A list of #Truecrypt alternatives http://arstechnica.com/civis/viewtopic.php?t=1245367 Shockingly, key program defunct after 10yrs. Now onto #FileVault , BitLocker & #PGP
Posts Tagged ‘privacy’
Compiling a list of Truecrypt alternatives – Ars Technica OpenForum
November 16, 2014Computer Hope computer system information script v1.9
November 15, 2014Where can I see a webpage that shows information about me?
See a system information script for an example of the type of information a website can get about your computer.
The Dark Market for Personal Data – NYTimes.com
October 26, 2014The Dark Market for Personal Data
http://www.nytimes.com/2014/10/17/opinion/the-dark-market-for-personal-data.html We’re all “judged by a #bigdata Star Chamber of unaccountable decision makers”
QT:{{”
We need regulation to help consumers recognize the perils of the new information landscape without being overwhelmed with data. The right to be notified about the use of one’s data and the right to challenge and correct errors is fundamental. Without these protections, we’ll continue to be judged by a big-data Star Chamber of unaccountable decision makers using questionable sources.
“}}
Google and the Right to Be Forgotten
October 24, 2014The Solace of Oblivion http://www.newyorker.com/magazine/2014/09/29/solace-oblivion In Europe, the right to be forgotten trumps #Google. In the US copyright is effective for this
QT:{{
In the effort to escape unwanted attention on the Internet,
individuals and companies have had success with one weapon: copyright
law. It is unlawful to post photographs or other copyrighted material
without the permission of the copyright holder. “I needed to get
ownership of the photos,” Bremer, the Catsouras family’s lawyer, told
me. So he began a lengthy negotiation with the California Highway
Patrol to persuade it to surrender copyright on the photographs. In
the end, though, the C.H.P. would not make the deal.
Other victims of viral Internet trauma have fared better with the
copyright approach. In August, racy private photographs of Jennifer
Lawrence, Kate Upton, and other celebrities were leaked to several Web
sites. (The source of the leaks has not been identified.) Google has
long had a system in place to block copyrighted material from turning
up in its searches. Motion-picture companies, among others, regularly
complain about copyright infringement on YouTube, which Google owns,
and Google has a process for identifying and removing these links.
Several of the leaked photographs were selfies, so the women
themselves owned the copyrights; friends had taken the other pictures.
Lawyers for one of the women established copyrights for all the
photographs they could, and then went to sites that had posted the
pictures, and to Google, and insisted that the material be removed.
Google complied, as did many of the sites, and now the photographs are
difficult to find on the Internet, though they have not disappeared.
“For the most part, the world goes through search engines,” one lawyer
involved in the effort to limit the distribution of the photographs
told me. “Now it’s like a tree falling in the forest. There may be
links out there, but if you can’t find them through a search engine
they might as well not exist.”
…
The job had two parts. The first was technical—that is, creating a
software infrastructure so that links could be removed. This was not
especially difficult, since Google could apply the system already in
place for copyrighted and trademarked works. Similarly, Google had
already blocked links that might have led to certain dangerous or
unlawful activity, like malware or child pornography.
}}
They’re Watching You at Work
September 21, 2014They’re Watching You at Work http://www.theatlantic.com/magazine/archive/2013/12/theyre-watching-you-at-work/354681 Will HR analytics be a corporate big brother or personal coach? #Datamining & #Privacy
An Inside Look at Anonymous, the Radical Hacking Collective
September 19, 2014An Inside Look at Anonymous, the Radical #Hacking Collective http://www.newyorker.com/magazine/2014/09/08/masked-avengers Doxing & DDoSing, aggression for a new century
What You Can Do About Facebook Tracking – WSJ
September 1, 2014For sale: Systems that can secretly track where cellphone users go around the globe
August 30, 2014For sale: Systems that can secretly track where #cellphone users go
http://www.washingtonpost.com/business/technology/for-sale-systems-that-can-secretly-track-where-cellphone-users-go-around-the-globe/2014/08/24/f0700e8a-f003-11e3-bf76-447a5df6411f_story.html Holes in SS7 allow location queries by foreigners
With This App and Gadget, Google Glass Can Read Your Mind
July 12, 2014With This… Gadget, #GoogleGlass Can Read Your Mind
http://mashable.com/2014/07/10/google-glass-mind-reader EEG biosensor tells glass to take pics; neat but privacy worries
Wearable Computers Will Transform Language
July 7, 2014Your Body, Broadcasting Live. Wearable #sensors could spill… innermost secrets http://quibb.com/links/wearable-computers-will-transform-language/view Will we be tweeting our heart rate?
QT:{{”
And if you fret about the fate of data being gathered by the smartphone in your pocket, you’ll shudder at the thought of what could leak from hardware in your clothes or on your skin. Wearables will likely record not just what you do and whom you talk to but also the states of your mind and body, including your heart rate, blood pressure, and brain activity—information you probably don’t want shared too widely. What if your boss could measure how focused you are at work? What if your spouse could know whom else you found
attractive?
Without reliable security, clear privacy laws, and simple user controls, the wearables generations might have few secrets left to keep. People might give up data unwittingly, lured by cheap deals and ignorant of the fine print of privacy policies, says Jason Hong, a privacy and security expert at Carnegie Mellon. Smartphone users, he points out, are often surprised that many free apps keep close tabs on them. He fingers a few notorious snoops: the game Angry Birds, Bible App, and Brightest Flashlight Free. “People don’t expect these apps to collect location data,” he says, but they do. “They send it out to advertisers.”
Records from wearables such as brain sensors could also be used in criminal investigations, says Nita Farahany, who studies the legal implications of emerging technologies at Duke University, in Durham, N.C. Under U.S. law, she explains, “you can’t be forced to testify against yourself, but that doesn’t mean your body can’t be used against you.” If prosecutors can use fingerprints and DNA to get a conviction, what’s to stop them from using scans of a suspect’s thoughts or emotional reactions?
“}}