Frontrunner + internet   63

Most Students Don’t Know When News Is Fake, Stanford Study Finds
Preteens and teens may appear dazzlingly fluent, flitting among social-media sites, uploading selfies and texting friends. But they’re often clueless about evaluating the accuracy and trustworthiness of what they find.

Some 82% of middle-schoolers couldn’t distinguish between an ad labeled “sponsored content” and a real news story on a website, according to a Stanford University study of 7,804 students from middle school through college. The study, set for release Tuesday, is the biggest so far on how teens evaluate information they find online. Many students judged the credibility of newsy tweets based on how much detail they contained or whether a large photo was attached, rather than on the source.
society  internet  news  criticalthinking  2016 
november 2016 by Frontrunner
SpaceX Plans Worldwide Satellite Internet with Low Latency, Gigabit Speed
SpaceX has detailed ambitious plans to bring fast Internet access to the entire world with a new satellite system that offers greater speeds and lower latency than existing satellite networks.

The private spacecraft company founded by CEO Elon Musk filed an application Tuesday for satellite space station authorizations with the US Federal Communications Commission. SpaceX recently said that its satellite service’s commercial availability date has not yet been determined, but the application’s technical description mentioned 2019 as a possible time for launching satellites into orbit.

SpaceX wants to launch 4,425 satellites into low-Earth orbits, with altitudes ranging from 715 miles to 823 miles. By contrast, the existing HughesNet satellite network has an altitude of 22,000 miles.
spacex  elonmusk  internet  connectivity  isp  satellites  lowearthorbit  fcc  2016 
november 2016 by Frontrunner
Freedom on the Net 2016
* Internet freedom around the world declined in 2016 for the sixth consecutive year.
* Two-thirds of all internet users – 67 percent – live in countries where criticism of the government, military, or ruling family are subject to censorship.
* Social media users face unprecedented penalties, as authorities in 38 countries made arrests based on social media posts over the past year. Globally, 27 percent of all internet users live in countries where people have been arrested for publishing, sharing, or merely “liking” content on Facebook.
* Governments are increasingly going after messaging apps like WhatsApp and Telegram, which can spread information quickly and securely.
internet  freedom  world  2016 
november 2016 by Frontrunner
I Don’t Like Computers
* I don’t watch videos on computers.
* I barely read Twitter.
* I don’t listen to podcasts.
* I don’t Instagram. Or Snapchat. Or Vine. Or…any of those things.
* I don’t Netflix.
* I don’t Spotify.
* I don’t Uber.
* I don’t have or want an Alexa. Or a Google Home. Or a Sonos.
* I don’t want my light switches connected to the internet.
* Or my fridge.
* Or my thermostat.
* Or really anything except my computer.
opinion  rant  computers  internet  iot  twitter  videos  music  2016 
november 2016 by Frontrunner
How the Soviets Invented the Internet and Why it Didn't Work
On the morning of 1 October 1970, the computer scientist Viktor Glushkov walked into the Kremlin to meet with the Politburo. He was an alert man with piercing eyes rimmed in black glasses, with the kind of mind that, given one problem, would derive a method for solving all similar problems. And at that moment the Soviet Union had a serious problem. A year earlier, the United States launched ARPANET, the first packet-switching distributed computer network that would in time seed the internet as we know it. The distributed network was originally designed to nudge the US ahead of the Soviets, allowing scientists’ and government leaders’ computers to communicate even in the event of a nuclear attack. It was the height of the tech race, and the Soviets needed to respond.
internet  network  sovietunion  theory  politics  failure  history  2016 
october 2016 by Frontrunner
Major Cyberattack Knocks Twitter, Paypal, Spotify Offline Friday
Cyberattacks targeting a little known internet infrastructure company, Dyn, disrupted access to dozens of websites on Friday, preventing some users from accessing PayPal, Twitter and Spotify.

Dyn, whose customers include some of the world's most widely visited websites, said it did not know who was responsible for the outages that began in the Eastern United States, then spread to other parts of the country and overseas.
ddos  iot  hacking  bots  botnet  criminal  dyn  internet  infrastructure  twitter  paypal  spotify  security  2016 
october 2016 by Frontrunner
Hacked Cameras, DVRs Powered Today’s Massive Internet Outage
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.

Earlier today cyber criminals began training their attack cannons on Dyn, an Internet infrastructure company that provides critical technology services to some of the Internet’s top destinations. The attack began creating problems for Internet users reaching an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.
ddos  iot  hacking  bots  botnet  criminal  dyn  internet  infrastructure  twitter  amazon  tumblr  reddit  spotify  netflix  security  2016 
october 2016 by Frontrunner
The Man Behind the Million-dollar Homepage
Alex Tew isn’t really known for following the crowd. His mantra has always been to see what everyone else is focusing on and to do the opposite.

In 2005, Tew was obsessed with one thing: making money, enough to pay his way through a three-year business management course at Nottingham University. For most young people, that would mean taking on a part-time job or going to the bank. But not for Tew, a 21-year-old budding entrepreneur from Wiltshire, England, who created the Million Dollar Homepage and peddled internet advertising space on it at $1 a pixel in 10 by 10 blocks.
internet  website  history  alextew  milliondollar  getrichquick  2016 
october 2016 by Frontrunner
150,000 IoT Devices behind the 1Tbps DDoS attack on OVH
Last week, the hosting provider OVH faced 1Tbps DDoS attack, likely the largest one ever seen.

The OVH founder and CTO Octave Klaba reported the 1Tbps DDoS attack on Twitter sharing an image that lists the multiple sources of the attack.

Klaba explained that the servers of its company were hit by multiple attacks exceeding 100 Gbps simultaneously concurring at 1 Tbps DDoS attack. One of the attacks documented by the OVH reached 93 MMps and 799 Gbps.
ddos  iot  internet  hacking  2016 
september 2016 by Frontrunner
2 out of 3 Young Millennials Now Use an Ad Blocker
A new survey from Anatomy Media has found that two-thirds of young millennials now use ad blockers on desktop or mobile devices to avoid intrusive ads, improve privacy, and enjoy other benefits.

The report titled Millennials At The Gate was based on a survey of 2,700 millennials aged 18 to 24. The group, which represents young millennials across the US, was surveyed between June 29 and July 5, 2016.

According to the report, ad blocking has become “an established social norm” among young millennials. And while just 15% of all people across the US currently use an ad blocker, the majority of young adults rely on these tools.
adblock  millennials  internet  advertisement  2016 
september 2016 by Frontrunner
Streisand Effect
The Streisand effect is the phenomenon whereby an attempt to hide, remove, or censor a piece of information has the unintended consequence of publicizing the information more widely, usually facilitated by the Internet. It is an example of psychological reactance, wherein once people are aware something is being kept from them, their motivation to access and spread the information is increased.
streisandeffect  barbrastreisand  internet  wikipedia 
august 2016 by Frontrunner
When Yahoo Ruled the Valley: Stories of the Original ‘Surfers’
Back in the mid-1990s, before Google even existed, the world’s best guides to the internet sat in Silicon Valley cubicles, visiting websites and carefully categorizing them by hand.

They were called surfers, and they were a collection of mostly 20-somethings — including a yoga lover, an ex-banker, a divinity student, a recent college grad from Ohio hungry for adventure — all hired by a start-up called Yahoo to build a directory of the world’s most interesting websites.

Today, with more than one billion websites across the globe, the very notion seems mad. Even then, there was a hint of insanity about the enterprise.
yahoo  history  internet  websites  2016 
july 2016 by Frontrunner
North Korea's Naenara Web Browser: It's Weirder Than We Thought
Naenara Browser is the DPRK’s version of Firefox that comes built into Red Star OS, the official operating system of North Korea. I recently got my hands on Naenara Browser version 3.5. My first impression in playing with it is that this is one ancient version of Firefox. Like maybe more than a half dozen major revisions out of date? It’s hard to tell for sure in cursory checking but the menus remind me of something I used to use 5+ years ago. That’s not too surprising; it’s tough to have a browser and update it all the time, especially with such a small team devoted to the project, as I’m sure they have a lot of other things going on.
internet  browsers  naenara  northkorea  redstaros  os  analysis  2016 
july 2016 by Frontrunner
Russia Asks for the Impossible With its New Surveillance Laws
It’s been a rough month for Internet freedom in Russia. After it breezed through the Duma, President Putin signed the “Yarovaya package" into law—a set of radical “anti-terrorism” provisions drafted by ultra-conservative United Russia politician Irina Yarovaya, together with a set of instructions on how to implement the new rules. Russia’s new surveillance laws include some of Bad Internet Legislation’s greatest hits, such as mandatory data retention and government backdoors for encrypted communications—policies that EFF has opposed in every country where they’ve been proposed.

As if that wasn’t scary enough, under the revisions to the criminal code, Russians can now be prosecuted for “failing to report a crime.” Citizens now risk a year in jail for simply not telling the police about suspicions they might have about future terrorist acts.
internet  russia  surveillance  privacy  security  law  terrorism  encryption  holland  france  usa  2016 
july 2016 by Frontrunner
HTTPS Adoption *Doubled* This Year
Despite being around for over 20 years, HTTPS has always remained very lightly adopted - until now. Data from 2 independent sources show HTTPS adoption has more than doubled in the last year, an unprecedented massive spike in adoption of this security control.
internet  ssl  https  adoptionrate  security  privacy  2016 
july 2016 by Frontrunner
BuiltWith
Find out what websites are built with.
webdev  websites  technology  architecture  analysis  lookup  internet  cdn  statistics  tool 
july 2016 by Frontrunner
How the Internet was Invented
In the kingdom of apps and unicorns, Rossotti’s is a rarity. This beer garden in the heart of Silicon Valley has been standing on the same spot since 1852. It isn’t disruptive; it doesn’t scale. But for more than 150 years, it has done one thing and done it well: it has given Californians a good place to get drunk.

During the course of its long existence, Rossotti’s has been a frontier saloon, a gold rush gambling den, and a Hells Angels hangout. These days it is called the Alpine Inn Beer Garden, and the clientele remains as motley as ever. On the patio out back, there are cyclists in spandex and bikers in leather. There is a wild-haired man who might be a professor or a lunatic or a CEO, scribbling into a notebook. In the parking lot is a Harley, a Maserati, and a horse.

It doesn’t seem a likely spot for a major act of innovation. But 40 years ago this August, a small team of scientists set up a computer terminal at one of its picnic tables and conducted an extraordinary experiment. Over plastic cups of beer, they proved that a strange idea called the internet could work.
internet  history  vintcerf  robertkahn  innovation  arpanet  network  2016 
july 2016 by Frontrunner
How the Internet is Killing Religion -- Part 1
This chart comes from a study by Allen Downey, a computer scientist at the Olin College of Engineering in Massachusetts. The two charts show the correlation between the rise in the use of the Internet (the blue line on the top) and the percentage of Americans who say they have no religious affiliation. As you can see, as more and more people use the Internet, more and more people have become less religious. Using data from the University of Chicago, Downey determined that the biggest influence on religious affiliation is religious upbringing. That is, people tend to believe what they were raised to believe. Similarly, college-level education correlates with the drop in religious affiliation. That is, people who go to college are less likely to be religious.
religion  christianity  mormons  internet  atheism  johndraper  2016 
july 2016 by Frontrunner
Why People Block Ads (and What It Means for Marketers and Advertisers)
Everyone today has an opinion about online ads. At HubSpot, we wear two hats: we’re online marketers and online browsers who consume voracious amounts of content. So the ad blocking phenomenon, and the debate surrounding it, is incredibly interesting for us as observers. As inbound marketers, we see the need for businesses and content creators to hit their bottom line, but as online content consumers, we also see a lot of annoying ads.
internet  business  commercial  adblock  marketing  statistics  users  opinions  2016 
july 2016 by Frontrunner
Why Networks Need ASICs
Tomorrow's networks are driving price and performance requirements that call for custom silicon, according to a senior manager for a company using ASICs.

Networks are in trouble. The volume of data, applications and transactions hitting data centers is increasing at an exponential pace. Add in predictions that by 2020 users will own as many as 25 connected devices and, according to Cisco, the Internet of Things will account for as many as 50 billion new IP-enabled devices and you can see a tsunami of traffic headed our way.
hardware  asic  routing  encryption  performance  internet  network  google  apple  microsoft  fortinet  barefootnetworks  2016 
july 2016 by Frontrunner
HTTPS Crypto's Days are Numbered. Here’s How Google Wants to Save It
Braithwaite said the field of post-quantum cryptography is rapidly developing and referred readers to three recently published research papers. These papers contribute to the growing body of knowledge involving quantum-resistant algorithms. Given the flux, Google's use of Ring-LWE should be seen as proof-of-concept method that stokes further inquiry rather than a finished product.
https  encryption  quantumcomputers  security  google  chrome  ringlwe  cryptography  proofofconcept  webbrowsers  internet  surveillance  2016 
july 2016 by Frontrunner
Penetration Testing Tools Cheat Sheet
- Recon and Enumeration
- - NMAP Commands
- SMB enumeration
- - Other Host Discovery
- - SMB Enumeration
- Python Local Web Server
- Mounting File Shares
- Basic Finger Printing
- SNMP Enumeration
- DNS Zone Transfers
- DNSRecon
- HTTP / HTTPS Webserver Enumeration
- Packet Inspection
- Username Enumeration
- - SMB User Enumeration
- - SNMP User Enumeration
- Passwords
- - Wordlists
- Brute Forcing Services
- - Hydra FTP Brute Force
- - Hydra POP3 Brute Force
- - Hydra SMTP Brute Force
- Password Cracking
- - John The Ripper - JTR
- Exploit Research
- Windows Penetration Testing Commands
- Linux Penetration Testing Commands
- Compiling Exploits
- - Identifying if C code is for Windows or Linux
- - Build Exploit GCC
- - GCC Compile 32Bit Exploit on 64Bit Kali
- - Compile Windows .exe on Linux
- SUID Binary
- - SUID C Shell for /bin/bash
- - SUID C Shell for /bin/sh
- - Building the SUID Shell binary
- Reverse Shells
- TTY Shells
- - Python TTY Shell Trick
- - Spawn Interactive sh shell
- - Spawn Perl TTY Shell
- - Spawn Ruby TTY Shell
- - Spawn Lua TTY Shell
- - Spawn TTY Shell from Vi
- - Spawn TTY Shell NMAP
- Metasploit
- - Meterpreter Payloads
- - Windows reverse meterpreter payload
- - Windows VNC Meterpreter payload
- - Linux Reverse Meterpreter payload
- Meterpreter Cheat Sheet
- Common Metasploit Modules
- - Remote Windows Metasploit Modules (exploits)
- - Local Windows Metasploit Modules (exploits)
- - Auxilary Metasploit Modules
- - Metasploit Powershell Modules
- - Post Exploit Windows Metasploit Modules
- Networking
- - TTL Fingerprinting
- IPv4
- - Classful IP Ranges
- - IPv4 Private Address Ranges
- - IPv4 Subnet Cheat Sheet
- ASCII Table Cheat Sheet
- CISCO IOS Commands
- Cryptography
- - Hash Lengths
- - Hash Examples
- SQLMap Examples
internet  security  penetrationtesting  tools  cheatsheet  2016 
june 2016 by Frontrunner
Drowning in a Sea of Information
Try to remember the last time your phone was not the first thing you reached for in the morning. I can’t recall a time when it wasn’t.

Every morning my alarm goes off at 6:30 am. Before I lug my sluggish body from under the security of my warm sheets, I reach for my phone, pull it up inches away from my face, and start scrolling through whatever I missed overnight. This is not only the beginning of my morning routine, but also a routine behavior throughout the rest of my day — obsessively checking, collecting, and consuming content until I close my eyes and try to disconnect my brain for the night. This behavior is called Infomania, which is defined as “the compulsive desire to check or accumulate news and information, typically via cell phone or computer.”
infomania  internet  addiction  news  informationoverload  fomo  fearofmissingout  health  memory  memoryloss  learning  2016 
june 2016 by Frontrunner
6 in 10 of You Will Share This Link without Reading it, a New, Depressing Study Says
On June 4, the satirical news site the Science Post published a block of "lorem ipsum" text under a frightening headline: "Study: 70% of Facebook users only read the headline of science stories before commenting."

Nearly 46,000 people shared the post, some of them quite earnestly — an inadvertent example, perhaps, of life imitating comedy.
socialmedia  internet  culture  sharing  reading  science  dummytext  idiocracy  2016 
june 2016 by Frontrunner
I Created Godwin's Law in 1990, But it Wasn't a Prediction - It was a Warning
Although I'm proud of my career-spanning work on internet rights and freedoms, my biggest claim to internet notoriety is my little social experiment, Godwin's Law, which I crafted back in the days before there was large-scale public access to the internet.

Based on my own early experience of online arguments, I had come up with this mock "law," which was meant to have the sound and seeming inevitability of a law of physics or mathematics: "As an online discussion continues, the probability of a comparison to Hitler or to Nazis approaches 1."
godwinslaw  internet  nazi  discussion  arguments  culture  2016 
june 2016 by Frontrunner
MPs' Private Emails are Routinely Accessed by GCHQ
GCHQ and the US National Security Agency (NSA) have access to intercepted emails sent and received by all members of the UK Parliament and peers, including with their constituents, a Computer Weekly investigation has established.
internet  surveillance  intelligence  privacy  gchq  nsa  membersofparliament  2016 
june 2016 by Frontrunner
How DNS Works
A fun and colorful explanation of how DNS works.
internet  dns  howstuffworks  learning 
june 2016 by Frontrunner
Why You Should Bet Big on Privacy
The whole idea behind privacy by design is to provide protection now and in the future, regardless of governance, corruption and security breaches. When done right, privacy can vastly reduce the impact of attacks on your business and reputation, since there would be no sensitive data to leak.

Ideally though, we shouldn’t care about privacy. Not because it’s unimportant, but rather because it would be by default in everything, offering an ethical baseline that makes us feel safe. We shouldn’t have to worry about our privacy, just as we shouldn’t have to worry about war, discrimination, hunger, disease or money.

If you are a CEO, you have two choices: be in denial, ignore privacy and risk your company disappearing if the market turns; or, be a forward-thinking leader who embraces it as a strategic advantage, thereby building a future-proof organization that is both ethical and beneficial to society.
surveillance  privacy  privacybydesign  internet  webdev  business  businesspractice  tracking  advertisement  capitalism  2016 
may 2016 by Frontrunner
Going Dark: Online Privacy and Anonymity for Normal People
Last week we got news of the Rosebutt data breach. This is a very particular class of site and like many others we've recently seen compromised, it's highly likely that members would have preferred to keep their identities secret. It doesn't matter if you don't agree with the lifestyle choice of those on the site and certainly I myself am not one to look around the house at everyday items and think "I wonder if that could...". That's entirely beside the point though which is that a bunch of consenting adults now have their identities in the hands of an untold number of people who are willingly sharing the data around web. But it didn't have to be that way.
privacy  security  anonymize  internet  scams  tor  email  bestpractices  2016 
may 2016 by Frontrunner
Why a Staggering Number of Americans Have Stopped Using the Internet the Way They Used To
Nearly one in two Internet users say privacy and security concerns have now stopped them from doing basic things online — such as posting to social networks, expressing opinions in forums or even buying things from websites, according to a new government survey released Friday.

This chilling effect, pulled out of a survey of 41,000 U.S. households who use the Internet, show the insecurity of the Web is beginning to have consequences that stretch beyond the direct fall-out of an individual losing personal data in breach. The research suggests some consumers are reaching a tipping point where they feel they can no longer trust using the Internet for everyday activities.
internet  surveillance  effects  economy  privacy  security  2016 
may 2016 by Frontrunner
Mark Zuckerberg is a Hypocrite - Facebook has Destroyed the Open Web
Mark Zuckerberg appeared presidential last month. In a speech he gave at an annual Facebook event, he said travelling around the world has worried him: "I am starting to see people and nations turning inward — against this idea of a connected world and a global community."

He showed dismay for "fearful voices calling for building walls and distancing people they label as 'others.'" Then, like a powerful world leader, he called on everyone: "Instead of building walls, we can help people build bridges. And instead of dividing people, we can help bring people together."

That is all quite ironic to me, and I'll tell you why. In 2014, I was pardoned and released from a prison in Tehran where I spent six years over my web activism. Before I was imprisoned in 2008, all the hype and rage on the internet was found on blogs.
facebook  markzuckerberg  openweb  internet  web  closedgarden  2016 
may 2016 by Frontrunner
Bill Gates' Worst Decisions as CEO, According to a Longtime Microsoft Exec
Bill Gates served as Microsoft CEO for nearly 25 years, until he stepped down in 2000.

In that span, he turned a two-man startup into a tech juggernaut worth hundreds of billions of dollars, becoming the world's richest man along the way.

But every great CEO makes mistakes, and according to Brad Silverberg, who's spent nine years as Microsoft's SVP from 1990, Gates made two critical mistakes that hampered the company's business in some ways: His weak lobbying efforts and failure to take advantage of the internet early on.
billgates  microsoft  ceos  mistakes  lobbying  internet  2016 
april 2016 by Frontrunner
Edward Snowden: The Internet is Broken
In 2013, a now-infamous government contractor named Edward Snowden shined a stark light on our vulnerable communications infrastructure by leaking 10,000 classified U.S. documents to the world.

One by one, they detailed a mass surveillance program in which the National Security Administration and others gathered information on citizens — via phone tracking and tapping undersea Internet cables.

Three years after igniting a controversy over personal privacy, public security, and online rights that he is still very much a part of, Snowden spoke with Popular Science in December 2015 and shared his thoughts on what's still wrong and how to fix it.
internet  society  privacy  security  snowden  nsa  surveillance  hacking  2016 
april 2016 by Frontrunner
Gone In Six Characters: Short URLs Considered Harmful for Cloud Services
Short URLs produced by bit.ly, goo.gl, and similar services are so short that they can be scanned by brute force. Our scan discovered a large number of Microsoft OneDrive accounts with private documents. Many of these accounts are unlocked and allow anyone to inject malware that will be automatically downloaded to users’ devices. We also discovered many driving directions that reveal sensitive information for identifiable individuals, including their visits to specialized medical facilities, prisons, and adult establishments.
internet  urlshorteners  security  privacy  hacking  scanning  bitly  onedrive  googlemaps  microsoft  google  2016 
april 2016 by Frontrunner
Tightening the Net: Iran's National Internet Project
Since 2006, the Iranian authorities have been discussing plans for a 'National Internet'. While talk of increased Internet access and connectivity inside Iran was welcomed, the National Internet Project also poses risks of increased censorship and the effective isolation of Iran from the World Wide Web, marking it as a serious threat to freedom of expression and the free flow of information within a country already notorious for censorship.
iran  network  internet  censorship  privacy  2016 
april 2016 by Frontrunner
ReadWrite
ReadWrite covers Web 2.0 and Web technology in general, and provides industry news, reviews, and analysis.
news  web20  webdev  internet  development  iot  technology 
april 2016 by Frontrunner
Lumen
The Lumen database collects and analyzes legal complaints and requests for removal of online materials, helping Internet users to know their rights and understand the law. These data enable us to study the prevalence of legal threats and let Internet users see the source of content removals.
internet  online  material  content  removal  censorship  law  legal  website 
march 2016 by Frontrunner
The Free Internet Project
The Free Internet Project is a nonprofit whose mission is to provide the public with information about the latest legal and technological efforts to protect Internet freedoms around the world.
internet  privacy  countries  world  map 
march 2016 by Frontrunner
XKeyscore: NSA Tool Collects 'Nearly Everything a User Does on the Internet'
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.
privacy  nsa  xkeyscore  surveillance  internet  snowden  2013 
march 2016 by Frontrunner
HTTP 2.0 is Coming, Be Ready
HTTP has been in use by the World-Wide Web global information initiative since 1990. However, it is December 2014 and we don’t have anymore simple pages with cross linked HTML documents as it used to be. Instead, we have Web applications, some of them very heavy and requiring a lot of resources. And unfortunately, the version of the HTTP protocol currently used – 1.1, has issues.
internet  http2  performance  2014 
march 2016 by Frontrunner
Ecma International
Ecma International is an industry association founded in 1961, dedicated to the standardization of information and communication systems.
internet  standards  ecma  ecmascript  javascript  js 
march 2016 by Frontrunner
World Wide Web Consortium (W3C)
The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web standards.
internet  standards  w3c 
march 2016 by Frontrunner
W3Techs - World Wide Web Technology Surveys
W3Techs provides information about the usage of various types of technologies on the web.
trends  web  internet  technology  statistics  usage 
march 2016 by Frontrunner
Web Technology Usage Trends
Web and Internet technology usage statistics.
trends  web  internet  technology  statistics  usage 
march 2016 by Frontrunner
A Look at the Inner Workings of NSA’s XKEYSCORE
The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything — write an email, post to a social network, browse the web or play a video game — there’s a decent chance that the Internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.
nsa  xkeyscore  internet  surveillance  2015 
march 2016 by Frontrunner
The Research Pirates of the Dark Web
After getting shut down late last year, a website that allows free access to paywalled academic papers has sprung back up in a shadowy corner of the Internet.
internet  darkweb  research  piracy  filesharing  2016 
march 2016 by Frontrunner
The Sound of the Dialup, Pictured
If you ever connected to the Internet before the 2000s, you probably remember that it made a peculiar sound. But despite becoming so familiar, it remained a mystery for most of us. What do these sounds mean?
internet  connectivity  56k  modems  signals  2015 
june 2015 by Frontrunner
The Future of the Open Web
I’ve spent a lot of time in my career writing and talking about future web features, from CSS3 to Web Components. But I’ve recently come to realise that, while I still think these features are important, I’ve been missing out on the bigger picture: the survival of the open web. That sounds hyperbolic, I know, but so many articles I’ve read, conversations I’ve had, and behaviours I’ve observed, have led me to the conclusion that the open web, in the form we know it now, is under threat.
internet  www  openweb  native  2015 
may 2015 by Frontrunner
I Read All the W3C Specs
Sanders Kleinfeld read through all the 2014+ W3C specifications and here is what he thinks.
internet  w3c  specifications  2015 
may 2015 by Frontrunner
Trackers and Bank Accounts
A Finnish online bank used to include a third-party analytics and tracking script in all of its pages.
internet  security  privacy  2015 
april 2015 by Frontrunner
The Failed Promise of Deep Links
Will Deep Links Ever Truly Be Deep?

The buzz over linking mobile apps obscures links’ true potential: to create profound networks of knowledge and share power more widely.
internet  links  2015 
april 2015 by Frontrunner
Ask HN: Successful one-person online businesses?
How many people on hacker news are running successful online businesses on their own? What is your business and how did you get started?

Defining successful as a profitable business which provides the majority of the owners income.
business  internet  hackernews  2014 
april 2015 by Frontrunner
The Shut-In Economy
In the new world of on-demand everything, you’re either pampered, isolated royalty — or you’re a 21st century servant.
culture  internet  social 
march 2015 by Frontrunner
BoS: NSA is monitoring key internet routers - Puzzle Palace Author
Julian Assange writes about the NSA monitoring of the Internet in 1996.
privacy  nsa  internet  surveillance 
march 2015 by Frontrunner
A cookie can last 7,984 years, according to new international privacy study
An international study led by the UK’s Information Commissioner’s Office (ICO) into the use of cookies has revealed that some websites are placing cookies on computers and other devices that will long outlast the usefulness of the device.
internet  privacy  cookies 
march 2015 by Frontrunner
HTTP/2 Explained
This document describes the protocol HTTP/2 at a technical and protocol level. Background, the protocol, the implementations and the future.
http2  internet  protocol  document 
february 2015 by Frontrunner
Why Internet users all around the world should be worried about China’s Great Firewall - The Washington Post
Raising alarm bells, news emerged in December that the Cyberspace Administration of China was now in charge of the China Internet Network Information Center (CNNIC), the authority that issues digital certificates to Web sites here and tells users that they are safe to visit.
china  internet  censorship  privacy 
february 2015 by Frontrunner
SwiperProxy
A lightning-fast, open source web proxy that is easy for you to run and customize.
proxy  web  internet  opensource 
february 2015 by Frontrunner
The Second “Crypto War” and the Future of the Internet
The first crypto war was fought in the early 1990s. Back then, the U.S. authorities was afraid that the bad guys would get their hands on cryptography that would prevent the authorities from getting their hand on the data. That's why we saw 40-bit encryption for browsers outside outside of the U.S.A. Well, it never stopped bad guys from getting their hand on strong cryptography.

Now it's time for round two.
cryptography  browsers  internet  security  encryption  privacy  bigbrother 
january 2015 by Frontrunner
Who’s Attacking Whom? Realtime Attack Trackers
Brian Krebs takes a look at the multiple ways online attacks and attackers are tracked around the globe in real-time.
security  ddos  cyberwar  internet  tracking  surveillance 
january 2015 by Frontrunner
Freemail
Freemail is an email system for Freenet. It allows you to send anonymous emails to other Freenet users using your standard email client. It is currently not bundled in the Freenet installer, and has to be downloaded separately. You can also try the Freemail plugin by selecting it from the list on the plugins page of your Freenet node.
privacy  email  internet 
january 2015 by Frontrunner

related tags

56k  adblock  addiction  adoptionrate  advertisement  alextew  amazon  analysis  anonymize  apple  architecture  arguments  arpanet  asic  atheism  barbrastreisand  barefootnetworks  bestpractices  bigbrother  billgates  bitly  botnet  bots  browsers  business  businesspractice  capitalism  cdn  censorship  ceos  cheatsheet  china  christianity  chrome  closedgarden  commercial  community  computers  connectivity  content  cookies  countries  criminal  criticalthinking  cryptography  culture  cyberwar  darkweb  ddos  developers  development  discussion  dns  document  dummytext  dyn  ecma  ecmascript  economy  effects  elonmusk  email  encryption  facebook  failure  fcc  fearofmissingout  filesharing  fomo  fortinet  france  freedom  gchq  getrichquick  godwinslaw  google  googlemaps  hackernews  hacking  hardware  health  history  holland  howstuffworks  http2  https  idiocracy  infomania  informationoverload  infrastructure  innovation  intelligence  internet  iot  ipaddress  iran  isp  javascript  johndraper  js  law  learning  legal  links  lobbying  lookup  lowearthorbit  map  marketing  markzuckerberg  material  membersofparliament  memory  memoryloss  microsoft  millennials  milliondollar  mistakes  modems  mormons  mozilla  music  naenara  native  nazi  netflix  network  news  northkorea  nsa  onedrive  online  opensource  openweb  opinion  opinions  os  paypal  penetrationtesting  performance  piracy  politics  privacy  privacybydesign  proofofconcept  protocol  proxy  quantumcomputers  rant  reading  reddit  redstaros  religion  removal  research  resources  ringlwe  robertkahn  routing  russia  satellites  scams  scanning  science  security  sharing  signals  snowden  social  socialmedia  society  sovietunion  spacex  specifications  spotify  ssl  standards  statistics  streisandeffect  surveillance  technology  terrorism  theory  tool  tools  tor  tracking  trends  tumblr  twitter  urlshorteners  usa  usage  users  videos  vintcerf  w3c  web  web20  webbrowsers  webdev  website  websites  whois  wikipedia  world  www  xkeyscore  yahoo 

Copy this bookmark:



description:


tags: