This article goes over America's security and privacy trade-off, especially after 9/11. The author argues that we have done an excellent job keeping a balance between these two approaches and, while actions such as the Paris attack may make us question if we should add more security, there is no reason to take away the privacy we have as since 9/11 we have been doing a good job of valuing both of these aspects.
This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
This article, written by the one and only Cory Doctorow, highlights the privacy concerns associated with Google Chromebooks. More and more schools are issuing its students Chromebooks, which exfiltrate all data to Google data-centers and infringe one's privacy. This site also includes other interesting articles related to security and privacy.
This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
This is a PDF file of a chapter taken from a book that contains essays on many issues that arise from "big data." This chapter specifically pertains to our privacy versus security debate because it provides reasons as to why bulk data collection does not work as well as alternative options to mass surveillance.
This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
"Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
"Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
A well-reasoned argument from our favorite security blogger, with plenty of links to help us in writing our final paper. It is also an interesting article as it talks about the debate before Snowden, Wikileaks, and other whistleblowers.
Focusing on the consequences of the Patriot Act and how the US government upped the security on civilians after 9/11, this is a really nice graphic that gives a scary visual on the expanded powers of the national government in the name of security. It's from the ACLU, so this gives a pretty good perspective of, specifically, curbed liberties.
This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?