Group items matching
in title, tags, annotations or urlWhat is cryptography? | TechRadar - 0 views
-
This article, combined with the guide to staying completely anonymous on the internet linked at the end of it, suggest that one of the easiest ways to be anonymous online is to use a private browser like Ghostery, or a private search engine like DuckDuckGo. These services don't track your information the same way that Google does, making your online browsing experience more private and secure.
http://www.davidellis.ca/wp-content/uploads/2014/09/PIP_AnonymityOnline_090513.pdf - 0 views
Tor: What Lies Beneath the Onion's Skin - 3 views
The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views
-
This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
Yik Yak « vanderbilt hustler - 3 views
Online privacy is dead - 2 views
-
With the shutdown of the silk road, the NSA has proven that it is monitoring even the most anonymous parts of the web. This raises some serious questions. Is anything that we do online really "private?"
-
It's a little depressing, isn't it? One solution would be stronger oversight for the NSA. We could assume they can see everything, but have stronger assurances that they're using that power responsibly.
The NSA Can Probably Break Tor's Encryption Keys - 0 views
-
When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
-
When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
1 - 15 of 15
Showing 20▼ items per page