Skip to main content

Home/ Brian links/ Group items tagged privacy

Rss Feed Group items tagged

Kevin DiVico

Do You Like Online Privacy? You May Be a Terrorist | Public Intelligence - 0 views

  •  
    A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity.  The document, part of a program called "Communities Against Terrorism", lists the use of "anonymizers, portals, or other means to shield IP address" as a sign that a person could be engaged in or supporting terrorist activity.  The use of encryption is also listed as a suspicious activity along with steganography, the practice of using "software to hide encrypted data in digital photos" or other media.  In fact, the flyer recommends that anyone "overly concerned about privacy" or attempting to "shield the screen from view of others" should be considered suspicious and potentially engaged in terrorist activities.
Kevin DiVico

privacyscore analytics - your online privacy guide - 0 views

  •  
    A privacyscore estimates the privacy risk of using a website based on how they handle your personal and tracking data.
Kevin DiVico

Six Tips to Protect Your Search Privacy | Electronic Frontier Foundation - 0 views

  •  
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see searches that reference your online reading habits, medical history, finances, sexual orientation, or political affiliation?
Kevin DiVico

About the project | Pervacy.eu - 0 views

  •  
    The objective of this project is the design and development of a privacy-aware content filtering platform focused on future pervasive wireless networks.  I'm expected to design a content filtering and users protection platform based on two building blocks:
Kevin DiVico

Building a Student Data Infrastructure: Privacy, Transparency and the Gates Foundation-... - 0 views

  •  
    The Shared Learning Collaborative, a Gates Foundation-funded initiative, rebranded itself this week. There's a new name - inBloom, Inc. - but the mission and plans remain the same, the new non-profit insists. That mission is to build an open source, cloud-based education data infrastructure in the hopes of addressing a number of problems schools face: the lack of data interoperability between the various databases and software systems that they utilize and the merits of spending money to update outdated administrative IT (versus, say, buying instructional - or other - tech and/or versus spending money on something altogether non-tech).
Kevin DiVico

Askemos - 0 views

  •  
    The aim of the Askemos project is to enable reliable and justiciable data processing, with the goal of producing "Software that can last 200 years." The first implementations of an Askemos peer can be obtained from ball.askemos.org. The Askemos web site itself is served from the Askemos/BALL development network. Follow here for more details. Note that Askemos concerns the abstract specification exclusively; including data formats, protocols, service interfaces etc. - not the actual implementations. Askemos combines incorruptible privilege delegation and non-repudiable replication of communicating processes into a trustworthy network. Physical machines under control of their operators execute applications processes under permanent multilateral audit. The network's honest majority of hosts provides users with exclusive control, and thus real ownership of processes. Askemos models a kind of "virtual constitutional state" where physical hosts bear witness to the interactions of virtual agents (akin to citizens). Self verifying identifiers can confirm that original documents have not beentampered with. The real potential for using Askemos is for identity and time stamp services, informationmanagement in public administration and libraries attaching metadata and archives, with the goal of establishing robust systems that can endure for centuries. German tax law, for instance, has storage requirements, which makes Askemos interesting even for private, individual use. Also Activist groups, non-profits and people who desire privacy and reliability in a chaotic and unpredictable world have much to gain from this software.
Kevin DiVico

Antonio F. Skarmeta: Presentations from Seminar Internet of Things (IoT) and Future Int... - 0 views

  •  
    Results from FIA Aalborg: The Internet of Things (IoT) is one of the most important fundaments for the smart cities, and is becoming slowly but steadily one of the core elements of the Future Internet (FI). In fact, various architectures and approaches from Future Internet such as Cloud Computing (Software as a Service - SaaS), which are being linked with the Web of Things, which is also allowing to define Sensors as a Service (SaaS) are clear examples of this relation between Future Internet and IoT architectures. At this particular point, where the IoT is a reality, where several IoT-based high scale deployments are being carried out such as Rome, and Santander. It is essential to discuss what are the IoT-specific aspects that the FI architecture has to take into account, in order to efficiently map the IoT architectures into an overall FI architecture, and particularly, how to manage rights of the individual (i.e. privacy) and its interaction with IoT objects taking into account aspects like delegation, access control as key aspects in the inclusion of the Internet of Things in the common lives with its total inclusion in the city of the future.
Kevin DiVico

White House launches big data R&D effort - 0 views

  •  
    Six U.S. government agencies will spend more than $200 million to help the government better organize and analyze large volumes of digital data, in a new "big data" research and development effort announced by President Barack Obama's administration Thursday.
Kevin DiVico

Tor's latest project helps Iran get back online despite new Internet censorship regime - 0 views

  •  
    Last week, the Iranian government apparently started a new censorship program that blocks encrypted Internet traffic. Even Iranians who had taken steps to evade government firewalls were being stymied-and the immediate impact can be seen in usage of the Tor network.
Kevin DiVico

From Invisible Ink to Cryptography, Lessons in Spycraft and Privacy-Hacking from the Am... - 0 views

  •  
    Our personal data is among today's most valuable information currency. It's often hard to determine what part companies own, what part the government owns, and what part, if any, is entirely our own - provided a third party hasn't already sold it to someone else.
1 - 10 of 10
Showing 20 items per page