aldolat + privacy   55

Cryptomator: Free Cloud Encryption for Dropbox & Others
Free client-side encryption for your cloud files. Open source software: No backdoors, no registration.
encryption  privacy  security  cloud 
2 days ago by aldolat
Cryptomator come possibile erede di TrueCrypt
Cryptomator infatti permette di creare container di file inaccessibili senza la giusta chiave, scelta dall’utente e impostata esclusivamente Client Side, senza quindi che avvenga comunicazione alcuna con server della società o terze entità ulteriori.
encryption  privacy  security  cloud 
7 days ago by aldolat
Not So Pretty: What You Need to Know About E-Fail and the PGP Flaw | Electronic Frontier Foundation
Don’t panic! But you should stop using PGP for encrypted email and switch to a different secure communications method for now.
PGP  GnuPG  OpenPGP  bug  attack  exploit  email  security  privacy 
7 days ago by aldolat
EFAIL
EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails.
PGP  GnuPG  OpenPGP  bug  attack  exploit  email  security  privacy 
7 days ago by aldolat
Mail criptate, c'è un bug enorme che permette di leggere i messaggi. Anche quelli già spediti
Un ricercatore europeo ha trovato un enorme bug nel sistema PGP e S/MIME utilizzato per codificare le email end to end: non solo è possibile leggere il testo delle mail crittografate in chiaro, ma si può risalire anche ai vecchi messaggi.
PGP  GnuPG  OpenPGP  bug  attack  exploit  email  security  privacy 
8 days ago by aldolat
Guida all'applicazione del Regolamento europeo in materia di protezione dei dati personali - Garante Privacy
La Guida intende offrire un panorama delle principali problematiche che imprese e soggetti pubblici dovranno tenere presenti in vista della piena applicazione del regolamento, prevista il 25 maggio 2018.
GDPR  privacy  Europe 
22 days ago by aldolat
Russia is Banning Telegram
If you want secure messaging, use Signal. If you're concerned that having Signal on your phone will itself arouse suspicion, use WhatsApp.
Telegram  security  privacy  encryption 
28 days ago by aldolat
Why You Should Stop Using Telegram Right Now 
Telegram has a wide range of security issues and doesn’t live up to its proclamations as a safe and secure messaging application.
security  encryption  privacy  Telegram 
28 days ago by aldolat
La TV svizzera indaga sull’Internet delle Cose: quante telecamere vulnerabili | Il Disinformatico
Nei mesi scorsi ho collaborato con la trasmissione Patti Chiari della Radiotelevisione Svizzera per esplorare l’Internet delle Cose.
IoT  privacy  security  TV 
5 weeks ago by aldolat
The GDPR Framework — WordPress Plugins
The easiest way to make your WordPress site GDPR compliant!
GDPR  privacy  Europe 
5 weeks ago by aldolat
Free Secure Email Certificate with Digital Signature
Start protecting your digital communications with Comodo secure certificate
S_MIME  cryptography  encryption  signature  free  email  privacy  certificate 
6 weeks ago by aldolat
Certificates for secure electronic mail | Actalis S.p.A.
Make your email secure by sending signed and/or encrypted messages.
S_MIME  cryptography  encryption  signature  free  email  privacy  certificate 
6 weeks ago by aldolat
Cambridge Analytica e Facebook. I dati personali valgono oro ma le persone li regalano
Convincere qualcuno a votare per un partito non è molto diverso dal convincerlo a comprare il dentifricio di una marca ben precisa, basta solo sapere su cosa fare leva.
privacy  Facebook 
8 weeks ago by aldolat
GDPR: How it Affects WordPress Site Owners and Developers - WPMU DEV
If you haven’t been living under a rock for the last few months, there’s a very good chance you’ve heard of GDPR, or the General Data Protection Regulation.
GDPR  privacy  Europe 
9 weeks ago by aldolat
New Team Forms to Facilitate GDPR Compliance in WordPress Core – WordPress Tavern
GDPR applies to all businesses, organizations, sectors, situations, and scenarios, regardless of a business’s size, head count, or financial turnover. A small app studio is every bit as beholden to these rules as a large corporation.
GDPR  privacy  Europe 
10 weeks ago by aldolat
CryptoParty
CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
november 2017 by aldolat
OpenPGP Best Practices - riseup.net
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  privacy  cryptography 
october 2017 by aldolat
Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
july 2017 by aldolat
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017 by aldolat
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017 by aldolat
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017 by aldolat
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
FCC  data  ISP  privacy  from pocket
july 2017 by aldolat
Guardian Project – People, Apps and Code You Can Trust
Guardian Project creates easy to use secure apps, open-source software libraries, and customized mobile devices that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception and monitoring.
privacy  security 
january 2017 by aldolat
Tactical Technology Collective
Tactical Tech is a non profit that explores the political and social role of technology in our lives.
activism  privacy 
january 2017 by aldolat
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
january 2017 by aldolat
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights  journalism  GnuPG  gpg 
january 2017 by aldolat
Yes, you do have something to hide | Safe and Savvy
“But I have nothing to hide” is an argument that we hear often nowadays.
privacy  letture 
january 2014 by aldolat
How to Erase Yourself From the Internet
Here's how you can become a ghost on the Internet, by tracking down and eliminating your digital past.
social  delete  privacy  account 
november 2013 by aldolat
L’identità in Rete e nel mondo reale « Alessandro Bottoni
Visto che il mio precedente articolo sul Decreto Pisanu ha riscosso un certo interesse, ne approfitto per chiarire alcuni punti (tecnici e filosofici) che riguardano il concetto di identità personale nel mondo fisico ed in quello virtuale (Internet). Se nel caso specifico del Decreto Pisanu NON ha senso tentare di identificare e tracciare tutti gli utenti, indiscriminatamente, esistono però molti casi in cui è necessario conoscere l’identità reale degli utenti. Come si fa in questo casi?
identity  privacy  security 
october 2011 by aldolat
Galet
Galet is a peer-to-peer application, which primarily aims to provide easy to setup secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connection occur between two nodes that has not been explicitly accepted by the users of theses nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited. As Galet features tunneling, it can also be used as a very easy to set-up VPN. Galet is written in C++/Qt, and has been tested under Linux and Windows.
f2f  p2p  vpn  privacy  sharing  security 
december 2010 by aldolat
Care(less|ful) Computing « Alessandro Bottoni
Personalmente, sono d’accordissimo con Stallman ma con un’eccezione: credo che quando si tratta di conservare dati estremamente sensibili fuori dalla portata di persone pericolose, un servizio di “remote storage”, “remote backup” o di “online office” possa essere il migliore alleato.
cloud-computing  privacy  security  stallman 
december 2010 by aldolat
Web Browser Privacy Check
This tool checks what security related information is exposed by your web browser to any website that you visit. By accessing this page via an anonymizing proxy or any other internet privacy solution you can judge how effectively your identity is hidden.
privacy  security  browser  test 
november 2010 by aldolat
MyBrowserInfo.com (My Browser Info)
MyBrowserInfo.com is the fastest and easiest way to determine your IP address and information about your Web browser.
privacy  security  browser  test 
november 2010 by aldolat
Analyze Your Internet Connection - Privacy.net
Analyze Your Internet Connection. Click to analyze your Internet connection (opens new window). Note that this page runs tests, such as trying to open popup windows and checking for open ports. It may trigger some warnings such as from a firewall.
privacy  security  browser  test 
november 2010 by aldolat
BrowserSpy.dk
BrowserSpy.dk is the place where you can see just how much information your browser reveals about you and your system. Did you know that all websites that you visit can find out which fonts you have installed? It's also possible to find out if you have a range of programs installed. These include Adobe Reader, OpenOffice.org, Google Chrome and Microsoft Silverlight. Perhaps even which sites you have visited lately can be detected! When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. BrowserSpy.dk is a service where you can check just what information it's possible to gather from your system, just by visiting a website. Privacy to the ultimate test!
security  privacy  browser  test 
november 2010 by aldolat
Panopticlick
Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits.
privacy  security  browser  test 
november 2010 by aldolat
Ipredator - Surf anonymously with VPN and proxy
You'll exchange the IP-number you get from your ISP to an anonymous IP-number .
You get a safe/encrypted connection between your computer and the Internet.
vpn  proxy  security  privacy 
november 2010 by aldolat
Relakks - Surf anonymously with VPN and proxy
Protect yourself and your family against surveillance. Simply preserve your integrity online with a hidden IP-number via proxy and VPN-encryption.
vpn  proxy  security  privacy 
november 2010 by aldolat
I dieci accorgimenti per la privacy che dovresti assolutamente conoscere | LastKnight.com
Cerchiamo di stilare un elenco di 10 accorgimenti che, pur non rappresentando il “silver bullet” (la “pallottola d’argento” ammazza licantropi), aiutano comunque a controllare meglio cosa rendiamo pubblico di noi stessi.
security  privacy 
july 2010 by aldolat
Delete Your Account
Tool per cancellare account dai social network.
social  account  privacy  security 
april 2010 by aldolat
Create an Encrypted Private Directory with eCryptfs | Tombuntu
eCryptfs is a kernel-native cryptographic filesystem. It’s also a stacked filesystem, eCryptfs must work on top of another filesystem such as Ext3. This means that you don’t need to allocate space for eCryptfs, it will grow and shrink as you add files to it.
linux  security  privacy  filesystem  howto  encryption 
september 2008 by aldolat
How Does Bruce Schneier Protect His Laptop Data? With His Fists -- and PGP
Perhaps encryption isn't so easy after all, and some people could use a little primer. This is how I protect my laptop.
security  privacy  pgp  tips  schneier 
september 2008 by aldolat

Copy this bookmark:



description:


tags: