background preloader

Little Sister Webs

Facebook Twitter

Personal Jurisdiction in the Internet World. Personal Jurisdiction and Related Issues Personal (or in personam) jurisdiction can be defined as the court’s power to compel a defendant to appear before it, to adjudicate claims made by or against the defendant, and to enforce any judgment entered in connection with such claims. In the absence of personal jurisdiction, a court may not exercise judicial power over a defendant. A court must dismiss a lawsuit upon discovery that personal jurisdiction does not exist.

Any judgment entered by a court that is eventually found to lack personal jurisdiction is ineffectual and need not be honored by a court in a different jurisdiction. A defense of lack of personal jurisdiction must be promptly raised since, unlike subject matter jurisdiction, personal jurisdiction can be waived. A defendant who fails to timely raise the defense is deemed to have acquiesced to the court’s jurisdiction and may not subsequently seek dismissal on jurisdictional grounds. Jurisdiction in a Traditional Setting Cal. 1. Export.gov - Safe Harbor Data Privacy Links. ITA Web Site Privacy Policy ITA Disclaimer OPA has developed guidelines for creating an effective privacy policy, establishing enforcement mechanisms, and protecting children's privacy online.

The alliance is comprised of more than 40 global corporations and associations. NAI is an association of advertising networks, data exchanges, and marketing analytics services providers engaged in "online profiling". GBDe is a worldwide, CEO-led, business initiative, established in January 1999 to assist the development of a global policy framework for the emerging online economy. The Assurance Services Executive Committee (ASEC) of the American Institute of Certified Public Accountants (AICPA) and the Assurance Services Development Board (ASDB) of the Canadian Institute of Chartered Accountants (CICA) have issued an exposure draft of a proposed Privacy Framework.

SquareTrade is the largest independent warranty provider. U.S. Econsumer.gov Links to websites outside the U.S. 31995L0046. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Official Journal L 281 , 23/11/1995 P. 0031 - 0050 of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Having regard to the Treaty establishing the European Community, and in particular Article 100a thereof, Having regard to the proposal from the Commission (1), Having regard to the opinion of the Economic and Social Committee (2), Acting in accordance with the procedure referred to in Article 189b of the Treaty (3), (4) Whereas increasingly frequent recourse is being had in the Community to the processing of personal data in the various spheres of economic and social activity; whereas the progress made in information technology is making the processing and exchange of such data considerably easier;

Name Suppression. Decentralization: Why Dumb Networks Are Better. Every device employed to bolster individual freedom must have as its chief purpose the impairment of the absoluteness of power.— Eric Hoffer In computer and communications networks, decentralization leads to faster innovation, greater openness, and lower cost. Decentralization creates the conditions for competition and diversity in the services the network provides. But how can you tell if a network is decentralized, and what makes it more likely to be decentralized? Network “intelligence” is the characteristic that differentiates centralized from decentralized networks — but in a way that is surprising and counterintuitive. Some networks are “smart.”

They offer sophisticated services that can be delivered to very simple end-user devices on the “edge” of the network. The telephone network used to be a smart network supporting dumb devices (telephones). In a smart network like that, there is no room for innovation at the edge. Did the telecommunications companies welcome this development? Open WhisperSystems >> Open WhisperSystems. Declaration on Digital Freedom: FAQs PEN International. The PEN Declaration on Digital Freedom is a concise statement of PEN’s views on free expression in the digital age that was approved by the Assembly of Delegates — representing 20,000 writers — at the PEN International Congress in Gyeongju, Korea in September 2012. The Declaration is a framework and advocacy tool to help 104 PEN Centers around the world respond to threats in digital media and promote human rights. Back to top The Declaration is grouped into four separate articles that summarize PEN’s stance on critical issues.

They cover: (1) the targeting of individuals by governments; (2) censorship; (3) surveillance and privacy; and (4) business and human rights. PEN International maintains a case list of imprisoned, threatened, and murdered writers that is regularly updated. We have compiled resources for online writers, journalists and human rights defenders who need to protect their anonymity, ensure confidential information is kept secure, or bypass censorship controls.

Access. Statement on Internet Confidentiality | Internet Architecture Board. 13 November 2014 In 1996, the IAB and IESG recognized that the growth of the Internet depended on users having confidence that the network would protect their private information. RFC 1984 documented this need. Since that time, we have seen evidence that the capabilities and activities of attackers are greater and more pervasive than previously known. The IAB now believes it is important for protocol designers, developers, and operators to make encryption the norm for Internet traffic. Encryption should be authenticated where possible, but even protocols providing confidentiality without authentication are useful in the face of pervasive surveillance as described in RFC 7258. Newly designed protocols should prefer encryption to cleartext operation. We recommend that encryption be deployed throughout the protocol stack since there is not a single place within the stack where all kinds of communication can be protected.

Explicit cookie consent. OVER the past decade Western security agencies have been remarkably successful in keeping jihadist terrorists at bay. Put it down to diligence, surveillance technology, financial resources, the manageable numbers of potential terrorists and, often, good luck. The spooks have foiled complex plots, such as the one in 2009 to bring down airliners in mid-Atlantic.

They have brought a steady stream of would-be terrorists before the courts. Occasionally, loners and misfits have succeeded in carrying out attacks, such as the bombing of the Boston marathon and the beheading of a British soldier in London, both in 2013. But until the murders in Paris last week, most people would have had Islamist terrorism low on their list of concerns.

But counter-terrorism is getting harder for three reasons. The first is a consequence of the collapse of several Arab countries, above all the unending civil war in Syria and the rise of Islamic State (IS). Liberty v security, once again. Torguide. Track Who’s Tracking You With Mozilla Collusion. LONG BEACH, Calif. — Mozilla CEO Gary Kovacs took the TED stage Tuesday morning to introduce Collusion, a Firefox browser add-on that lets you track who’s tracking you across the web for behavioral targeting purposes. Describing the medium as “an area of consumer protection that’s almost entirely naked,” Kovacs argued that the price we’re now being asked to pay for connectivenss is our privacy, and in turn, it’s “now time for us to watch the watchers.” Collusion looks to offer more transparency to users by creating a visualization of how your data is being spread to different companies as you navigate the web.

Each time it detects data being sent to a behavioral tracker, it creates a red (advertisers), grey (websites) or blue dot on the visualization and shows the links between the sites you visit and the trackers they work with. Image Credit: James Duncan Davidson, TED. Now you can legally edit your online history. Google suffered a blow to their aim of owning each last morsel of information on the internet when the EU ruled that the tech behemoth must remove any personal data held on people that is deemed "inadequate, irrelevant, or no longer relevant".

The decision means that individuals will be able to request that the search engine removes links about them which provide information that they do not want to be known – ensuring their "right to be forgotten". Google and free speech activists have reacted with outrage, claiming that this severely reduces freedom of speech, as well as allowing internet users to edit their history and restructure the digital footprint that they've left on the online world. The court's decision was made after a Spanish man requested that notice of his house being repossessed was removed from a major news website: he'd paid the debts, so why was the information relevant anymore? That news article about the time you drove into a supermarket while off your face? Muse & Geek - [LEGISLATION] Directive Européenne sur les Cookies. Depuis quelques temps, vous avez pu apercevoir sur vos divers sites web préférés un bandeau vous signalant l'utilisation des cookies et vous demandant, de manière plus ou moins tacite, votre consentement pour en déposer sur votre navigateur.

Il s'agit en fait d'une obligation légale émise par la Commission Européenne sous la directive 2002/58/EC mise à jour par la directive 2009/136/EC et entrée en vigueur le 25 Mai 2011. L'article 5(3) de cette directive stipule (page 20) que : Les États membres garantissent que le stockage d’informations, ou l’obtention de l’accès à des informations déjà stockées, dans l’équipement terminal d’un abonné ou d’un utilisateur n’est permis qu’à condition que l’abonné ou l’utilisateur ait donné son accord, après avoir reçu, dans le respect de la directive 95/46/CE, une information claire et complète, entre autres sur les finalités du traitement. Consentement, d'accord. Mais sous quelle forme ? Mais avant de faire le tour de l'Europe, qu'est-ce qu'un cookie ? NeWeb Privacy. How to camouflage. Stay Anonymous. Identifying People using Anonymous Social Networking Data.

CBPR-PoliciesRulesGuidelines. OneSwarm - Private P2P Data Sharing. The Freenet Project - /papers. Hide My Ass! Free Proxy and Privacy Tools - Surf The Web Anonymously. Five Best VPN Service Providers. Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web. Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web You've probably seen those deep-web images floating around on the Internet. Usually, it goes something like this: There is a towering iceberg and the deeper the underwater portion extends, the more “hidden” and “exotic” the content is described to be. Sometimes these images are accurate to a point, but most are just making things up. So what exactly is 'deep web' then? Are there really hidden secrets and treasure buried under some cloak and dagger type conspiracy?

Well, in short, the answer depends on your idea of treasure and conspiracy. In this series of articles, I am going to break down the idea of a deep web, what is it, how it got there, and most importantly, how we can use it for our security—maybe even for lulz. Anonymity and Darknets The idea is to have enough masking, while maintaining a level of usefulness. If you need to escape your school's firewall, a simple HTTP proxy may work for this. Why Google? Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers. Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers In the first part of this series, we learned about darknets, as well as how they came about.

But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical address and a search warrant along with it. Enter Tor and Onion Routing Simple traffic analysis and deep packet inspection can give up what you are sending, where you are sending it, where it is coming from and who it is going to. Tor works on the idea of onion routing. The figure below illustrates how each layer of the "test" packet is peeled away one at a time on its way to the web server. Why Should I Use It? Tl;dr $ .

Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services. Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. In the last article, we spent some time going over the concepts of onion routing and how it can be useful to you.

Tor Hidden Services A Tor hidden service is simply a web server that runs locally and only takes requests from inside the Tor network. Due to the nature of hidden services being anonymous to a degree, the content can be extreme. Setting Up Your Own Hidden Service If you have gotten this far in my series, you are probably interested in setting up your own service. Step 1 Get the Tor Client Step 2 Set Up Your Web Server $ sudo . Tip That's it! Now restart Tor. Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet. Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P.

For a web browsing proxy and hidden services host, Tor gets the job done well. But if you are looking to expand your options for secure communication, then enter I2P! Invisible Internet and Onion Routing I2P initially began in 2003 as a proposed modification to Freenet. Content sent over I2P is encrypted through three-layer garlic encryption, used to verify the delivery of the message to the recipient. Step 1 Download I2P Let's start with a visit to the download page to grab the Windows binary or source code, if needed.

. $ sudo apt-add-repository ppa:i2p-maintainers/i2p$ sudo apt-get update$ sudo apt-get install i2p This downloads and installs the I2P router on your computer. Step 2 Start the I2P Router $ i2prouter start. A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media. A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? What are the best backups to use for DVD collections?

A word of caution. It's Like Stealing a Car... Imagine someone boosted your brand new car overnight, but when you came out in the morning to head off to work, it was still there! Copyright infringement happens when you acquire or redistribute a protected work without the expressed consent of whoever might own it. However, you are allowed to backup your own legally purchased software for your own private use, so long as it is not distributed in any way.

Null Byte's Super Quick Breakdown for New Friends Movies Cam - A copy made in a cinema using a camcorder or mobile phone. Editor Picks: The Top 10 Secret Resources Hiding in the Tor Network. Tor vs. I2P: The Great Onion Debate. The SSD Project | EFF Surveillance Self-Defense Project.