Security: Difference between revisions

403 bytes added ,  9 years ago
no edit summary
No edit summary
No edit summary
Line 239:
Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation.
 
Eisen, Michael. 2014. [http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/ The Internet of Things Is Wildly Insecure — And Often Unpatchable]. San Francisco, CA: wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/ .
 
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.
Line 276:
 
Soulskill. 2013. http://mobile.slashdot.org/story/13/01/09/1910210/nokia-redirecting-traffic-on-some-of-its-phones-including-https Nokia Redirecting Traffic On Some of Its Phones, Including HTTPS]. January 09. mobile.slashdot.org.
 
Trailrunner7. 2014. [http://yro.slashdot.org/story/14/06/26/1549232/mass-supreme-court-says-defendant-can-be-compelled-to-decrypt-data Mass. Supreme Court Says Defendant Can Be Compelled To Decrypt Data]. June 26. yro.slashdot.org/story/14/06/26/1549232/mass-supreme-court-says-defendant-can-be-compelled-to-decrypt-data .
 
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com.
Line 419 ⟶ 421:
 
Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance
 
 
 
Line 854 ⟶ 857:
<br />
LANGUAGE TEMPLATE: http://worlduniversity.wikia.com/wiki/LANGUAGE_TEMPLATE
<br />
MUSEUM TEMPLATE: http://worlduniversity.wikia.com/wiki/MUSEUM_TEMPLATE
<br />
NATION STATE TEMPLATE: http://worlduniversity.wikia.com/wiki/NATION_STATE_TEMPLATE
Anonymous user