Bookmark
Opinion: The Internet is a surveillance state - CNN.com
edition.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html, posted 2013 by peter in opinion privacy social
So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites. And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant.
Bookmark
What Your Likes On Facebook Betray About You | Popular Science
www.popsci.com/technology/article/2013-03/what-your-facebook-likes-betray-about-you, posted 2013 by peter in msm privacy social statistics
That a Facebook fans of "Barack Obama" might be Democrats or people who liked the "No H8" campaign were more likely to be gay seems obvious, but other correlations were far less intuitive. "Curly Fries" and "Thunderstorms" seem to be surprisingly linked with a high IQ, while "That Spider is More Scared Than U" happens to draw a non-smoking fan base. Predictors of male heterosexuality include "Being Confused After Waking Up From Naps." An appreciation of "Hello Kitty" tended to be associated with people who were more open and less emotionally stable. [Sounds like overtraining to me, but surely they wouldn't make such a fundamental mistake? Right?]
Bookmark
EUobserver.com / Justice & Home Affairs / US free to grab EU data on American clouds
euobserver.com/justice/118857, posted 2013 by peter in eu fascism hosting privacy usa
The section in the so-called Foreign Intelligence Amendments Act (FISAAA) grants the US government sweeping powers to collect foreign intelligence information stored in US Cloud computing providers like Amazon or Google.
The article specifically states the US Attorney General and the Director of National Intelligence may authorise jointly, for a period of up to one year from the effective date of the authorisation, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.
Bookmark
tahoe-lafs
https://tahoe-lafs.org/trac/tahoe-lafs, posted 2012 by peter in cloudcomputing distributed free opensource privacy security software storage
Tahoe-LAFS is a Free and Open cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire filesystem continues to function correctly, including preservation of your privacy and security.
A one-page summary explains the unique properties of this system.
Bookmark
Researchers Develop Surveillance System that can Watch & Predict - ParityNews.com: ...Because Technology Matters
paritynews.com/science/item/455-researchers-develop-surveillance-system-that-can-watch--predict, posted 2012 by peter in ai fascism msm privacy science security terrorism
Carnegie Mellon university researchers have developed a surveillance system that can not only recognize human activities but can also predict what might happen next.
Researchers, through the Army-funded research dubbed Mind's Eye, have created intelligent software that recognizes human activities in video and can predict what might just happen next; sounding an alarm if it detects anomalous behavior.
Bookmark
Canada-EU Trade Agreement Replicates ACTA’s Notorious Copyright Provisions | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2012/10/ceta-replicates-acta, posted 2012 by peter in copyright eu politics privacy toread transparency
A comparison of the leaked draft Canada-EU agreement shows the treaty includes a number of the same controversial provisions, specifically concerning criminal enforcement, private enforcement by Internet Service Providers (ISPs), and harsh damages. These provisions are particularly problematic, and were the key reasons why the European Parliament rejected ACTA. However, given the lack of transparency associated with the CETA discussions (both Canada and EU insist that the draft text remain secret), the concerns that CETA may replicate ACTA appear to be very real despite denials from some members of the European Commission.
Bookmark
Whonix: Anonymous operating system
https://www.net-security.org/secworld.php?id=13757, posted 2012 by peter in free linux opensource privacy virtualization
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.
Whonix consists of two machines, which are connected through an isolated network. One machine acts as the client or Whonix-Workstation, the other as a proxy or Whonix-Gateway, which will route all of the Whonix-Workstation's traffic through Tor. This setup can be implemented either through virtualization and/or Physical Isolation.
Bookmark
Random patdowns begin at 30 int'l airports in Japan ‹ Japan Today: Japan News and Discussion
www.japantoday.com/category/national/view/random-patdowns-begin-at-30-intl-airports-in-japan, posted 2012 by peter in japan privacy security terrorism travel
Random patdowns began at 30 international airports across Japan this week.
According to the Ministry of Land, Infrastructure, Transport and Tourism, the random body searches are being conducted to check for chemical and plastic explosive materials that are not picked up by metal detectors, TBS reported.
Oh good, Japan joins in the fun of groping passengers in the name of security. I feel safer already.
Bookmark
California passes law to stop firms from snooping on staff social networking- The Inquirer
www.theinquirer.net/inquirer/news/2213099/california-passes-law-to-stop-firms-from-snooping-on-staff-social-networking?utm_campaign=INQ&utm_source=Twitter&utm_medium=Twitterfeed, posted 2012 by peter in politics privacy social usa
The bills will prohibit universities and employers from making their applicants hand over their email or social media account passwords, and in a statement [Governor Jerry] Brown said that California is leading where others should be following.
Personally, I'm amazed that any employer anywhere could possibly think it's reasonable to demand that employees fork over their passwords. What's next, employers wanting copies of house keys so they can have a look in employees' homes?
Bookmark
[North Korean] IDs to Include Data Chips
www.rfa.org/english/news/korea/ids-08212012105201.html, posted 2012 by peter in fascism korea privacy
According to one source, who spoke to RFA on condition of anonymity, the current plastic IDs will be replaced with cards containing circuit chips which store data about the cardholder, including address, family background, and record of travel.
“North Korean people will be made to bring the new ID cards when they travel so security officers can know everything about their trip, such as the person’s destination, when he or she has traveled, and how many times they have traveled,” the source said.
And remember, when North Korea does this, it's oppression. When Western countries do it, it's for your protection and perfectly harmless. You have nothing to hide, do you?
|< First < Previous 41–50 (151) Next > Last >|