Posts by Category: Privacy Resources

Data Selfie

May 28, 2018

Data Selfie
https://dataselfie.it/

Data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal what machine learning algorithms could predict about your personality based on that data. The tool explores our relationship to the online data we leave behind as a result of media consumption and social networks – the information you share consciously and unconsciously. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

57 views

KeePassX – Cross Platform Password Manager

May 28, 2018

KeePassX – Cross Platform Password Manager
https://www.keepassx.org/

KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License. KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database. KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature. The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favourable. Originally KeePassX was called KeePass/L for Linux since it was a port of Windows password manager Keepass Password Safe. After KeePass/L became a cross platform application the name was not appropriate anymore and therefore, on 22 March 2006 it has been changed. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

50 views

Standard Notes – A Simple and Private Notes App

May 28, 2018

Standard Notes – A Simple and Private Notes App
https://standardnotes.org/

Standard Notes is a safe place for your notes, thoughts, and life’s work. Standard Notes is free to use on every platform, and comes standard with cross-platform sync and end-to-end privacy. For those wanting a little more power and flexibility, we created Extended, which unlocks powerful editors, themes, and automated backups. Features include: 1) 100% Private – Your notes are encrypted and secured so only you can decrypt them. No one but you can read your notes (not even us); 2) Simple – Keeping our app simple means you’ll spend less time fighting and more time writing. It’s faster and lighter than most notes apps; 3) Powerful Extensions – Compose any kind of note, from rich text, to Markdown and code. Change the mood and find new inspiration with custom themes; and 4) Long-lasting – You probably don’t care, so we’ll care for you: our apps are built carefully to optimize overall lifetime and long-term survivability. Additional features include: a) Always Free; b) AES-256 encryption. No one but you can read your notes; c) Easy to use, open-source apps on Mac, Windows, iOS, Android, and Linux; d) Automatic Automatic sync with no limit on data capacity; e) Web access; and f) Offline access. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

48 views

Stitcher Premium – Welcome To the Spoken World

May 22, 2018

Stitcher Premium – Welcome To the Spoken World
https://www.stitcher.com/

Stream the latest in news, sports, talk, and entertainment radio anywhere, on demand. Stitcher is the easiest way to discover the best of over 65,000+ radio shows, live radio stations and podcasts. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

48 views

Bishop Fox Cybersecurity Style Guide

April 28, 2018

Bishop Fox Cybersecurity Style Guide
https://www.bishopfox.com/blog/2018/02/hello-world-introducing-the-bishop-fox-cybersecurity-style-guide/

How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In the evolving world of information security, it’s hard to know who to turn to for answers to questions like these. Through research and internal discussions over the last two years, they have come to a consensus about how to answer these kinds of questions for themselves. They have compiled 1,775 security terms into one document that they are calling the Cybersecurity Style Guide, and they are very excited to share Version 1 of that guide with you. This style guide is not a dictionary — their goal here is to give guidance about usage, not to define the terms in detail. Each term in the guide earned its place by being unintuitive in some way. From malicious viruses to viral memes, our guide reflects the terms that security researchers are likely to use in their technical reports, blogs, and presentations. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

97 views

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations

April 14, 2018

How to Survive GDPR: The Essential Guide to the Web’s New Privacy Regulations
https://getonwebs.wordpress.com/2018/04/03/how-to-survive-gdpr-the-essential-guide-to-the-webs-new-privacy-regulations/

A basic guide to the new European Law General Data Protection Regulation (GDPR) that goes into force on May 25, 2018. Because of its global reach all persons and companies should understand the consequences. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

105 views

AES Crypt – Advanced Open Source File Encryption

March 28, 2018

AES Crypt – Advanced Open Source File Encryption
https://www.aescrypt.com/

AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files. You do not need to be an expert to use AES Crypt, nor do you need to understand cryptography. When using Windows, the only thing you need to do is right-click on a file, select AES Encrypt or AES Decrypt, enter a password, and AES Crypt will do the rest. On a Mac, you can drag a file to the AES Crypt program and provide the required password. On the command line, one can execute the “aescrypt” command with name of the file and password to use to encrypt or decrypt. For PHP, Java, and C# developers, there are libraries available that can read and write AES-encrypted files from within your application. For Python enthusiasts, there is a command-line utility with source code that can be used to integrate AES Crypt functionality into your own Python applications. Using a powerful 256-bit encryption algorithm, AES Crypt can safely secure your most sensitive files. Once a file is encrypted, you do not have to worry about a person reading your sensitive information, as an encrypted file is completely useless without the password. It simply cannot be read. AES Crypt is the perfect tool for anyone who carries sensitive information with them while traveling, uploads sensitive files to servers on the Internet, or wishes to protect sensitive information from being stolen from the home or office. AES Crypt is also the perfect solution for those who wish to backup information and store that data at a bank, in a cloud-based storage service, and any place where sensitive files might be accessible by someone else. Best of all, AES Crypt is completely free open source software. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

139 views

Obin – Client Side Encrypted PasteBin

March 27, 2018

Obin – Client Side Encrypted PasteBin
https://0bin.net/

A random key is generated and used to encrypt the paste, thanks to the sjcl JavaScript library. The encrypted content is then sent to the server, which returns the address of the newly created paste. The JavaScript code redirects to this address, but it adds the encryption key in the URL hash (#). When somebody wants to read the paste, they will usually click on a link with this URL. If the hash containing the key is a part of it, 0bin’s JavaScript will use it to decrypt the content sent by the server. The browser never sends the hash to the server, so the latter does not receives the key at any time. All pastes are AES256 encrypted, they cannot know what you paste… This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

123 views

etherpad – Collaborating In Really Real-Time

March 26, 2018

etherpad – Collaborating In Really Real-Time
http://etherpad.org/

No more sending your stuff back and forth via email, just set up a pad, share the link and start collaborating! Etherpad allows you to edit documents collaboratively in real-time, much like a live multi-player editor that runs in your browser. Write articles, press releases, to-do lists, etc. together with your friends, fellow students or colleagues, all working on the same document at the same time. All instances provide access to all data through a well-documented API and supports import/export to many major data exchange formats. And if the built-in feature set isn’t enough for you, there’s tons of plugins that allow you to customize your instance to suit your needs. You don’t need to set up a server and install Etherpad in order to use it. Just pick one of publicly available instances that friendly people from everywhere around the world have set up. Alternatively, you can set up your own instance by following their installation guide. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

112 views

OnionShare – Securely and Anonymously Share Files of Any Size

March 26, 2018

OnionShare – Securely and Anonymously Share Files of Any Size
https://onionshare.org/

OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor Onion Service, and generating an unguessable URL to access and download the files. It does not require setting up a separate server or using a third party file-sharing service. You host the files on your own computer and use a Tor Onion Service to make it temporarily accessible over the internet. The receiving user just needs to open the URL in Tor Browser to download the file. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

107 views