background preloader

EPIC - Electronic Privacy Information Center.

EPIC - Electronic Privacy Information Center.
Latest News - April 8, 2014 Several open government organizations, including Public Citizen, the Sunlight Foundation, the Project on Government Oversight, Citizens for Responsibility and Ethics in Washington, the Center for Effective Government and have filed an amicus brief supporting EPIC in EPIC v. NSA. EPIC is seeking to obtain a Presidential Directive on cyber security that was widely circulated to federal agencies and senior policy advisors. EPIC submitted a Freedom of Information Act Request to the NSA for NSPD-54 and several related documents. After the agency refused to disclose the Directive, EPIC sued the NSA under the Freedom of Information Act.

Related:  _Crypto ToolsVie privée - Empreinte numériqueonline transparency and privacyPrivacyLe recrutement et la productivité à l’heure des Big Data

dm-crypt Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process.[3] Frontends[edit] Report: Rare leaked NSA source code reveals Tor servers targeted Two Germany-based Tor Directory Authority servers, among others, have been specifically targeted by the National Security Agency’s XKeyscore program, according to a new report from German public broadcaster ARD. Tor is a well-known open source project designed to keep users anonymous and untraceable—users' traffic is encrypted and bounced across various computers worldwide to keep it hidden. This marks the first time that actual source code from XKeyscore has been published. ARD did not say how or where it obtained the code. Unlike many other NSA-related stories, the broadcaster did not specifically mention the information being part of the trove leaked by whistleblower Edward Snowden. XKeyscore is one of the high-level NSA surveillance programs that have been revealed via Snowden over the last year.

WikiLeaks and the Possibility of Open Diplomacy Home > Ideas > Innovations Make a Comment By Peter Singer | Project Syndicate | December 13, 2010 At Princeton University, Woodrow Wilson, who was president of the university before he became president of the United States, is never far away. NSA targets the privacy-conscious (Seite 1) NSA targets the privacy-conscious von J. Appelbaum, A. Gibson, J. Goetz, V. Marc Rotenberg "Privacy is the most comprehensive of all rights and the one most cherished by a free people." - Justice Louis Brandeis Marc Rotenberg is Executive Director of the Electronic Privacy Information Center (EPIC) in Washington, DC. He teaches information privacy law at Georgetown University Law Center and has testified before Congress on many issues, including access to information, encryption policy, consumer protection, computer security, and communications privacy. He testified before the 9-11 Commission on "Security and Liberty: Protecting Privacy, Preventing Terrorism."

Linux Unified Key Setup - LUKS In computing, the Linux Unified Key Setup or LUKS is a disk-encryption specification created by Clemens Fruhwirth and originally intended for Linux. While most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability amongst different programs, but also assures that they all implement password management in a secure and documented manner.[1] The design of LUKS aimed to conform to the TKS1 secure key setup scheme.[2] See also[edit] References[edit]

EU's right to be forgotten: Guardian articles have been hidden by Google When you Google someone from within the EU, you no longer see what the search giant thinks is the most important and relevant information about an individual. You see the most important information the target of your search is not trying to hide. Stark evidence of this fact, the result of a European court ruling that individuals had the right to remove material about themselves from search engine results, arrived in the Guardian's inbox this morning, in the form of an automated notification that six Guardian articles have been scrubbed from search results. The first six articles down the memory hole – there will likely be many more as the rich and powerful look to scrub up their online images, doubtless with the help of a new wave of "reputation management" firms – are a strange bunch. Anyone entering the fairly obvious search term "Dougie McDonald Guardian" into – the US version of Google – will see three Guardian articles about the incident as their first results.

HILLIS'S QUESTION: WHO GETS TO KEEP SECRETS?- An EDGE Special Event NEW CLAY SHIRKY Social & Technology Network Topology Researcher; Adjunct Professor, NYU Graduate School of Interactive Telecommunications Program (ITP); Author, Cognitive Surplus Late to the conversation, but just checked in on Christmas night to find this present of a conversation gift-wrapped and sitting in my mail box. Late though I am, I'll chime in with a few things. 1.

Related:  dividivitree 1Internet Privacy & SecuritydefendersA CLASSERprivacyamigainformatics