Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "of" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Why colleges are prioritizing privacy - 0 views

  •  
    It is possible to have security, but not privacy, so although you believe your data may be secure, your privacy can be being invaded. You wouldn't know by who, so the best thing to do for now until privacy is better regulated is to be mindful of what you are doing on the internet.
2More

Edward Snowden says Facebook is just as untrustworthy as the NSA - Vox - 0 views

  •  
    We need to really pay attention to how many different apps and resources we have connected to big sites like facebook, and google. Heck, Apple as a whole essentially has our entire lives on record. Don't link everything to facebook or google, and maybe consider diversifying your technology.
  •  
    Companies don't require a warrant to conduct data searches of their customers. The safest way to ensure that your data remains private while using services from a company is to use client based end to end encryption.
1More

How "omnipotent" hackers tied to NSA hid for 14 years-and were found at last | Ars Tech... - 1 views

  •  
    Try to avoid opening emails from senders you don't 100% trust and know. Also, routinely check your PC using some kind of antivirus or data scrubbing software to ensure your system hasn't accrued keyloggers or malware that might give bad actors sensitive personal information.
1More

What Surveillance Will Look Like in the Future - The Atlantic - 0 views

  •  
    What have experts predicted for the future of surveillance?
1More

The effectiveness of surveillance technology: What intelligence officials are saying: T... - 2 views

  •  
    How effective has mass surveillance been in preventing terror attacks?
« First ‹ Previous 281 - 294 of 294
Showing 20 items per page