aldolat + privacy   39

CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
4 weeks ago by aldolat
OpenPGP Best Practices -
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  crittografia  privacy 
6 weeks ago by aldolat
Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
july 2017 by aldolat
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017 by aldolat
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017 by aldolat
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017 by aldolat
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
FCC  data  ISP  privacy  from pocket
july 2017 by aldolat
Guardian Project – People, Apps and Code You Can Trust
Guardian Project creates easy to use secure apps, open-source software libraries, and customized mobile devices that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception and monitoring.
privacy  security 
january 2017 by aldolat
Tactical Technology Collective
Tactical Tech is a non profit that explores the political and social role of technology in our lives.
activism  privacy 
january 2017 by aldolat
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
january 2017 by aldolat
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights  journalism  GnuPG  gpg 
january 2017 by aldolat
Yes, you do have something to hide | Safe and Savvy
“But I have nothing to hide” is an argument that we hear often nowadays.
privacy  letture 
january 2014 by aldolat
How to Erase Yourself From the Internet
Here's how you can become a ghost on the Internet, by tracking down and eliminating your digital past.
social  delete  privacy  account 
november 2013 by aldolat
L’identità in Rete e nel mondo reale « Alessandro Bottoni
Visto che il mio precedente articolo sul Decreto Pisanu ha riscosso un certo interesse, ne approfitto per chiarire alcuni punti (tecnici e filosofici) che riguardano il concetto di identità personale nel mondo fisico ed in quello virtuale (Internet). Se nel caso specifico del Decreto Pisanu NON ha senso tentare di identificare e tracciare tutti gli utenti, indiscriminatamente, esistono però molti casi in cui è necessario conoscere l’identità reale degli utenti. Come si fa in questo casi?
identity  privacy  security 
october 2011 by aldolat
Galet is a peer-to-peer application, which primarily aims to provide easy to setup secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connection occur between two nodes that has not been explicitly accepted by the users of theses nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited. As Galet features tunneling, it can also be used as a very easy to set-up VPN. Galet is written in C++/Qt, and has been tested under Linux and Windows.
f2f  p2p  vpn  privacy  sharing  security 
december 2010 by aldolat
Care(less|ful) Computing « Alessandro Bottoni
Personalmente, sono d’accordissimo con Stallman ma con un’eccezione: credo che quando si tratta di conservare dati estremamente sensibili fuori dalla portata di persone pericolose, un servizio di “remote storage”, “remote backup” o di “online office” possa essere il migliore alleato.
cloud-computing  privacy  security  stallman 
december 2010 by aldolat
Web Browser Privacy Check
This tool checks what security related information is exposed by your web browser to any website that you visit. By accessing this page via an anonymizing proxy or any other internet privacy solution you can judge how effectively your identity is hidden.
privacy  security  browser  test 
november 2010 by aldolat (My Browser Info) is the fastest and easiest way to determine your IP address and information about your Web browser.
privacy  security  browser  test 
november 2010 by aldolat
Analyze Your Internet Connection -
Analyze Your Internet Connection. Click to analyze your Internet connection (opens new window). Note that this page runs tests, such as trying to open popup windows and checking for open ports. It may trigger some warnings such as from a firewall.
privacy  security  browser  test 
november 2010 by aldolat is the place where you can see just how much information your browser reveals about you and your system. Did you know that all websites that you visit can find out which fonts you have installed? It's also possible to find out if you have a range of programs installed. These include Adobe Reader,, Google Chrome and Microsoft Silverlight. Perhaps even which sites you have visited lately can be detected! When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. is a service where you can check just what information it's possible to gather from your system, just by visiting a website. Privacy to the ultimate test!
security  privacy  browser  test 
november 2010 by aldolat
Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits.
privacy  security  browser  test 
november 2010 by aldolat
Ipredator - Surf anonymously with VPN and proxy
You'll exchange the IP-number you get from your ISP to an anonymous IP-number .
You get a safe/encrypted connection between your computer and the Internet.
vpn  proxy  security  privacy 
november 2010 by aldolat
Relakks - Surf anonymously with VPN and proxy
Protect yourself and your family against surveillance. Simply preserve your integrity online with a hidden IP-number via proxy and VPN-encryption.
vpn  proxy  security  privacy 
november 2010 by aldolat
I dieci accorgimenti per la privacy che dovresti assolutamente conoscere |
Cerchiamo di stilare un elenco di 10 accorgimenti che, pur non rappresentando il “silver bullet” (la “pallottola d’argento” ammazza licantropi), aiutano comunque a controllare meglio cosa rendiamo pubblico di noi stessi.
security  privacy 
july 2010 by aldolat
Delete Your Account
Tool per cancellare account dai social network.
social  account  privacy  security 
april 2010 by aldolat
Create an Encrypted Private Directory with eCryptfs | Tombuntu
eCryptfs is a kernel-native cryptographic filesystem. It’s also a stacked filesystem, eCryptfs must work on top of another filesystem such as Ext3. This means that you don’t need to allocate space for eCryptfs, it will grow and shrink as you add files to it.
linux  security  privacy  filesystem  howto  encryption 
september 2008 by aldolat
How Does Bruce Schneier Protect His Laptop Data? With His Fists -- and PGP
Perhaps encryption isn't so easy after all, and some people could use a little primer. This is how I protect my laptop.
security  privacy  pgp  tips  schneier 
september 2008 by aldolat

Copy this bookmark: