digital-ad industry says that if it passes it could mean ‘Facebook won’t be free’
Tennessee Congresswoman Martha Blackburn says she wants to give consumers control of their internet experience.
She’s introduced a bill — the “BROWSER Act” — that would require internet users to actively opt in to say yes to any sort of ad tracking or online-data collection.
“Facebook won’t be free,” said Scott Howe, CEO of the data company Acxiom. Acxiom collects consumer data on millions of Americans — where they live and the kinds of things they shop for — that marketers and media companies use to target consumers and deliver more-relevant ads. So it’s looking out for any legislation in this realm closely.
Continue reading New Internet-Privacy Bill to address Ad Tracking or Online-Data Collection
Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting to. Continue reading Researchers find over 100 spying Tor nodes
Richard Stallman lecturing about copyright at University of Calgary on 2009-02-03. Free/Libre formats & raw footage can be found here, as per Stallman’s request. (Transcode-SR1 contains wireless mic audio.)
- Once Encrypted you CANNOT go back to unencrypted status.
- You may also notice a slight performance hit as your device will be using extra resources to encrypt and decrypt your data as needed.
- If you interrupt the process you WILL lose some or all of the data on your device so let it finish before doing anything.
Basically, encrypting you device scrambles up all your files on your device and makes them unreadable unless you unlock your device with your password or pin; without these your device is unusable and your data is fully locked from anyone.
Some recent legal rulings have suggested that encryption can protect against warrantless searches. The California Supreme Court has ruled that police officers can lawfully search your cell phone without a warrant if it’s taken from you during arrest – but they would require a warrant if it was encrypted. A Canadian court has also ruled that phones can be searched without a warrant as long as they’re unencrypted.
Continue reading How to encrypt your Android Device
Boil it all down and last week’s Black Hat conference in Las Vegas discussed just two things – identity and privacy in cyberspace. Both are at risk as the internet enters a period of massive expansion.
IT managers need to deal with these issues in the light of the increasing volume and subtlety of attacks by ill-intentioned people.
Identity and privacy are two sides of the same coin. For the internet to work, everything connected to it requires a unique identifier, known as an internet address or uniform resource locator (URL). This allows network routers, which act as postmasters, to direct messages to the right address.
The internet was designed to be flexible. This makes it possible for people to pretend to own someone else’s address and thus to divert traffic elsewhere, or even to take over the address.
In addition, many people want to hide their identities and activities on the internet for both legitimate and illegitimate reasons. Continue reading Identity and privacy at risk on new internet
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.
The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, including household names, and small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems.
Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic. Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information.
“Companies that rely on user names and passwords have to develop a sense of urgency about changing this,” said Avivah Litan, a security analyst at the research firm Gartner. “Until they do, criminals will just keep stockpiling people’s credentials.”
Websites inside Russia had been hacked, too, and Mr. Holden said he saw no connection between the hackers and the Russian government. He said he planned to alert law enforcement after making the research public, though the Russian government has not historically pursued accused hackers.
So far, the criminals have not sold many of the records online. Instead, they appear to be using the stolen information to send spam on social networks like Twitter at the behest of other groups, collecting fees for their work.