Posts by Category: Privacy Resources

IPsec – Internet Protocol Security

November 22, 2013

 

IPsec – Internet Protocol Security
http://en.wikipedia.org/wiki/IPsec

Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite, while some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Hence, IPsec protects any application traffic across an IP network. Applications do not need to be specifically designed to use IPsec. Without IPsec, the use of TLS/SSL had to be designed into an application to protect the application protocols. This will be added to Privacy Resources Subject Tracer™.

 
1825 views

Bitmessage – P2P Communication Protocol To Send Encrypted Messages

November 21, 2013

 

Bitmessage – P2P Communication Protocol To Send Encrypted Messages
https://bitmessage.org/wiki/Main_Page

Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide “non-content” data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs. If Bitmessage is completely new to you, you may wish to start by reading the whitepaper.  This will be added to the P2P Section of Deep Web Research and Discovery Resources 2013 Subject Tracer. This will be added to Privacy Resources Subject Tracer™.

2331 views

Awareness Watch Newsletter V11N12 December 2013

November 20, 2013

Awareness Watch Newsletter V11N12 December 2013
http://AwarenessWatch.VirtualPrivateLibrary.net/V11N12.pdf
Awareness Watch™ Newsletter Blog and Archives
http://www.AwarenessWatch.com/

The December 2013 V11N12 Awareness Watch Newsletter is a freely available 56 page .pdf document (412KB) from the above URL. This month’s featured report covers Privacy Resources and Alerts 2014. In todays New Economy we must constantly be diligent in observing the latest privacy resources as well as the appropriate alerts to keep us current in all the various facets of our life including business, academic and special interests. This list of sources is taken from my Subject Tracer™ Information Blogs titled Privacy Rersources and Internet Alerts and are constantly updated with Subject Tracer™ Information Bots (STIB) at the following URLs: http://www.PrivacyResources.info/ and http://www.InternetAlerts.info/. These resources and sources will help you to discover the many existing and new pathways available to you through the Internet to find the latest privacy and alert resources, sources and sites. In today’s New Economy it has become one of the most important areas that we must constantly monitor and implement! The Awareness Watch Spotters cover many excellent and newly released annotated current awareness research sources and tools as well as the latest identified Internet happenings and resources including a number of neat and must-have tools! The Awareness Watch Article Review covers 3D Printing Community and Emerging Practices of Peer Production by by Jarkko Moilanen and Tere Vadén.

2301 views

uProxy – Share Your Pathway To the Internet

November 14, 2013

 

 

uProxy – Share Your Pathway To the Internet
http://uproxy.org/

uProxy is a browser extension that lets users share alternative more secure routes to the Internet. It’s like a personalised VPN service that you set up for yourself and your friends. uProxy helps users protect each other from third parties who may try to watch, block, or redirect users’ Internet connections. You might not realise it, but every time you connect to a website, your information takes many steps. For example it may travel from your computer to a Wi-Fi hotspot, to an Internet service provider, then on to an international gateway before arriving at the site. This journey matters because it is at each step that the connection may be blocked, surveilled or misdirected. uProxy lets you provide a pathway for trusted friends to get safer, more private and more reliable access. You give access to a friend by email or chat. By accessing the Internet through uProxy, a friend’s Internet connection is routed through your computer before continuing to the site they are visiting. uProxy helps avoid attacks on your friend’s Internet connection. You can also use uProxy when you are travelling and worried about the security of your Internet connection. By using uProxy to route your connection back to your home computer, you can access the Internet as if you were in your own home. uProxy has been developed at the University of Washington, with help from Brave New Software. The project was seeded by Google Ideas. This will be added to Privacy Resources Subject Tracer™.

2328 views

TOR2Web – Onion.to Tor Hidden Services Gateway

November 11, 2013

TOR2Web – Onion.to Tor Hidden Services Gateway
https://www.onion.to/

This gateway to Tor hidden services provides convenient access to Tor hidden services. It is a pure proxy that forwards requests to the respective hidden service. We do not store any data and are not liable for the content. No anonymity! Onion.to as a gateway cannot offer any anonymity for the visitor. For example, both onion.to and the hidden service itself can see the visitor’s IP address, and use browser fingerprinting to track users across different sessions. In all cases, it is better to download the Tor Browser Bundle and access the hidden service using Tor (don’t forget to remove the .to from the URL!). This will be added to Privacy Resources Subject Tracer™.

18110 views

SafeGov – Promoting Trusted and Responsible Cloud Computing for Government

November 09, 2013

SafeGov – Promoting Trusted and Responsible Cloud Computing for Government
http://www.safegov.org/

SafeGov.org is a forum for IT providers and leading industry experts dedicated to promoting trusted and responsible cloud computing solutions for the public sector. By fostering a more comprehensive understanding of cloud technologies, including their benefits, capabilities and limitations, SafeGov.org works to empower government users to make well-informed procurement choices from the growing universe of marketplace offerings. SafeGov.org will: a) Propose solutions, best practices and guidance to ensure that public sector customers can seize the advantages of new cloud offerings while mitigating risk; b) Provide detailed information that governments need to make complex decisions about shifting enterprise services to the cloud; c) Provide a comprehensive platform for leading experts and analysts to discuss issues affecting the broader cloud sector; d) Help foster healthy discussions of innovations and advancements in cloud computing by tracking policy developments, news coverage, and expert analysis and research; and e) Promote open competition and safe, secure, and responsible IT practices. The following principles are a foundation for this forum: 1) Data storage and integrity: Government users have the right to know how and where their data is stored and that it is stored without compromising data integrity; 2) Cloud architecture choice: The right for government customers to choose a cloud architecture that best meets their needs; 3) Accurate vendor representations: The commitment of vendors to clearly and accurately represent their capabilities, costs and ability to conform to government standards; 4) Security and privacy: The top priorities for any cloud solution should be to provide maximum security and well-defined privacy policies that reflect the interests of government customers; and 5) Level playing field: The need for open competition based on well-defined implementation and procurement policies. This will be added to Privacy Resources Subject Tracer™.

2373 views

A Guide for Guarding Personal Information in the Workplace

November 04, 2013

 

 

A Guide for Guarding Personal Information in the Workplace
http://www.sharefile.com/datasecurity.aspx

It is a common practice for a company to store personal or private information in its files. This information can be as crucial and sensitive as credit card information, social security numbers and other data which directly expose the company’s employees or customers. This type of information is required to complete critical business transactions such as payroll. However, if an unauthorized person gains access to it, it could result in a major loss of privacy and damage to the company and its employees. Considering the financial, moral and psychological consequences of security violations, it is imperative to protect personal information at all times. This has been added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1378 views

Update>Privacy Resources White Paper Link Dataset Compilation

November 01, 2013

Update>Privacy Resources White Paper Link Dataset Compilation
http://www.PrivacyResources.info/

The white paper link dataset compilation of Privacy Resources Subject Tracer™ by Marcus P. Zillman, M.S., A.M.H.A. is a 31 page .pdf document 251KB. [Updated November 1, 2013]. Privacy Resources and Sites on the Internet is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. This is a MUST reference for today’s New Economy where privacy and security have become major issues!! Keep your privacy and security with this excellent Subject Tracer™. The website and .pdf have been completely updated as of November 1, 2013.

1000 views

Faceless.me VPN – Surf the Web Anonymously and Protect Your Data

October 28, 2013

Faceless.me VPN – Surf the Web Anonymously and Protect Your Data
http://faceless.me/

Did you know that some people are tracking what you do online? Your ISP, the Government, Google or someone with hacker skills may spy on your online activities. Faceless.Me VPN is a tool that grants you online Privacy and Security. By using our service you get yourself behind the shield, where no one can spy on your online identity or steal your data. Features include: a) Hide your IP address and browsing habits; b) Encrypt your “sensitive data”: credit cards and passwords; c) Get access to region-restricted content from anywhere; and d) No Logs Kept. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™.

4488 views

Secured URL

October 24, 2013

Secured URL
http://securedurl.org/

Secured URL allows you to encrpypt a URL with a password. It works like TinyURL. 1.Enter a URL (website link), password, and expiration date. 2.Get the secured URL and share as desired. Do not share the password in the same communication. Their security measures include: a) Secured URLs are purged after the Expiration Date; b) No browser information is stored in the database (ie., IP Address or Host Name); c) Apache Web Server logging is disabled; and d) No use of Google Analytics. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

1584 views