Internet Privacy

Facebook Twitter
Censorship

"Dans le business de la publication, les lecteurs sont les produits et les consommateurs sont les publicitaires", affirme Dave Winer, paraphrasant une citation célèbre : "Si vous ne voyez pas le produit, c'est que vous êtes le produit". La bulle des données Path, Facebook, Twitter, Foursquare, Instagram, Foodspotting, Yelp, Gowalla et tant d'autres récupèrent les numéros de téléphone de nos contacts et leurs adresses e-mail sur leurs serveurs pour faciliter les appariements, bien souvent sans même en demander la permission ou en informer les utilisateurs. Pour Uwe Hook, président de la firme de consulting BatesHook, c'est le signe d'un problème majeur. Image : Nous sommes cernés par les bulles de données, expliquait Eli Pariser lors de sa présentation à TED (vidéo). Image extraite de sa présentation. Nous faudra-t-il payer pour préserver notre vie privée sur l’internet

Nous faudra-t-il payer pour préserver notre vie privée sur l’internet

Online chats, off the record: Cryptocat puts privacy back on the Web
Un routeur VPN Host-to-LAN en utilisant OpenVPN Un routeur VPN Host-to-LAN en utilisant OpenVPN Le but de ce document est de décrire la façon de configurer une routeur OpenVPN pour le Host-to-LAN Virtual Private Network. Les sections dans lesquelles les how-to est divisé sont les suivants: Pourquoi utiliser OpenVPN que le VPN Gateway Interface web OpenVPN.
The How-To Geek Guide to Getting Started with TrueCrypt If you’re looking for a simple and powerful way to encrypt everything from system drives to backup discs to everything in between, TrueCrypt is an open-source tool that will help you lock up your files. Read on as we show you how to get started. What Is TrueCrypt and Why Should I Use It? TrueCrypt is an on-the-fly encryption application that allows you to work with encrypted files as you would work on files located on a regular drive. Without on-the-fly encryption, actively working with encrypted files is an enormous pain and the outcome is usually either that people simply do not encrypt their files or they engage in poor security practices with their encrypted files because of the hassle of decrypting/encrypting them. How does this play out in real life? The How-To Geek Guide to Getting Started with TrueCrypt
How to Optimize Mozilla Firefox for Maximum Privacy How to Optimize Mozilla Firefox for Maximum Privacy Firefox includes powerful features to prevent you from being tracked online, but they aren’t on by default. We’ll show you how to take control of your privacy online with Firefox’s options. Firefox also has some features that send personal data to Mozilla and Google, but these features aren’t mandatory.
THIS IS WHAT FACEBOOK SENDS THE POLICE WHEN THEY COME ASKING FOR YOUR INFORMATION. | SUPERCHIEF
ACTA

From being a niche product used by the few, in the past few years VPN services have hit the big time. These days more and more Internet users see running a privacy enhancing service as a requirement rather than just a luxury. Today we take a look at a few tips and tricks that can enhance the security of any VPN. While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed. Securing your privacy when your VPN fails How To Make VPNs Even More Secure How To Make VPNs Even More Secure
How to secure your computer and surf fully Anonymous BLACK-HAT STYLE
Cybersecurity is important to all Internet users because it can make the Internet a safer place to shop, conduct business, and communicate with others. However, pending cybersecurity bills include provisions that pose major civil liberties risks that must be addressed before any bill is enacted into law. This is urgent: the House is ready to take up legislation as soon as the week of April 23; after that, the Senate will act. Cybersecurity's 7-Step Plan for Internet Freedom Cybersecurity's 7-Step Plan for Internet Freedom
CISPA

Cops Can Copy iPhone Contents In Less Than 2 Minutes  Cops Can Copy iPhone Contents In Less Than 2 Minutes  Published on April 10, 2012 by admin · 1 Comment NextWeb It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from youriPhonein under two minutes. The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.
For the last couple of years discussion around censorship of websites in the West has become as prolific as the that around already established blockades in countries such as China and Iran. While meddling with the Internet’s DNS is the weapon of choice for censors, a new P2P system called ODDNS hopes to put control back in the hands of the people. The Internet’s Domain Name System, which translates human-readable URLs into IP addresses so that web users can more easily find Internet sites, has become a battle ground for censorship during the last couple of years. From residing almost exclusively in the awareness of computer engineers and nerds, recent attempts by various copyright holders to censor sites such as The Pirate Bay and introduce even more broad powers with the introduction of the SOPA legislation in the US, the existence and mechanisms of the Internet’s DNS have now broken through into the mainstream. ODDNS: Decentralized and Open DNS To Defeat Censorship ODDNS: Decentralized and Open DNS To Defeat Censorship
The Spy Files - WikiLeacks
En partenariat avec WikiLeaks, OWNI révèle l'existence d'un nouveau marché des interceptions massives, permettant d'écouter toutes les télécommunications à l'échelle d'une nation. Ses acteurs vendent leurs produits en Europe, aux États-Unis et à des dictatures. WikiLeaks rend public aujourd’hui près de 1 100 documents internes, plaquettes commerciales et modes d’emploi des produits commercialisés par les industriels des systèmes de surveillance et d’interception des télécommunications. La surveillance massive d’Internet révélée

La surveillance massive d’Internet révélée

Big Brother Arrives Via Facebook And He's Your Friend
Personal data as new Currency?
Staying connected on your smartphone can also come with privacy concerns Staying connected on your smartphone can also come with privacy concerns Wind Chill Warning issued January 7 at 5:19AM EST expiring January 8 at 10:00AM EST in effect for: Belmont, Carroll, Columbiana, Coshocton, Guernsey, Harrison, Jefferson, Monroe, Muskingum, Noble, Tuscarawas… Wind Chill Warning issued January 7 at 10:29AM EST expiring January 8 at 9:00AM EST in effect for: Ashtabula, Cuyahoga, Geauga, Holmes, Lake, Lorain, Mahoning, Medina, Portage, Stark, Summit, Trumbull, Wayne… Wind Chill Warning issued January 7 at 10:29AM EST expiring January 8 at 9:00AM EST in effect for: Ashland, Crawford, Erie, Hancock, Huron, Knox, Lucas, Marion, Morrow, Ottawa, Richland, Sandusky, Seneca, Wood, Wyandot… Winter Weather Advisory issued January 7 at 10:29AM EST expiring January 7 at 7:00PM EST in effect for: Ashland, Crawford, Erie, Hancock, Huron, Knox, Lucas, Marion, Morrow, Ottawa, Richland, Sandusky, Seneca, Wood, Wyandot…