2010 Apr 21, 6:49"OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end-user). It also provides a process for end-users to authorize
third-party access to their server resources without sharing their credentials (typically, a username and password pair), using user-agent redirections."
oauth authorization security privacy internet web rfc standard technical 2010 Apr 21, 6:47"After years of secrecy (and the occasional leak), a draft of the Anti-Counterfeiting Trade Agreement (ACTA) treaty has finally been released by negotiators. We've delved deep into the treaty,
highlighting its numerous problems. Indeed, there's a lot not to like about the treaty: Internet disconnections, anticircumvention prohibitions, and even the ability for rightsholders to get
injunctions if they can show infringement is imminent."
arstechnica acta privacy internet todo government politics piracy technical 2010 Mar 9, 5:35Comparison of US claim 'the tort of appropriation' to Google video case in Italy.
italy google privacy law legal us technical 2010 Mar 8, 1:50Paper suggests history stealing to find what popular social networking site groups a visitor to your web site belongs to and stats on how easy it is to then uniquely identify the visitor on the
popular social networking site.
security privacy social social-network paper research web browser css technical system:filetype:pdf system:media:document 2010 Mar 1, 2:24There is an amazing amount of info around about the alleged assassination Mahmoud al-Mabhouh including this Dubai hotel survielance footage.
video crime security privacy wired cctv 2010 Feb 26, 2:42Adam Barth has tons of papers on web browser security.
adam-barth security web browser privacy javascript google chrome research technical 2010 Feb 24, 9:21"Onstage at TED2010, TED curator Chris Anderson interviews Google's Sergey Brin about the company's recent statement on China."
ted video sergey-brin google china security privacy censorship technical 2010 Jan 29, 10:52Another technology stolen but then remotely using the tech to get it back story.
iphone apple gps privacy crime 2010 Jan 29, 10:28"Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies." Examines HTTP headers and browser features and reports if your
configuration is unique (mine is). Good info for anyone looking at creating an anonymous browsing plugin or service
web security privacy eff education identity surveillance cookies cookie anonymity anonymous technical 2010 Jan 26, 1:46Intro to TOR the onion router.
tor censorship privacy internet web tool tutorial technical 2010 Jan 14, 2:54Wow: "If the report's findings are correct, it suggests that the government of China has been engaged for months in a massive campaign of industrial espionage against US companies."
internet google china security politics privacy 2010 Jan 12, 9:02"We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could
operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China."
google china politics privacy censorship internet web search 2009 Dec 7, 5:15"Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web." ... "Cryptome also published lawful data-interception guides for Cox
Communications, SBC, Cingular, Nextel, GTE and other telecoms and service providers. But of all those companies, it appears to be Yahoo’s lawyers alone who have issued a DMCA takedown notice to
Cryptome demanding the document be removed."
privacy security copyright yahoo dmca internet web surveillance 2009 Dec 1, 9:40Wow: 'The fact that federal, state, and local law enforcement can obtain communications "metadata"—URLs of sites visited, e-mail message headers, numbers dialed, GPS locations, etc.—without any real
oversight or reporting requirements should be shocking, but it isn't. The courts ruled in 2005 that law enforcement doesn't need to show probable cause to obtain your physical location via the cell
phone grid. All of the aforementioned metadata can be accessed with an easy-to-obtain pen register/trap & trace order. But given the volume of requests, it's hard to imagine that the courts are
involved in all of these.'
privacy security gps phone cellphone government politics 2009 Nov 23, 11:28"Thanks to the utilization of new technology, we're now seeing large-scale success in eliminating the need for passwords while increasing the successful registration rate at websites to over 90%...In
addition, after a thorough evaluation of the security and privacy of these technologies, the same techniques are being piloted by President Obama's open identity initiative to enable citizens to sign
in more easily to government-operated websites."
identity openid google security authentication facebook password via:connolly technical 2009 Oct 20, 8:24Against Transparency - The perils of openness in government. - Lawrence Lessig - October 9, 2009
lawrence-lessig transparent government essay privacy politics 2009 Aug 17, 8:37Info on Flash cookies, US Govt websites cookie use, possible US Govt regulations on privacy/tracking users, plus a great zombie photo.
zombie flash cookie wired privacy internet web browser politics government advertising google technical 2009 May 2, 8:54Humorous Firefox bug description: "This privacy flaw has caused my fiance and I to break-up after having dated for 5 years."
firefox bug humor privacy browser web 2009 Mar 26, 2:24"Yesterday's remix challenge -- to mock the ridiculous new "anti-terrorism" posters the London police have put up that tell you to spy on your neighbors -- was a smashing success. I've collected the
25 or so that came in to date below". I enjoyed: "A bomb won't go off here because people tend to be quite nice really." "Terribly convenient, isn't it? Incriminating evidence left right out where
you'll spot it and call it in..." "A bomb won't go off here because the true likelihood of you being the victim of a terror attack is really very low, especially when compared to other causes of
death or injury."
humor politics poster paranoia security via:boingboing.comments photoshop privacy 2009 Jan 23, 1:47"When you experiment with Amazon's Mechanical Turk, it feels like magic. ... Last week, I started a new Turk experiment to answer two questions: what do these people look like, and how much does it
cost for someone to reveal their face?"
privacy research amazon mechanicalturk internet photo experiment social