Category Archives: Privacy

Crossing the Border? Here’s How to Safeguard Your Data From Searches by http://nyti.ms/2nnTaav

Travelers, beware: When you take your gadgets abroad, maintaining the security of the data on your devices is just as important as protecting yourself from muggers.

from http://nyti.ms/2nnTaav

Selected by Galigio via Computer Borders

The hackers in your yogurt by http://bit.ly/2neYlrH

To read the news these days is to receive frequent reminders about how easily our technology can be turned against us. We know the CIA can spy on us through our smart TVs and that criminals can infiltrate millions of personal computers, wireless routers, and other smart devices.

from http://bit.ly/2neYlrH

Selected by Galigio via Computer Borders

Link

Charming animated short on The Power of Privacy by Andrea James via logo

The Power of Privacy from Matthias Hoegg on Vimeo.

Link

Faking Your Death Online Is a Lot Harder Than It Used to Be by Roisin Kiberd via vice_motherboard_logo

“…But pseudocides are rarer in recent times. “Vanishing” oneself is more difficult; the world is simply too small a place now, connected as it is by social media and the surveillance it entails….”

“…Let’s say you are hiding in Japan, and a tourist takes a photo where you’re in the background,” he told me. “The photo is uploaded to social media and a week later, a cop uploads your photo into a facial recognition site like TinEye [a reverse-image search engine]. Boom—you’re busted, because TinEye will find your photo online…”

Link

Tor Users Might Soon Have a Way to Avoid Those Annoying CAPTCHAs by Joshua Kopstein via vice_motherboard_logo

“…a new repository on CloudFlare’s Github page shows that the company is developing an alternative method for anonymous users to access sites without having to repeatedly solve annoying CAPTCHA puzzles—something privacy advocates will likely see as a step in the right direction….”

“In essence, the protocol allows a user to solve a single CAPTCHA and in return learn a specified number of tokens that are blindly signed that can be used for redemption instead of witnessing CAPTCHA challenges in the future,”

 

 

Link

Your Smartphone Is Becoming An AI Supercomputer by Sean Captain via fastco-e911a1ecaff695c740670e41df436c86

“…Just as “the cloud” was becoming the answer to every “How does it work?” question, smartphones have started clawing back their independence, performing on their own tasks that used to require a tether to a server farm. The result is a more natural AI experience, without the annoying or creepy lag of an internet connection to a data center…

…AI will also drive convenience features. You might see virtual assistants that use the phone’s camera to recognize where you are, such as a specific street or the inside of a restaurant, and bring up relevant apps, says Rizzoli. And for once, such hyper-conveniences may not have the creep factor. If future AI doesn’t need the cloud, then the cloud doesn’t need your personal data…

…As artificial intelligence continues expanding across the tech world, it seems destined to grow on phones, too. Expectations are rising that gadgets will simply know what we want and what we mean…”

Benefits vs. Risks Of Cloud Computing (… and some tips from my experience…)

Previously posted on Medium

Today utilizing an external drive is the most often used strategy for having an efficient backup storage. On the other hand, the people who contemplate utilizing cloud computing for this purpose often wonder if the technology is worth the attempt.

Users of the system ensure that there’s no reasons why anyone should keep from utilizing this system as it guarantees numerous additional benefits as when compared to the traditional methods. The truth that you’ve to fork out a “minuscule” amount of cash on a -monthly- basis for the use of cloud data storage is one motive behind prospective users to be careful.

 

The following benefits of the technology are cause enough to make sure that this expense property is truly worth it.

Extensive storage space: The most elementary advantage of utilizing the cloud is that you can store any quantity of information, which is difficult when using drives. The system is very simple to utilize as the account is created within a few minutes, as opposed to the effort and time spent on going searching for an additional drive.

No Physical existence: Once you have saved your data on the cloud, it becomes the obligation of the supplier to worry about its preservation. Rather than purchasing and saving these numerous added drives, one only has to stay attached to the web in order to access the stored information.

Convenience of automatic back-up: The consumers of cloud computing do not have to trouble making sure that they have related the external drive to their computers and that they take back-ups occasionally. The options on the cloud system may be altered as per the user’s setting as to whether the back-up must be taken several times in one day or once each day. The only obvious prerequisite for the system to be copied is the internet must be related and anything else is looked after.

Easy restoration: In usual conditions, locating and repairing a hard disk drive from backed up information is a long and troublesome process which calls for the providers of the pc technician. The cloud consumers are spared from such an annoyance as this restoration procedure is made quick and simple. If at all the users however have questions about managing this on their very own, they could always seek help from the companies plus they’ll be more than happy to oblige.

It is important to understand the dangers involved when transferring your business into the cloud before contemplating cloud computing technology. You should perform a risk assessment procedure before any control is handed over to a service provider.

First of all you should deeply understand what is the real privacy protection offered by the Cloud Provider. Nowadays the best (more secure and/or more respectful of your privacy) Hosting – Cloud Providers are redeploying their storage servers from USA to Switzerland. This happens because in general Swiss has a better privacy protection and it is outside the European Union and United States Laws. This means that in Swiss, disclosure order/warrant have less possibilities to have effects than in US or EU if they have not a very good legal motivation.

More in general, it is possible to affirm that any location of the Cloud Provider could be good if you understand the local privacy legislation before you use its services. Moreover the Cloud Providers have to guarantee an encrypted storage without detaining any key that can, directly or indirectly, decrypt the information you save or use through its servers. Consequently all the data transmission have to use https protocols with a recommended minimum of 1024 bits encryption. On my side I privilege nothing that offers less than a 2048 bits https protection.

Usually you can have a good representation about the security of the services offered and the legal legislation that will affect your Cloud Service contract if you read carefully the EULA.

For this reason, before committing, you should inquire which privacy and security laws will apply to the information and where your information will be saved. In case the information will be saved outside of your Country, you will also need to be informed as to the laws and regulation demands in that specific geographic place.

Moreover you have to understand if the Cloud Provider that you are choosing to support your business, is really able to guarantee an adequate service level. Don’t be worried to send inquires if the information provided in their Service Level Agreement don’t solve tour doubts or you think that the provided services could not match with your needs in future because they seems not enough flexible.

Anyway, try to prefer a Cloud Service Provider that has an effective Customer Support Service that can promptly (24/7/365) solve your problems. Cloud Service reseller are (sometimes) cheaper but they could not be the best choice for your business technical needs.

cloud-computing-defined

Courtesy of webopedia.com

Last but not least, don’t underestimate the security holes represented by the human factor. You have to offer the right level of training to your employees and colleagues because just a single mistake by them, can be transformed, by an hacker or a competitor, in a potential debacle for all your Cloud System. Invest in learning courses about Cloud risks for all your employees and colleagues, let them understand what are the potential risks of using Cloud Services. Don’t be afraid to introduce “difficult” technical concept (as e.g. man-in-the-middle attacks, different encryption systems, social engineering tactics, the importance of digital signs, etc..) to them.

For this reason, in order to reach a better security level, configure all the electronic devices (common: tablets, smartphones, laptops & uncommon and often more dangerous: all the hardware with an embedded OS especially if they are able to communicate data through Internet or your phone provider) in order that they use your VPN by default. If you will be able to secure all the transmission through your reliable VPN you could have solved at least the 40-50% of the potential mistakes that are normally made by your employees or colleagues.

HTML5 Privacy Matters: DOM Storage. How to solve it in only 2 steps!

Recently I started an online course that was created using the Google Course Builder.

After I registered the course I was not able to access it because “my browser didn’t allow the web storage” and, for this reason, a message informed me that it would be necessary to use a up-to-date browser as Chrome or Firefox.

The only problem is that I always use Firefox. Obviously a “particular” version of Firefox where I also added a bunch of different add-ons to enhance the privacy protection level of my navigation and, for this reason, the Google course was not available for me.

Normally I would have decided to quit the course because I prefer not to modify my Firefox configuration after I spent so much time searching the best add-ons to preserve a minimum of privacy.  But, in this case, I really wanted to attend the course and so I decided to manually operate on the Firefox configuration to “solve” the problem and allow Google to keep all the information it would have considered as essential.

This is the list of what I did:

– open Firefox and type:

about:config

in the address bar.

– search for:

dom.storage.enabled

and change its configuration from “false” to “true” double-clicking on it.

After this fast change in the Firefox’s configuration menu I was able to attend the Google course but….. I am conscious that my privacy is a little bit less protected because now Google can store up to 5 MB of content on my browser. In fact, before HTML 5 we were used to “cookies” and we were able to “manage” (better: erase) them also if, as the LSO Flash cookies, they were more persistent than usual. Moreover in the old html times, the space available for cookies on your local browser was 4 KB (yes… KB) but now, in the Html 5 era, a single website can easily manage and permanently store till 5 MB on your browser. And this is the reason why I decided to protect my privacy disabling the DOM Storage on Firefox and this is also the reason because I will disable DOM Storage as soon as I complete the Google course…
DOM STORAGE
If you are not a simple user but you prefer to directly and consciously operate on the Firefox configuration to improve your privacy level, you would read this interesting post by BestVPN.
————-

References:

Configure OpenDNS on your Ubuntu Computer through DDclient in just 6 steps – Tutorial

1 – Why should I change DNS? 
You “use” them in any moment, every time you are in front of a computer but usually you don’t consider to directly manage or change them because you think that it is not worthy to do anything with them. 
On the contrary, you know that many different online companies offer dedicated DNS addresses you can use to substitute the default DNS addresses provided by your ISP.
So, at this point, your main question is “Why should I change DNS on my route or my computer”?
For example, for one or more of these different reasons:
– to have a chance of a possible increasing of speed and reliability when you surf Internet; 
– if you want to delegate to a third “professional” part some security tasks (e.g. third party security filtering to protect yourself against phishing or viruses);
acces websites that are normally geoblocked by commercial policies/agreements or censorship imposed by Governments;
parental monitoring if you prefer to have a rough idea of what websites your children visit or if you whant to filter some specific contenents.
2 – Choose a reliable DNS provider
If you decide that you want to try a different DNS provider you need to choose a reliable one. A quick search on Internet will help you to find the most appropriate DNS Provider for your needs.
In this specific case we are examining how to configure the DNS from OpenDNS.com so, if you want to test it, you have to sign up for a free account on opendns.com or simply copy the DNS addresses you find in the bottom right of their homepage or sign up for a OpenDNS.com free account. In the last case, you have the possibility of monitoring your traffic in a professional statistical way and probably you will satisfy one or more of the reasons that may explain your choice to use different DNS. 
3 – Install DNS from OpenDNS on your router
If you want to use OpenDNS on your LAN you have to configure the router through the its configuration interface. The way you can do this varies from one router to another but in all the popular models you will easily find a specific sub-menu where you could activate the “use predefined DNS” option compiling the two addresses provided by OpenDNS.
In this way all your LAN traffic will be pipelined through OpenDNS and you will not need to singularly configure each computer you have.
dns4

Image from: oriental-press.com

4 – Install DNS from OpenDNS on your Linux computer
4a – Preliminary configuration.
The problem with opendns.com is that it doesn’t provide an official tutorial to correctly install its DNS on a Linux machine. For this reason you can follow this brief notes that I wrote after installing it on a Ubuntu 14.04 LTS Ubuntu computer.
Go to the OpenDNS.com support page dedicated to the installation on Ubuntu and follow their instructions:
I exactly followed all the instruction till the point 8 but, when I had big problems when I typed:
sudo ifdown eth0 && sudo ifup eth0
because this message appeared:
ERROR unknown interface eth0=eth0
The matter is that my ethernet is really named eth0 (I double checked using the commands ifconfig and netstat -r -n) but it was not possible to operate on it.
To solve this problem I used the Poorak’s Blog suggestion and I had to open the interface file via Terminal with:
sudo nano /etc/network/interfaces 

– or if you prefer:

sudo gedit /etc/network/interfaces
and manually add these lines:
auto eth0
iface eth0 inet dhcp
then I restarted my networking
sudo /etc/init.d/networking restart
4b – Install DDclient on Ubuntu if you have a dynamic IP
Normally the Internet Service Provides provides a dynamic IP to users that may change over time. So, if you don’t want to pay more to obtain a static IP, you need to install a software that could constantly communicate your actual IP address to OpenDNS.com. In my case, I dedcided to install DDclient to be able to continue to properly use the OpenDNS.com services.
To install DDclient I preliminarly had to install coreutils through Terminal:
sudo apt-get install coreutils
and the required SSH and SSL sockets:
sudo apt-get install ssh libio-socket-ssl-perl
and finally the DDclient:
sudo apt-get install ddclient
At this point you manually edit the configuration file:
sudo nano /etc/ddclient.conf
(or, if you prefer sudo gedit /etc/ddclient.conf)
typing:

##
## OpenDNS.com account-configuration
##
use=web, web=myip.dnsomatic.com
ssl=yes
server=updates.opendns.com
protocol=dyndns2
login=opendns_username
password=opendns_password
opendns_network_label

where:

– ‘opendns_network_label’ is the label given to the network you’re updating in your account.
If you have spaces in your network label, replace them with an underscore ( _ ) 
You can find the network label in the Settings Tab of the OpenDNS Dashboard.
– the login is your email address with OpenDNS
– the password is your opendns password. 
“If you have special characters in your password wrap the password in single-quotes ( ‘ ). 
If there are any single-quotes in your password, put backslash ( \ ) before the single-quote to escape the character”.
References:
5 – Start OpenDNS and DDclient on your Ubuntu computer
At this point you have all the elements to start  so you can open a Terminal and type: 
sudo /usr/sbin/ddclient chkconfig ddclient on && sudo /usr/sbin/ddclient service start
On the other side, if you want to check the status of DDclient, you will type:
sudo /etc/init.d/ddclient status

6 – Configure Linux OS to start DDclient at boot on Ubuntu

On Ubuntu is really simple to configure DDclient to start at the computer boot. You have to open the Session and Startup manager through the desktop Dash. Now you are able to Add a specific command to the Application Autostart menu to run DDclient at the boot:
sudo /usr/sbin/ddclient chkconfig ddclient on && sudo /usr/sbin/ddclient service start
If you are configuring OpenDNS through DDclient on a different Linux distribution you can google the right tutorial or follow the guide created on aboutLinux.info.
At this point you will automatically use OpenDNS on your Ubuntu computer.