Quantcast
Channel: anthropology news ticker - antropologi.info » anthropology
Viewing all articles
Browse latest Browse all 2364

Erkan in the Army now...: Cyberculture roundup: John Cusack hangs around with EFF people… PEW: Anonymity, Privacy, and Security Online

$
0
0
Anonymity, Privacy, and Security Online 86% of online adults have taken steps to avoid surveillance by other people or organizations when using the internet. Despite precautions, 21% have had an email or social media account hijacked and 11% have had vital information stolen. John Cusack in hacker-land How I spent the weekend: I flew to the Electronic Frontier Foundation and the Freedom of the Press Foundation in a helicopter with actor, writer, filmmaker, and activist John Cusack, friend of Boing Boing and of digital liberty (@johncusack on Twitter). John’s a pal, and one of my fellow board members at FPF. He’d never met most of the FPF-ers or EFF-ers, so we decided to take advantage of the clear California skies and a kind offer from a friend who flies Steve Fossett‘s chopper (which has now been converted into a camera ship for motion pictures), and literally chopper in to hacker-town. We stopped by Noisebridge, too. Chaos ensued.     We flew up in this very special stunt/movie helicopter owned by a friend of Mr. Cusack’s, a man who is a film financier in Hollywood. The craft was previously owned by famed aviator Steve Fossett. Hundreds of Pages of NSA Spying Documents to be Released As Result of EFF Lawsuit In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. NSA Becomes Household Name After Snowden Leaks How popular a topic has the National Security Agency become after Edward Snowden started leaking top-secret documents about its far-reaching surveillance programs? Very. Internet Freedom and Political Space The Internet is a new battleground between governments that censor online content and those who advocate Internet freedom. This report examines the implications of Internet freedom for state-society relations in nondemocratic regimes. Smartphone cameras have killed the point-and-shoot, but not the dSLR Everything in the technology space seems to be revolving around the camera built into the hardware device. If there’s a social component to it, then it needs to have a camera. Take today’s Samsung Galaxy Gear news where the electronics manufacturer unveiled a smartwatch with a 1.9 megapixel camera on the wriststrap — traditionally, watches didn’t come with a way to take photographs. Hell, even the Pebble smartwatch, one of the first of its kind, didn’t come equipped with a way to capture images or videos. The Cost of Censorship in Libraries: 10 Years Under the Children’s Internet Protection Act This year marks the 10-year anniversary of the enforcement of the Children’s Internet Protection Act (CIPA), which brought new levels of Internet censorship to libraries across the country. CIPA was signed into law in 2000 and found constitutional by the Supreme Court in 2003. The law is supposed to encourage public libraries and schools to filter child pornography and obscene or “harmful to minors” images from the library’s Internet connection in exchange for continued federal funding. Unfortunately, as Deborah Caldwell-Stone explains in Filtering and the First Amendment, aggressive interpretations of this law have resulted in extensive and unnecessary censorship in libraries, often because libraries go beyond the legal requirements of CIPA when implementing content filters. As a result, students and library patrons across the country are routinely and unnecessarily blocked from accessing constitutionally protected websites. This is Yahoo’s new logo Last  month, Yahoo said it would introduce a new logo but keep its infamous exclamation point. Today, after 30 days of showing off alternative versions of its badge, the companyhas delivered. Mapping the Bitcoin Economy Could Reveal Users’ Identities Analyzing the public traces left by every bitcoin transaction could allow law enforcement to identify many users of a currency often assumed to offer anonymity. Anonymous #opINFORM gaining momentum (Includes interview) DigitalJournal.com Those within Anonymous subscribe to the various social media accounts of #opINFORM to stay abreast of current events related to some of the organization’s goals. A source within the project says their information reaches between four and five million   Twerking enters Oxford Dictionary The rooms are neither as dusty, nor as bald of sound, as one might imagine the cloisters of the Oxford English Dictionary. There are no books piled in the cracked tile hallways, no atmospheric beams of light angling into the tranquil gloom. No old clunking timepiece marks the infinitude of time.   Anonymous leaks information on leading Azerbaijan energy company SC Magazine A group claiming to be an Armenian branch of hacker collectiveAnonymous has leaked 7 GB worth of documents relating to Azerenergy, the leading energy producer in the Eurasian country of Azerbaijan. Financial details, offshore communications, contracts … Anonymous hacktivists target Azeri largest electrical power producer Hackers ”Anonymous” hack Azerbaijani energy giant as dissatisfaction sign … Hackers ”Anonymous” hack Azerenergy   The NSA: Even Worse Than You Think! There is one secret Edward Snowden spilled that even the most hard-boiled anti-privacy security operative can’t ignore: The National Security Agency is broken. It is broken not just because it somehow let a contractor steal a voluminous portion of its secrets, but because many of those secrets paint a picture of a dysfunctional agency. The NSA not only can’t stop a leaker like Snowden; it’s uncertain that the NSA can do a good chunk of what’s in its job description. How Advanced Is the NSA’s Cryptanalysis — And Can We Resist It? Whatever the NSA has up its top-secret sleeves, the mathematics of cryptography will still be the most secure part of any encryption system. Related posts: Cyberculture roundup: Youth and their online reputation; Privacy issues; Transparency etc.. Cyberculture roundup: Thousands of NSA Privacy Violations exposed with New Snowden Documents… Blogger’s suicide site… Online privacy special series from MediaShift. A cyberculture roundup. Pew Report on Teens and Mobile Apps Privacy; Best of Ballmer… a Cyberculture roundup… Cyberculture roundup: Pew Report: 72% of Online Adults in US are Social Networking Site Users; On MIT’s report on Aaron Swartz’s prosecution..

Viewing all articles
Browse latest Browse all 2364

Trending Articles