If you want to communicate really securely, you may assume you need some government level spy training, a high tech encrypted phone, or at least a custom operating system. Nope. Not at all. It turns out the most secure communications device available to anyone, anywhere, right now is the humble iPod Touch. At least, that’s what Joseph Cox reports in Wired. After reading the article, I suspect he is correct. […]
Offline Privacy & Security
Good advice from Steven J. Vaughan-Nichols at http://www.zdnet.com/article/sick-of-windows-spying-on-you-go-linux. he writes, “You can try to turn Windows 10’s data-sharing ways off, but, bad news: Windows 10 will keep sharing some of your data with Microsoft anyway.” By the way, this web server runs on Linux. I also use a Linux system for accessing my bank account, investment account, and for a few other online services where I want very high security.
I disagree with the title of this article but will suggest it be required reading for anyone concerned about their own privacy. Karol Markowicz writes about her recent experience from an online dating service. She also mentions several ways in which your private information becomes public, perhaps with your realizing it. See http://nypost.com/2015/07/27/the-myth-of-online-privacy.
Top 10 Ways Your Privacy Is Being Invaded (and Sold, Traded, Auctioned, Analyzed, Repackaged, and Retargeted)
An interesting article that is suggested reading for everyone: Top 10 Ways Your Privacy Is Being Invaded (and Sold, Traded, Auctioned, Analyzed, Repackaged, and Retargeted) by Tom McNichol in Wired at http://www.wired.com/2015/07/top-10-ways-privacy-invaded-sold-traded-auctioned-analyzed-repackaged-retargeted/.
A secret US tribunal ruled late Monday that the National Security Agency is free to continue its bulk telephone metadata surveillance program—the same spying that Congress voted to terminate weeks ago. See http://arstechnica.com/tech-policy/2015/06/secret-us-court-allows-resumption-of-bulk-phone-metadata-spying.
David Cameron has said the U.K. is not a place that will not go into people’s emails and invade their privacy. By that same token, he believes security services should have access to online communications if the U.K. wants to ward off terrorism. “We just want to ensure that terrorists do not have a safe space in which to communicate,” said Cameron. “That is the challenge, and it is a […]
More than 70 million American adults discovered that their personal information had been compromised in 2014, according to projections from a recent nationally representative survey of more than 3,000 American adults, conducted by Consumer Reports. While some of these incidents happened online, the overwhelming majority happened offline, typically at a brick-and-mortar store or a financial institution.
Sen. Rand Paul on Monday hailed a “big victory for privacy” in his fight against the National Security Agency’s bulk data collection program after key provisions of the post-9/11 Patriot Act lapsed late Sunday. “Actually, I think we’re winning,” the Kentucky Republican said on Fox News when asked if the legislative fight was over for the moment. “The president will be rebuked and the president will no longer be able […]
Few government agencies routinely collect more information on every law-abiding American than the Internal Revenue Service. And by targeting the IRS, a group of seemingly sophisticated hackers has now collected their own chunk of that detailed data. On Tuesday the IRS admitted that it had been the target of a breach that compromised 100,000 taxpayers’ files between February and the middle of this month. The IRS says the attackers gained […]
When Edward Snowden fled from the United States to a Hong Kong hotel room, and then on to Russia, he took with him a massive cache of documents from the American intelligence establishment. These would form the main part of the Snowden revelations, which ultimately showed the extent to which ordinary people have been spied upon by the services they use, and by their own governments.