anonymity   7197

« earlier    

Why OPSEC Is for Everyone, Not Just for People with Something to Hide
Originally posted by CyberSecStu on, reposted here with permission from him
OPSEC (Operational Security) is a term derived from the U.S. military and is an analytical process used to deny an adversary information that could compromise the secrecy and/or the operational security of a mission. The very process of performing OPSEC or protecting yourself from an adversary not only plays a very important role in both offensive and defensive security strategies but also in everyday life.
Examples of OPSEC that pertain to this article include protecting the real identity of someone who has chosen to create a pseudonym that black hat and white hat hackers most commonly will undertake online. The process of ensuring that critical information, such as IP addresses, language used, writing styles, email accounts, personal traits etc. cannot be used to unmask their real identity is a constant process.
privacy  security  anonymity  data  sharing  social_media 
8 days ago by rgl7194
Tribler Invented 'Paid' Torrent Seeding Over a Decade Ago - TorrentFreak
Over the past weeks, there has been a lot of discussion about 'paid' seeding, which is one of the new proposals from the Tron/BitTorrent team. However, this idea is far from new. The Tribler research team has been working on its 'bandwidth as currency' idea for over a decade, and they now have a fully operational token marketplace in their torrent client.
During the early days of BitTorrent, bandwidth was relatively scarce.
Torrent sites encouraged users to keep their clients running, to ensure that downloads would finish in ‘just’ a few hours.
Torrent streaming requires even more bandwidth. To address this, a group of top researchers came up with a new idea. What if we treated bandwidth as a currency?
“P2P dies or thrives depending on how much upload people donate. By introducing electronic ‘currency’ for uploads the researchers think they can make P2P HDTV Video on Demand possible,” we wrote, back in 2007.
bittorrent  p2p  piracy  blockchain  bitcoin  research  anonymity  encryption  tor 
10 days ago by rgl7194
Anonymity on the Internet Must be Protected
1995 analysis of anonymity on the internet, along with important cases
anonymity  society  law  internet 
12 days ago by tswaterman
Banksy Bought My House
A funny story of an artist trying to be anonymous
banksy  art  funny  anonymity  england 
15 days ago by nelson
A linguist examines the anonymous NY Times OpEd - YouTube
"linguistic camouflage"
transmitting lots of information about ourselves unconsciously
engineered document
anonymity  linguistics 
4 weeks ago by robincamille
BBC Family & Education News - Parental Alienation | Facebook
Nikki Jenkins and Susanna Cooper from the Family & Education Facebook page sourced a really interesting story about parental alienation which is when one parent turns a child against the other parent. Branwen Jeffries and Katherine Smith then developed the story for the Ten and for online. Because of the sensitive nature of the story, the parent’s story was anonymised using animation by Sumi Senthinathan – this is a digital first story and an example of how to tell an important story which has issues of anonymity.
video  verticalvideo  bbc  anonymity  animation  education 
4 weeks ago by paulbradshaw
Inside Amazon’s Fake Review Economy
A vast web of Amazon review fraud lives online, and it's designed to evade the company’s efforts to thwart it.
articles  amazon  internet  reviews  anonymity 
5 weeks ago by gmisra

« earlier    

related tags

2018  5g  abuse  academic  accesspoint  accounts  activism  ads  advertising  against  aggregation  algorithm  algorithms  amazon  anchorless  android  animation  anime  anonymisation  anonymization  anonymous  antiforensic  antiforensics  antisurveillance  antitracking  ap  app  art  articles  assemblage  autonomy  banksy  bbc  behaviour  birthday  bitcoin  bittorrent  block  blockchain  bots  brave  browser  browsers  camera  cd  censorship  chat  chatroom  city  cocktail  code  coding  commentary  comments  communication  communications  community  computer_security  cookies  cool_things  correlation  costs  countersurveillance  countersurveillant  critique  crowdsourcing  cryptocurrency  cs  data  dataprivacy  dataprotection  dc:creator=balljames  dctagged  deanonymisation  deanonymize  decentralized  deleting  deletion  demographics  density  differential  digitalidentity  distribution  distro  dot  dota  dynamic  echo  economics  education  eff  electrum  email  encryption  encyption  england  ethics  eu  europe  examples  exchange  experimental  explanation  face  facebook  facial  fail  fandom  filter  finance  fingerprint  firefox  folklore  forensics  free  fun  funny  gallic  geolocation  global  good  google  gov2.0  guides  hacking  hardware  history  hosting  howto  hsu  https  huge-data-the-biggest  identity  illusion  inference  instability  intel  internet  iot  journalism  juggalo  k-anonymity  k-map  k  kyc  l-diversity  labor  lasell  law  layer  linguistics  links  linux  live  location  machine-learning  machine_learning  machinelearning  makeup  map  mapping  matching  mathematics  media  mediax  metadata  misanthropy  mob  mobile  mostly-modern  name  netart  network-structure  news  newspapers  nlp  nyt  nytimes  offline  op-ed  open-closed  opensource  opsec  org:mag  os  otf  p2p  papers  peer-review  people  performance  personaldata  photo  piracy  politics  polling  popsci  positioning  power  printer  printing  privacy  productivity  profiling  programming  proprietary  protocol  proxy  python  q2  quirk  raynerangela  reader-comments  recognition  reconnaissance  registration  regulation  research  resistance  resources  reviews  right  russia  safety  scitariat  secrecy  security  services  sharing  shock  signal-noise  signaling  simple  small_blogs  smart_devices  smart_speaker  smartphone  social-media  social  social_media  socialmedia  society  software  source  spam  spatial  speculation  sql  statistics  steam  stylometry  surveillance  swap  tactics  targeting  tech  techdirt  telemetry_data  temp  testing  third_part_cookies  threat-modeling  time  tls  tool  tools  tor  trackers  tracking  trading  transport  trump  trumpdonald  truth  twitter  uk  usa  usb  users  verticalvideo  video  vpn  wallet  war  web  webapp  weird  wifi  windows  wireguard  world-war  yellow  δ-presence 

Copy this bookmark: