Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 187: | Line 187: | ||
HTTPS Everywhere. 2014. [https://www.eff.org/https-everywhere HTTPS Everywhere]. San Francisco, CA: eff.org/https-everywhere . |
HTTPS Everywhere. 2014. [https://www.eff.org/https-everywhere HTTPS Everywhere]. San Francisco, CA: eff.org/https-everywhere . |
||
phantom. 2014. [https://code.google.com/p/phantom/ phantom: System for generic, decentralized, unstoppable internet anonymity]. Mountain View, CA: code.google.com/p/phantom/ . |
|||
TOR Vidalia project and Tor Browser Bundle. |
TOR Vidalia project and Tor Browser Bundle. |
||
Line 297: | Line 299: | ||
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
||
'''References to Add''' |
|||
https://apps.facebook.com/theguardian/commentisfree/2012/jul/10/nsa-warrantless-wiretapping-crime |
|||
http://apple.slashdot.org/story/12/07/15/1457223/when-art-apple-and-the-secret-service-collide |
|||
http://news.slashdot.org/story/12/07/14/2157233/former-pentagon-analyst-china-has-backdoors-to-80-of-telecoms |
|||
http://it.slashdot.org/story/12/07/17/1516220/security-camp-is-not-space-camp-just-based-on-it-video |
|||
http://it.slashdot.org/story/12/07/16/2310215/android-jelly-bean-much-harder-to-hack |
|||
http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network |
|||
http://www.wired.com/threatlevel/2012/07/binney-on-alexander-and-nsa/ |
|||
http://yro.slashdot.org/story/12/08/02/1628204/federal-appeals-court-orders-tsa-to-explain-delay-in-body-scan-public-hearing |
|||
http://it.slashdot.org/story/12/08/03/0026201/yahoo-sued-for-password-breach |
|||
http://it.slashdot.org/story/12/08/07/006229/time-machines-computer-memory-and-brute-force-attacks-against-smartcards |
|||
http://it.slashdot.org/story/12/08/07/1349234/sensor-uses-bodys-electrical-signature-to-secure-devices |
|||
http://news.slashdot.org/story/12/08/10/1453237/poll-finds-americans-think-the-tsa-is-doing-a-good-job |
|||
http://it.slashdot.org/story/12/08/15/2033234/botnet-flaw-lets-researchers-disrupt-attacks |
|||
http://it.slashdot.org/story/12/09/03/0321205/calculating-the-cost-of-full-disk-encryption |
|||
http://yro.slashdot.org/story/12/09/08/2029245/white-house-circulating-draft-of-executive-order-on-cybersecurity |
|||
http://mobile.slashdot.org/story/12/09/20/1324228/android-hacked-via-nfc-on-the-samsung-galaxy-s-3 |
|||
http://it.slashdot.org/story/12/09/25/1631236/samsung-smartphones-vulnerable-to-remote-wipe-hack |
|||
http://it.slashdot.org/story/12/09/25/1356211/data-breach-reveals-100k-ieeeorg-members-plaintext-passwords |
|||
http://www.proxy-server.at/ |
|||
http://rendezvous.blogs.nytimes.com/2013/06/28/u-s-prism-meet-chinas-golden-shield/ |
|||
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-feds-pays-for-60-percent-of-tors-development-can-users-trust-it/ |
|||
http://yro.slashdot.org/story/13/09/09/1154209/google-speeding-up-new-encryption-project-after-latest-snowden-leaks |
|||
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance |
|||
https://www.youtube.com/watch?v=3ijjHZHNIbU |
|||
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption |
|||
http://yro.slashdot.org/story/13/10/06/0016208/us-intelligence-chief-defends-attempts-to-break-tor |
|||
http://gizmodo.com/darpa-will-give-you-2-million-to-build-hacker-proof-de-1451009416 |
|||
https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance |
|||
http://www.netfamilynews.org/top-takeaways-from-uss-top-net-safety-conference |
|||
https://www.eff.org/https-everywhere/faq |
|||
http://slashdot.org/topic/datacenter/home-routers-pose-biggest-consumer-cyberthreat/ |
|||
http://krebsonsecurity.com/ |
|||
http://news.slashdot.org/story/14/03/28/1132220/wal-mart-sues-visa-for-5-billion-for-rigging-card-swipe-fees |
|||
http://interviews.slashdot.org/story/14/04/06/2344201/interview-john-mcafee-answers-your-questions |
|||
http://thetrustadvisor.com/headlines/cyberthreats |
|||
http://politics.slashdot.org/story/14/07/10/1954258/after-nsa-spying-flap-germany-asks-cia-station-chief-to-depart |
|||
https://whispersystems.org/#encrypted_texts |
|||
https://crypto.cat/ |
|||
https://guardianproject.info/apps/chatsecure |
|||
http://www.lelundin.se/ |
|||
http://it.slashdot.org/story/14/11/07/1611257/website-peeps-into-73000-unsecured-security-cameras-via-default-passwords |
|||
http://open.blogs.nytimes.com/2014/11/13/embracing-https/?_r=3 |
|||
https://code.google.com/p/phantom/ |
|||
Line 439: | Line 531: | ||
Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance |
Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance |
||