background preloader

Le logiciel de téléphonie mobile qui défie le contrôle des Etats

Le logiciel de téléphonie mobile qui défie le contrôle des Etats

Related:  Anonymously / surfer anonymement.netneutrality | access and information

How to remain secure against NSA surveillance Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting. At this point, I feel I can provide some advice for keeping secure against such an adversary. The primary way the NSA eavesdrops on internet communications is in the network. That's where their capabilities best scale.

How Not to Steal People's Content on the Web The best content marketers aren't afraid to share. Share content. Share links. Share ideas. Share data. Démontage du Galaxy S II Teardown *This article is based on a product available in the Korean market. Specifics such as design, features, components, etc may differ by region. Selling over 3 million units worldwide in just 55 days and eagerly awaited in markets not yet available in, the Samsung GALAXY S II is one hot smartphone. With the power of a dual-core processor, a sharp 4.3” Super AMOLED Plus display and all the Android goodies jam packed in a miraculously slim 8.9mm, it’s no surprise that customers are so interested. Ever since its debut, there’s been a lot of buzz about how slim the GALAXY S II is, and as always, we’ve had techies try to strip the device down. Now we don’t want you to risk ruining your beautiful device, so we dissected it for you.

In the Real Fourth Reich, You'll Be the First to Go: Anonymous Goes After Neo-Nazis Der Spiegel reports the hacktivist collective Anonymous is actively targeting neo-Nazis in Germany in a campaign called Operation Blitzkrieg. The group has launched a WikiLeaks-style website, Nazi-Leaks, to support the operation. They are publishing materials hacked from Germany's extreme right-wing party, the Nationaldemokratische Partei Deutschlands, or National Democratic Party of Germany (NDP). Cell Phones and Their Technosocial Sites of Engagement Abstract This paper provides examination of the effects of widespread mobile telephony on the social and spatial relations of individuals in the postmodern state. This is the realm of cyborg anthropology, which, according to co-developer Donna Haraway, “explores the production of humanness through machines” (Gray 1993:342).

Do-Not-Track Movement Is Drawing Advertisers’ Fire Do Not Track mechanisms are features on browsers — like Mozilla’s Firefox — that give consumers the option of sending out digital signals asking companies to stop collecting information about their online activities for purposes of targeted advertising. First came a stern letter from nine members of the House of Representatives to the Federal Trade Commission, questioning its involvement with an international group called the World Wide Web Consortium, or W3C, which is trying to work out global standards for the don’t-track-me features. The legislators said they were concerned that these options for consumers might restrict “the flow of data at the heart of the Internet’s success.” Next came an incensed open letter from the board of the Association of National Advertisers to Steve Ballmer, the C.E.O. of , and two other company officials. “Microsoft’s action is wrong.

Freedom of information legislation Freedom of information laws (FOI laws) allow access by the general public to data held by national governments. They establish a "right-to-know" legal process by which requests may be made for government-held information, to be received freely or at minimal cost, barring standard exceptions. Also variously referred to as open records, or sunshine laws (in the United States), governments are also typically bound by a duty to publish and promote openness. In many countries there are constitutional guarantees for the right of access to information, but usually these are unused if specific support legislation does not exist. Introduction[edit] Démontage Samsung Galaxy S III Massachusetts, The people of Massachusetts have always stood up for their right to repair. In 2012, voters passed a law that ensured residents' right to repair their car wherever they wanted. Now, it's time to do the same for electronics. With the Digital Right to Repair Bill, H.3383, we have a chance to guarantee our right to repair electronics — like smartphones, computers, and even farm equipment. We have a chance to help the environment and stand up for local repair jobs—the corner mom-and-pop repair shops that keep getting squeezed out by manufacturers.

Victory! Boycott forces GoDaddy to drop its support for SOPA Under intense pressure from an Internet-wide boycott, domain registrar GoDaddy has given the open Internet an early Christmas present: it's dropping its support for the Stop Online Piracy Act. The change was announced in a statement sent to Ars Technica: Go Daddy is no longer supporting SOPA, the "Stop Online Piracy Act" currently working its way through U.S. Congress. "Fighting online piracy is of the utmost importance, which is why Go Daddy has been working to help craft revisions to this legislation—but we can clearly do better," Warren Adelman, Go Daddy's newly appointed CEO, said.

Dan Swinhoe (Global) - The App Revolution: How this Varies By Market Mobile Communications "The iPad2 is equivalent to a 1986 Cray II supercomputer. It was the pre-eminent computer in the world. In 1993 the iPad2 would have been considered one of the 30 fastest computers in the world."

Related:  Android HTC Desire Rootage Roms...J'y bricoleAstuces InformatiquesUn téléphone plus écolo et plus anonymeTELEPHONIE ET TELECOMUNICATIONInternet