120 private links
A free and open source alternative Twitter front-end focused on privacy.
Inspired by the Invidious project.
The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity, location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building.
La vie privée est-elle un problème de vieux cons ? demandait Jean-Marc Manach dans un excellent ouvrage. Bien sûr que non, mais on aimerait tant nous le faire croire…
« Natifs numériques », « natifs du numérique », « génération numérique »… Ce genre d’expressions, rencontrées dans les grands médias désireux d’agiter le grelot du jeunisme, peut susciter quelque agacement. D’autant que cette catégorie soi-disant sociologique se transforme bien vite en cible marketing pour les appétits des mastodontes du Web qui ont tout intérêt à présenter la jeunesse connectée comme le parangon des usages du net.
A recent ruling by the Court of Justice of the European Union found that certain users can ask search engines to remove results for queries that include their name where those results are “inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed.”
In implementing this decision, we will assess each individual request and attempt to balance the privacy rights of the individual with the public’s right to know and distribute information. When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information—for example, information about financial scams, professional malpractice, criminal convictions, or public conduct of government officials.
If you have a removal request, please fill out the form below. Please note that this form is an initial effort. We look forward to working closely with data protection authorities and others over the coming months as we refine our approach.
Google pense que « si [nous faisons] quelque chose [que nous souhaitons] que personne ne sache, peut-être [devrions-nous] commencer par ne pas le faire » et que « la vie privée pourrait en réalité être une anomalie ». Pourtant nous utilisons tous plus ou moins ses services et ceux des entreprises qui développent le même mode de pensée sur Internet. Mais au fait, n’avons-nous vraiment rien à cacher ?
Les RFIDs peuvent-elles devenir un réseau de surveillance des citoyens ? Imaginons un réseau qui analyserait tous les RFIDs actifs aux sorties des magasins. Ainsi, tous les comportements des clients seraient recensés. Ce scénario digne d'Orwell n'est plus une pure abstraction.
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
PRISM is a clandestine mass electronic surveillance data mining program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[8][9]
PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[10][11] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[citation needed] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[12] The disclosures were published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that PRISM was "the number one source of raw intelligence used for NSA analytic reports."[13] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls on an ongoing daily basis.[14][15]
U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[16][17] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people