To those of us who were accustomed to thinking of the internet as a glorious, distributed, anarchic, many-to-many communication network in which anyone could become a global publisher, corporate gatekeepers had lost their power and peer-to-peer sharing was becoming the liberating norm, Labovitz’s brusque summary comes as a rude shock. Why? Because what he was really saying is that the internet is well on its way to being captured by giant corporations – just as the Columbia law professor Tim Wu speculated it might be in The Master Switch, his magisterial history of 20th-century communications technologies.

Bookmark

Facy

huydx.com/facy/, posted 5 Oct by peter in communication free ruby shell social software

Facy is a terminal client for facebook, which support streaming-like feature. Only supports Ruby 1.9 and later. To install facy, we need ruby pre-installed, please refer to https://www.ruby-lang.org/en/installation/ to know how to install ruby. I recommend rvm to control the version of installed ruby.

Mail-in-a-Box turns a fresh cloud computer into a working mail server.

You get contact synchronization, spam filtering, and so on. On your phone, you can use apps like K-9 Mail and CardDAV-Sync free beta to sync your email and contacts between your phone and your box. And in your browser:

Usenet has been around for decades, but it's still a great resource, one that offers speed and reliability that bittorrent can't match. Putting aside the whole "first rule of Usenet," this week we're looking at five of the best Usenet providers, based on your nominations.

A smart and nice Twitter client on terminal wrote by Python.

When Edward Snowden exposed the scale and depth of the National Security Agency's surveillance programs, his findings led to another disheartening revelation: that our Internet has become too centralized. Webmail services like Yahoo and Google and social networks like Facebook and Twitter are convenient and efficient platforms, as well as easy to use, but they collect massive amounts of user data that can facilitate intelligence spying and other types of snooping. Meanwhile, securer methods of communication are often cumbersome and overly technical for the average user who would like to send an email without having to download and set up various software. Yet after Snowden’s leaks, an increasing demand for securer alternatives has led to the development of anti-surveillance products with an eye towards being user friendly.

That is certainly true for Miguel Freitas, a research engineer based in Rio de Janeiro, Brazil, who decided to create a decentralized alternative to Twitter to counter NSA spying and protect against shutdowns of social media sites; but it would also be “something that my grandmother could use,” Freitas tells techPresident.

ProxFree is a simple and completely free web proxy service. Perfect for those looking to bypass censorship restrictions and/or looking to browse the internet privately, anonymously and securely.

LEAP's multi-year plan to secure everyday communication breaks down into discrete services, to be rolled out one at a time. When we introduce a new service, integrated support will be added to both the user-facing LEAP Client and the server-side LEAP Platform for Service Providers. All communication content will be client-side encrypted, and as much of the metadata as possible. Most importantly, all LEAP services will be based on our plan for federated secure identity and unmappable routing.

The tweet.IM service sits between your Jabber or Google@Talk instant messaging account and your Twitter account and passes messages to and from, in both directions. As a result, you can create Twitter messages in your instant messaging application and send them direct to Twitter, without having to enter your Twitter account. You can also elect to receive tweets from users that you follow, directly in your instant messenger.

Without the support of two major browsers and major websites most internet users are missing out on the security benefits of perfect forward secrecy. Without the protection of PFS, if an organisation were ever compelled — legally or otherwise — to turn over RSA private keys, all past communication over SSL is at risk. Perfect forward secrecy is no panacea, however; whilst it makes wholesale decryption of past SSL connections difficult, it does not protect against targeted attack on individual sessions. Whether or not PFS is used, SSL remains an important tool for web sites to use to secure data transmission across the internet to protect against (perhaps all but the most well-equipped) eavesdroppers.

1–10 (59)   Next >   Last >|