background preloader

Defenders

Facebook Twitter

Privacy International. Future of Privacy Forum. Jules Polonetsky (JulesPolonetsky) Center for Democracy & Technology | Keeping the Internet Open, I. CenDemTech. CenDemTech @ Ustream.TV - {ABOUT}. Free .TV shows, LIVE Video Ch. Chaîne de CenDemTech. Information Security: Covering today's security topics. PrivacyCamp. Shaun Dakin (PrivacyCampDC) Electronic Frontier Foundation | Defending Freedom in the Digita. EFF (EFF) John Gilmore (activist) An outspoken civil libertarian, Gilmore has sued the FAA, Department of Justice, and others. He unsuccessfully challenged the constitutionality of secret law regarding travel security policies in Gilmore v. Gonzales.[2][3] Gilmore is also a philanthropist, and has given financial support to, among others, Students for Sensible Drug Policy, Marijuana Policy Project, Erowid, MAPS, and various organizations seeking to end the war on drugs.

As the fifth employee of Sun Microsystems and founder of Cygnus Support, he accumulated sufficient wealth to take an early retirement and pursue other interests. Gilmore is co-author with Bill Croft of the 1985 Bootstrap Protocol (RFC 951), which evolved into DHCP, the primary way to obtain an IP address upon joining an Ethernet or wireless network. Gilmore has received the Free Software Foundation's Advancement of Free Software 2009 award.[4] He owns the domain toad.com which is one of the 100 oldest active .com domains. John Naughton on WikiLeaks | Technology | The Observer.

The Gilmore aphorism about censorship first saw the light of day in 1993 – in a Time article about the internet – and since then has taken on a life of its own as a consoling mantra about the libertarian potential of the network. "In its original form," Gilmore explains, "it meant that the Usenet software (which moves messages around in discussion newsgroups) was resistant to censorship because, if a node drops certain messages because it doesn't like their subject, the messages find their way past that node anyway by some other route.

" But, he continues, "The meaning of the phrase has grown through the years. Internet users have proven it time after time, by personally and publicly replicating information that is threatened with destruction or censorship. " The aphorism came up a lot last week following publication by the Guardian, the New York Times and Der Spiegel of extensive reports based on the stash of classified US military reports published on the WikiLeaks website.

Schneier on Security. Security theater. Security theater is the practice of investing in countermeasures intended to provide the feeling of improved security while doing little or nothing to actually achieve it.[1] Some experts such as Edward Felten have described the airport security repercussions due to the September 11 attacks as security theater.[2] Disadvantages[edit] Security theater has real monetary costs but by definition provides no security benefits, or the benefits are so minimal as to not be worth the cost.[3] Security theater typically involves restricting or modifying aspects of people's behavior or surroundings in very visible and highly specific ways,[3] – that could involve potential restrictions of personal liberty and privacy, ranging from negligible (confiscating water bottles where bottled water can later be purchased) to significant (prolonged screening of individuals to the point of harassment).

The direct costs of security theater may be lower than that of more elaborate security measures. Enough Security Theater, Already. Bruce Schneier is not the first to suggest that the security mania at airports is not ‘real’ but a form of show, but he’s one of the most credible security analysts, today. Our security systems don’t accomplish what they are theoretically supposed to do, and at huge expense: it’s theater, intended to cause an emotional response of feeling safe, without actually doing much: It’s not security theater we need, it’s direct appeals to our feelings. The best way to help people feel secure is by acting secure around them. Instead of reacting to terrorism with fear, we — and our leaders — need to react with indomitability, the kind of strength shown by President Franklin D.

Roosevelt and Prime Minister Winston Churchill during World War II.By not overreacting, by not responding to movie-plot threats, and by not becoming defensive, we demonstrate the resilience of our society, in our laws, our culture, our freedoms. Daniel Solove. Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law School. He is a Senior Policy Advisor at Hogan Lovells. He is also the founder of TeachPrivacy, a company that provides privacy and data security training programs to businesses, schools, healthcare institutions, and other organizations. Professor Solove is co-reporter of the American Law Institute's Restatement of Information Privacy Principles. An internationally known expert in privacy law, Solove has been interviewed and quoted by the media in several hundred articles and broadcasts, including the New York Times, Washington Post, Wall Street Journal, USA Today, Chicago Tribune, the Associated Press, ABC, CBS, NBC, CNN, and NPR.

He has written 9 books and more than 50 law review articles in the Harvard Law Review, Yale Law Journal, Stanford Law Review, Columbia Law Review, NYU Law Review, Michigan Law Review, U. His book, The Future of Reputation, won the 2007 McGannon Award. Daniel J. Solove (DanielSolove) Privacyint. Police State UK. PoliceStateUK.

EPIC.org Electronic PrivacyInformationCenter. Privacy140 (privacy140) Richard Stallman's Personal Page. Center for Media and Communication Studies (CMCS) | CMCS. STATEWATCH - monitoring the state and civil liberties in Europe. Big Brother AwardsInter national. Privacy Rights Clearinghouse | Empowering Consumers. Protecting Privacy. American Civil Liberties Union. Privacy First - Welkom bij Privacy First. Privacy First (privacyfirst) Big Brother Watch (bbw1984)

BROAD - Broadening the Range Of Awareness in Data protection. Privacymatters. Privacy and Human Rights. The Public Voice. The Public Voice (thepublicvoice) Bits of Freedom. Bits of Freedom (bitsoffreedom) EDRI | Digital Civil Rights in Europe. PogoWasRight.org - Privacy News. ACLUNC dotRights | DotRights Campaign (dotRights) Ultimate Privacy Total Online PRivacy. ICO Data Protection and FreedomofInformation. ICOnews. Personal information online - code of practice. Bring your own device (BYOD) This guidance explores what you need to consider if permitting the use of personal devices to process personal data for which you are responsible.

Cloud computing Cloud computing offers the promise of a cost effective means to access a range of computing services. This guidance explains how the Data Protection Act applies to processing of personal data in cloud computing services. Mobile apps Mobile apps have particular features that make privacy a pressing concern. IT disposal We've produced guidance to help organisations securely dispose of their IT equipment. Personal information online The personal information online code of practice explains how the Data Protection Act applies to the collection and use of personal data online. Social networking (pdf) We explain what you need to consider when you run, contribute to, or download personal data from online forums such as social networking sites, message boards, or blogs. Security.NL. Ik heb toch niks te verbergen. VRIJBIT.NL - home. Boxcrack.net - Home. Boxcrack. CPB College Bescherming Persoonsgegev. Viviane Reding - Commissioner for Information Society and Media.

The Justice portfolio is new – it was only created with the start of this European Commission, under the leadership of President José Manuel Barroso, in 2010. I am thus the first EU Justice Commissioner who is also responsible for citizenship and fundamental rights. My department, the Directorate General for Justice, deals with a wide range of areas such as civil and commercial law, consumer protection legislation, data protection, criminal law, free movement of citizens and equality legislation. Read more Human dignity, freedom, democracy, equality, the rule of law and respect for human rights must be more than concepts. Fundamental rights are the foundation on which the European Union is built: they must be continuously respected and protected. This commitment is laid down in the European Union's Charter of Fundamental Rights – Europe's "Bill of Rights" and the most modern codification of fundamental rights recognised in national constitutions. Read more. EC blik op online privacy.

Of het nu gaat om rfid-chips, of behavioral targeting, Europeanen moeten het recht hebben om zelf te bepalen hoe hun persoonsgegevens gebruikt worden. De Europese Commissie staat klaar om op verschillende fronten actie te ondernemen om dit recht te verdedigen, omdat het met nieuwe technologieën steeds makkelijker wordt persoonsgegevens te misbruiken. Dat laat Viviane Reding, Europees Commissaris voor Informatiemaatschappij en Media, weten in een videoboodschap. Rfid Rfid-chips kunnen hun economische potentieel alleen waarmaken als zij door de consument en niet op de consument worden toegepast.

Volgens de commissaris moet de consument weten waar de chips voor worden gebruikt en hoe ze deze kunnen verwijderen of uit kunnen zetten. In onder meer OV-chipkaarten en paspoorten zijn rfid-chips verwerkt. De Europese wet is op dit gebied ook ‘glashelder’, meent Reding. Ondanks de duidelijke wetgeving denkt de commisairs dat een waarschuwing op dit gebied wel nodig is. Behavioral targeting.