Security: Difference between revisions

Content added Content deleted
No edit summary
No edit summary
Line 187: Line 187:


HTTPS Everywhere. 2014. [https://www.eff.org/https-everywhere HTTPS Everywhere]. San Francisco, CA: eff.org/https-everywhere .
HTTPS Everywhere. 2014. [https://www.eff.org/https-everywhere HTTPS Everywhere]. San Francisco, CA: eff.org/https-everywhere .

phantom. 2014. [https://code.google.com/p/phantom/ phantom: System for generic, decentralized, unstoppable internet anonymity]. Mountain View, CA: code.google.com/p/phantom/ .


TOR Vidalia project and Tor Browser Bundle.
TOR Vidalia project and Tor Browser Bundle.
Line 297: Line 299:


Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.


'''References to Add'''

https://apps.facebook.com/theguardian/commentisfree/2012/jul/10/nsa-warrantless-wiretapping-crime

http://apple.slashdot.org/story/12/07/15/1457223/when-art-apple-and-the-secret-service-collide

http://news.slashdot.org/story/12/07/14/2157233/former-pentagon-analyst-china-has-backdoors-to-80-of-telecoms

http://it.slashdot.org/story/12/07/17/1516220/security-camp-is-not-space-camp-just-based-on-it-video

http://it.slashdot.org/story/12/07/16/2310215/android-jelly-bean-much-harder-to-hack

http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network

http://www.wired.com/threatlevel/2012/07/binney-on-alexander-and-nsa/

http://yro.slashdot.org/story/12/08/02/1628204/federal-appeals-court-orders-tsa-to-explain-delay-in-body-scan-public-hearing

http://it.slashdot.org/story/12/08/03/0026201/yahoo-sued-for-password-breach

http://it.slashdot.org/story/12/08/07/006229/time-machines-computer-memory-and-brute-force-attacks-against-smartcards

http://it.slashdot.org/story/12/08/07/1349234/sensor-uses-bodys-electrical-signature-to-secure-devices

http://news.slashdot.org/story/12/08/10/1453237/poll-finds-americans-think-the-tsa-is-doing-a-good-job

http://it.slashdot.org/story/12/08/15/2033234/botnet-flaw-lets-researchers-disrupt-attacks

http://it.slashdot.org/story/12/09/03/0321205/calculating-the-cost-of-full-disk-encryption

http://yro.slashdot.org/story/12/09/08/2029245/white-house-circulating-draft-of-executive-order-on-cybersecurity

http://mobile.slashdot.org/story/12/09/20/1324228/android-hacked-via-nfc-on-the-samsung-galaxy-s-3

http://it.slashdot.org/story/12/09/25/1631236/samsung-smartphones-vulnerable-to-remote-wipe-hack

http://it.slashdot.org/story/12/09/25/1356211/data-breach-reveals-100k-ieeeorg-members-plaintext-passwords

http://www.proxy-server.at/

http://rendezvous.blogs.nytimes.com/2013/06/28/u-s-prism-meet-chinas-golden-shield/

http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-feds-pays-for-60-percent-of-tors-development-can-users-trust-it/

http://yro.slashdot.org/story/13/09/09/1154209/google-speeding-up-new-encryption-project-after-latest-snowden-leaks

http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

https://www.youtube.com/watch?v=3ijjHZHNIbU

http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

http://yro.slashdot.org/story/13/10/06/0016208/us-intelligence-chief-defends-attempts-to-break-tor

http://gizmodo.com/darpa-will-give-you-2-million-to-build-hacker-proof-de-1451009416

https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance

http://www.netfamilynews.org/top-takeaways-from-uss-top-net-safety-conference

https://www.eff.org/https-everywhere/faq

http://slashdot.org/topic/datacenter/home-routers-pose-biggest-consumer-cyberthreat/

http://krebsonsecurity.com/

http://news.slashdot.org/story/14/03/28/1132220/wal-mart-sues-visa-for-5-billion-for-rigging-card-swipe-fees

http://interviews.slashdot.org/story/14/04/06/2344201/interview-john-mcafee-answers-your-questions

http://thetrustadvisor.com/headlines/cyberthreats

http://politics.slashdot.org/story/14/07/10/1954258/after-nsa-spying-flap-germany-asks-cia-station-chief-to-depart


https://whispersystems.org/#encrypted_texts

https://crypto.cat/

https://guardianproject.info/apps/chatsecure

http://www.lelundin.se/

http://it.slashdot.org/story/14/11/07/1611257/website-peeps-into-73000-unsecured-security-cameras-via-default-passwords

http://open.blogs.nytimes.com/2014/11/13/embracing-https/?_r=3

https://code.google.com/p/phantom/




Line 439: Line 531:


Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance
Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance