“The losers are us, the people, who are left with no one to stand up for our interests. Our elected government, which is supposed to be responsible to us, is not. And corporations, which in a market economy are supposed to be responsive to our needs, are not. What we have now is death to privacy—and that’s very dangerous to democracy and liberty.” Bruce Schneier shares his thoughts on the incestuous relationship between corporations, lawmakers and the intelligence community in the US.
You might also wish to compare Article 12, Universal Declaration of Human Rights.
“I’ve talked to some of those who participated in the HBGary hack to learn in detail how they penetrated HBGary’s defenses and gave the company such a stunning black eye—and what the HBGary example means for the rest of us mere mortals who use the Internet.” Peter Bright’s story may be a couple of years old, but it still makes for an interesting read and tells you what not to do.
“But there’s another good reason for checking out a candidate’s Facebook page before inviting them in for an interview: it may be a fairly accurate reflection of how good they’ll be at the job.” Kashmir Hill reports on a study that will be read by HR consultants the world over.
“Can I be facebookfriends with my parents? Should I add someone I don’t really know? Will other people think my status update’s funny?”
Joep van Osch
“Apple’s and Google’s war for the phone in our pockets is the biggest clash since Apple v Microsoft for the space on our desktops” and, according to Robert Lane Greene, likely to impact the way we experience the world around us.
“In a world of repressive governments and a growing reliance on insecure networks, there’s no way anyone can be sure their most sensitive messages aren’t intercepted by the forces of darkness. But you can make it mathematically improbable that all but the most well-funded snoops could ever make heads or tales of your communications.” Use Dan Goodin’s step-by-step guide to email encryption and keep your communications private.
“It may not be surprising for you to learn that email is not a secure medium of communication; however, it may surprise you to learn just how inherently insecure it really is.” Erik Kangas on how email really works, what the security issues are and where you can make the difference.
luxsci.com (PDF file, 112 kb)
“Wer eine E-Mail verschickt, muß damit rechnen, daß seine Nachricht von Dritten gelesen wird.” Brief article outlining steps you can take to keep your email communications private.
“Spammers use HTML emails to confirm your address.” There are other drawbacks to using HTML-formatting when sending and receiving emails. Consider this list of potential pitfalls that Martin Favreau has compiled for you.
Email encryption should be used by everyone. Here’s why.
“Der politische Stand ist eine Symbiose mit der Medienindustrie eingegangen, die aus finanziellen Gründen den Terrorismus in einem Maße ausschlachtet, das objektiv nicht zu rechtfertigen ist.” Privacy is like oxygen, argues Pär Ström. You’ll miss it when it’s gone…
“You too can get PGP set up in a few simple steps.” Jason Thomas shows just how easy it is to start encrypting your messages.
“The bottom line is, if your email passes through or is stored on servers controlled by others, it’s probably a good idea to consider encryption.” Joe Brockmeier considers the confidentiality of your messages.
Find out more about the basic terminology and main methods of cryptography.
“In this guide, I will show you how to use the most important GPG commands.” Brendan Kidwell introduces GnuPG for Windows users.
“Internet life carries its own versions of courtesy, privacy and security issues that all users need to know.” This article discusses basic email etiquette and explains the proper use of the To, CC and BCC fields when sending emails.
Not entirely sure how cryptography works? This document’s two chapters, The Basics of Cryptography and Phil Zimmermann on PGP, will tell you what you need to know.
ftp.pgpi.org (PDF file, 1007 kb)
“I don’t want people reading my mail.” Roy Hoobler explains how to use KGPG for email and file encryption under KDE.
“It sounds like science fiction, but it’s true.” Andrew Bomford first published this article in November 1999. Will matters have improved since then?
Kelly Martin has become the victim of identity theft. A security professional by trade, he reflects on the many ways that personal data, stored on your computer, can fall into the wrong hands.