Posts by Category: Privacy Resources

FRONTLINE: United States of Secrets

July 06, 2014

FRONTLINE: United States of Secrets
http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/

FRONTLINE doesn’t shy away from difficult topics, as demonstrated by“United States of Secrets” a recent documentary on the activities of the National Security Agency (NSA) in the United States. On this site, visitors can view both parts of the documentary, explore interviews with tech industry experts, learn about journalistic guidelines, and also look over a raft of extra features. In The Latest section, visitors can look over meditations that include “How the NSA Can Get Onto Your iPhone” and  “Inside the NSA the Day After 9/11.” Additionally, visitors can view related programs, such as “Top Secret America” and several others. This will be added to Privacy Resources Subject Tracer™.

1119 views

PaperKarma™ – Kill Unwanted Mail, Not Trees

July 01, 2014

PaperKarma™ – Kill Unwanted Mail, Not Trees
https://www.paperkarma.com/

PaperKarma™ is a product of Reputation.com. The app was started by two guys in Seattle who detest unsolicited paper mail. Our mission is to help you take control of your home or business mailbox and to receive what and only what you want. As it turns out, most businesses want this too. They don’t want to waste printing and delivery costs and have their material go directly into the trashcan. They work closely with the source companies to help you unsubscribe from catalogs, magazines, credit card offers, etc. and optionally – i.e., if you explicitly choose to – convert you to the corresponding online (email) versions. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1155 views

Privacy Badger – Blocks Spying Ads and Invisible Trackers

June 27, 2014

Privacy Badger – Blocks Spying Ads and Invisible Trackers
https://www.eff.org/privacybadger/

Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it’s like you suddenly disappeared. Privacy Badger was born out of our desire to be able to recommend a single extension that would automatically analyze and block any tracker or ad that violated the principle of user consent; which could function well without any settings, knowledge or configuration by the user; which is produced by an organization that is unambiguously working for its users rather than for advertisers; and which uses algorithmic methods to decide what is and isn’t tracking. This will be added to Privacy Resources Subject Tracer™.

1381 views

Cluster – Private Spaces For You and Your Friends

June 24, 2014

Cluster – Private Spaces For You and Your Friends
https://cluster.co/

Create a group space, add the people you care about, and watch those people join and contribute. Features include: a) Private & Secure – Only invited members of the space can see what you post; b) An App for Everyone – Award-winning apps for iPhone, iPad, Android, and Web; and c) Relevant Notifications – Know when people you invited post new things to the space. This will be added to Privacy Resources Subject Tracer™ Information Blog.

1277 views

OnionShare – Securely and Anonymously Share a File of Any Size

June 23, 2014

OnionShare – Securely and Anonymously Share a File of Any Size
https://github.com/micahflee/onionshare

OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn’t require setting up a server on the internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you. This will be added to Privacy Resources Subject Tracer™. This will be added to the tools section of Research Resources’ Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to Script Resources Subject Tracer™.

1544 views

OpenScape – Secure Web Collaboration

June 18, 2014

OpenScape – Secure Web Collaboration
http://www.unify.com/us/products-services/unified-communications/applications/web-collaboration/

Bringing people together can be expensive. From business travel to managing office space, team coordination requires a deep investment—in cost, and in time. Enter the power of web collaboration. What if you could give your teams freedom to collaborate—without meeting? Have subject matter experts review a document on the fly? Escalate a complex discussion from auditory to visual in midstream? See the impact of an idea on teammates’ faces? Hire the best candidate for your team without worrying about where he or she lives? Web Collaboration from Unify turns those and other opportunities into reality.Features include: a) Web conferencing for up to 1,000 session participants; b) Highly secure 256-bit AES encryption; c) Integrated Desktop/application sharing, White-boarding, File sharing, Co-browsing, URL push, Session recording, chat, and multi-party Video (or insert favorite picture); d) Multi-screen capability, Media morphing, Undocking; e) Remote control for technical support; f) Full featured mobile client from iPhone, iPad and Android; g) Desktop client for Windows and MAC OS; and h) On-premise and hosted. OpenScape Web Collaboration lets your team seamlessly and securely share documents, videos and other media with a click. Directly from their desktops, smartphones and tablets. Group and individual chat enables side conversations, while seeing faces tells you if an idea is flying—or flopping. Because it’s fully available on our mobile client, you collaborate wherever you need to be. That means faster problem-solving, faster decision-making—and a faster path to a competitive Advantage. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to Privacy Resources Subject Tracer™.

1369 views

Encrypt.to – Send Encrypted Messages By One Click

June 14, 2014

Encrypt.to – Send Encrypted Messages By One Click
https://encrypt.to/

No signup needed if your public key is stored on a public key server! Open the link: https://encrypt.to/{your-email} or https://encrypt.to/{your-key-id}. They take the privacy of your data very seriously. Your browser encrypts the message before handing it to them! They are using End-to-end encryption with OpenPGP.js. We cannot read your message! Use the Security audit tool to audit the deployed source code. Features include: a) Open Source – They are using client side encryption and they can’t decrypt your message; b) OpenPGP.js – Encrypt.to is based on OpenPGP.js a JavaScript implementation of the OpenPGP standard; and c) Privacy In Mind – They are running Diaspora – a decentralized social networking platform built with your privacy in mind. Public Keys are available like GPGTools for Mac, Seahorse for Linux or Gpg4win for Windows. This will be added to Privacy Resources Subject Tracer™.

1308 views

ccrypt – Secure Encryption and Decryption of Files and Streams

June 10, 2014

ccrypt – Secure Encryption and Decryption of Files and Streams
http://ccrypt.sourceforge.net/

ccrypt is a utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael block cipher, a version of which is also used in the Advanced Encryption Standard (AES, see http://www.nist.gov/aes). This cipher is believed to provide very strong security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around. In addition, there is a compatibility mode for decrypting legacy unix crypt files. An emacs mode is also supplied for editing encrypted text files.  Encryption and decryption depends on a keyword (or key phrase) supplied by the user. By default, the user is prompted to enter a keyword from the terminal. Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

1687 views

Tickle – Escape an Awkward Encounter

June 03, 2014

Tickle – Escape an Awkward Encounter
http://www.usetickle.com/

Tickle is a new app that will help you get out of awkward situations. Using your phone’s accelerometer, Tickle will generate a phantom phone call when you touch your phone in an awkward manner. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1572 views

rumr – Anonymous Messaging With People You Know

May 30, 2014



rumr – Anonymous Messaging With People You Know
http://rumrapp.com/

rumr is the new way to chat anonymously in real-time with your friends on iOS and Android. Features include: a) Private – Chat privately and anonymously in real-time with your friends. rumr allows you to have conversations your identity prevents. It’s like having a conversation with the lights off; b) Anonymous – You are only identified by a colored chat bubble and your color is never shared. Your color will change each time someone new joins a chat to protect your anonymity. You can only see the messages if you are a member of the chat; and c) Safe – Inside each chat you can see the list of members so you always know who is in it. You can find friends on rumr through your address book or by adding a username. This will be added to Privacy ResourcesSubject Tracer™.

1511 views