deal with reality, but you've made the mistake of assuming that just because something will always be there, it's right. By that logic, most crime would be OK, and I think we probably agree that it's not.

TOR issues updated software after server breach

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The TOR Project is advising users to upgrade to a new version of the software following a hack that compromised three of its servers. TOR, short for "The Onion Router," is a worldwide network of servers that are used to help anonymize people's Web surfing. Web traffic is randomly routed through many servers, masking critical information such as someone's true IP (Internet Protocol) address.

How neutral can the FCC be about piracy?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I must confess, I thought FCC Chairman Julius Genachowski had found a clever way to keep his bid for Net neutrality regulations from getting mired in the debate over online piracy. When the FCC agreed to start the rulemaking process in October, Genachowski made it clear that the regulations wouldn't apply only to the transmission of unlawful content. That's code for bootlegged copies of "Avatar" and "The Hangover."

China cracks Google security: Google defies Chinese censors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent policy conflict between Google and the Chinese government is stirring up a lot of dust and creating a lot of confusion. Google recently announced A new approach to China in the Official Google Blog. The 12 January 2010 announcement makes allegations of security cracking by agents of the Chinese government in an attempt to gain access to dissidents

The limitations of Google Chrome OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Am I sending sensitive information for hackers to sniff? Further concern is data security. With traffic taking place between the Netbook and the Internet cloud, hackers can sniff out Internet packages and intercept information between a PC and a Wi-Fi router. Most companies use encryption via VPN software to hinder hacking attempts, but this may not be possible with Chrome OS.

Security Cam app turns Apple iPhone into a spy device

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Developer Crowded Road has had a rather difficult time getting its Security Cam App approved. In fact, its claim its app was submitted to Apple back in December of 2008, yet was just approved recently. This lengthy approval time shouldn't be too surprising, as the idea of turning one's iPhone into a possible spying device could be a troubling concept to some.

Q&A: Researcher Karsten Nohl on mobile eavesdropping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This week brought some bad news for mobile phone users. German security expert Karsten Nohl showed how easy it is to eavesdrop on GSM-based (Global System for Mobile Communications) cell phones, including those used by AT&T and T-Mobile customers in the U.S. to make tools available for people to verify its insecurities.