background preloader

La Quadrature du Net

La Quadrature du Net

http://www.laquadrature.net/en

Related:  La Quadrature du NetInternet Initiatives

Awesome Bar - Find your bookmarks, history and tabs when you type in the address bar The location bar, also called the URL bar or address bar, displays a site's web address (URL). We call it the Awesome Bar because it remembers those websites you've visited before, guesses where you're trying to go and displays a list of suggested sites you can choose from. The more you use it, the better it gets. This article covers the details of how the location bar autocomplete feature works and will have you using it like a pro in no time.

Getting the Message? Police Track Phones with Silent SMS In June 2011, Colette Giudicelli, a senator representing the Maritime Alps region of France, wrote to Claude Gueant, the French Interior Minister: Many foreign police and intelligence services use clandestine “Silent” SMS to locate suspects or missing persons. This method involves sending an SMS text message to the mobile phone of a suspect, an SMS that goes unnoticed and sends back a signal to the sender of the message. Colette Giudicelli would like to know whether this procedure has been used in France. Seven months later, and there has still been no response from the French government.

Alpha Personal Analytics Connect with Faceook, sign in for free, and get unique, personalized information anad analysis on your social data-computed by Wolfram|Alpha Clustering of your friends What are the groups of friends that make up your network? How do these groups relate to each other? Where in the world are your friends? Where do your friends live? Mobile Surveillance - A Primer Share This Mobiles can be useful tools for collecting, planning, coordinating and recording activities of NGO staff and activists. But did you know that whenever your phone is on, your location is known to the network operator? Or that each phone and SIM card transmits a unique identifying code, which, unless you are very careful about how you acquire the phone and SIM, can be traced uniquely to you? With cameras, GPS, mobile Internet come ever more dangerous surveillance possibilities, allowing an observer, once they have succeeded in gaining control of the phone, to turn it into a sophisticated recording device.

AdNauseam - Clicking Ads So You Don't Have To As online advertising is becoming more automatic, universal and unsanctioned, AdNauseam works to complete the cycle by automating all ad-clicks universally and blindly on behalf of the target audience. Working in coordination with Ad Block Plus, AdNauseam quietly clicks every blocked ad, registering a visit on the ad networks databases. As the data gathered shows an omnivorous click-stream, user profiling, targeting and surveillance becomes futile. AdNauseam is a browser extension designed to obfuscate browsing data and protect users from surveillance and tracking by advertising networks. Simultaneously, AdNauseam serves as a means of amplifying users' discontent with advertising networks that disregard privacy and facilitate bulk surveillance agendas.

This Internet provider pledges to put your privacy first. Always. Nicholas Merrill is planning to revolutionize online privacy with a concept as simple as it is ingenious: a telecommunications provider designed from its inception to shield its customers from surveillance. Merrill, 39, who previously ran a New York-based Internet provider, told CNET that he's raising funds to launch a national "non-profit telecommunications provider dedicated to privacy, using ubiquitous encryption" that will sell mobile phone service and, for as little as $20 a month, Internet connectivity. The ISP would not merely employ every technological means at its disposal, including encryption and limited logging, to protect its customers. It would also -- and in practice this is likely more important -- challenge government surveillance demands of dubious legality or constitutionality. A decade of revelations has underlined the intimate relationship between many telecommunications companies and Washington officialdom. Like the eavesdropping system that President George W.

Tor Browser Bundle Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Click Install (3) Wait until the installer finishes.

copyme / kopimi (copyme), symbol showing that you want to be copied. use kopimi in your own fancy. kopimi may be put on homepages or blogs, in books, in software, as sound logos in music or whatever. 1. copy one of these kopimi symbols, or make up your own 2. put it on a homepage 3. link the logotype to: www.kopimi.com/kopimi Cell Phone Location Tracking Public Records Request Of all of the recent technological developments that have expanded the surveillance capabilities of law enforcement agencies at the expense of individual privacy, perhaps the most powerful is cell phone location tracking. And now, after an unprecedented records request by ACLU affiliates around the country, we know that this method is widespread and often used without adequate regard for constitutional protections, judicial oversight, or accountability. All cell phones register their location with cell phone networks several times a minute, and this function cannot be turned off while the phone is getting a wireless signal. The threat to personal privacy presented by this technology is breathtaking. To know a person's location over time is to know a great deal about who a person is and what he or she values.

CVE - CVE List Main Page Home > CVE IDs Section Menu CVE IDs Coverage Goals Reference Key/Maps Updates & Feeds CVE List (all existing CVE IDs) Downloads Search CVE List Search Tips View Entire CVE List (html) NVD Advanced CVE Search CVE ID Scoring Calculator Request a CVE ID CVE Numbering Authorities (CNAs) Requester Responsibilities Update a CVE ID

Mobile Carriers Lobby Against Cell Phone Location Privacy Bill Tracking a Sprint Nextel cellphone. Image: U.S. District Court -- Southern District of Ohio. Cellphone companies are objecting to proposed California legislation that would force them to publicly report the number of times they turn over cellphone location information to police and federal agents, arguing that it’s too burdensome, and would take time away from the important work of sharing customer data with cops “day and night.” At issue is California’s SB 1434, a bill that would prohibit carriers from turning over locational data to police without a warrant. That data can include when and where a phone was when it made or received calls; a phone’s whereabouts as it pings cellphone towers or, in the extreme case, a phone’s GPS history.

Senators strip reporting requirement from location privacy bill Senator Mark Leno’s bill banning warrantless government searches of cell phone location information survived its first test at the California State Legislature, but it didn’t emerge unscathed. The ACLU of Northern California, a co-sponsor of the measure, told The Chronicle that the California Location Privacy Bill passed through the Public Safety Committee late Tuesday, meaning it’s headed for a full vote later this year. But Senators Curren Price Jr. (D-Inglewood) and Joel Anderson (R-El Cajon) refused to vote in favor of SB 1434, unless a provision was removed that would force mobile companies to disclose how often they turned over information and for what purposes.

First Look Code AutoCanary is a desktop program for Windows, Mac, and Linux that makes the process of generating machine-readable, digitally signed warrant canary statements simpler. A warrant canary is the colloquial term for a published statement that a service provider has not received legal process that it is prohibited from disclosing to the public, such as a national security letter. Once a service provider receives a legal request that contains a gag order, the canary statement is removed. For more information, see EFF’s Warrant Canary FAQ. How it Works

Who is Neustar? Brad Stone at the New York Times reports on an industry group working on a new platform for portable digital movie downloads: The [Digital Entertainment Content Ecosystem or DECE] is setting out to create a common digital standard that would let consumers buy or rent a digital video once and then play it on any device... Under the proposed system, proof of digital purchases would be stored online in a so-called rights locker, and consumers would be permitted to play the movies they bought or rented on any DECE-compatible device.

Related: