Posts by Category: Privacy Resources

The Daily Swig – Web Security Digest

August 14, 2018

The Daily Swig – Web Security Digest
https://portswigger.net/daily-swig/

The Daily Swig is a comprehensive news platform for the global web security space. Brought to you by PortSwigger Web Security, they cover the latest hacks and data breaches; web application vulnerabilities and exploits; new security technologies and solutions; cybersecurity policy and legislation; and other news and events relevant to web security. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

11 views

Disconnect.me – Take Back Your Privacy

August 04, 2018

Disconnect.me – Take Back Your Privacy
https://disconnect.me/

Free yourself from unwanted tracking. Enjoy a faster, safer internet. Today, there are thousands of companies that track people’s online activity and capture their personal information. But there’s a huge disconnect between how people’s data is being used, sold, or shared, and what they actually may want. Disconnect is founded on a basic principle: that people should have the freedom to move about the Internet – and their lives – without anyone else looking over their shoulder. They believe that everyone should have a voice in determining their own optimum level of privacy and how their personal information is treated. They are here to educate, inform, and empower individuals, with tools and solutions that not only give people insight into what’s happening with their digital data, but also give them control over who has access to it. They want to live in a world where everyone is able to move through their lives without worry that their clicks might be analyzed, their interests scrutinized, or their safety compromised. They intend to be an advocate for every individual on every device, and to create enduring, positive change in the way our personal data is created, managed, controlled, and shared. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

20 views

Peekier – Privacy Oriented Search Engine

June 23, 2018

Peekier – Privacy Oriented Search Engine
https://peekier.com/

Peekier (pronounced /’pi·ki·er/) is a new way to search the web. Peek through search results fast and securely on a search engine that respects your privacy. Peekier shows you a website preview of the search results. Clicking on a result will maximize the preview and allow you to scroll through the website. You can then decide if the information displayed on the website interests you or not before clicking on the link. The average website on the internet weighs in at around 2.5 MB and requires 100 HTTP requests to load. Peekier renders websites on an array of superfast servers and sends your browser a clean and efficient 40-80 KB PNG image. This is especially useful on a mobile connection, where the loading delay dictates that you only want to open a link that interests you. As websites are loaded on their servers and they only send the rendered image to your browser, they deal with malware and other threats while protecting your privacy and providing a safe and secure experience while you stay on their website. You can still choose to visit a website that interests you―the choice is yours. They take your privacy very seriously! They are pretty sure they are the search engine with the most privacy oriented features in the world. Peekier does not log your personal info or track you throughout your browsing sessions. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

88 views

The Beginner’s Guide To Online Privacy by Iulian Gulea

June 22, 2018

The Beginner’s Guide To Online Privacy by Iulian Gulea
https://medium.freecodecamp.org/the-beginners-guide-to-online-privacy-7149b33c4a3e

We are living in remarkable times. We can make pictures of places and people we like by pressing a button on our phones; shop from our homes for literally anything from needles to cars; reach hundreds of thousands of people through social and blogging platforms, and consume information on any topic in any volume at any time of the day. For a person from 30 years ago it might sound very futuristic. For us it’s just how things are. Common sense. But all that comes at a price. And that price is our privacy. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

90 views

Data Selfie

May 28, 2018

Data Selfie
https://dataselfie.it/

Data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal what machine learning algorithms could predict about your personality based on that data. The tool explores our relationship to the online data we leave behind as a result of media consumption and social networks – the information you share consciously and unconsciously. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

95 views

KeePassX – Cross Platform Password Manager

May 28, 2018

KeePassX – Cross Platform Password Manager
https://www.keepassx.org/

KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License. KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database. KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature. The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favourable. Originally KeePassX was called KeePass/L for Linux since it was a port of Windows password manager Keepass Password Safe. After KeePass/L became a cross platform application the name was not appropriate anymore and therefore, on 22 March 2006 it has been changed. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

99 views

Standard Notes – A Simple and Private Notes App

May 28, 2018

Standard Notes – A Simple and Private Notes App
https://standardnotes.org/

Standard Notes is a safe place for your notes, thoughts, and life’s work. Standard Notes is free to use on every platform, and comes standard with cross-platform sync and end-to-end privacy. For those wanting a little more power and flexibility, we created Extended, which unlocks powerful editors, themes, and automated backups. Features include: 1) 100% Private – Your notes are encrypted and secured so only you can decrypt them. No one but you can read your notes (not even us); 2) Simple – Keeping our app simple means you’ll spend less time fighting and more time writing. It’s faster and lighter than most notes apps; 3) Powerful Extensions – Compose any kind of note, from rich text, to Markdown and code. Change the mood and find new inspiration with custom themes; and 4) Long-lasting – You probably don’t care, so we’ll care for you: our apps are built carefully to optimize overall lifetime and long-term survivability. Additional features include: a) Always Free; b) AES-256 encryption. No one but you can read your notes; c) Easy to use, open-source apps on Mac, Windows, iOS, Android, and Linux; d) Automatic Automatic sync with no limit on data capacity; e) Web access; and f) Offline access. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

99 views

Stitcher Premium – Welcome To the Spoken World

May 22, 2018

Stitcher Premium – Welcome To the Spoken World
https://www.stitcher.com/

Stream the latest in news, sports, talk, and entertainment radio anywhere, on demand. Stitcher is the easiest way to discover the best of over 65,000+ radio shows, live radio stations and podcasts. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

99 views

Bishop Fox Cybersecurity Style Guide

April 28, 2018

Bishop Fox Cybersecurity Style Guide
https://www.bishopfox.com/blog/2018/02/hello-world-introducing-the-bishop-fox-cybersecurity-style-guide/

How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In the evolving world of information security, it’s hard to know who to turn to for answers to questions like these. Through research and internal discussions over the last two years, they have come to a consensus about how to answer these kinds of questions for themselves. They have compiled 1,775 security terms into one document that they are calling the Cybersecurity Style Guide, and they are very excited to share Version 1 of that guide with you. This style guide is not a dictionary — their goal here is to give guidance about usage, not to define the terms in detail. Each term in the guide earned its place by being unintuitive in some way. From malicious viruses to viral memes, our guide reflects the terms that security researchers are likely to use in their technical reports, blogs, and presentations. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

144 views

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations

April 14, 2018

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations
https://getonwebs.wordpress.com/2018/04/03/how-to-survive-gdpr-the-essential-guide-to-the-webs-new-privacy-regulations/

A basic guide to the new European Law General Data Protection Regulation (GDPR) that goes into force on May 25, 2018. Because of its global reach all persons and companies should understand the consequences. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

147 views