f2c   3139

« earlier    

Baidu and CloudFlare Boost Users Over China’s Great Firewall - The New York Times
The Chinese search giant Baidu and CloudFlare, a start-up based in San Francisco, have joined in an unusual business arrangement to speed Internet traffic into and out of China.
f2c  otf 
september 2015 by ATLynn
Google, Samsung to issue monthly Android security fixes | Reuters
Google Inc and Samsung Electronics Co will release monthly security fixes for Android phones, a growing target for hackers, after the disclosure of a bug designed to attack the world's most popular
otf  f2c 
august 2015 by ATLynn
Cloud-Computing Kingpins Slow to Adapt to Own Movement - WSJ
Cloud-computing kingpins like Amazon, Google and Microsoft are slow to adapt to their own movement, nursing the same worries as their customers: reliability and security.
f2c  otf 
august 2015 by ATLynn
China is putting police officers in internet company offices | The Verge
The Chinese government will begin embedding police officers at some internet companies, Financial Times reports, in an effort to better enforce its notoriously strict web censorship policies.
f2c  otf  China 
august 2015 by ATLynn
Watering holes exploiting JSONP hijacking to track users in China | AlienVault
Imagine if an authoritarian state had a tool to get private information about users visiting certain websites, including real names, mail addresses, sex, birthdays, phone numbers, etc. Imagine that even users that run TOR or VPN connections to bypass the tools that the authoritarian government uses to block and monitor these websites were exposed to this technique. - See more at: https://www.alienvault.com/open-threat-exchange/blog/watering-holes-exploiting-jsonp-hijacking-to-track-users-in-china#sthash.oqjlXcZ1.dpuf
f2c 
june 2015 by ChdHrly
Selective Truths Revealed: The Case of Iranian Search Engines
Those users who credulously turn to Yooz, GorGor, and Parsijoo with their online queries could easily be lead to believe false or misleading information. Moreover, even critical netizens may struggle to tell the pages for the real BBC Persian and the fake one apart, as they look remarkably similar.

In an age when so much of what we know about the world comes from online media sources, exercising control over which websites users see and which ones they don’t endows search engines with considerable power. And when the Iranian government uses that power to promote a specific ideological agenda and exclude alternative viewpoints, the Internet freedom of Iranian citizens suffers.
share  f2c  iran  search  interentfreedom  censorship 
may 2015 by blah
Pro-Russian Videos Get Fake Views With Help From Malware
While it is unclear who is behind the campaign, Trustware experts speculate that those who spread the exploit kit and the malware simply aimed to make money, and that someone else paid them to add fake views to pro-Russian propaganda videos.
Trustware  share  f2c  russia  malware  propaganda 
may 2015 by blah
Encryption, Anonymity, and the “Right to Science”
The encryption and anonymity debate requires us to dig deeper into aspects of human rights that are particular, unique, to the digital space — to address our “right to science,” and the freedoms that right enables.
privacy  surveillance  interentfreedom  humanrights  citizenlab  share  f2c  United_Nations  Sarah_McKune 
may 2015 by blah
‘Father of internet’ speaks out against govt demand for back doors in encryption — RT USA
Internet pioneer Vint Cerf said Monday that creating defects in encryption systems for law enforcement, often known as “back doors,” was “super, super risky” and not the “right answer.”
f2c 
may 2015 by ChdHrly
The Interview: Runa Sandvik, the Tor Project and Forbes writer - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
Journalists and governments are engaged in a censorship arms race, believes Runa Sandvik, a security researcher who contributes to the Tor Project and who writes for Forbes.
f2c 
april 2015 by ChdHrly
French TV network blames “an Islamist group” for 11-station blackout | Ars Technica
Websites, Facebook page defaced; TV stations still not fully operational.
f2c 
april 2015 by ChdHrly
Anonymous released a list of ISIS supporter websites and companies in UK and US that are hosting them
The online hacktivist group called Anonymous has released a list of websites related to ISIS and the companies that are hosting these websites.
f2c 
april 2015 by ChdHrly
Pending an executive summary, TrueCrypt is Audited.
April 2, 2015: Phase II analysis is completed.
f2c 
april 2015 by ChdHrly
Netizen Report: Two Bangladeshi bloggers assassinated for critical speech.
Bloggers in Bangladesh are facing increasingly violent threats for their criticism of religious conservatism. In the past month, two bloggers, Oyasiqur Rahman Babu and Avijit Roy, have been hacked to death in public. Both assassinations were allegedly planned and carried out by religious fundamentalists.
f2c 
april 2015 by ChdHrly
Immovable North Korean Authoritarianism Meets Irresistible Moore's Law: Which Wins? | Techdirt
It will be fascinating to watch the social and political ramifications of this silent struggle between tyranny and technology.
f2c 
april 2015 by ChdHrly
Baidu’s traffic hijacked to DDoS GitHub.com | Insight-labs
Almost instantly I saw it was keep trying to load these two URLs: github.com/greatefire/ and github.com/cn-nytimes/ every a few seconds.
f2c 
march 2015 by ChdHrly
"a confederacy of 'privacy' dunces":  what we found under the hood of an 'anonymous' chat app used by millions - Xipiter
Senrio alerted on many more apps but the one that is the subject of this post is apparently used by ~10-30million people
f2c 
march 2015 by ChdHrly
Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica
In the latest security lapse involving the Internet's widely used encryption system, Google said unauthorized digital certificates have been issued for several of its domains and warned misissued credentials may be impersonating other unnamed sites as well.
f2c 
march 2015 by ChdHrly
@OpenTechFund helps share Crypto Terminology
The purpose of this document is not to rigidly define terms for some sort of 'official' use, but rather to serve as an introduction and collective reference to the way terms are commonly used. People will disagree with some of these definitions, and that disagreement is a secondary concern to guiding newcomers to several definitions and giving them the ability to discern which is meant based on context.

This document is not meant to serve as an introduction to cryptography in general, but rather to supplement such guided tutorials and discussions where one is finding unfamiliar terms. If one isn't starting from the very, very beginning (e.g. arithmetic) and encounters a new term - this document should help them understand the term.
encryption  cryptography  share  f2c 
march 2015 by blah

« earlier    

related tags

access  advocacy  ap  apple  archive  arthit  atlantic  awareness  bahrain  beijing  berkman  blackout  cameron  censorship  china  circumvention  citizenlab  civilrights  collateralfreedom  crypto  cryptography  culture  cybercrime  cyberespionage  cyberwarfare  diezeit  dw  email  encryption  finfisher  firechat  foreignpolicy  free_speech  freedomhouse  gfw  global  globalvoices  goldenfrog  google  greatfire  greatfirewall  guardian  guardianproject  hacking  harvard  hk  humanrights  interent  interentfreedom  internet  internet_freedom  internet_governance  internetfreedom  iran  journalism  maker  malware  meek  mesh  microsoft  mlk  mobile  occupyhk  otf  ows  policy  politics  presssfreedom  privacy  propaganda  repression  rtbf  russia  safety  sarah_mckune  search  security  share  snakeoil  social_media  surveillance  tech  technology  tencent  textsecure  thailand  thainetizennetwork  tor  trustware  ucb  uk  united_nations  venezuela  vpn  wechat  whatsapp  xiao 

Copy this bookmark:



description:


tags: