🦞🌯 Lobster Roll

Thread

Security and Privacy Implications of Zoom (schneier.com)

Stories related to "Security and Privacy Implications of Zoom" across the full archive.

I never signed up for this! Privacy implications of email tracking (freedom-to-tinker.com)
Security and Privacy Implications of Zoom (schneier.com)
Bruce Schneier's talk at Google on Trust, Privacy, and Feudal Security (youtube.com)
US and UK spy agencies defeat privacy and security on the internet (theguardian.com)
The New TextSecure: Privacy Beyond SMS (whispersystems.org)
reop - reasonable expectation of privacy (tedunangst.com)
Mission Impossible: Hardening Android for Security and Privacy (blog.torproject.org)
The Ultimate Privacy Guide (bestvpn.com)
Privacy Claims Based on LinkedIn’s Security Promises Survive Motion to Dismiss (blog.ericgoldman.org)
Apple rejects Signal for being too privacy-friendly (twitter.com)
Americans' Privacy Strategies Post-Snowden (pewinternet.org)
Anonabox Recalls 'Privacy' Routers for Security Flaws (wired.com)
Endless: An iOS web browser with a focus on privacy and security - now in the App Store (itunes.apple.com)
When I switched again from Android to iOS, I had to give up using Firefox and its add-ons like HTTPS-Everywhere, Disconnect, and Self-Destructing Cookies. I started making a browser for iOS (as a wrapper around UIWebView, of course) that had these things built-in, and I have been using it as my p...
Chrome Extensions – AKA Total Absence of Privacy (labs.detectify.com)
HTTPS provides more than just privacy (certsimple.com)
RandomDNS aims to improve the security, privacy and anonymity of DNSCrypt. (github.com)
RandomDNS aims to improve the security, privacy and anonymity of DNSCrypt. It can randomize the server choice at runtime, rotate it frequently and much more.
Freedom and privacy/security issues on mobile phones (replicant.us)
W3C Web Bluetooth API Privacy (blog.lukaszolejnik.com)
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps (research.csiro.au)
> The first analysis of its kind, the report looked at 283 Android VPN apps, investigating a wide range of security and privacy features.VPN facts from the study > > Alarmingly, the report uncovered that not only did 18 per cent of the apps fail to encrypt users’ traffic but 38 per cent injected ...
On privacy and anonymity in electronic and non electronic voting: the ballot-as-signature attack. (hal.archives-ouvertes.fr)
> **Abstract:** A wealth of protocols for electronic voting have been proposed in the literature over the past years. What makes these protocols difficult to conceive and verify is one fundamental property, anonymity, which is of paramount importance in the real world, in particular when performing ...
Five Ways Cybersecurity Will Suffer If Congress Repeals the FCC Privacy Rules (eff.org)
Windows 10 and (lack of) Privacy and Security (twitter.com)
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy (dnasec.cs.washington.edu)
NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, Draft 5. (csrc.nist.gov)
From the press release at https://www.nist.gov/news-events/news/2017/08/nist-crafts-next-generation-safeguards-information-systems-and-internet - "The National Institute of Standards and Technology (NIST) has issued a new draft revision of its widely used Special Publication (SP) 800-53, Security an...
Librem 5 – A Security and Privacy Focused Phone – Purism (puri.sm)
Duck Duck Go: Illusion of Privacy (2013) (etherrag.blogspot.com)
Privacy implications of email tracking (senglehardt.com)
Improve Your Privacy in the Age of Mass Surveillance (iotdarwinaward.com)
SPECULOSE: Analyzing the Security Implications of Speculative Execution in CPUs (arxiv.org)
Some Thoughts About the Social Implications of Accessible Computing (1965) (multicians.org)
Impactful and relevant quotation: *The very power of advanced computer systems makes them a serious threat to the privacy of the individual. If every significant action is recorded in the mass memory of a community computer system, and programs are available for analyzing them, the daily activiti...