dissident + security   74

Edward Snowden's not the story. The fate of the internet is | Technology | The Observer
The press has lost the plot over the Snowden revelations. The fact is that the net is finished as a global network and that US firms' cloud services cannot be trusted
internet  privacy  security  NSA  suveillance 
july 2013 by dissident
maxcountryman/flask-bcrypt · GitHub
Flask-Bcrypt is a Flask extension that provides bcrypt hashing utilities for your application
security  flask  python  web_development  hash  extension 
september 2012 by dissident
Does Airport Security Really Make Us Safer? | Culture | Vanity Fair
As you stand in endless lines this holiday season, here’s a comforting thought: all those security measures accomplish nothing, at enormous cost. That’s the conclusion of Charles C. Mann, who put the T.S.A. to the test with the help of one of America’s top security experts.
transportation  security  privacy  Transportation_Security_Administration  terrorism  safety 
january 2012 by dissident
Download.Com Caught Adding Malware to Nmap & Other Software
CNET's Download.Com is one of the most popular (currently ranked #174 worldwide by Alexa) and longest-running (been around since 1996) major sites on the Internet. As a download repository, their key value ad was that they screened software to avoid malware, spyware, adware, viruses and other harmful content that certain shady software contains. Even many security experts recommended them as a safe place to download software online. Download.Com is run by CNET, which is part of the 17-billion dollar CBS media empire. Many people assumed that a major site like this wouldn't resort to unethical monetization schemes like adding spyware and other malware to their downloads.
download.com  windows  software  spyware  adware  CNET  privacy  malware  security  open_source  CBS 
december 2011 by dissident
ZCommunications | Governments Turn to Hacking Techniques for Surveillance of Citizens by Ryan Gallagher | ZNet Article
In a luxury Washington, DC, hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know about. The annual Intelligence Support Systems (ISS) World Americas conference is a mecca for representatives from intelligence agencies and law enforcement. But to the media or members of the public, it is strictly off limits.
privacy  security  internet  technology  surveillance  spying 
november 2011 by dissident
scie.nti.st » Hosting Git repositories, The Easy (and Secure) Way
I have been asked more and more these days, "How do I host a Git repository?" Usually it is assumed that some access control beyond simply read-only is involved (some users have commit rights). With access control comes issues of security, and that's a whole other bag of cats. This post is about presenting an answer to this question, without the fuss.
git  server  linux  security 
october 2011 by dissident
AP IMPACT: NYPD eyed US citizens in intel effort - Yahoo! News
NEW YORK (AP) — The New York Police Department put American citizens under surveillance and scrutinized where they ate, prayed and worked, not because of charges of wrongdoing but because of their ethnicity, according to interviews and documents obtained by The Associated Press.
racial_profiling  police  security  privacy  terrorism  New_York  NYPD  muslims 
september 2011 by dissident
Schneier on Security: Protecting Private Information on Smart Phones
AppFence is a technology -- with a working prototype -- that protects personal information on smart phones. It does this by either substituting innocuous information in place of sensitive information or blocking attempts by the application to send the sensitive information over the network.
privacy  Google  Apple  internet  technology  software  security 
june 2011 by dissident
Toxic Plankton feeds on Android Market for two months • The Register
The security of Google Android has once again been called into question after an academic researcher discovered 12 malicious apps hosted in the operating system's official applications market, some that had been hosted there for months and racked up hundreds of thousands of downloads.
security  privacy  Android  Google  market 
june 2011 by dissident
Crypto-Gram: September 15, 1999
As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we consider open source necessary for good security; we have for decades. Public security is always more secure than proprietary security. It's true for cryptographic algorithms, security protocols, and security source code. For us, open source isn't just a business model; it's smart engineering practice.
encryption  security  open_source  proprietary  Bruce_Schneier 
june 2011 by dissident
Why We Need An Open Wireless Movement | Electronic Frontier Foundation
If you sometimes find yourself needing an open wireless network in order to check your email from a car, a street corner, or a park, you may have noticed that they're getting harder to find.
wireless  security  internet  commons  privacy  technology 
april 2011 by dissident
Monitoring America | washingtonpost.com
Today's story, along with related material on The Post's Web site, examines how Top Secret America plays out at the local level. It describes a web of 4,058 federal, state and local organizations, each with its own counterterrorism responsibilities and jurisdictions. At least 935 of these organizations have been created since the 2001 attacks or became involved in counterterrorism for the first time after 9/11.
privacy  FBI  Homeland_Security  police  security  surveillance 
december 2010 by dissident

related tags

accountability  adware  Amazon  Amazong  Android  anonymous  apache  Apple  authentication  backdoor  border  Bruce_Schneier  capitalism  CBS  China  CIA  cloud  CNET  commons  computers  corporations  criminalization  cryptography  culture  cyberwar  cyber_security  David_Price  democrats  development  diplomacy  django  DNC  Donald_Trump  download.com  education  elections  email  encryption  espionage  extension  extremism  facebook  FBI  fedora  files  Firefox  flask  foreign_policy  framework  funding  Gamil  git  Google  government  Great_Britain  green_party  guide  guns  hackers  hacking  hash  history  Homeland_Security  hotels  Huawei  hysteria  ice  immigration  industry  Intel  intelligence_community  internet  iOS  iphone  javascript  JWT  Kaspersky  kindle  law_enforcement  lecture  linux  malware  market  Marriott  MI5  militarization  military  Mozilla  muslims  myths  National_Security_Agency  networking  New_York  North_Korea  NSA  NYPD  open_source  operating_systems  Panera_Bread  passwords  Pennsylvania  Peter_King  police  privacy  programming  proprietary  python  racial_profiling  racism  Ring  RSA  Russia  safety  Saudi_Arabia  schools  secrecy  security  self-defense  selinux  server  servers  sessions  sharing  shootings  social_media  software  spending  spying  spyware  ssl  students  surveillance  suveillance  technology  terrorism  Thomas_Drake  threats  tools  transparency  transportation  Transportation_Security_Administration  tutorial  ubuntu  United_States  Verizon  video  video_games  violence  voting  vulnerability  WannaCry  war  web_development  windows  wireless  wiretapping 

Copy this bookmark:



description:


tags: