Linux Privacy - Page 45

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

US Supreme Court bars enforcement of Child Online Protection Act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The US Supreme Court wrapped up its session by announcing a decision which bars the enforcement of the Child Online Protection Act (COPA). The COPA, passed in 1998, was an attempt by Congress to keep pornography out of the reach of children on the Internet by requiring credit cards, access codes, or other means of age verification to access adult content, with fines of up to US$50,000 for violations. . . .

Secure Web Based Mail Services

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There used to be a time when secure e-mail management was simple. "Managing" meant sorting through your e-mail messages and putting them into appropriate folders. Secure e-mail back then meant using a simple password for e-mail access. However, today, with e-mail being a business-critical application, more threats against e-mail than ever before, and government regulatory concerns, secure e-mail management takes on a whole different meaning. Viruses, spam, worms, and other malicious attacks and non-malicious events can bring e-mail infrastructures to their knees. With recent government legislation in countries such as the U.S., e-mail confidentiality has become a growing concern. One of the more common accesses to e-mail today is via Web browser and Web-based e-mail access. What security issues should be kept in mind when developing or designing Web mail systems? . . .

http://www.wired.com/news/print/0,1294,63934,00.html

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Think looking at spam is offensive? Try listening to it. For the millions of blind and visually impaired Internet users around the world, using text-to-speech software is often the only way to check e-mail. But as the spam problem gets worse, more and more of those users are finding that having their e-mail read aloud can be a minefield. Listening to the next message in the inbox may reveal an important letter from an old friend or, more often, an embarrassing ad for penis-enhancement therapy. . . .

Stealth wallpaper could keep WLANs secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

UK defence contractor BAE Systems has developed a stealth wallpaper to beat electronic eavesdropping on company Wi-Fi networks. The company has produced panels using the technology to produce a screen that will prevent outsiders from listening in on companies' Wi-Fi traffic but let other radio and mobile phone traffic get through. . . .

Antispam authentication moves ahead

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AOL, Earthlink, and Google have all previously signed on with SPF, and Microsoft's support means that adoption should move forward. The question now is what effect the SPF + Microsoft protocol will have on Yahoo's DomainKeys technology, which works differently. DomainKeys has been submitted to the Internet Engineering Task Force to be ratified as an open standard, and will be supported by Sendmail (which will also support SPF). At least all of the parties are saying all the right things: . . .

The biggest spammer on the Net? Comcast?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Comcast's high-speed Internet subscribers have long been rumored to be an unusually persistent source of junk e-mail. Now someone from Comcast is confirming it. "We're the biggest spammer on the Internet," network engineer Sean Lutner said at a meeting of an antispam working group in Washington, D.C., last week. . . .

Identity Theft - The Real Cause

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To understand the crime of identity theft and to see why it is such a rapidly growing problem you need to go back a few years. At that time here were criminal gangs that needed to launder the proceeds of their crimes. In the seventies and early eighties the banking industry with its centuries old code of secrecy was just what any self-respecting criminal needed. To open a bank account was a simple matter and the banks were keen to gain new customers. The days when it was a privilege to be allowed to have a bank account went out in the early seventies and the banks were fighting each other for business. . . .

Porn spam must now be labeled

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Will this new rule help rid inboxes of unwanted sexually explicit spam? It is doubtful. One of the arguments of the Can-Spam act is that it does nothing to reduce the amount of spam, only make the spam that is sent legal. This new rule does the same. Yes it may help in creating inbox rules to shuffle the spam off to the deleted items folder, but it does nothing to help curb the amount received (unless the spammers run afoul of the law and are shut down). The people who will adopt the rules will be in the minority, mainly because the majority of spam (sexually explicit or not) comes from outside of the United States and are out of the reach of the law. Luckily, there are legislators who recognize the Can-Spam act has had little effect on the spam problem and are urging the FTC to clamp down on the businesses who are using spammers to solicit their wares. . . .

New biometric approach secures ID cards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A novel biometric identification system could counter many of the objections to ID card schemes such as the one being proposed by the UK government. The system can unequivocally link a person to a particular ID card without having to match their biometric characteristics to data stored either on the card or on a central database. . . .

What's Wrong With E-Mail Accreditation?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

E-mail accreditation isn't taken all that seriously as a method of spam control. I'm baffled as to why. It appears to be an effective means of helping ensure that spam filters don't accidently block e-mail that the recipient actually wants to get. . . .

Student uncovers US military secrets

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although the technique is no good for tackling larger sections of text, it does show that officials need to be more careful with their sensitive documents. Naccache argues that the most important conclusion of this work "is that censoring text by blotting out words and re-scanning is not a secure practice". . . .

Fundamentals: Password Madness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While senior technology editor Curt Franklin was hard at work testing authentication tokens for this issue's cover story, I coincidentally ran into some questionable authentication policies and practices as a user. In lectures I've given and in classes I teach to network admins, I emphasize that people should never give their passwords to anyone. Your password and user name identify you to the network or servers. They are your digital ID and as such should be hidden through irreversible cryptography and protected from unauthorized alteration. But alas, as a customer I have dealt with two organizations, which will remain anonymous, that don't follow either principle. . . .

Bad laws, bad code, bad behavior

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Instead of prohibiting bad code, a better solution is to prohibit bad behavior. That could mean, for example, a general rule against fraud instead of trusting tech-impaired politicos to draw up a list of every type of possible code that could perform fraudulent acts. . . .

Cry to beat iris scanners

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An MP who volunteered to take part in the UK ID card trials says the iris scanner used is uncomfortable and made his eyes water. Poor chap, you're probably thinking, but not exactly a tragedy. However, this isn't just a whinge. The water in his eyes actually stopped the scanner from working, and it seems long eyelashes and hard contact lenses could fox it too. . . .

E-Postmark May Thwart Cyber Crook

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The virtual postmarks "are intended to occupy obsolete fields in the IP packet headers and are formed from the 32-bit IP addresses of the border router," Hale explained. For IP headers less than 32 bits long, the Penn State researchers propose segmenting the border router's IP address into several overlapping fragments. . . .

Benefits of BCC

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Another helpful security tip from Carnegie Mellon (via CERT): know when to use BCC when sending mail. Some of you might know some users who would benefit from this idea, and it certainly would go a long way towards making foward-chains less useful to spammers. . . .

How can technology cure this electronic plague?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More than 50 percent of e-mail is spam. Billions of spam attacks are launched each month. Spam costs U.S. companies at least $1 billion per year in security and human resources expenditures, as well as lost productivity. Increasingly, virus-infected machines are used to distribute spam and perpetuate additional fraud, such as phishing. Is combating spam a losing battle? We explore the potential technology solutions in our Spam Report Card 2004 videocast. . . .

MS opens Hotmail to bulk mailers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Prediction: MSN and Hotmail will lose ground to Yahoo, AOL, and possibly even Juno. This will occur if any sizable number of businesses take Microsoft up on this idea. The open question is: when will legislators and certain technology providers realize that required 'opt-in' is the only way to even hope to reduce the level of unsolicited email? Why must 'legitamite' marketers to whom we have never expressed an interest in relationship get even one free crack at our inboxes? . . .