recentpopularlog in

kkennedy : privacy   110

« earlier  
deaddrop/deaddrop · GitHub
DeadDrop is a server application intended to let news organizations and others set up an online drop box for sources.
journalism  message  privacy 
may 2013 by kkennedy
Personal Data Ecosystem
Cultivating the Community of Businesses And People Making it Happen
api  identity  privacy  socialnetworking 
november 2010 by kkennedy
FCC’s Warrantless Household Searches Alarm Experts
FTA: 'You may not know it, but if you have a wireless router, a cordless phone, remote car-door opener, baby monitor or cellphone in your house, the FCC claims the right to enter your home without a warrant at any time of the day or night in order to inspect it.'
privacy  fcc  legal  government 
may 2009 by kkennedy
Fordham Law Class Collects Personal Info About Scalia; Supreme Ct. Justice Is Steamed | ABA Journal - Law News Now
I need a 'turnabout is fair play' tag.

FTA: 'Last year, when law professor Joel Reidenberg wanted to show his Fordham University class how readily private information is available on the Internet, he assigned a group project. It was collecting personal information from the Web about himself.

This year, after U.S. Supreme Court Justice Antonin Scalia made public comments that seemingly may have questioned the need for more protection of private information, Reidenberg assigned the same project. Except this time Scalia was the subject, the prof explains to the ABA Journal in a telephone interview.'
privacy  surveillance  scotus  scalia 
may 2009 by kkennedy
Strip searching students illegal? Supreme Court not so sure
Holy...hell. Lots of followup links going into delicious on this one. Plus, as Cory Doctorow (among others) notes, invasions of privacy and rights limitations often start in places where individuals are given less legal protection against it, like schools and prisons. Once their value is "proven", then there's pressure to make them more generally widespread. (cameras, backpack searches, etc.)
legal  school  privacy  scotus  civlib 
april 2009 by kkennedy
Darknets and the future of P2P investigators - Ars Technica
FTA: 'LimeWire's new software illustrates a growing trend: "darknets" are becoming simple to setup and use. As millions of people now find that they can easily create their own private share networks, what's in store for content industry investigators who rely on public P2P networks to find suspected file-sharers?'
p2p  privacy  copyright  software  internet 
march 2009 by kkennedy
Missing laptop puts Starbucks workers' data at risk
FTA: 'Starbucks Corp. confirmed Monday that a laptop containing private information on 97,000 employees was stolen Oct. 29.

The information included names, addresses and Social Security numbers, according to an undated memo addressed to affected employees.'
privacy  dataloss  identitytheft 
november 2008 by kkennedy
Tor VM - Tor in a virtual machine.
Tor VM is a small virtual machine that acts as a router and redirects your TCP traffic and DNS request through Tor while filtering out protocols that could jeopardize your anonymity. Tor VM is built using all open source software and is free.

There are many advantages to running Tor in a virtual machine. Any application on any operating system that uses TCP for communication is routed over Tor. By using a small virtual machine that acts as a router, protocols such as UDP and ICMP are filtered, preventing a compromise of your anonymity. Placing Tor in a virtual machine separates Tor from potentially insecure applications that could compromises Tor's integrity and your security.
security  privacy  tool  p2p 
november 2008 by kkennedy
What Your Mailman Knows (Part 1 of 2)
This is a REALLY good article on the the topic on the consequences of pseudonymity, the media, and well, just the plain unavoidable creepiness of how much your postman (and by extension, Amazon, Netflix, etc.) know about you. Worth noodling on.
privacy  culture 
october 2008 by kkennedy
Remote sign out and info to help you protect your Gmail account
Very nice...this sort of auditing data is extremely helpful when dealing with services "in the cloud"
security  gmail  internet  authentication  privacy 
august 2008 by kkennedy
Amendment Would Put Spy Lawsuits, Amnesty On Hold Pending Investigation
If Sen. Dodd gets shouted down this time, I say bring on Bingaman and this amendment!
privacy  legal  gwot  surveillance  nsa  security 
july 2008 by kkennedy
MySpace Banning Sex Offenders: Online Predator Paranoia
Climb to the Stars (Stephanie Booth) || Good analysis. One of the 4 Horseman of the infopocalypse.
society  privacy  privacypol  toblog 
july 2007 by kkennedy
Kids, the Internet, and the End of Privacy
The Greatest Generation Gap Since Rock and Roll -- New York Magazine
future  geek  identity  media  privacy  society 
march 2007 by kkennedy
« earlier      
per page:    204080120160

Copy this bookmark:

to read