Posts by Category: Privacy Resources

Hide My Ass – Free Web Proxy

August 01, 2013

Hide My Ass – Free Web Proxy
http://hidemyass.com/

In this day and age of hackers, censorship, online identity theft, people spying and monitoring your online activities, your online privacy has never been so important. Their aim is to provide easy to use services that help protect your online identity and privacy. Their free web proxy is a secure service that allows you to surf anonymously online in complete privacy. Use their free proxy to surf anonymously online, hide your IP address, secure your internet connection, hide your internet history, and protect your online identity. For more advanced features their Pro VPN service adds increased security and anonymity on to your existing internet connection. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

5444 views

Crypton – Framework for Building Cryptographically Secure Cloud Applications

July 30, 2013

Crypton – Framework for Building Cryptographically Secure Cloud Applications
https://crypton.io/

Crypton is a framework for building cryptographically secure cloud applications. Such applications offer meaningful privacy assurance to end users because the servers running the application cannot read the data created and stored by the application. Using Crypton, developers can for the first time easily build feature rich multi user collaborative applications that offer total privacy and security “out of the box.” Crypton transparently does all the hard parts of cryptography behind the scenes. This allows developers to focus on domain specific challenges. This will be added to Privacy Resources Subject Tracer™. This will be added to Grid, Distributed and Cloud Computing Resources Subject Tracer™.

1980 views

NoteShred – Send Encrypted, Password Protected Notes That Automatically Shred After Reading

July 29, 2013


NoteShred – Send Encrypted, Password Protected Notes That Automatically Shred After Reading
https://www.noteshred.com/

Stop sending sensitive information in plain text. Encrypted email is a pain. Send an online, encrypted, password protected note instead and be notified after it’s been read and shred. The idea behind NoteShred is simple. You create a note, assign it a password and then select how and when you would like the note to “shred” itself. The note has a unique URL that you can send to a recipient along with a password for them to open the note. You decide when the note will destroy or “shred” itself. They email you once your note is shredded or deleted so you can rest easy knowing that sensitive information is no longer just laying around in someone’s inbox. Your notes are secured using a strong AES 256bit encryption algorithm with a variable encryption key based on your own password. This means that only the people with the password can decrypt the note. They are not able to decrypt your note or your attachments in anyway. NoteShred doesn’t require any registration or user accounts. It’s all free with no commitment. You can send notes to anybody, all they need is the password. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1725 views

Notedip – Private Secure Self Destructing Messages

July 13, 2013

Notedip – Private Secure Self Destructing Messages
http://notedip.com/

NoteDIP is a free web application that allows you to send secret messages over the internet. These messages will destroy itself after being read. Thus it adds one more layer of protection on our messages. It’s fast, easy, and requires no password or user registration at all. Just write your note, and NoteDIP will generate a link. Then you copy and paste that link into an email (or instant message) that you send to the person who you want to read the note. When that person clicks the link for the first time, they will see the note in their browser and the note will automatically self-destruct; which means no one (even that very same person) can read the note again. The link won’t work anymore. You can optionally choose to be notified when your note is read by leaving your email and a reference for the note. You can also add passwords to ensure more security to your secret messages. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1328 views

SpiderOak – 100% Private Online Backup, Sync and Sharing

July 11, 2013

SpiderOak – 100% Private Online Backup, Sync and Sharing
https://spideroak.com/

First released in 2007, SpiderOak helped define the industry of online backup. Determined to dispel the myth that ‘data online can’t be secure,’ SpiderOak carved its niche as the top choice for those most concerned with privacy. The engineering goal was simple – devise a plan where users’ files, filenames, file types, folders, and/or any other personal information is never exposed to anyone for any reason (even under government subpoena). This describes  SpiderOak’s ‘zero-knowledge’ privacy environment. What does ‘Zero-Knowledge’ privacy mean? In technical terms it means that the server has ‘zero-knowledge’ of your data. In non-technical terms it means that your data is 100% private and  only readable to you. In a world where more and more of our lives are online, it behooves us to think about who has access to our data from critical business documents to personal photo albums. SpiderOak provides  the ability to utilize cloud technologies while retaining that precious  right we call privacy. This will be added to Privacy Resources Subject Tracer™.

980 views

TransCertain – Beyond Platforms

July 09, 2013

TransCertain – Beyond Platforms
http://www.transcertain.com/

TransCertain’s™ Security-Storage-Accessibility-as-a-Service solutions use advanced, proprietary Microtokenization™ / MicroEncryption™ methodology to protect and safeguard personal, corporate, private and any other sensitive information and data while permitting organizations to analyze, share, and distribute mission critical information across multiple platforms in a Ultra-Secure manner.

1154 views

Do Not Track Me

July 08, 2013

Do Not Track Me
https://www.abine.com/dntdetail.php

Stop companies from tracking you. DoNotTrackMe is the new and improved DoNotTrackPlus. Now with more tracker blocking power, stop identity thieves, advertisers, social networks, and spammers from tracking you. Features include: a) No setup; it just works; b) •Blocks more than 600 trackers; c) Web pages load up to 4x faster; and d) Free Download. This will be added to Privacy Resources Subject Tracer™ Information Blog.

1245 views

Privoxy – Free Software Privacy Enhancement

July 03, 2013

Privoxy – Free Software Privacy Enhancement
http://www.privoxy.org/

Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy is Free Software and licensed under the GNU GPLv2. Privoxy is an associated project of Software in the Public Interest (SPI). This will be added to Privacy Resources Subject Tracer™ Information Blog. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog.

1192 views

Scrambls – Take Personal Control Over Your Files and Posts Anywhere On the Web

July 03, 2013

Scrambls – Take Personal Control Over Your Files and Posts Anywhere On the Web
https://scrambls.com/

The web has recently seen a fantastic explosion in the ease and utility of online sharing. From political discourse to cake recipes, everything gets posted online. This evolution of information distribution has made it so much easier to stay in touch with friends, colleagues and ideas. However, it has come with a cost. The majority of posts are aggregated across a number of huge social media services that reserve the right read, distribute and archive the content as they see fit. Files are usually shared in the clear and can easily fall into the wrong hands. Scrambls enables users to seamlessly assert lasting control over their posts and files. Some conversations are really meant to be private. Some posts maybe shouldn’t have been posted. Some content is worthy of copyright. Groups and affiliations change. Scrambls strives to be an easy-to-use tool spanning across the Internet to give you control over your participation in online media and online distribution of your importan files. Scrambls works for online posts and files interchangeably. Using the same group controls as you use for scrambling social media posts, you can easily scramble a file or folder before emailing it or posting it to an online service or drive. Scrambls works by introducing a ‘key’ needed to read a post or open a protected file. The original content is encoded before being delivered to the web. The key gets stored at a scrambls servers while the encoded post goes to the service provider. When the post is later displayed, or the file is opened, scrambls applies the key to make it readable again. The author owns these keys and can set the policy for whom and when to make them available. This will be added to Privacy Resources Subject Tracer™ Information Blog. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

1208 views

LLRX> Privacy Resources and Sites on the Internet 2013

June 29, 2013

LLRX> Privacy Resources and Sites on the Internet 2013
http://www.llrx.com/features/privacyresources2013.htm

Marcus P. Zillman’s guide is a comprehensive, timely and actionable resource inclusive of a wide range of privacy resources for individuals as well as organizations. His guide includes references to associations,  indexes, search engines as and topical websites and sources that provide current applications, information and resources on the salient topic of privacy and how it relates to your use of the internet and social media. This guide is constantly updated as well and available from the Privacy Resources Subject Tracer™ by clicking here.

1507 views