Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged privatization

Rss Feed Group items tagged

Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
charlie_overton

What is cryptography? | TechRadar - 0 views

  •  
    This article, combined with the guide to staying completely anonymous on the internet linked at the end of it, suggest that one of the easiest ways to be anonymous online is to use a private browser like Ghostery, or a private search engine like DuckDuckGo. These services don't track your information the same way that Google does, making your online browsing experience more private and secure.
Derek Bruff

How Joe Biden Accidentally Helped Us All E-Mail in Private | Danger Room | Wired.com - 0 views

  •  
    Nice write-up in Wired's "Danger Room" column on Phil Zimmerman, who was recently inducted into the Internet Hall of Fame.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Derek Bruff

Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views

  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
mariannas

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
jcs215

Unifying the Global Response to Cybercrime | APWG - 0 views

shared by jcs215 on 12 Nov 14 - Cached
  •  
    The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to electronic crime through development of data resources, data standards and model response protocols and systems for private and public sectors.
Derek Bruff

How to Encrypt Your Email and Keep Your Conversations Private - 0 views

  •  
    We'll give Mailvelope (the webmail encryption tool) a try in class tomorrow. See Step Three for instructions.
charlotteneuhoff

Know how much of your personal info is online? Google's new tool will tell you - 1 views

  •  
    This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
hamzapatel123

Online privacy is dead - 2 views

  •  
    With the shutdown of the silk road, the NSA has proven that it is monitoring even the most anonymous parts of the web. This raises some serious questions. Is anything that we do online really "private?"
  •  
    It's a little depressing, isn't it? One solution would be stronger oversight for the NSA. We could assume they can see everything, but have stronger assurances that they're using that power responsibly.
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
krschroeder9

The Importance of Understanding Encryption in Cybersecurity - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
shalinnaik17

kevin mitnick - Twitter Search - 1 views

  •  
    Can you update this link to point to Kevin Mitnick's Twitter page? It just goes to the search results right now.
mmukhin

Edward Snowden says Facebook is just as untrustworthy as the NSA - Vox - 0 views

  •  
    We need to really pay attention to how many different apps and resources we have connected to big sites like facebook, and google. Heck, Apple as a whole essentially has our entire lives on record. Don't link everything to facebook or google, and maybe consider diversifying your technology.
  •  
    Companies don't require a warrant to conduct data searches of their customers. The safest way to ensure that your data remains private while using services from a company is to use client based end to end encryption.
chetchetchetchet

The state of privacy in America | Pew Research Center - 1 views

  •  
    To any future college students: Be careful of what you type on the internet or reveal about yourself in an online forum. Despite the shocking revelations of the size and scope of the government's surveillance programs revealed by Edward Snowden, the majority of Americans don't understand the kind of information the government has on them, have taken few steps to protect their online data, and believe that such programs don't go far enough in tackling terrorism. Ironically, these same Americans also overwhelmingly believe that consumers have lost protection of their data to companies who have used their clients' privacy as a commodity. I would advise you to be careful of what you post online, and follow a few steps, such as passwords, encryption, and clearing your cookies, to help protect at least some of your data online and allow you to remain private. These programs continue to this day, and it's important that you protect what little privacy remains.
  •  
    What are the mechanisms behind surveillance? How precisely are people surveilled in the US?
1 - 20 of 21 Next ›
Showing 20 items per page