2016 Jan 27, 10:28 2014 May 21, 2:11
law legal encryption technical
Guardian - Secrets, lies and Snowden’s email: why I was forced to shut down Lavabit
"For the first time, the founder of an encrypted email startup that was supposed to insure privacy for all reveals how the FBI and the US legal system made sure we don’t have the right to much
privacy in the first place"
2013 Jun 21, 10:43
technical legal tor nsa eff spying security privacy
What It All Means: All Your Communications are Belong to U.S. In sum, if you use encryption they’ll keep your data forever. If you use Tor, they’ll keep your data for at least five years. If an
American talks with someone outside the US, they’ll keep your data for five years. If you’re talking to your attorney, you don’t have any sense of privacy. And the NSA can hand over you
information to the FBI for evidence of any crime, not just terrorism. All without a warrant or even a specific FISA order.
Not sure if this is saying all Tor data is collected or saying if someone uses Tor then start collecting that someone’s communication.
2012 Nov 11, 1:26
http law legal technical 301 cookie privacy
Moral: laws should cover behavior not specific technologies. The implementation can change, laws shouldn’t take such dependencies.
2012 Mar 9, 3:30
technical facebook stupid internet privacy
show up with unfortunate results in web searches. Information is too easily copyable and archive-able to make removing these results a viable option, so clearly the solution is to create more
Create fake profiles on Facebook using your name but with a different photo, different date of birth, and different hometown. Create enough doppelgangers to add noise to the search results for
your name. And have them share embarrassing stories on their blogs. The goal is to ensure that the din of your alternates drowns out anything embarrassing showing up for you.
Although it will look suspicious if you're the only name on Google with such chaff. So clearly you must also do this for your friends and family. Really you'll be doing them a favor.
2012 Feb 17, 12:17
ad target pregnancy humor privacy
What Target discovered fairly quickly is that it creeped people out that the company knew about their pregnancies in advance.
“If we send someone a catalog and say, ‘Congratulations on your first child!’ and they’ve never told us they’re pregnant, that’s going to make some people uncomfortable,” Pole told me. “We are
very conservative about compliance with all privacy laws. But even if you’re following the law, you can do things where people get queasy.”
2011 Dec 10, 6:49
privacy torrent technical
Public site that tracks who (by IP address) downloads what and lets anyone view this.
2011 Nov 30, 4:22
technical cell-phone privacy security
“TechCrunch and others are reporting that a program called “Carrier IQ”
that comes pre-installed on Sprint phones has some pretty amazing spyware capabilities, right down to keylogging everything you do on the phone.”
2011 Jun 20, 2:09
"Why did the hackers at Lulz Security ("LulzSec") invade Sony Pictures websites, take down cia.gov, and release 60,000+ e-mail addresses and passwords? For the lulz, of course—but what might look
lulzy to one person could certainly enrage another. In honor of its 1,000th tweet, the witty wankers of LulzSec released a manifesto of sorts, defending their actions to the angry Internets."internet security privacy hack technical
2011 Apr 27, 2:23
"The gradual disappearance of open wireless networks is a tragedy of the commons, with a confusing twist of privacy and security debate. This essay explains why the progressive locking of wireless
networks is harmful — for convenience, for privacy and for efficient use of the electromagnetic spectrum."law eff wireless internet technical privacy security
2011 Apr 8, 2:07
"On average their method gets to within 690 metres of the target and can be as close as 100 metres – good enough to identify the target computer's location to within a few streets.", "When a
landmark machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this
time difference narrows the search down further."technical internet privacy geo geolocation security
2011 Mar 10, 6:14
Polar bears destroy hiddern cameras (filming them for Science!) It is a well known fact that polar bears are very protective of their rights to privacy.
video science nature animals bbc humor
2010 Jun 25, 2:58
"... all you need to do is specify the /W switch and the file or folder you want to overwrite—after you have already deleted it. cipher /W:C:\Path\To\Folder"technical cmd privacy security windows cipher delete
2010 May 27, 8:52
Time to stock up on prepaid anonymous cell phones before its too late! Or just use the call encryption Android application...privacy security cellphone anonymous politics government technical
2010 May 24, 6:26
"What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors," by Jon Howell and Stuart Schechter.
"We introduce the sensor-access widget, a graphical user interface element that resides within an application's display. The widget provides an animated representation of the personal data being
collected by its corresponding sensor, calling attention to the application's attempt to collect the data."
Not sure how well that scales...technical security privacy research
2010 May 23, 4:32
"The ability to detect visitors' browsing history requires just a few lines of code. Armed with a list of websites to check for, a malicious webmaster can scan over 25 thousand links per second
(1.5 million links per minute) in almost every recent browser."technical privacy security web browser
2010 May 6, 7:25
2010 Apr 26, 3:03
"Find out what personal data Facebook publishes about people by entering their Facebook username here: zesty.ca/facebook."facebook privacy technical