35 private links
#Libravatar is a Federated Open Source Service which delivers your avatar (profile picture) to other websites, as an alternative to #Gravatar. If you create an account with us, your photo could start popping up next to forum posts or blog comments on any site where you left your email address.
Over the past few weeks, #Zoom's use has exploded since it became the video conferencing platform of choice in today's COVID-19 world. (My own university, Harvard, uses it for all of its classes. Boris Johnson had a cabinet meeting over Zoom.) Over that same period, the company has been exposed for having both lousy privacy and lousy security. My goal here is to summarize all of the problems and talk about solutions and workarounds.
In general, Zoom's problems fall into three broad buckets: (1) bad #privacy practices, (2) bad #security practices, and (3) bad user configurations.
Découverte de la journée, #Qwant - je vais essayer le navigateur aussi.
Looking for resources to make your own Computer Vision-triggering fashion and fabric designs? Check out the resource library below, and view the tutorial slides from my DEFCON 27 Crypto & Privacy Village Talk to get started. Libraries & APIs: OpenCV OpenFace VeriLook SDK OpenALPR PlateRecognizer TensorFlow Imag
Internal documents show that the social network gave Microsoft, Amazon, Spotify and others far greater access to people’s data than it has disclosed.
Denis Olivennes et Mathias Chichportich analysent cette marche forcée et inconsciente vers une société soumise aux injonctions souvent absurdes d’une prétendue modernité.
Laptop Camera Cover Set
$5.00
Description
This strip includes three 0.5" X 0.75" and two 0.5" X 1" adhesive stickers designed to protect you from visual surveillance by covering the lens of your laptop camera (and other devices).
Stickers feature a unique ultra-removeable adhesive to prevent gummy residue on your lens—far better than masking tape!
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.
VeraCrypt main features:
Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time(on-the-fly) and transparent.
Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
Encryption can be hardware-accelerated on modern processors.
Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
More information about the features of VeraCrypt may be found in the documentation
Mailvelope is available as a web browser extension for Chrome / Chromium and Firefox. It uses OpenPGP.js to add encryption and digital signature capability to any webmail service.
Enigmail is a seamlessly integrated security add-on for Mozilla Thunderbird. It allows you to use OpenPGP to encrypt and digitally sign your emails and to decrypt and verify messages you receive.
Enigmail is free software. It can be freely used, modified and distributed under the terms of the Mozilla Public License.
This comic says that a password such as "Tr0ub4dor&3" is bad because it is easy for password cracking software and hard for humans to remember, leading to insecure practices like writing the password down on a post-it attached to the monitor. On the other hand, a password such as "correcthorsebatterystaple" is hard for computers to guess due to having more entropy but quite easy for humans to remember.
Matomo is the only analytics platform that gives you full control over your data and more:
Free open-source software
100% data ownership
User privacy protection
User-centric insights
Customisable and extensible
Easy to use
No data limits
privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.
switching.social – Ethical, easy-to-use and privacy-conscious alternatives to popular sites and apps
- Alternatives to #Facebook and #Twitter
- Alternatives to #WhatsApp, #Messenger and #Skype
- Alternatives to #Google Search
- Alternatives to #Gmail, #Yahoo Mail and #Outlook
- Alternatives to #Medium
- Alternatives to #Amazon Books, #Kindle, #Audible and #Goodreads
- Alternatives to #Windows
- Alternatives to #Chrome and Internet Explorer/ #Edge
- Alternatives to #GoogleMaps
- Alternatives to #DropBox, #GoogleDrive and #GoogleDocs
- Alternatives to #Steam
- Alternatives to #Change.org
- Alternatives to #GoogleNews
- All-in-one alternatives
During Jacob Applebaum's talk at DebConf15, he noted that Debian should TLS-enable all services, especially the mirrors.
His reasoning was that when a high-value target downloads a security update for package foo, an adversary knows that they are still using a vulnerable version of foo and try to attack before the security update has been installed.
In this specific case, TLS is not of much use though. If the target downloads 4.7 MiB right after a security update with 4.7 MiB has been released, or downloads from security.debian.org, it's still obvious what's happening. Even padding won't help much as the 5 MiB download will also be suspicious. The mere act of downloading anything from the mirrors after an update has been released is reason enough to try an attack.
The solution, is, of course, Tor.
SQLCipher is an open source library that provides transparent, secure 256-bit AES encryption of SQLite database files.