Posts by Category: Privacy Resources

Lockify – Securely Send Private Information To Anyone

October 25, 2014

Lockify – Securely Send Private Information To Anyone
https://aboutlockify.com/

Lockify enables your business to send confidential messages (and soon files) to anyone using your existing communication tools. Features include: a) Open source encryption engine using the industry benchmark AES-256; b) User experience as simple as sharing a link; c) Works with all of your current (and future) communications tools; d) No registration nor sign in required; e) Easy-to-use authentication methods that don’t require any pre-coordination with your recipients; and f) Automatic permanent deletion of your encrypted data upon expiration. It’s easy as sharing a Lockify Link using your existing email/chat/SMS/etc. This will be added to Privacy Resources Subject Tracer™.

1914 views

EFF Releases – Protect Yourself From Electronic Spying with “Surveillance Self-Defense

October 24, 2014

EFF Releases – Protect Yourself From Electronic Spying with “Surveillance Self-Defense
https://ssd.eff.org/

The Electronic Frontier Foundation (EFF) launched its updated “Surveillance Self-Defense” report today, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world. “Everyone has something to protect, whether its from the government or stalkers or data-miners,” said EFF International Director Danny O’Brien. “Surveillance Self-Defense will help you think through your personal risk factors and concerns–is it an authoritarian government you need to worry about, or an ex-spouse, or your employer?–and guide you to appropriate tools and practices based on your specific situation.” Surveillance Self-Defense includes briefings on important security issues, tutorials on using specific privacy software like PGP and OTR, and guides for specific categories of users, like human rights activists or journalism students. People who are just beginning to upgrade their communications privacy can choose the “Security Starter Pack.” “The Internet and other electronic communications have empowered people all over the globe to speak out and make connections in world-changing ways,” said EFF Director for International Freedom of Expression Jillian York. “But this has also opened new opportunities for tracking and exposure. Surveillance Self-Defense will teach you to think critically about your Internet use and make good choices even as the technology changes around you.” Surveillance Self-Defense was first launched in 2009, aimed at educating Americans about the law and technology of communications surveillance. The new report expands, revises, and updates the old guide for use across the globe with support from the Ford Foundation. EFF spoke and worked with experts and activists from across the world, from MIT to the Middle East, in developing the guide. The entire Surveillance Self-Defense project is available in English, Spanish, and Arabic, with more languages available  soon. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

1350 views

GlassWire – Network Security Monitor and Firewall Tool

October 24, 2014

GlassWire – Network Security Monitor and Firewall Tool
https://www.glasswire.com/

Protect your computer by monitoring your network … GlassWire displays your network activity on an easy to understand graph while searching for unusual Internet behavior that could indicate malware or violations of your privacy. Once unusual network activity is discovered you’re instantly alerted with detailed information so you can protect your computer, privacy, and data. This will be added to Privacy Resources Subject Tracer™ Information Blog. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1149 views

EEXCESS – Enhancing Europe’s eXchange in Cultural Educational and Scientific reSources

October 23, 2014

EEXCESS – Enhancing Europe’s eXchange in Cultural Educational and Scientific reSources
http://eexcess.eu/

EEXCESS is a research project funded by the European Union’s Seventh Framework Programme (FP7/2007‐2013) under grant agreement n° 600601. Its vision is to unfold the treasure of cultural, educational and scientific long-tail content for the benefit of all users. EEXCESS stands for: Enhancing Europe’s eXchange in Cultural Educational and Scientific reSources. Through personalised and contextualised recommendation technologies we aim to enrich existing content dissemination channels users habitually use (e.g. social media) and content creation techniques users regularly conduct (e.g. writing blog entries). In order to ensure high quality recommendations we emphasize the integration of knowledge from memory organisations as well as the analysis of user behaviour and content consumption patterns. As the latter raises serious privacy protection issues, we will develop methods for retaining users’ privacy while offering the full range of personalisation. Key objectives include: a) Enrichment of Content; b) Personalised Recommendation; and c) Privacy Preservation. This will be added to Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™.

1424 views

Privacy.IO

October 20, 2014

Privacy.IO
https://privacy.io/

Web privacy is big news. This affordable Virtual Private Network (VPN) service promises to “give you your privacy back.” How does it work? Privacy.IO encrypts your data so that when you connect to your Internet Service Provider (ISP), your usage remains untraceable. You have full anonymity, with no logs kept. All operating systems are supported, including Windows, Apple, and Linux. This will be added to Privacy Resources Subject Tracer™. From The Scout Report, Copyright Internet Scout 1994-2014. https://www.scout.wisc.edu

1438 views

IVPN – Protect Your Online Privacy From Anywhere

October 07, 2014

IVPN – Protect Your Online Privacy From Anywhere
https://www.ivpn.net/

Their anonymous IP service encrypts and secures your connection – even on public networks. Safeguard your private data from snoopers and government surveillance. Protect your family from hackers and ID thieves. Their VPN software works on almost any device, anywhere. Features include: a) RESTORE YOUR PRIVACY – By safely encrypting your internet traffic and shielding your identity, IVPN protects you from controversial government surveillance and data retention practices; b) YOUR SECURITY IS THEIR SPECIALITY – Unlike other VPN and anonymous proxy services, their team has decades of experience in information security – so you can rely on their expertise to protect your data; c) PROTECT YOUR ANONYMITY – All your internet activity is tied to our VPN IP addresses, not yours. Surf anonymously knowing they don’t store ANY logged data that could compromise your anonymity online; and d) NO SPEED OR USAGE LIMITS – Get fast unlimited premium bandwidth, with no restrictions or download caps. Buy the best VPN service for both privacy and performance. IVPN routes your connection through secure VPN servers, maintaining your right to privacy and protecting you from hackers and censorship. Protect your IP …. Hide your location using our Multihop network for the ultimate in anonymous browsing and privacy. Stop Hackers and ID Thieves …. Trust that your email, chat and internet usage is secure even when using open public networks. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1398 views

Privatize

September 29, 2014

Privatize
http://privatize.io/

The Privatize site is a great place to create tweets with private links that can only be viewed by the people you mention. It’s a nice way to share information with only a set few and it’s a good way to create discrete offerings. Users simply need to login with their Twitter account to get started. This version is compatible with all operating systems. This will be added to Privacy Resources Subject Tracer™.[From The Scout Report, Copyright Internet Scout 1994-2014. https://www.scout.wisc.edu]

1770 views

Awareness Watch Talk Show for Saturday September 27, 2014 at 2:00pm EDT – Privacy Resources

September 27, 2014

Awareness Watch Talk Show for Saturday September 27, 2014 at 2:00pm EDT – Privacy Resources
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will be featuring Privacy Resources Subject Tracer™. This Internet Annotated Link Dataset Compilation is dedicated to the latest and most competent resources for privacy available over the Internet. The following selected privacy resources, sites, indexes and alerts offer excellent knowledge and information discovery sources to help you accomplish your privacy research and discovery goals! We will also discussing my latest freely available Awareness Watch Newsletter V12N9 September 2014 highlighting the following subject areas: Peer to Peer (P2P), File Sharing, Grid and Matrix Search Engines, Semantic Web Research Resources, Artificial Intelligence Resources, and Bot and Intelligent Agent Research Resources and Sites and my freely available September 2014 Zillman Column featuring my Student Research Resources Library. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Saturday, September 27, 2014 and then archived for easy review and access. Listen, Call and Enjoy!!

2069 views

TOX – A New Kind of Secure Instant Messaging

September 25, 2014

TOX – A New Kind of Secure Instant Messaging
http://tox.im/

With the rise of government monitoring programs, Tox provides an easy to use application that allows you to connect with friends and family without anyone else listening in. While other big-name services require you to pay for features, Tox is totally free, and comes without advertising. Nowadays, every government seems to be interested in what we’re saying online. Tox is built on a “privacy goes first” agenda, and they make no compromises. Your safety is their top priority, and there isn’t anything in the world that will change that. Features include: a) Messages – At your fingertips. You’re always in the loop with instant encrypted messaging; b) Calls – Stay in touch. Make free and secure Tox to Tox calls; c) Video – Seeing is believing. Catch up face to face with a secure video call; d) Security – Tox takes your privacy seriously. With leading-class encryption, you can rest assured knowing that the only people reading your messages are the ones you send them to; e) Ease of Use – Unlike other secure messaging solutions, Tox does not require you to be a computer programmer to use it. Tox comes out-of-the-box with an easy-to-use interface that allows you to focus on your conversations; and f) Freedom – Tox is both free for you to use, and free for you to change. You are completely free to both use and modify Tox. Furthermore, Tox will never harass you with ads, or require you to pay for features. This will be added to Privacy Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1924 views

ProtonMail – Securing Privacy Rights for Everyone

September 05, 2014

ProtonMail – Securing Privacy Rights for Everyone
https://protonmail.ch/

ProtonMail was founded in summer 2013 by scientists who met at CERN and were drawn together by a shared vision of a more secure and private Internet. Early ProtonMail hackathons were held at the famous CERN Restaurant One and at MIT. ProtonMail is headquartered in Geneva, Switzerland with a satellite office by the MIT campus. They are advised by the MIT Venture Mentoring Service. Features Include: a) ProtonMail is incorporated in Switzerland and their servers are located in Switzerland. They are outside of US and EU jurisdiction and user data is protected by strict Swiss data protection laws; b) Because of their end-to-end encryption, your data is already encrypted by the time it reaches their servers. They cannot decrypt your encrypted messages and as result, they cannot share them with third parties; c) ProtonMail works out of any modern web browser, there is nothing to install. They are also backwards compatible with other email providers so you can continue sending and receiving emails from friends who are not using ProtonMail; d) They believe privacy is a fundamental human right and should be available for everyone. That’s why they offer multi-tiered pricing including a free version that anyone can use. Let’s bring privacy back to the people; e) They do not keep permanent logs or require any personal information to sign up. They even accept anonymous payment methods (such as Bitcoin) so even paid users have their privacy rights protected; and f) ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It’s as simple as visiting their site and logging in. There are no plugins or apps to install – simply use your favorite web browser. This will be added to Privacy Resources Subject Tracer™. This will be added to Journalism Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog.

2194 views