Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

Post Tagged with: "privacy"

WhiteHat Aviator: A browser for privacy and security, but is proprietary and for OS X only. WTH?

WhiteHat Aviator is a Web browser that’s just been released by WhiteHat Security, a Web security company based in Santa Clara, California. At a time when Web browsers are not in short supply, it’s tempting to ask, What’s the point of this new Web browser? Because it’s good for your privacy and security, says the guys from WhiteHat Security. I […]

Project Chess spied on you long before Microsoft acquired Skype

Long before Edward Snowden told us about a govt privacy-abusing spy operation called PRISM or Prism, Skype had its own collaborative project with the govt that was code-named Project Chess. That was going on while Skype executives were denying any such activity was taken place. According to a New York Times report, Skype began looking at “the legal and technical […]

Free Software alternatives to help you outwit PRISM

Just because your activities are being monitored by the powers that be does not mean that you should throw up your arms in the air and give up. Yes, complete privacy is almost impossible to achieve in the age of bits and bytes, but there are things you can do to minimize how much of your privacy you give up. […]

Got a PRISM and Boundless Informant problem? Whisper and Tor can help

Got a PRISM and Boundless Informant problem? Whisper and Tor can help

PRISM and Boundless Informant. Don’t you just love names like that. They have a nice ring to them. But do not be fooled. Those are bad for your privacy and, with time, even worse for a true democracy. But thank heavens for Free Software and those making them available. With much gratitude to them, here are two Free Software services […]

How to create and maintain anonymous email accounts

Don’t let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous email activities is impossible. It is, though, as with all things involving digital security, it can never be 100%. But that should not keep you from trying to keep your email communications private and anonymous, because if […]

One more reason to not use Skype for Linux

Even though Skype for Linux is unlike most applications available on any Linux installation, that is, it is a proprietary application, it has long been a popular chat and VoIP application for many users, not for free software purists, but for those that do not care about the core philosophies of free software. If you belong to that group, that […]

Should you be worried about Ubuntu Desktop’s privacy settings?

Should you be worried about Ubuntu Desktop’s privacy settings?

Ubuntu 12.04 LTS (Long Term Support), aka Precise Pangolin, will be released towards the end of this month. Like most distribution releases, it will come with its share of new features, enhancements and bugfixes. You will find one of those new features in System Settings, the hub for most graphical administrative tools in Ubuntu and GNOME 3 desktops in general. […]

He can steal your smart phone’s and tablet’s encryption keys

If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again. Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. Because I am very security conscious and like to […]

“Who Has Your Back?” In Depth: Which Companies Promise To Tell Users About Government Data Requests?

EFF recently launched a campaign calling on companies to stand with their users when the government comes looking for data. (If you haven’t done so, sign our petition urging companies to provide better transparency and privacy.) This article will provide a more detailed look at one of the four categories in which a company can earn a gold star in […]

Shopping Online, Privacy, Data Protection and Third-Party Tracking

In the wake of yet another e-commerce data breach in which the names and email addresses of millions of online shoppers and credit card users have been accessed illegally, researchers in the US suggest that privacy discussions, and ultimately legislation must urgently focus on the expanding roles of third-parties handling pervasive online customer profiles. Nancy King of the College of […]

[How to] Be Confident Storing Information in the Cloud

Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only increasing as organizations try to manage the data growth by moving it to the cloud. It’s clear that storage administrators must regain control of information to reduce costs and recovery times while complying with regulatory compliance standards, including […]

Tracking Protection Lists: A privacy enhancing technology that complements Do Not Track

Yesterday, Microsoft released version 9 of Internet Explorer, which includes two significant new privacy features: Tracking Protection Lists (TPLs) and a Do Not Track (DNT) header that allows users to request that websites not track them. We’ve written about the virtues of the Do Not Track header previously. In this post we’ll look more closely at privacy blacklists, a category […]

Identifying ‘Anonymous’ Email Authors

A team of researchers from Concordia University has developed an effective new technique to determine the authorship of anonymous emails. Tests showed their method has a high level of accuracy — and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law. Findings on the new technique are published in the journal Digital Investigation. […]

Who’s watching you?

Who’s watching you?

Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and becoming a victim of Internet fraud. Coinciding with global Data Privacy Day today, new survey research by Opera Software in the United States, Japan and Russia pulls back the curtain and looks under the bed at what […]

Mozilla Leads the Way on Do Not Track

Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new privacy extension today, but we believe that Mozilla is now taking a clear lead and building a practical way forward for people who want privacy when they browse the web. Why We Need Do Not Track […]

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks […]

The Internet Society on the Wikileaks issue

Recently, we have witnessed the effective disappearance from the Internet of a website made infamous through international press coverage and political intrigue. The Internet Society is founded upon key principles of free expression and non discrimination that are essential to preserve the openness and utility of the Internet. We believe that this incident dramatically illustrates that those principles are currently […]

ISPs Free To Continue Deleting Evidence Against File-Sharers

Sweden’s highest court has rejected an application by an anti-piracy group which would force an ISP to hand over the identity of a file-sharing site operator. Antipiratbyrån wants TeliaSonera to reveal who is behind the SweTorrents BitTorrent tracker but the ISP has refused and taken its case all the way to the Supreme Court. That Court has now decided that […]

E-Book Buyer’s Guide to E-Book Privacy

With the 2010 holidays upon us, it’s time to update EFF’s E-Book Buyer’s Guide to E-Book Privacy, which summarizes and comments on the privacy-related policies of several e-readers. What’s new. We’ve added in the iPad and also added in the software used by many libraries and devices for e-book access, made by Adobe called Adobe Content Server. Adobe doesn’t keep […]

Profiling Based on Mobile, Online Behavior: A Privacy Issue

It’s illegal for businesses and law enforcement to profile a person based on their race, gender, or ethnicity, yet millions of Americans are being profiled every day based on their online consumer behavior and demographics. Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated. The result, according to two recent articles in the journal […]