leaks   2040

« earlier    

Twitter
Vom -Komplex bis zur -Aufarbeitung: Der Staat mauert – und gewinnt. Da helfen nur noch große , gerade…
G20-Aufarbeitung  Leaks  NSU-Komplex  from twitter_favs
2 days ago by schmitz
James Bridle: Whistleblowers are a terrible answer to the problems of big tech | WIRED UK
We cannot and must not leave moral decisions about our common future to the consciences of a privileged technological elite
technology  facebook  surveillance  leaks 
4 weeks ago by h_b_
The Myth of Deep Throat - POLITICO Magazine
I get it. In the years since Watergate, the Washington Post’s famous golden source—later revealed to be former FBI No. 2 executive W. Mark Felt—has become practically synonymous with the ideal of the noble leaker. The original Deep Throat “was instrumental in thwarting the conspiracy and bringing [President Richard] Nixon down,” Harry Litman, a former deputy assistant attorney general, approvingly wrote in the Los Angeles Times in May. “Was it wrong for Deep Throat, as FBI official Mark Felt was then known, to guide the investigation?” Washington Post columnist Margaret Sullivan asked in June, in the midst of a column praising leaks and anonymous sources, and inviting more. New York magazine columnist Frank Rich has gone a step further and already announced his casting choice: James Comey is today’s Deep Throat.
leaks  ruleOfLaw  watergate  corruption  fbi 
6 weeks ago by Jswindle
Preventing Flood Damage from Plumbing System Failure
A cracked or damaged pipe, water leak, or any other plumbing system malfunction can be extremely costly if not taken care of in a timely manner.
plumbing  problems  leaks  water  damage 
6 weeks ago by Adventure_Web
West Africa Leaks - ICIJ
West Africa Leaks - ICIJ
tax  ij  leak  ICIJ  Africa  t  s  leaks 
7 weeks ago by paulbradshaw
EFAIL
EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails.
Email is a plaintext communication medium whose communication paths are partly protected by TLS (TLS). For people in hostile environments (journalists, political activists, whistleblowers, ...) who depend on the confidentiality of digital communication, this may not be enough. Powerful attackers such as nation state agencies are known to eavesdrop on email communications of a large number of people. To address this, OpenPGP offers end-to-end encryption specifically for sensitive communication in view of these powerful attackers. S/MIME is an alternative standard for email end-to-end encryption that is typically used to secure corporate email communication.
email  s/mime  OpenPGP  security  leaks 
8 weeks ago by kOoLiNuS

« earlier    

related tags

!course-topics  !search_and_research  6x  7  8  accountability  advertising  africa  again:  aggregator  ahead  algorithms  and  apple  appleby  arm  banking  banksarron  barbados  basement  behavioral  bermuda  bias  biz&it  blacktone  bluebird  brexit  brighthouse  britishvirginislands  buzzfeed  cables  capitalgainstax  carbon  carboncredits  carbonemissions  caulk  caymanislands  censorship  channelislands  classloader  competition  computer  computing  confirmed?  congo  corporate  corrupt  corruption  cruise  culture-war  current-events  damage  data.breaches  data  database  dataset  datasets  davisdavid  dc:creator=murphyrichard  dctagged  democrats  dev  dietcoke  digital  diplomatic  dnc  données  drama  drc  dribbles  duchyofcornwall  duchyoflancaster  duterterodrigo  economy  education  elizabethii  email  environment  ethics  eu  evil  face  facebook  fakenews  fbi  featuredart  finance  flux-stasis  forests  freefolk  fuel  g20-aufarbeitung  galaxy  game  gas  gertlerdan  git  glencore  google  govemichael  greenhamcommon  growth  guardian  guidelines  hacking  hamiltonlewis  hardbrexit  hardware  harristristan  have  haven  highereducation  hillary_clinton  howtoleak  howtoleaktopropublica  howtoleaktothenewyorktimes  howtoleaktothewashingtonpost  hybrid  icij  ij  impact  info-foraging  instruments  integrity  intel  internetofthings  internetresearchagency  investigative.journalism  investment  ios  iosdev  iot  ireland  isleofman  java  jeep  jersey  jm  johnmccain  johnsonboris  journalism  junckerjean-claude  jvm  keystone_xl  kushnerjared  laptop  law  lawsuit  leak  leakers  leaky  leephillip  legal  letter  linekergary  lobbying  location  loses  mac  maintenance  malta  manipulation  marketing  maytheresa  mcnameeroger  media  memory-leak  memory  mi  microdot  mining  misinformation  monarchy  more  mueller  murdochrupert  muscatjoseph  music  myanmar  negotiations  new  news  newspapers  newton  nodeal  nsu-komplex  nuclearweapons  of  offshore  oil  opendaylight  openpgp  org:lite  oxbridge  panama  panamapapers  paper  paradise.papers  paradisepapers  passwords  patent  performance  personaldata  philippines  pipeline  pipes  plane  platform  player  plumbing-maintenance  plumbing  pnc  policy  political  politics  prestonpeter  preventing  princecharles  printer  problems  property  propublica  publishing  putin  reddit  redhatnfv  rees-moggjacob  regularpost  regulation  removing  report  research  responsibility  revelations  ruby  ruleoflaw  russia  s/mime  s  s9  s9:  samsung  saudi_arabia  screper  search  season  secrecy  securedrop  security  selmayrmartin  signal  socialmedia  spoilers  spy  sr-71  sr71  stampduty  starmerkeir  states  strava  summary  supercomputer  surveillance  swift  sécurité  t  tax  taxavoidance  taxevasion  taxhavens  tech  technews  technology  techpeople  testing  the  theap  thebestpeople  thrones  timothynick  tips  tisdallsarah  tools  toryparty  tracker  transition  transparency  trends  troubles  trump  trumpdonald  tuning  twitter  u2  uber  uk  united  universities  universityofcambridge  universityofoxford  us  usa  video  visualization  water  watergate  waterproofing  web  what  whistleblower  whistleblowers  whistleblowing  whitehouse  wikileaks  wonkish  wwdc  x  xiaomi  zuckerbergmark   

Copy this bookmark:



description:


tags: