background preloader


Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits. Click below and you will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web. Only anonymous data will be collected by this site. Click here to test how trackable your browser is.

Related:  Nowhere to Hide???

Meet the Online Tracking Device That is Virtually Impossible to Block This story was co-published with Mashable. A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from to First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it. Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles, or other types of content are displayed to them.

Le Cookie Unofficial FAQ Version 2.6 Contributed to Cookie Central by David Whalen A Note from the Author Projector Disguised as Camera Flashes Images Into Others’ Photos German inventor Julius von Bismarck refers to his potentially very disruptive brainchild as an “image fulgarator.” The verb, “fulgurate,” means, “to flash or dart like lightening.” According to Herr von Bismarck, himself, it works like this: Technically, the Image Fulgurator works like a classical camera, though in reverse. In a normal camera, the light reflected from an object is projected via the lens onto the film. In the Image Fulgurator, this process is exactly the opposite: instead of an unexposed film, an exposed and developed roll of slide film is loaded into the camera and behind it, a flash.

Kate Lucente Kate Lucente focuses her practice on issues related to privacy, data protection, data security, communications, e-commerce, telemarketing and marketing compliance. Kate helps companies achieve compliance with complex and rapidly evolving state, federal and international privacy, data security and e-commerce laws, and routinely advises national and multi-national companies on issues relating to privacy, data protection, security, marketing and media law issues. She also routinely prepares privacy policies and terms of service, negotiates cloud services and other business services agreements, and helps companies to analyze and respond to security breaches. Kate's experience also includes helping companies to analyze and implement records management programs, electronic discovery programs and whistleblower programs, from a multi-jurisdictional perspective.

Campaigners warn of user data creep Internet service providers (ISPs) are required to store details of user e-mails and net phone calls from Monday as a European Union directive comes into force. Governments say it will protect citizens but civil liberty campaigners are not so sure. To whom did you send your first e-mail today? I ask, because from today ISPs inside the EU are legally required to store details of that e-mail for up to a year. And the same goes for any internet phone call you make. Government agents 'directly involved' in most high-profile US terror plots Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on Monday by Human Rights Watch, raises questions about the US criminal justice system's ability to respect civil rights and due process in post-9/11 terrorism cases. It portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots.

How Internet Cookies Work" In April of 2000 I read an in-depth article on Internet privacy in a large, respected newspaper, and that article contained a definition of cookies. Paraphrasing, the definition went like this: Cookies are programs that Web sites put on your hard disk. They sit on your computer gathering information about you and everything you do on the Internet, and whenever the Web site wants to it can download all of the information the cookie has collected. [wrong]

The Top Ten Commandments of Password Protection April 6, 2011Tim Visited 528 times , 1 Visits today Protecting your passwords is a vital component of keeping your online accounts safe and secure. Careless users often find themselves the victim of email or Facebook hacks. index ** We will be hosting a roundtable on the latest trends in Germany's data protection law. The roundtable will feature a number of representatives from Germany's data protection authorities and take place in Munich on 28-29 April 2014. This event is being hosted in conjunction with the Privacy Officers Network. Further details are available here **

The first truly honest privacy policy The FTC has called for a Do Not Track list and simplified Web privacy policies. How about an honest privacy policy instead? Teaser:

Related:  US privacy debatesCybersecurity 1