background preloader

Privacy: Resources

Facebook Twitter

Proxy List - Best working proxies here. A proxy list is a well kept list of all stable forms of proxies available online that is known to the source hosting the list. More or less, a proxy list is an organized list to help you determine a working proxy for use in your browsing or application needs. So, that brings us to another question if you are not familiar with it - and that is, what is a proxy website? A proxy website allows a user to access blocked or limited websites that they may not can usually access. It also supplies a means of confidentiality to a web user. Proxy based websites permit you to place a URL of a website that you wish to visit in their search box, and takes you through their proxy server, rather than visiting the site directly yourself. By doing this, your IP Address is hidden to the receiving a website, and thus your physical location as shown by an IP on your computer. Basically, a proxy is a work-around or bypass of sorts to direct website interaction online.

Apple: We 'must have' comprehensive user location data on you. But it's not just iPhones that are keeping track of their users. Apple's iPhone 3G, iPhone 3GS, the iPhone 4, and iPad models are also keeping track of consumers whereabouts. Mac computers running Snow Leopard and even Windows computers running Safari 5 are being watched. The question is why? The company has remained silent after researchers Alasdair Allan and Pete Warden revealed this Wednesday that the iPhone was storing logs of users' geographic coordinates in a hidden file. We're not sure why Apple is gathering this data, but it's clearly intentional, as the database is being restored across backups, and even device migrations, the security experts wrote in their blogs. While Apple has since remained tight-lipped on the matter, not responding to any media-inquires, another privacy snafu last year gives insight into what the company is doing with the information. In June 2010, Congressmen Edward J.

Read: Global Backlash builds over Apple's tracking controversy. Friedland_112.pdf (application/pdf Object) A Day in the Life of Privacy. Everyday we Make Compromises in the Face of Privacy, and None of us Have as Much Privacy as we Want. As soon as I woke up this morning my privacy was compromised. My Android phone has GPS enabled so that the phone, and any widget on it, can determine my geolocation.

I am pretty careful about checking the permissions on the widgets I install, but not everyone is, and even I am capable of making errors. My daughter was once checking permissions on a screen saver and found that the “coarse location” was one of the permissions requested. Can you imagine a single valid reason that a screen saver would need your location? Neither could I. After breakfast, it was time for me to travel so I got in my car and drove downtown. As I got downtown, I drove through an intersection that was monitored by a red-light camera.

I got downtown way easier than I had thought – thinking “better 30 minutes early than a minute late” had gotten me there 45 minutes before my meeting, so I stopped for coffee first. The Spy files. WikiLeaks: The Spy Files Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S.

International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. Selling Surveillance to Dictators How Mass Surveillance Contractors Share Your Data with the State. Why blurring sensitive information is a bad idea - dheera.net - Dheera Venkatraman's web site. The need for FOSS intelligence tools for sensemaking etc. - Open Manufacturing. Nobel Intent - Science News. Taking steps to further improve our privacy practices. Posted by Peter Fleischer, Privacy Counsel-Europe, and Nicole Wong, Deputy General Counsel When you search on Google, we collect information about your search, such as the query itself, IP addresses and cookie details. Previously, we kept this data for as long as it was useful. Today we're pleased to report a change in our privacy policy: Unless we're legally required to retain log data for longer, we will anonymize our server logs after a limited period of time.

When we implement this policy change in the coming months, we will continue to keep server log data (so that we can improve Google's services and protect them from security and other abuses)—but will make this data much more anonymous, so that it can no longer be identified with individual users, after 18-24 months. Just as we continuously work to improve our products, we also work toward having the best privacy practices for our users. If you want to know more, read the log retention FAQ (PDF). BlackBuntu Security Training. 09.14.2005 - Researchers recover typed text using audio recording of keystrokes. UC Berkeley Press Release Researchers recover typed text using audio recording of keystrokes By Sarah Yang, Media Relations | 14 September 2005 BERKELEY – A new security threat revealed by computer scientists at the University of California, Berkeley, may be enough to drive some people away from their computer keyboards and back to pen and paper.

The researchers show that a simple audio recording of those keyboard clicks can betray the text you just entered, from passwords to secret love notes. The researchers were able to take several 10-minute sound recordings of users typing at a keyboard, feed the audio into a computer, and use an algorithm to recover up to 96 percent of the characters entered. "It's a form of acoustical spying that should raise red flags among computer security and privacy experts," said Doug Tygar, UC Berkeley professor of computer science and information management and principal investigator of the study. But that's not the end. So what's a typist to do?