Bookmark
Får ikke lenger overvåke norske fildelere - kultur - Dagbladet.no
www.dagbladet.no/2009/06/22/kultur/fildeling/espen_tondel/6846241/, posted 2009 by peter in copyright msm p2p privacy toread
Siden 2006 har advokatfirmaet Simonsen hatt midlertidig konsesjon fra Datatilsynet for å overvåke fildeling på internett, og å samle IP-adressen til folk som bedriver denne aktiviteten.
Men nå er det stopp på denne overvåkningen.
Bookmark
Bozeman City job requirement raises privacy concerns - Montana's News Station - Fair. Accurate. To the Point. -
montanasnewsstation.com/Global/story.asp?S=10551414&nav=menu227_3, posted 2009 by peter in fascism msm privacy usa
"Please list any and all, current personal or business websites, web pages or memberships on any Internet-based chat rooms, social clubs or forums, to include, but not limited to: Facebook, Google, Yahoo, YouTube.com, MySpace, etc.," the City form states. There are then three lines where applicants can list the Web sites, their user names and log-in information and their passwords. [...] "So, we have positions ranging from fire and police, which require people of high integrity for those positions, all the way down to the lifeguards and the folks that work in city hall here. So we do those types of investigations to make sure the people that we hire have the highest moral character and are a good fit for the City," Sullivan said.
Bookmark
Researchers Build Anonymous, Browser-Based 'Darknet' - DarkReading
www.darkreading.com/security/encryption/showArticle.jhtml?articleID=217801293, posted 2009 by peter in p2p privacy security toread
Darknets, themselves, are nothing new; networks like Tor, FreeNet, and Gnutella are well-established. The HP researchers say Veiled is the same idea, only much simpler: It doesn't require any software to participate, just an HTML 5-based browser. "We've implemented a simple, new darknet in the browser," Wood says. "There are no supporting [software] programs."
Bookmark
BBC NEWS | Technology | China's computers at hacking risk
news.bbc.co.uk/2/hi/technology/8094026.stm, posted 2009 by peter in fascism msm privacy security
Every PC in China could be at risk of being taken over by malicious hackers because of flaws in compulsory government software.
Bookmark
TOSBack | The Terms-Of-Service Tracker
www.tosback.org/timeline.php, posted 2009 by peter in privacy security
Terms-Of-Service and other website policies form the foundation of your relationship with social networking sites, online businesses, and other Internet communities. But most people become aware of these terms only when there's a problem. TOSBack was created to help you monitor the policies for the websites you use everyday, and show how they change over time.
The Current State of Web Privacy, Data Collection, and Information Sharing
Bookmark
Security Fix - The Scrap Value of a Hacked PC
voices.washingtonpost.com/securityfix/2009/05/the_scrap_value_of_a_hacked_pc.html, posted 2009 by peter in msm privacy security spam windows
Computer users often dismiss Internet security best practices because they find them inconvenient, or because they think the rules don't apply to them. Many cling to the misguided belief that because they don't bank or shop online, that bad guys won't target them. The next time you hear this claim, please refer the misguided person to this blog post, which attempts to examine some of the more common -- yet often overlooked -- ways that cyber crooks can put your PC to criminal use.
Bookmark
Fake web traffic can hide secret chat - tech - 26 May 2009 - New Scientist
www.newscientist.com/article/mg20227096.200-fake-web-traffic-can-hide-secret-chat.html, posted 2009 by peter in communication messaging privacy science security
Their system, dubbed retransmission steganography (RSTEG), relies on sender and receiver using software that deliberately asks for retransmission even when email data packets are received successfully. "The receiver intentionally signals that a loss has occurred. The sender then retransmits the packet but with some secret data inserted in it," he says in a preliminary research paper (www.arxiv.org/abs/0905.0363). So the message is hidden among the teeming network traffic.
Bookmark
Software Improves P2P Privacy By Hiding In The Crowd
www.mccormick.northwestern.edu/news/articles/492, posted 2009 by peter in communication p2p privacy science
The team of researchers [...] studied connection patterns in the BitTorrent file-sharing network — one of the largest and most popular P2P systems today. They found that over the course of weeks, groups of users formed communities where each member consistently connected with other community members more than with users outside the community. [...] Given the impact of this threat, the researchers developed a technique that prevents accurate classification by intelligently hiding user-intended downloading behavior in a cloud of random downloading.
Bookmark
Office of the Privacy Commisioner - Deep Packet Inspection
dpi.priv.gc.ca/, posted 2009 by peter in communication privacy reference security toread
DPI technology raises privacy concerns because it can involve the inspection of information sent from one end user to another.
|< First < Previous 111–120 (151) Next > Last >|