background preloader

Tools and tactics for your digital security

Tools and tactics for your digital security

Related:  Computer, Privacy & Data Protection CPDP conference 2015security and hackingInternet, Tips & TricksCOUNTER-SURVEILLANCE

Why trade is not the place for the EU to negotiate privacy Argument for including privacy in trade agreements The basic argument for including privacy in trade agreements is twofold. First, trade agreements attempt to lower barriers between regimes and reduce the friction inherent in conducting transnational business. Thus trade agreements already contain many attempts at regulatory harmonisation, or at least constructing interfaces between regulatory regimes. There is an exception to regulatory harmonisation at the World Trade Organisation that specifically addresses privacy, but a new free trade agreement could negotiate around this exception.[7] Second, trade agreements do involve a more formal negotiating process than, say, the Safe Harbor. If a more extended process leads to consensus building, then perhaps the EU and the US could arrive at a better compromise through trade.

Free and Open Source Cyber Security Learning Cybrary | 0P3Nuser generated content What is 0P3N? 0P3N is content you won't find anywhere else on the web. How Does it Work? Privacy tools You are being watched. It has become a fact that private and state sponsored organizations are spying on us. is here to give you the knowledge and tools to defend yourself against global mass surveillance. Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them.

Mailvelope - OpenPGP for webmail Mailvelope comes preconfigured to work with several webmail services, including Gmail. You can check if Mailvelope is already configured to work with your webmail provider by loging into your email account and composing new message. You should see a Mailvelope button in the upper, right-hand corner of the message area, as shown below: If you see this button, you can skip the remaining steps in this section.

Privacy Camp: Big data and ever increasing state surveillance - EDRi By Kirsten Fiedler As every year, EDRi is co-organising a privacy camp for civil society as a warm-up event for the CPDP conference. The event will discuss big data and every increasing state surveillance and the sessions will focus on privacy and data protection challenges and possibilities in Europe. It will take place on Tuesday, 20 January 2015 in Brussels. The Real Science Behind Cracking Passwords b46f685f85e0af830d82ddbbe795eff3 By adding a unique salt, I can do something about that. I created a quick Javascript program that takes the user’s name, and pulls the first and last three letters from their username and makes them into a salt. Then, the program takes the salt, plus the user’s password, and runs them through the MD5 algorithm and produces the hash that will be their password. Take a look at the results below.

Snowden-approved: The ‘Citizenfour’ hacker’s toolkit One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, we’ve put together a guide to some of the major security software programs and operating systems available. If you’ve wanted to take steps to secure your own information, but were uncertain where to start, this article should get you headed in the right direction.

Android - Getting and Installing Bitmask There are two ways to obtain the Bitmask Android client, the first one is to download directly from the Bitmask website and the second is to download it through the Play Store. This first one means you will have to manually download any updates to the client. The second that you are letting Google live on your device. We recommend for now to use the direct download method. Downloading and installing Bitmask for Android

Towards Multilateral Standards for Surveillance Reform by Ian Brown, Morton H. Halperin, Ben Hayes, Ben Scott, Mathias Vermeulen Ian Brown University of Oxford - Oxford Internet Institute Morton H. Halperin Hacker (programmer subculture) A team of hackers competing in the CTF competition at DEF CON 17 A hacker is an adherent of the subculture that originally emerged in academia in the 1960s, around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC)[1] and MIT Artificial Intelligence Laboratory.[2] A hacker is someone who loves to program or who enjoys playful cleverness, or a combination of the two.[3] The act of engaging in activities (such as programming or other media[4]) in a spirit of playfulness and exploration is termed hacking. Richard Stallman explains about hackers who program: What they had in common was mainly love of excellence and programming. They wanted to make their programs that they used be as good as they could.

Secure Mobile Apps To achieve our goal of a comprehensive, privacy- and security-focused communications solution, Guardian is driven both by internal development and the open-source community at large. In cases where a viable, vetted, and usable product already fills the communications needs of our target audience, we will recommend apps that work. Our Apps Our apps are available on Google Play, Amazon, our F-Droid Repository, or download the APK directly from us. Expert users can also download and test our nightly builds. How Mesh Networking Empowers Mobile Activism Mobile activism has proven to be a cornerstone of modern tactics used to hold governments and organizations accountable. Yet as we have seen multiple times across the globe in recent years, when large scale protests erupt, or governments feel threatened, the result is sometimes the shutdown of mobile networks. These events can have substantial impacts felt across the economy, services digital and physical, not to mention the obvious massive communication disruptions. Such events have even led groups to look into recognizing mobile network access as a fundamental human right.

Law Square contributing to top summit CDPD 2015 - Law Square The days of the most awaited data protection and privacy event in Belgium have finally arrived: dozens of academics, lawyers, practitioners, policy-makers and computer scientists will indeed gather next 21-22-23 January in Brussels, in one of the leading data protection and privacy conferences in Europe and around the world, to present topics and exchange views and ideas on the latest emerging issues and trends in the field of computers, privacy and data protection. The conference will include panels covering many current topics, such as European and Global developments, mobile technologies, wearable technologies, EU-US developments regarding the regulation of government surveillance, e-health, internet governance and privacy, Big Data, border surveillance, and the Data Protection reform amongst many others. For more information on the event, please visit:

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.