120 private links
Les GAFAM étant des GAFAM, il n'y a rien de bon à attendre d'eux.
We do not store your data!
Since we NEVER collect your data, we NEVER track your data! We respect your privacy!
1.
It is in our DNA to protect every user!
2.
We DO NOT store your data!
3.
With Swisscows you are 100% anonymous!
Refusez les programmes de surveillance des données comme PRISM, XKeyscore et Tempora.
Nous avons tous le droit à la vie privée dès maintenant en chiffrant nos communications et en mettant fin à notre dépendance à l'égard des services propriétaires.
Privacy invasion —
Senate votes to let ISPs sell your Web browsing history to advertisers
The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies.
The rules were approved in October 2016 by the Federal Communications Commission's then-Democratic leadership, but are opposed by the FCC's new Republican majority and Republicans in Congress. The Senate today used its power under the Congressional Review Act to ensure that the FCC rulemaking "shall have no force or effect" and to prevent the FCC from issuing similar regulations in the future.
Which companies help protect your data from government?
Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 140,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public.
To demonstrate how an attacker could exploit this security hole, the experts made a proof-of-concept video. They showed that a cybercriminal could record a video of the targeted user via his/her own webcam and seamlessly post in on their Facebook timeline.
One of the most fascinating documents we came across was the BPD's subpoena of Philip Markoff's Facebook information. It's interesting for a number of reasons -- for one thing, Facebook has been pretty tight-lipped about the subpoena process, even refusing to acknowledge how many subpoenas they've served. Social-networking data is a contested part of a complicated legal ecosystem -- in some cases, courts have found that such data is protected by the Stored Communications Act.
Conseil : ne vous fiez pas au numérique. Et c’est bien en tant que fan du numérique que je vous dis qu’il est très dangereux de s’y fier à 100%.
Be a web detective.
Ghostery is your window into the invisible web – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior.
Ghostery tracks over 1,200 trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
Threatpost, The Kaspersky Lab security news service, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Threatpost’s award-winning editorial team produces unique and high-impact content including security news, videos, feature reports and more. They break important original stories, offer expert commentary on high-priority news aggregated from other sources, and engage with readers to discuss how and why these events matter.
Threatpost has been referenced as an authoritative source on information security by leading news outlets including The New York Times, The Wall Street Journal, MSNBC, USA Today and National Public Radio.
Threatpost’s global editorial activities are driven by industry-leading security journalist Dennis Fisher, editor-in-chief. He is assisted by Christopher Brook and Brian Donohue.
Make Threatpost your first stop for security news and analysis to stay informed and keep your organization safe.
TrapWire is a unique, predictive software system designed to detect patterns indicative of terrorist attacks or criminal operations. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations. Through the systematic capture of these pre-attack indicators, terrorist or criminal surveillance and pre-attack planning operations can be identified -- and appropriate law enforcement counter measures employed ahead of the attack. As such, our clients are provided with the ability to prevent the terrorist or criminal event, rather than simply mitigate damage or loss of life.
Department of Homeland Security will instantly know everything about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away. From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body—agents will be able to get any information they want without even touching you
When the government gathers or analyzes personal information, many people say they're not worried. "I've got nothing to hide," they declare. "Only if you're doing something wrong should you worry, and then you don't deserve to keep it private."
Nous sommes prêts à rendre accessibles nos données personnelles contre des services gratuits en ligne. Mais nous ne savons pas toujours ce que ces compagnies font avec ces données. C’est écrit quelque part sur une page qui fait 15 kilomètres de long. Nous serions moins inquiets si c’était plus clair, non?
In the name of better surveillance of suspected criminals, the Federal Bureau of Investigation is trying to pursue a way that could force companies like Microsoft, Facebook, Yahoo, and Google to make many of their Internet products more easily wiretapped by law enforcement officials.
"Arvind Narayana writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their 'fists,' Naryanan posits that an author's habitual choices of words, such as, for example, the frequency with which the author uses 'since' as opposed to 'because,' can be processed through an algorithm to identify the author's writing. Fortunately, and for now, manually altering one's writing style is effective as a countermeasure."
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
Twitter users are about to become major marketing fodder, as two research companies get set to release information to clients who will pay for the privilege of mining the data.