Loss of Privacy

Keeping you informed on recent losses to privacy and civil rights worldwide.

The idea of banning hoods is not new to Oklahoma, right now, there is a law banning hoods during crimes that’s been around since the 20’s.

It was originally drafted to help combat crimes from the Ku-Klux-Klan, but people we spoke with say a new amendment of banning hoodies in public could open doors to a bigger problem.

Now, a proposal for an amendment to that law, could make it illegal to hide your identity in public. The fine for your fashion crime? $500.

“I think this is a violation of an individual’s right to choose what they want to wear as long as it doesn’t violate the realm of public decency and moral values, and I think this could be very problematic,” Siderias said.

The proposal provides exceptions for religious garments, protection from weather, parades, Halloween celebrations and numerous other circumstances.

So what is the point of the law if you have plenty of reasons to be exempt?

you can read the full bill and find out more at NewsChannel 4.

flattr this!

With more and more of us shifting everyday tasks—banking, education, social interaction, even shopping for groceries—to the virtual world, securing our personal information has become more important than ever. One of the simplest ways to help protect our financial and other info from prying eyes and would-be identity thieves is to use a strong password. Yet many people take a decidedly casual approach to choosing a password, with potential disastrous results.

Having your password compromised is no laughing matter. More than half a million hackers have a go at cracking Facebook passwords every single day. In an effort to protect its users, the site gives specific tips for protecting both your Facebook account and any financial information you may have saved on the site—unsurprisingly, choosing a strong password is high on the list.

So what constitutes the “perfect” password? If you’re serious about security, a strong password will include a mix of upper and lower case letters, numbers, symbols, and even non-keyboard characters. It will be unique (using the same password for everything might be common, but it’s also spectacularly unsafe). It’s also greater than eight characters in length, contains arbitrary phrases made using numbers and letters (e.g., “b4D P4S$W0Rd”), but no complete words. And no matter how secure your password is, it’s made more secure by changing it regularly.

How to Create the Perfect Password - Via Who Is Hosting This: The Blog

Source: http://www.whoishostingthis.com

flattr this!

An album of powerful cartoons made in result of the tragic events at the headquarters of Charlie Hebdo today.

A personal favorite is below.

xoP3mPa

flattr this!

Whether we are reading the Guardian, the New York Times, the Hindu or any other news website, third party trackers are collecting data about our online behaviour.

When we access websites, third parties are able to track our online behaviour, aggregate our data, link it to other data collected about us and subsequently create profiles. These profiles tell a story about us – which may or may not be true – and can include our political beliefs, gender, sexual orientation, economic status, habits, interests, affiliations and much more.

And while this might all appear to be harmless, we largely have very little control over how and when our data is collected, how our profiles are created, whether they are accurate, who they are subsequently shared with, who has access to them, what they are used for, where they are stored and for how long.

Source.

Video.

flattr this!

In response to evolving terrorist threats, including non-metallic explosive devices and weapons, the U.S. TSA has adopted full-body scanners as the primary passenger screening method at nearly 160 airports nationwide at a cost exceeding $1 billion. Although full-body scanners play a critical role in transportation security, they have generated considerable controversy, including claims that the devices are unsafe, violate privacy and civil liberties, and are ineffective. Furthermore, these scanners are complex embedded systems that raise important computer security questions.

Despite such concerns, neither the manufacturers nor the government have disclosed enough technical details to allow for rigorous independent evaluation, on the grounds that such information could benefit attackers, or is a trade secret. To help advance the public debate, we purchased a government-surplus Rapiscan Secure 1000 full-body scanner and performed a detailed security evaluation of its hardware and software.

Source.

Video.

flattr this!