background preloader

Whisper Systems

Whisper Systems

Vente de données: Des employés de Swisscom, Sunrise et Orange arrêtés - Suisse Vente de données Trois collaborateurs des principaux opérateurs de téléphonie mobile ainsi qu’un détective établi à Lausanne ont été interpellés par la justice genevoise, soupçonnés d’avoir vendu des informations confidentielles à des tiers. L’instruction est menée par le premier procureur genevois Yves BertossaImage: Keystone Partager & Commenter Votre email a été envoyé. Quatre personnes ont été interpellées par la justice genevoise, soupçonnées d’avoir transmis des informations sur des numéros de téléphone ou des relevés téléphoniques de clients. Les employés des télécommunications auraient vendu à des tiers des informations couvertes par le secret professionnel, notamment des relevés de factures téléphoniques, des «fadettes » comme on les appelle dans le milieu du renseignement. L’instruction se poursuit, menée par le premier procureur genevois Yves Bertossa. (Le Matin)

GMAIL - 2-step Verification Pourquoi utiliser la validation en deux étapes ? La validation en deux étapes ajoute un niveau de sécurité supplémentaire à votre compte Google, ce qui réduit considérablement le risque de vous faire voler des informations personnelles par un tiers dans votre compte. Si la validation en deux étapes est activée dans votre compte, les pirates informatiques doivent non seulement obtenir votre mot de passe et votre nom d'utilisateur, mais aussi avoir accès à votre téléphone, pour pirater vos données. Fonctionnement 1 Saisissez votre mot de passe À chaque fois que vous vous connecterez à Google, vous devrez saisir votre nom d'utilisateur et votre mot de passe, comme vous le faites habituellement. 2 Saisissez le code reçu sur votre téléphone. La simplicité avant tout Lorsque vous vous connectez, vous pouvez choisir de ne plus avoir à saisir de code sur l'ordinateur utilisé. En savoir plus sur la validation en deux étapes

WhisperSystems/TextSecure - GitHub Digital Agenda: Europeans use mobile phones more when travelling abroad, but still worry about costs, EU survey reveals Brussels, 14th February 2011 Digital Agenda: Europeans use mobile phones more when travelling abroad, but still worry about costs, EU survey reveals A lmost three quarters of Europeans are worried about the cost of using their mobile phone when travelling in the EU a survey released by the European Commission today shows. 72% of travellers still limit their roaming calls because of high charges even if a majority is aware that prices have fallen since 2006. Only 19% of people who use internet-related services on their mobile phones when abroad think the costs of data-roaming for (Internet surfing or checking e-mails) are fair. The results of this survey, plus the public consultation on the future of the Roaming Regulation ( IP/10/1679 ), which closed on 11 th February, will feed into the Commission's review of current EU roaming rules, due by June 2011. Neelie Kroes, Vice-President of the European Commission for the Digital Agenda said: "Telecom companies must listen to their customers.

Tweets still must flow One year ago, we posted “The Tweets Must Flow,” in which we said, The open exchange of information can have a positive global impact … almost every country in the world agrees that freedom of expression is a human right. Many countries also agree that freedom of expression carries with it responsibilities and has limits. As we continue to grow internationally, we will enter countries that have different ideas about the contours of freedom of expression. Until now, the only way we could take account of those countries’ limits was to remove content globally. We haven’t yet used this ability, but if and when we are required to withhold a Tweet in a specific country, we will attempt to let the user know, and we will clearly mark when the content has been withheld. There’s more information in our Help pages, both on our Policy and about Your Account Settings. One of our core values as a company is to defend and respect each user’s voice. Update - Jan 27, 2:20pm.

SummarizeThis Quickly Summarizes Long Passages of Text SummarizeThis is a free tool that summarizes the main point(s) of long articles that you find on the web. To use SummarizeThis you just copy and paste text into the summary box and click "summarize." A summary of the text then appears above the original text that you copied. Applications for EducationSummarizeThis could be helpful to students when they are working on long and in-depth research projects. By using SummarizeThis they can save time by getting a sense of what a long article is about before reading the whole thing in detail. Tell Cameron, NO WAY! Privacy Policy Last modified: November 11, 2011 This Privacy Policy is continually under review to ensure your privacy and security. This website, (the “Site”) is operated by Access (“We” or “Us”). We strongly believe that you have the right to control the use of your personal information and that your privacy must be respected. In this policy, "Access" refers to Access staff, board members, cooperating attorneys, interns, volunteers, and consultants, all of whom are bound by law or contract to keep information they receive as part of their assistance to Access confidential. Collection of Information When you are on the Access website and are asked for personal information, you are sharing that information with Access alone, unless stated otherwise. When you make a donation online, Access collects a variety of information about you including your first name, last name, address, city, state/region/province, zip/postal code, country, and email address. Cookies

The Tsunami of Smartphones in Computer Forensics Two years ago, I began to say in lectures that we had seen a 200% rise in the number of cell phones passing through our forensics lab. Today, I am beginning to say that the increase is more like 500%. As a society, we seem increasingly to regard our cell phones as an appendage of our bodies. To confirm our addiction to our phones, Nielsen recently conducted a study which offers some interesting stats. Women spend 22% more time chatting on their phones than men, spending an average of 856 minutes on the phone monthly compared to 667 minutes for men. Women also text more, sending or receiving an average of 601 texts per month - the number was 447 for men. Black, Hispanic and Asian users text more than white users - no explanation why. It comes as no surprise to anyone that teenagers are obsessive texters, texting a mind and thumb-numbing 2,779 texts per month. Texting has been a boon to computer forensics, supplementing the gold nuggets so often found in e-mail.

Twitter tells third-party devs to stop making Twitter client apps In a statement issued today by Twitter on its official developer mailing list, the company informed third-party developers that they should no longer attempt to build conventional Twitter client applications. In a move to increase the "consistency" of the user experience, Twitter wants more control over how its service is presented to users in all contexts. The announcement is a major blow to the third-party application developers who played a key role in popularizing Twitter's service. More significantly, it demonstrates the vulnerability of building a business on top of a Web platform that is controlled by a single vendor. The situation highlights the importance of decentralization in building sustainable infrastructure for communication. The message was posted by Ryan Sarver, of Twitter's platform team. "We need to move to a less fragmented world, where every user can experience Twitter in a consistent way.

Twitter, algorithms, crowdsourcing used to spot truthiness A few years back, a certain late night host popularized a word that may or may not be in your dictionary: truthiness. Stephen Colbert was referring to what has become a very effective political tool, namely, statements that many people will accept as true because they feel right, even if they have no basis in reality. A small cottage industry has since sprung up to evaluate the amount of truth that exists in a potentially truthy statement (Politifact is probably the best example). Now, a bunch of academics at Indiana are attempting to use a combination of crowd-sourcing, Twitter, and automated text and network analysis to bring instances of political truthiness out into the open. The team has set up a site, Truthy.indiana.edu, to show off and explain the system. Twitter also offers APIs for access to the content flowing through its system, and the Truthy site will be using this feed to obtain raw material for its analysis. The final test is perhaps the most interesting.

HOW TO: Create Groups for Twitter One of the most demanded features for Twitter has been the ability to create groups, allowing members to focus on different sets of people they're following. For example, you could create groups for all of your fantasy league friends, colleagues at work, friends in real life, family members, and so on. Because Twitter still does not provide any group feature, it has opened the floodgates for countless third party solutions. There are many different ways Twitter members can create virtual groups. Here is a roundup of some of the most popular methods employed today. Have another method to tell us about? Third Party Services TweetWorks - My favorite of the bunch because it's so quick and easy to setup a group. TwitTangle - You don't just create groups on this service but also tag and rate your friends which helps you filter your timeline any way you want. Twitter Clients twhirl - Another wildly popular Twitter client that also includes support for Friendfeed. Your Own Twitter Service

Related: