Tag Archives: Privacy

Link

Faking Your Death Online Is a Lot Harder Than It Used to Be by Roisin Kiberd via vice_motherboard_logo

“…But pseudocides are rarer in recent times. “Vanishing” oneself is more difficult; the world is simply too small a place now, connected as it is by social media and the surveillance it entails….”

“…Let’s say you are hiding in Japan, and a tourist takes a photo where you’re in the background,” he told me. “The photo is uploaded to social media and a week later, a cop uploads your photo into a facial recognition site like TinEye [a reverse-image search engine]. Boom—you’re busted, because TinEye will find your photo online…”

Link

Tor Users Might Soon Have a Way to Avoid Those Annoying CAPTCHAs by Joshua Kopstein via vice_motherboard_logo

“…a new repository on CloudFlare’s Github page shows that the company is developing an alternative method for anonymous users to access sites without having to repeatedly solve annoying CAPTCHA puzzles—something privacy advocates will likely see as a step in the right direction….”

“In essence, the protocol allows a user to solve a single CAPTCHA and in return learn a specified number of tokens that are blindly signed that can be used for redemption instead of witnessing CAPTCHA challenges in the future,”

 

 

Link

Your Smartphone Is Becoming An AI Supercomputer by Sean Captain via fastco-e911a1ecaff695c740670e41df436c86

“…Just as “the cloud” was becoming the answer to every “How does it work?” question, smartphones have started clawing back their independence, performing on their own tasks that used to require a tether to a server farm. The result is a more natural AI experience, without the annoying or creepy lag of an internet connection to a data center…

…AI will also drive convenience features. You might see virtual assistants that use the phone’s camera to recognize where you are, such as a specific street or the inside of a restaurant, and bring up relevant apps, says Rizzoli. And for once, such hyper-conveniences may not have the creep factor. If future AI doesn’t need the cloud, then the cloud doesn’t need your personal data…

…As artificial intelligence continues expanding across the tech world, it seems destined to grow on phones, too. Expectations are rising that gadgets will simply know what we want and what we mean…”

Link

Best Books on the Impact of Technology on Society by Narain Jashanmal, via medium.com 

…As technology moves from the realm of the visible to the invisible; embedded, pervasive computing that adds intelligence to even the most mundane objects and experiences — there will be an inevitable, ongoing conversation about the consequences, unintended or otherwise… The books on this list run the gamut, from unabashed enthusiasm for our coming robot overlords, to heartfelt expressions of anxiety about whether what we’re giving up is worth what we’re getting in return…”

Test your VPN through Terminal – Linux Tips

computer-VPN

Do you use a VPN to connect to Internet and increase your privacy? If you are one of the many you would be sure that the VPN you are paying is really working properly.

You can always use, via browser, one of those dedicated websites that check your Ip and, in some cases, test the real effectiveness of VPN and/or use Terminal.

But, for my experience, if you prefer to test your public IP without using the Terminal, the best tutorial for this specific task has been published by http://www.tecadmin.net.

Get Public IP using Linux Terminal

Recommended!… if you are looking for an extra test that you can manage directly from Terminal.

Benefits vs. Risks Of Cloud Computing (… and some tips from my experience…)

Previously posted on Medium

Today utilizing an external drive is the most often used strategy for having an efficient backup storage. On the other hand, the people who contemplate utilizing cloud computing for this purpose often wonder if the technology is worth the attempt.

Users of the system ensure that there’s no reasons why anyone should keep from utilizing this system as it guarantees numerous additional benefits as when compared to the traditional methods. The truth that you’ve to fork out a “minuscule” amount of cash on a -monthly- basis for the use of cloud data storage is one motive behind prospective users to be careful.

 

The following benefits of the technology are cause enough to make sure that this expense property is truly worth it.

Extensive storage space: The most elementary advantage of utilizing the cloud is that you can store any quantity of information, which is difficult when using drives. The system is very simple to utilize as the account is created within a few minutes, as opposed to the effort and time spent on going searching for an additional drive.

No Physical existence: Once you have saved your data on the cloud, it becomes the obligation of the supplier to worry about its preservation. Rather than purchasing and saving these numerous added drives, one only has to stay attached to the web in order to access the stored information.

Convenience of automatic back-up: The consumers of cloud computing do not have to trouble making sure that they have related the external drive to their computers and that they take back-ups occasionally. The options on the cloud system may be altered as per the user’s setting as to whether the back-up must be taken several times in one day or once each day. The only obvious prerequisite for the system to be copied is the internet must be related and anything else is looked after.

Easy restoration: In usual conditions, locating and repairing a hard disk drive from backed up information is a long and troublesome process which calls for the providers of the pc technician. The cloud consumers are spared from such an annoyance as this restoration procedure is made quick and simple. If at all the users however have questions about managing this on their very own, they could always seek help from the companies plus they’ll be more than happy to oblige.

It is important to understand the dangers involved when transferring your business into the cloud before contemplating cloud computing technology. You should perform a risk assessment procedure before any control is handed over to a service provider.

First of all you should deeply understand what is the real privacy protection offered by the Cloud Provider. Nowadays the best (more secure and/or more respectful of your privacy) Hosting – Cloud Providers are redeploying their storage servers from USA to Switzerland. This happens because in general Swiss has a better privacy protection and it is outside the European Union and United States Laws. This means that in Swiss, disclosure order/warrant have less possibilities to have effects than in US or EU if they have not a very good legal motivation.

More in general, it is possible to affirm that any location of the Cloud Provider could be good if you understand the local privacy legislation before you use its services. Moreover the Cloud Providers have to guarantee an encrypted storage without detaining any key that can, directly or indirectly, decrypt the information you save or use through its servers. Consequently all the data transmission have to use https protocols with a recommended minimum of 1024 bits encryption. On my side I privilege nothing that offers less than a 2048 bits https protection.

Usually you can have a good representation about the security of the services offered and the legal legislation that will affect your Cloud Service contract if you read carefully the EULA.

For this reason, before committing, you should inquire which privacy and security laws will apply to the information and where your information will be saved. In case the information will be saved outside of your Country, you will also need to be informed as to the laws and regulation demands in that specific geographic place.

Moreover you have to understand if the Cloud Provider that you are choosing to support your business, is really able to guarantee an adequate service level. Don’t be worried to send inquires if the information provided in their Service Level Agreement don’t solve tour doubts or you think that the provided services could not match with your needs in future because they seems not enough flexible.

Anyway, try to prefer a Cloud Service Provider that has an effective Customer Support Service that can promptly (24/7/365) solve your problems. Cloud Service reseller are (sometimes) cheaper but they could not be the best choice for your business technical needs.

cloud-computing-defined

Courtesy of webopedia.com

Last but not least, don’t underestimate the security holes represented by the human factor. You have to offer the right level of training to your employees and colleagues because just a single mistake by them, can be transformed, by an hacker or a competitor, in a potential debacle for all your Cloud System. Invest in learning courses about Cloud risks for all your employees and colleagues, let them understand what are the potential risks of using Cloud Services. Don’t be afraid to introduce “difficult” technical concept (as e.g. man-in-the-middle attacks, different encryption systems, social engineering tactics, the importance of digital signs, etc..) to them.

For this reason, in order to reach a better security level, configure all the electronic devices (common: tablets, smartphones, laptops & uncommon and often more dangerous: all the hardware with an embedded OS especially if they are able to communicate data through Internet or your phone provider) in order that they use your VPN by default. If you will be able to secure all the transmission through your reliable VPN you could have solved at least the 40-50% of the potential mistakes that are normally made by your employees or colleagues.

3 steps to install DNScrypt to improve your privacy – Ubuntu version

Also if you use OpenDNS to improve your standard of privacy, you are not protected by “last mile” dangers but you can boost your security installing DNScrypt on your digital device. DNScrypt “works by encrypting all DNS traffic between the user and OpenDNS, preventing any spying, spoofing or man-in-the-middle attacks”.

DNScrypt “is a protocol that authenticates communications between a DNS client and a DNS resolver” and it “is not a replacement for a VPN, as it only authenticates DNS traffic, and doesn’t prevent “DNS leaks”, or third-party DNS resolvers from logging your activity”.

For this reason you have to be conscious that DNScrpt is just a -very good- improvement of your privacy but not the definitive solution to all your privacy concerns.

DNScrypt is so versatile that you can install it on every kind of device you prefer. In fact it is possible to download DNScrypt for servers, IOS, OSX, Android, Windows and Linux computers (DNScrypt-proxy version). Obviously the installation and setup will vary a little depending the OS you installed on your device.

Concept-Skyscraper-Feeds-on-Air-Pollution-Uses-It-to-Grow-433607-2

Image from softpedia.com

Here we are talking about DNScrypt installation on Ubuntu.

For this purpose I suggest to use the Terminal that allows you to install DNScrypt i just 3 steps:

sudo add-apt-repository ppa:anton+/dnscrypt
sudo apt-get update
sudo apt-get install dnscrypt-proxy

Last but not least, you need to interface the Internet traffic of your computer through the DNScrypt-proxy. For this reason you have to Edit your Network Configuration and add the address 127.0.0.2 to the “DNS Servers” line as for the below screenshot:

DNSCrypt

Now you can start DNScrypt just typing:

sudo dnscrypt-proxy -R opendns -a 127.0.0.2:53 -u okturtles

Where, in my specific case, okturtles is the name of the remote DNS resolver I decided to use. I chose that specific risolver from the list I found into into my computer after DNScrypt-proxy installation:

/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv

As usual in similar situations, you may want to spend another couple of minutes to configure your computer to start DNScrypt at the computer boot. Open the Session and Startup manager through the desktop Dash and Add this specific command to the Application Autostart menu:

sudo dnscrypt-proxy -R opendns -a 127.0.0.2:53 -u dnscrypt