Posts by Category: Privacy Resources

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations

April 14, 2018

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations
https://getonwebs.wordpress.com/2018/04/03/how-to-survive-gdpr-the-essential-guide-to-the-webs-new-privacy-regulations/

A basic guide to the new European Law General Data Protection Regulation (GDPR) that goes into force on May 25, 2018. Because of its global reach all persons and companies should understand the consequences. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

41 views

AES Crypt – Advanced Open Source File Encryption

March 28, 2018

AES Crypt – Advanced Open Source File Encryption
https://www.aescrypt.com/

AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files. You do not need to be an expert to use AES Crypt, nor do you need to understand cryptography. When using Windows, the only thing you need to do is right-click on a file, select AES Encrypt or AES Decrypt, enter a password, and AES Crypt will do the rest. On a Mac, you can drag a file to the AES Crypt program and provide the required password. On the command line, one can execute the “aescrypt” command with name of the file and password to use to encrypt or decrypt. For PHP, Java, and C# developers, there are libraries available that can read and write AES-encrypted files from within your application. For Python enthusiasts, there is a command-line utility with source code that can be used to integrate AES Crypt functionality into your own Python applications. Using a powerful 256-bit encryption algorithm, AES Crypt can safely secure your most sensitive files. Once a file is encrypted, you do not have to worry about a person reading your sensitive information, as an encrypted file is completely useless without the password. It simply cannot be read. AES Crypt is the perfect tool for anyone who carries sensitive information with them while traveling, uploads sensitive files to servers on the Internet, or wishes to protect sensitive information from being stolen from the home or office. AES Crypt is also the perfect solution for those who wish to backup information and store that data at a bank, in a cloud-based storage service, and any place where sensitive files might be accessible by someone else. Best of all, AES Crypt is completely free open source software. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

50 views

Obin – Client Side Encrypted PasteBin

March 27, 2018

Obin – Client Side Encrypted PasteBin
https://0bin.net/

A random key is generated and used to encrypt the paste, thanks to the sjcl JavaScript library. The encrypted content is then sent to the server, which returns the address of the newly created paste. The JavaScript code redirects to this address, but it adds the encryption key in the URL hash (#). When somebody wants to read the paste, they will usually click on a link with this URL. If the hash containing the key is a part of it, 0bin’s JavaScript will use it to decrypt the content sent by the server. The browser never sends the hash to the server, so the latter does not receives the key at any time. All pastes are AES256 encrypted, they cannot know what you paste… This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

62 views

etherpad – Collaborating In Really Real-Time

March 26, 2018

etherpad – Collaborating In Really Real-Time
http://etherpad.org/

No more sending your stuff back and forth via email, just set up a pad, share the link and start collaborating! Etherpad allows you to edit documents collaboratively in real-time, much like a live multi-player editor that runs in your browser. Write articles, press releases, to-do lists, etc. together with your friends, fellow students or colleagues, all working on the same document at the same time. All instances provide access to all data through a well-documented API and supports import/export to many major data exchange formats. And if the built-in feature set isn’t enough for you, there’s tons of plugins that allow you to customize your instance to suit your needs. You don’t need to set up a server and install Etherpad in order to use it. Just pick one of publicly available instances that friendly people from everywhere around the world have set up. Alternatively, you can set up your own instance by following their installation guide. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

60 views

OnionShare – Securely and Anonymously Share Files of Any Size

March 26, 2018

OnionShare – Securely and Anonymously Share Files of Any Size
https://onionshare.org/

OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor Onion Service, and generating an unguessable URL to access and download the files. It does not require setting up a separate server or using a third party file-sharing service. You host the files on your own computer and use a Tor Onion Service to make it temporarily accessible over the internet. The receiving user just needs to open the URL in Tor Browser to download the file. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

58 views

Awareness Watch Talk Show for Wednesday February 21, 2018 at 2:00pm EST – Privacy Resources 2018

February 21, 2018

Awareness Watch Talk Show for Wednesday February 21, 2018 at 2:00pm EST – Privacy Resources 2018
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will be featuring my recently updated white paper Privacy Resources 2018. We will be highlighting the latest and greatest resources and sources covering privacy resources, sources, search engines, subject directories, articles, guides and tracers….literally everything on the Internet covering PRIVACY RESOURCES!! We will also be discussing my latest freely available Awareness Watch Newsletter V16N2 February 2018 featuring Deep Web Research and Discovery Resources 2018 as well as my freely available February 2018 Zillman Columns highlighting 2018 Tools for Current Awareness. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Wednesday, February 21, 2018 and then archived for easy review and access. Listen, Call and Enjoy….

150 views

Updated> Privacy Resources 2018

February 01, 2018

Updated> Privacy Resources 2018
http://www.PrivacyResources.info/

The white paper link dataset compilation of Privacy Resources 2018 Subject Tracer™ by Marcus P. Zillman, M.S., A.M.H.A. is now a 52 page .pdf document 375KB. Privacy Resources and Sites on the Internet is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. This is a MUST reference for today’s New Economy where privacy and security have become major issues!! Keep your privacy and security with this excellent Subject Tracer™. This white paper (.pdf) has been completely updated including all links validated and new links added as of February 1, 2018.

This research is powered by Subject Tracer Bots™ available from the Virtual Private Library™.

©2018 Marcus P. Zillman, M.S., A.M.H.A.

105 views

Tresorit – End-to-End Encrypted File Sync and Sharing

January 05, 2018

Tresorit – End-to-End Encrypted File Sync and Sharing
https://tresorit.com/

Protect your files with end-to-end encryption. Keep your sensitive data safe from hackers, snooping governments and the dangers of internal breaches. Secure your files all the way from your computer to the people you share them with. With their end-to-end encryption, nothing leaves your device unencrypted. Only you have the keys to read the content of your files. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

182 views

Awesome Machine Learning for Cyber Security

January 03, 2018

Awesome Machine Learning for Cyber Security
https://github.com/jivoi/awesome-ml-for-cybersecurity

A curated list of amazingly awesome tools and resources related to the use of machine learning for cyber security. This will be added to Privacy Resources Subject Tracer™. This will be added to Artificial Intelligence Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

 

205 views

Haven: Keep Watch

December 23, 2017

Haven: Keep Watch
https://guardianproject.github.io/haven/

Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical spaces. Haven turns any Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders. They designed Haven for investigative journalists, human rights defenders, and people at risk of forced disappearance to create a new kind of herd immunity. By combining the array of sensors found in any smartphone, with the world’s most secure communications technologies, like Signal and Tor, Haven prevents the worst kind of people from silencing citizens without getting caught in the act. This will be added to Privacy Resources Subject Tracer™. This will be added to Journalism Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™. This will be added to Start Up Resources for the Entrepreneur 2018 white paper.

178 views