Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 112 by tekniklr tagged privacy

"These data breaches may not stop people from spying on their children or partners. But perhaps it will shine a light on just how common, and powerful, consumer spyware has become. Even in small-town southwestern United States."

Share It With Others!

"This guide (updating a previous guide from 20112) helps travelers understand their individual risks when crossing the U.S. border, provides an overview of the law around border search, and offers a brief technical overview to securing digital data."

Share It With Others!

actually reading this it looks like they’re arguing for the device owner’s first amendment rights / privacy

(but it’s still interesting)

Share It With Others!

"With the current US administration pondering the possibility of forcing foreign travelers to give up their social media passwords at the border, a lot of recent and justifiable concern has been raised about data privacy. The first mistake you could make is presuming that such a policy won’t affect US citizens. ... What few protections citizens have in their home countries end at the border"

Share It With Others!

"What happens if border agents are allowed to demand access to your phone and online accounts—and turn you away if you don’t comply?"

Share It With Others!

Good general purpose advice for when you want to conceal your location and/or identity (in practice it's relatively easy to conceal one or the other, but not both). Always model your defenses vs specific threats for best results.

Share It With Others!

I was just considering going to defcon this year, and how I should get a burner phone for that...

Share It With Others!

"That’s because Marlinspike said people will find that the classic dismissal of encryption. “I have nothing to hide” isn’t actually true if the government or nefarious hackers target them. Who doesn’t have an email sitting in their inbox that would embarrass them to death should it be revealed? And Marlinspike wrote that with 27,000 pages of federal statutes and 10,000 administrative regulations, “You probably do have something to hide, you just don’t know it yet.”"

Share It With Others!

Share It With Others!

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT