background preloader

Privacy for anyone anywhere

https://tails.boum.org/

Related:  Online PrivacyConfidentialité - Vie privée - RGPDSecurity

How to get a personal VPN and why you need one now — Quartz Elon Musk is the most wholesome visionary our era has produced. He is a benign idealist; a guy with his eyes on a horizon beyond money. Money? Here's What the Big Tech Companies Know About You With nearly eight billion people on the planet — and more than half of them on internet — verifying who’s who is one of the great technological challenges of our time. To meet this challenge, Biometric security is rising to the occasion, buoyed by technological advancements and user-friendly experiences. Modern biometrics can seem like science fiction, but the concept is far from new. Sir Francis Galton, cousin of the famous Charles Darwin, used an analysis of over 8,000 fingerprint samples to publish what would become the first fingerprint classification system in history. Source

SHR Project What is SHR ? SHR is a GNU/Linux based operating system for smartphones and similar mobile devices. It integrates various Free and Open Source Software projects into a versatile platform - flexible enough to run on a vast selection of mobile hardware such as the Openmoko Neo Freerunner, Goldelico OpenPhoenux (GTA04), Nokia N900 and more. The SHR build system is based on OpenEmbedded - well known from the Yocto project. For telephony, networking, etc. the freesmartphone.org framework is used.

Ipredia OS for anonymous browsing and communications Ipredia OS is a Fedora based Linux operating system for anonymous web browsing, email, chat and file sharing, unlike similar projects like Tails and Liberte Linux based on tor, Ipredia anonymity takes root around the I2P anonymous network, with websites and services only accessible through an i2p proxy tunnel. The distribution can be downloaded with the Gnome or LXDE desktop, I tested the LXDE version because it is best for a live CD since it is lightweight and it should load quicker, there is the option to install Ipredia OS in your hard drive and some people might prefer the Gnome desktop for that. The operating system includes all of the basic applications an average computer user needs.

What are the Best .onion Sites & How to Access Them Safely in 2020 Put on your scuba mask because we’re about to dive way down into the deep web. All of the websites we are about to discuss can only be accessed through Tor. Your regular browser won’t be able to open any links that end in.onion. If you’re not already familiar with.onion sites, don’t worry. publish0x Recently, I wrote about the Brave team’s report on the data collecting and bidding practises in government-associated websites in the United Kingdom. The conclusions in that report were shocking, as it was found that many of the nation’s council websites had data collected without permission. Almost 7 million accounts were linked to data broker LiveRamp, which until recently was associated with Cambridge Analytica.

iwiDarwin iwi_darwin was ported from Linux drivers made by Intel®. This code includes derivations from the BSD and Linux drivers and is therefore licensed under GPL2. Donations should be done in mercurysquad project New drivers If you know of other linux wireless drivers for mini-pci-express cards you like to see working in mac os x post the link/request in the Issues section

Most popular VMWare Virtual Appliances for IT Administrators Updated on September 23, 2009: Please review the updated list of virtual appliances. You may also be interested in reviewing virtual appliances for Security. The original post has been retained as a historical reference. The download links for most of the appliances in the following table no longer work since VMware has revamped the Appliance Marketplace. Thanks I have ranked the virtual appliances for IT Administrators available at the VMWare Virtual Appliance Marketplace (VVAM) as described below. How to foil NSA sabotage: use a dead man's switch The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy. It doesn't really matter if you trust the "good" spies of America and the UK not to abuse their powers (though even the NSA now admits to routine abuse), you should still be wary of deliberately weakened security.

Sir Tim Berners-Lee speaks out on data ownership The data we create about ourselves should be owned by each of us, not by the large companies that harvest it, the Tim Berners-Lee, the inventor of the world wide web, said today. Berners-Lee told the IPExpo Europe in London’s Excel Centre that the potential of big data will be wasted as its current owners use it to serve ever more “queasy” targeted advertising. By gaining access to their own data, people could use it with information about themselves from other sources in order to create “rich data” – a far more valuable commodity than mere “big data”, he said.

GNU/Linux Timeline After a short essay on methodology we’re curious to find out whether there are any master-snoops among our audience. We present exhibit M, a rare specimen we know nothing about but for the fact that it was compiled from bits of Gentoo. Hence we call publicly for any hints or leads regarding this elusive distribution! IT Career Paths - A Guide to Credentials and Certifications If you love technology, then the IT field can offer a number of opportunities and areas to specialize in. As you hone in on your skills, you can validate your knowledge by advancing up the certification ladder to achieve new career heights. Whatever path you choose, we'll help you figure out the right steps to take.

Facebook privacy and kids: Don’t post photos of your kids online Photo by Hemera/Thinkstock I vividly remember the Facebook post. It was my friend’s 5-year-old daughter “Kate,” (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door. A caption read “Leaving for our annual Labor Day weekend at the beach,” and beneath it were more than 50 likes and comments from friends—including many “friends” that Kate’s mom barely knew.

Heimdall What is Heimdall? Heimdall is a cross-platform open-source tool suite used to flash firmware (aka ROMs) onto Samsung mobile devices. How does it work? Heimdall connects to a mobile device over USB and interact with software running on device known as Loke. Loke and Heimdall communicate via the custom Samsung-developed protocol sometimes referred to as the 'Odin protocol'. Low-level USB in Heimdall is handled by the popular open-source USB library, libusbx.

Related:  AnonymousSystème d'exploitationComputer