background preloader

TRIER

Facebook Twitter

Games to learn coding

Cyber-sécurité. La loi renseignement expliquée à mes parents. Mes parents adorent Internet.

La loi renseignement expliquée à mes parents

Ils trouvent ça génial. Mais ils ne le comprennent pas. Du tout… Non parce qu’ils ne veulent pas le comprendre, juste parce que… ça les dépasse, de très loin. Advocacy Assembly. How-to-remain-anonymous-online.pdf. SecureDrop. The Terms-Of-Service Tracker. Terms of Service; Didn't Read. Mobile privacy. OnionShare. The Enemies of Internet - Surveillance. How Much Surveillance Can Democracy Withstand? By Richard Stallman A version of this article was first published in Wired in October 2013.

How Much Surveillance Can Democracy Withstand?

Thanks to Edward Snowden's disclosures, we know that the current level of general surveillance in society is incompatible with human rights. The repeated harassment and prosecution of dissidents, sources, and journalists in the US and elsewhere provides confirmation. We need to reduce the level of general surveillance, but how far? Where exactly is the maximum tolerable level of surveillance, which we must ensure is not exceeded? Faced with government secrecy, we the people depend on whistleblowers to tell us what the state is doing. Julian Assange : la BD, la pétition et la manif.

Cette bande dessinée a été créée par Paul Wink (@paulwinck) Pétition pour l’accord du droit d’asile à Julian Assange : Cliquez ici.

Julian Assange : la BD, la pétition et la manif

GlobaLeaks. Société de la surveillance - Epelboin. What happened when a parent fought for his kid's privacy at an all-Chromebook school / Boing Boing. Katherine W was seven when her third-grade teacher issued Chromebooks to her class.

What happened when a parent fought for his kid's privacy at an all-Chromebook school / Boing Boing

Her dad, Jeff, is a serious techie, but the school's tech choices didn't sit well with him. He was able to get Katherine an exception that let her use a more private, non-cloud computer for the year, but the next year, Katherine's school said she would have to switch to a laptop that would exfiltrate everything she did to Google's data-centers. The rules around data-collection and kids are complicated and full of loopholes. Though they seem, on the surface, to forbid Google from creating an advertising profile of kids using school-issued laptops, the reality is that kids are profiled as soon as they click outside of the Google education suite -- so when a kid watches a Youtube video, her choice is added to an advertising profile that's attached to her school ID.

That’s when EFF reached out to the district. Anatomie d'une désintoxication au Web sous surveillance. Si vous n'avez pas vécu sur une branche d'arbre les dix dernières années, vous savez probablement que le concept de vie privée est quelque peu chahuté ces derniers temps.

Anatomie d'une désintoxication au Web sous surveillance

Lorsque nous naviguons sur le Web, nous générons de l'information. Et que ce soit pour des raisons économiques, politiques ou d'autres bien moins avouables, il existes de nombreuses parties qui ont un intérêt direct à exploiter ces données. Et elles ne s'en privent pas, le plus souvent à notre insu et en dehors de tout contrôle légal.

En tant que bâtisseuses et bâtisseurs du Web, nous contribuons souvent à fragiliser la vie privée de nos utilisateurs en nous rendant complice de cette exploitation, moins souvent par malice que par ignorance, insouciance ou paresse. Ce billet est la transcription de la conférence éponyme que j'aurais dû donner aux RMLL 2015 à Beauvais. Comment vérifier que votre connexion VPN est bien étanche. Vous surfez à travers votre petit VPN et vous êtes bien content, car vous vous sentez à l'abri.

Comment vérifier que votre connexion VPN est bien étanche

Mais avez-vous pensé aux petites fuites qui peuvent survenir à tout moment ? Oui un peu comme dans la pub pour les Vania sauf que là c'est de fuite DNS qu'il s'agit. En effet, il se peut dans certaines circonstances, que votre système d'exploitation fasse passer vos requêtes DNS en clair hors du tunnel initié lors d'une connexion VPN. Et c'est problématique, car cela signifie qu'il est possible pour le résolveur DNS que vous utilisez (celui du FAI, de Google...etc.), de vous identifier et de faire le lien avec les sites que vous visitez.

Alors, comment être sûr que vous n'êtes pas sujet à cette fuite de DNS ? Edward Snowden Explains How To Reclaim Your Privacy. LAST MONTH, I met Edward Snowden in a hotel in central Moscow, just blocks away from Red Square.

Edward Snowden Explains How To Reclaim Your Privacy

It was the first time we’d met in person; he first emailed me nearly two years earlier, and we eventually created an encrypted channel to journalists Laura Poitras and Glenn Greenwald, to whom Snowden would disclose overreaching mass surveillance by the National Security Agency and its British equivalent, GCHQ. This time around, Snowden’s anonymity was gone; the world knew who he was, much of what he’d leaked, and that he’d been living in exile in Moscow, where he’s been stranded ever since the State Department canceled his passport while he was en route to Latin America. His situation was more stable, the threats against him a bit easier to predict. How the Pentagon punished NSA whistleblowers. By now, almost everyone knows what Edward Snowden did.

How the Pentagon punished NSA whistleblowers

He leaked top-secret documents revealing that the National Security Agency was spying on hundreds of millions of people across the world, collecting the phone calls and emails of virtually everyone on Earth who used a mobile phone or the internet. When this newspaper began publishing the NSA documents in June 2013, it ignited a fierce political debate that continues to this day – about government surveillance, but also about the morality, legality and civic value of whistleblowing. But if you want to know why Snowden did it, and the way he did it, you have to know the stories of two other men. The first is Thomas Drake, who blew the whistle on the very same NSA activities 10 years before Snowden did. Drake was a much higher-ranking NSA official than Snowden, and he obeyed US whistleblower laws, raising his concerns through official channels.

The supreme irony? Holistic security. Cybrary. Santa Claus confirms NSA attack on naughty or nice database. By Joe McNamee A press conference was organised this morning on behalf of Mr Santa Claus.

Santa Claus confirms NSA attack on naughty or nice database

At the conference, a spokes–elf confirmed that there had been repeated attempts to hack the “naughty or nice (NON)” database. The NON-database was thought to be used by Mr Claus to keep records of young inhabitants of planet earth, in order to set gift-giving priorities on 6, 24 and 25 December each year. Mr Claus’ spokes-elf stressed that the security of the database was not compromised in any way. He also confirmed that the IP addresses associated with the attack were traced to the US National Security Agency (NSA). Big Brother Awards. Elementor ★ Page Builder for WordPress.

Locker – Effacer téléphone si l'on tente de forcer votre code de verrouillage. Si vous êtes un agent secret ou tout simplement un citoyen concerné par sa vie privée, voici une application Android un poil dangereuse, mais intéressante.

Locker – Effacer téléphone si l'on tente de forcer votre code de verrouillage

Sans titre. Lima – Un Cloud chez soi en physique. The Social Engineering Portal. INSIDE. The 4 Layers of Energy. Photo by Rick Harrison via Flickr While we may say, and mean, that we want to make an impact with our work, or get a raise, or to be viewed as a leader in our industry, we often stall or miss big opportunities in our careers due to the “impact trap.”

The trap works like this: You work diligently in order to achieve a certain level of what you view as success, only to discover the bigger or better opportunities you could be working toward. Because you’ve already put so much work into getting where you are, you become afraid of moving toward any other potential opportunities to grow in fear of losing what you’ve worked so hard to gain. Targeted Ads Don’t Just Make You More Likely to Buy — They Can Change How You Think About Yourself. Thanks to online tracking technology, marketers no longer have to rely on assumptions about consumer behavior. Instead, they can deliver ads targeted specifically to individuals based on their behavior online. Marketers have long known that this type of personalized advertising is more effective at generating both clicks and conversions, but they have not fully understood the consumer psychology that makes these behaviorally targeted ads so effective. These ads are indeed more relevant and interesting to consumers—but that’s not the entire story.

In our research, recently published in the Journal of Consumer Research, we explored whether behaviorally targeted ads have unique psychological consequences that help make them more effective than ads that rely on traditional demographic or psychographic targeting. Youtransfer by remie. Park your worries. Online Privacy Principles Digital. NSA CLOUD - A Free Back-Up Of Your Life. Meet the Naked Protesters Fighting Surveillance. On Monday, key provisions of the Patriot Act, a controversial bill that gives the federal government vast surveillance powers, are set to expire. A group of activists have found a way to keep Congress focused on this issue: turning off its Internet.

The program is called Blackout Congress, and its objective is to make sure that until Congress ends its mass surveillance laws, staffers are unable to access the websites they need. The campaign website has a small piece of code that an owner of a website can add to its backend. Data Dealer. Take This Lollipop. Exposing the Invisible. Ononymous. Darkwire – Un web chat pour discuter anonymement. Darkwire – Un web chat pour discuter anonymement. N1 - The extensible, open source mail client. Marre de votre webmail ? Remplacez le par Rainloop !

Add-ons for Thunderbird. CenoCipher. CenoCipher is a free, open-source, easy-to-use tool for exchanging secure encrypted communications over the internet. It uses strong cryptography to convert messages and files into encrypted cipher-data, which can then be sent to the recipient via regular email or any other channel available, such as instant messaging or shared cloud storage. Runs on all versions of Windows, and also on Linux using Wine. Certified 100% Free and rated 4.5/5 by Softpedia Features at a glance Technical details.

Vuvuzela – La messagerie qui chiffre aussi les métadonnées.