Posts by Category: Privacy Resources

Awareness Watch Talk Show for Wednesday February 21, 2018 at 2:00pm EST – Privacy Resources 2018

February 21, 2018

Awareness Watch Talk Show for Wednesday February 21, 2018 at 2:00pm EST – Privacy Resources 2018
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will be featuring my recently updated white paper Privacy Resources 2018. We will be highlighting the latest and greatest resources and sources covering privacy resources, sources, search engines, subject directories, articles, guides and tracers….literally everything on the Internet covering PRIVACY RESOURCES!! We will also be discussing my latest freely available Awareness Watch Newsletter V16N2 February 2018 featuring Deep Web Research and Discovery Resources 2018 as well as my freely available February 2018 Zillman Columns highlighting 2018 Tools for Current Awareness. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Wednesday, February 21, 2018 and then archived for easy review and access. Listen, Call and Enjoy….

32 views

Updated> Privacy Resources 2018

February 01, 2018

Updated> Privacy Resources 2018
http://www.PrivacyResources.info/

The white paper link dataset compilation of Privacy Resources 2018 Subject Tracer™ by Marcus P. Zillman, M.S., A.M.H.A. is now a 52 page .pdf document 375KB. Privacy Resources and Sites on the Internet is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. This is a MUST reference for today’s New Economy where privacy and security have become major issues!! Keep your privacy and security with this excellent Subject Tracer™. This white paper (.pdf) has been completely updated including all links validated and new links added as of February 1, 2018.

This research is powered by Subject Tracer Bots™ available from the Virtual Private Library™.

©2018 Marcus P. Zillman, M.S., A.M.H.A.

52 views

Tresorit – End-to-End Encrypted File Sync and Sharing

January 05, 2018

Tresorit – End-to-End Encrypted File Sync and Sharing
https://tresorit.com/

Protect your files with end-to-end encryption. Keep your sensitive data safe from hackers, snooping governments and the dangers of internal breaches. Secure your files all the way from your computer to the people you share them with. With their end-to-end encryption, nothing leaves your device unencrypted. Only you have the keys to read the content of your files. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

120 views

Awesome Machine Learning for Cyber Security

January 03, 2018

Awesome Machine Learning for Cyber Security
https://github.com/jivoi/awesome-ml-for-cybersecurity

A curated list of amazingly awesome tools and resources related to the use of machine learning for cyber security. This will be added to Privacy Resources Subject Tracer™. This will be added to Artificial Intelligence Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

 

103 views

Haven: Keep Watch

December 23, 2017

Haven: Keep Watch
https://guardianproject.github.io/haven/

Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical spaces. Haven turns any Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders. They designed Haven for investigative journalists, human rights defenders, and people at risk of forced disappearance to create a new kind of herd immunity. By combining the array of sensors found in any smartphone, with the world’s most secure communications technologies, like Signal and Tor, Haven prevents the worst kind of people from silencing citizens without getting caught in the act. This will be added to Privacy Resources Subject Tracer™. This will be added to Journalism Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™. This will be added to Start Up Resources for the Entrepreneur 2018 white paper.

134 views

Cryptomator

December 21, 2017

Cryptomator
http://www.cryptomator.org

Cloud storage can be a tempting offsite backup approach, but without some sort of encryption one runs the risk of accidentally publishing all the files they’ve backed up to the world. Cryptomator provides such an encryption layer. It provides a virtual hard drive that users can treat like a USB stick. But under the covers, Cryptomator transparently uses industry standard AES encryption to encode your files before storing them on a cloud provider. The encryption key used is generated from a user-specified password using the standard scrypt algorithm; there is no additional key or account management beyond that. Cryptomator is licensed under the GPLv3, with full source code available on github. Desktop versions of Cryptomator are available for Windows, macOS, and Linux. Mobile versions are available for iOS and Android. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™. Copyright © 2017 Internet Scout Research Group – http://scout.wisc.edu

155 views

GDPR Portal: Site Overview

December 15, 2017

GDPR Portal: Site Overview
http://www.eugdpr.org/

This website is a resource to educate the public about the main elements of the General Data Protection Regulation (GDPR). After four years of preparation and debate the GDPR was finally approved by the EU Parliament on 14 April 2016. It will enter in force 20 days after its publication in the EU Official Journal and will be directly application in all members states two years after this date. Enforcement date: 25 May 2018 – at which time those organizations in non-compliance will face heavy fines. The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. The key articles of the GDPR, as well as information on its business impact, can be found throughout this site. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

184 views

Swirlds – The Platform for Distributed Applications

November 25, 2017

Swirlds – The Platform for Distributed Applications
http://www.swirlds.com/

Swirlds is a software platform designed to build fully-distributed applications that harness the power of the cloud without servers. Now you can develop applications with fairness in decision making, speed, trust and reliability, at a fraction of the cost of traditional server-based platforms. Features include: a) Secure – Maintain private and secure data, without having to trust the privacy and integrity of any central server; b) Reliable – Deliver applications that are always available; as reliable as the internet; c) Fair – Ensure the actual order of transactions is the consensus order, and all transactions are included; d) Trusted – Enforce rules, achieve fairness and ensure safety in a highly trusted system; e) Fast – Speed time-to-consensus with more transactions per second; and f) Cost-effective – Build high-throughput, scalable applications without incurring server costs and maintenance. The Swirlds platform enables developers to create both permissioned and permissionless distributed applications with high transaction throughput, low consensus latency, and fairness in transaction order, without the burdensome costs of Proof-of-Work. Some of the application categories include: 1) Markets; 2) Gaming; 3) Online Collarboration; 4) Identity; 5) Cryptocurrency; and 6) Public Ledger. This will be added to Financial Sources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™. This will be added to Privacy Resources Subject Tracer™.

140 views

Guide to Privacy Resources 2018

November 22, 2017

Guide to Privacy Resources 2018
http://www.StealthMode.info/

The Guide to Privacy Resources 2018 is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. The comprehensive list of sources is taken from my Subject Tracer™ Information Blog titled Privacy Resources and is constantly updated with my Subject Tracer™ bots. These resources and sources will help you to discover the many pathways available to you through the Internet to find the latest privacy sources and sites. [This has been updated on November 21, 2017 and is 51 pages PDF 346KB]

129 views

Privacy Resources 2018

November 21, 2017

Privacy Resources 2018
http://www.PrivacyResources.info/

The white paper link dataset compilation of Privacy Resources 2018 Subject Tracer™ by Marcus P. Zillman, M.S., A.M.H.A. is now a 51 page .pdf document 361KB. Privacy Resources and Sites on the Internet is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. This is a MUST reference for today’s New Economy where privacy and security have become major issues!! Keep your privacy and security with this excellent Subject Tracer™. This white paper (.pdf) has been completely updated including all links validated and new links added as of November 21, 2017.

This research is powered by Subject Tracer Bots™ available from the Virtual Private Library™.

©2017 Marcus P. Zillman, M.S., A.M.H.A.

109 views