Posts by Category: Privacy Resources

SecretInk – Create a Message That Automatically Self-Destructs After Reading

December 23, 2013

SecretInk – Create a Message That Automatically Self-Destructs After Reading
https://secretink.co/

SecretInk is a platform for sending secure messages that self-destruct immediately after being read. You can send passwords, account information or just plain fun messages and rest assured that no 3rd parties will read them. SecretInk sends all messages over HTTPS so your message text never touches the network unencrypted. Since they use end-to-end encryption, your message will never be readable by your work, ISP or third party mail hosts. Once a message is opened it is permanently deleted from their database. They never retain a copy and your message will be gone forever. They really believe in the power of secret messages, so they have built SecretInk to send SMS and e-mails for free! You can send messages to any phone number in their supported countries for free and it will be just as secure as every other SecretInk message. No one but the recipient will ever be able to read it. SecretInk is a new product made by PowerInbox. PowerInbox sees the next generation of email as collaborative, real-time, and interactive. The PowerInbox team is committed to bringing the app experience to email. PowerInbox’s interactive email plug-in allows users to perform real-time interactions inside emails from sites such as Facebook, Twitter, and LinkedIn. This will be added to Privacy Resources Subject Tracer™.

1312 views

I2P Anonymous Network

December 06, 2013

I2P Anonymous Network
http://www.i2p2.de/

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others. The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering them an uncensorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments – even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech. Anonymity is not a boolean – we are not trying to make something “perfectly anonymous”, but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection. I2P is still a work in progress. It should not be relied upon for “guaranteed” anonymity at this time, due to the relatively small size of the network and the lack of extensive academic review. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks. I2P works by routing traffic through other peers with all traffic encrypted end-to-end. For more information about how I2P works, see their Introduction. This will be added to Privacy Resources Subject Tracer™.

1586 views

How To Encrypt (almost) Anything Article

November 23, 2013

 

 

How To Encrypt (almost) Anything Article
http://www.pcworld.com/article/2025462/how-to-encrypt-almost-anything.html

An excellent article discussing how to encrypt almost anything by Alex Castle of the business security section in PCWorld. This will be added to Privacy Resources Subject Tracer™.

1675 views

IPsec – Internet Protocol Security

November 22, 2013

 

IPsec – Internet Protocol Security
http://en.wikipedia.org/wiki/IPsec

Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite, while some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Hence, IPsec protects any application traffic across an IP network. Applications do not need to be specifically designed to use IPsec. Without IPsec, the use of TLS/SSL had to be designed into an application to protect the application protocols. This will be added to Privacy Resources Subject Tracer™.

 
1783 views

Bitmessage – P2P Communication Protocol To Send Encrypted Messages

November 21, 2013

 

Bitmessage – P2P Communication Protocol To Send Encrypted Messages
https://bitmessage.org/wiki/Main_Page

Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide “non-content” data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs. If Bitmessage is completely new to you, you may wish to start by reading the whitepaper.  This will be added to the P2P Section of Deep Web Research and Discovery Resources 2013 Subject Tracer. This will be added to Privacy Resources Subject Tracer™.

2253 views

Awareness Watch Newsletter V11N12 December 2013

November 20, 2013

Awareness Watch Newsletter V11N12 December 2013
http://AwarenessWatch.VirtualPrivateLibrary.net/V11N12.pdf
Awareness Watch™ Newsletter Blog and Archives
http://www.AwarenessWatch.com/

The December 2013 V11N12 Awareness Watch Newsletter is a freely available 56 page .pdf document (412KB) from the above URL. This month’s featured report covers Privacy Resources and Alerts 2014. In todays New Economy we must constantly be diligent in observing the latest privacy resources as well as the appropriate alerts to keep us current in all the various facets of our life including business, academic and special interests. This list of sources is taken from my Subject Tracer™ Information Blogs titled Privacy Rersources and Internet Alerts and are constantly updated with Subject Tracer™ Information Bots (STIB) at the following URLs: http://www.PrivacyResources.info/ and http://www.InternetAlerts.info/. These resources and sources will help you to discover the many existing and new pathways available to you through the Internet to find the latest privacy and alert resources, sources and sites. In today’s New Economy it has become one of the most important areas that we must constantly monitor and implement! The Awareness Watch Spotters cover many excellent and newly released annotated current awareness research sources and tools as well as the latest identified Internet happenings and resources including a number of neat and must-have tools! The Awareness Watch Article Review covers 3D Printing Community and Emerging Practices of Peer Production by by Jarkko Moilanen and Tere Vadén.

2262 views

uProxy – Share Your Pathway To the Internet

November 14, 2013

 

 

uProxy – Share Your Pathway To the Internet
http://uproxy.org/

uProxy is a browser extension that lets users share alternative more secure routes to the Internet. It’s like a personalised VPN service that you set up for yourself and your friends. uProxy helps users protect each other from third parties who may try to watch, block, or redirect users’ Internet connections. You might not realise it, but every time you connect to a website, your information takes many steps. For example it may travel from your computer to a Wi-Fi hotspot, to an Internet service provider, then on to an international gateway before arriving at the site. This journey matters because it is at each step that the connection may be blocked, surveilled or misdirected. uProxy lets you provide a pathway for trusted friends to get safer, more private and more reliable access. You give access to a friend by email or chat. By accessing the Internet through uProxy, a friend’s Internet connection is routed through your computer before continuing to the site they are visiting. uProxy helps avoid attacks on your friend’s Internet connection. You can also use uProxy when you are travelling and worried about the security of your Internet connection. By using uProxy to route your connection back to your home computer, you can access the Internet as if you were in your own home. uProxy has been developed at the University of Washington, with help from Brave New Software. The project was seeded by Google Ideas. This will be added to Privacy Resources Subject Tracer™.

2283 views

TOR2Web – Onion.to Tor Hidden Services Gateway

November 11, 2013

TOR2Web – Onion.to Tor Hidden Services Gateway
https://www.onion.to/

This gateway to Tor hidden services provides convenient access to Tor hidden services. It is a pure proxy that forwards requests to the respective hidden service. We do not store any data and are not liable for the content. No anonymity! Onion.to as a gateway cannot offer any anonymity for the visitor. For example, both onion.to and the hidden service itself can see the visitor’s IP address, and use browser fingerprinting to track users across different sessions. In all cases, it is better to download the Tor Browser Bundle and access the hidden service using Tor (don’t forget to remove the .to from the URL!). This will be added to Privacy Resources Subject Tracer™.

17662 views

SafeGov – Promoting Trusted and Responsible Cloud Computing for Government

November 09, 2013

SafeGov – Promoting Trusted and Responsible Cloud Computing for Government
http://www.safegov.org/

SafeGov.org is a forum for IT providers and leading industry experts dedicated to promoting trusted and responsible cloud computing solutions for the public sector. By fostering a more comprehensive understanding of cloud technologies, including their benefits, capabilities and limitations, SafeGov.org works to empower government users to make well-informed procurement choices from the growing universe of marketplace offerings. SafeGov.org will: a) Propose solutions, best practices and guidance to ensure that public sector customers can seize the advantages of new cloud offerings while mitigating risk; b) Provide detailed information that governments need to make complex decisions about shifting enterprise services to the cloud; c) Provide a comprehensive platform for leading experts and analysts to discuss issues affecting the broader cloud sector; d) Help foster healthy discussions of innovations and advancements in cloud computing by tracking policy developments, news coverage, and expert analysis and research; and e) Promote open competition and safe, secure, and responsible IT practices. The following principles are a foundation for this forum: 1) Data storage and integrity: Government users have the right to know how and where their data is stored and that it is stored without compromising data integrity; 2) Cloud architecture choice: The right for government customers to choose a cloud architecture that best meets their needs; 3) Accurate vendor representations: The commitment of vendors to clearly and accurately represent their capabilities, costs and ability to conform to government standards; 4) Security and privacy: The top priorities for any cloud solution should be to provide maximum security and well-defined privacy policies that reflect the interests of government customers; and 5) Level playing field: The need for open competition based on well-defined implementation and procurement policies. This will be added to Privacy Resources Subject Tracer™.

2333 views

A Guide for Guarding Personal Information in the Workplace

November 04, 2013

 

 

A Guide for Guarding Personal Information in the Workplace
http://www.sharefile.com/datasecurity.aspx

It is a common practice for a company to store personal or private information in its files. This information can be as crucial and sensitive as credit card information, social security numbers and other data which directly expose the company’s employees or customers. This type of information is required to complete critical business transactions such as payroll. However, if an unauthorized person gains access to it, it could result in a major loss of privacy and damage to the company and its employees. Considering the financial, moral and psychological consequences of security violations, it is imperative to protect personal information at all times. This has been added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1339 views