Not Signed-In
Which clippings match 'Security' keyword pg.1 of 3
21 AUGUST 2013

Controversial Aotearoa New Zealand surveillance laws pass

"The controversial spy laws have been passed by Parliament by 61 votes to 59. The laws were drafted in the wake of a succession of blunders by New Zealand's foreign intelligence agency, the Government Communications Security Bureau, which included illegally spying on German internet entrepreneur Kim Dotcom. Earlier, Prime Minister John Key acknowledged new surveillance laws have 'alarmed' some people but blames the Government's opponents for stoking their fears. Legislation giving the GCSB the power to spy on New Zealanders was debated in Parliament today ahead of being passed into law."

(Tracy Watkins, 21 August 2013, Fairfax NZ News)

1

CONTRIBUTOR

Simon Perkins
25 JULY 2013

Secure Mobile Environment for HTML5 Apps

Fig.1 A promotional video by Sencha Inc. about their technology solution called "Sencha Space".

1
2

TAGS

APIapps • Bring Your Own Device • business application • business applications • business apps • business web • BYOD • deployment • design for mobiledevice-level APIHTML5HTML5 Apps • managed environment • mobile devicemulti-devicemulti-device adaptationmultiple devices • secure environment • security • Sencha Space • Sencha Space (technology) • Sencha Space Secure Mobile Environment • software deployment • software management • technology platformweb app frameworkweb application frameworkWebKit

CONTRIBUTOR

Simon Perkins
30 MAY 2010

Google Street View Cars Peep Your Wi-Fi

"Nine days ago the data protection authority (DPA) in Hamburg, Germany asked to audit the WiFi data that our Street View cars collect for use in location–based products like Google Maps for mobile, which enables people to find local restaurants or get directions. His request prompted us to re–examine everything we have been collecting, and during our review we discovered that a statement made in a blog post on April 27 was incorrect.

In that blog post, and in a technical note sent to data protection authorities the same day, we said that while Google did collect publicly broadcast SSID information (the WiFi network name) and MAC addresses (the unique number given to a device like a WiFi router) using Street View cars, we did not collect payload data (information sent over the network). But it's now clear that we have been mistakenly collecting samples of payload data from open (i.e. non–password–protected) WiFi networks, even though we never used that data in any Google products.

However, we will typically have collected only fragments of payload data because: our cars are on the move; someone would need to be using the network as a car passed by; and our in–car WiFi equipment automatically changes channels roughly five times a second. In addition, we did not collect information traveling over secure, password–protected WiFi networks."

(Google, 14/05/2010 01:44:00 PM)

1

CONTRIBUTOR

Simon Perkins
15 APRIL 2010

Tor: improving privacy and security through virtual tunnels

"Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built–in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non–governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online."

(The Tor Project, Inc.)

1

TAGS

activismanonymityanonymouscivil libertiescommunicationdissidentsEFFElectronic Frontier Foundation • Indymedia • InternetnetworkNGOnode • Non-Governmental Organisation • onlineprivacysecurityserver • socially sensitive communication • Tortracking • virtual tunnel • volunteer • VPN • whistleblower

CONTRIBUTOR

Simon Perkins
16 OCTOBER 2009

TZI: The Center for Computing and Communication Technologies

"The Center for Computing and Communication Technologies – TZI was founded 1995 as a research institute of the Universität Bremen. Main objectives are the research and development of innovative information– and communication technologies and their transfer into products and services.

The application oriented research at TZI supports the development of concerted activities Mobile Solutions, Interaction and Education, Software Quality and Information Security, Adaptive Communication. As the competence center for information– and communication technologies in the state of Bremen, the TZI contributes to development of Bremen towards a high tech location.

Currently the TZI occupies about 160 scientists that are researching in over 100 national and international projects."

(TZI)

CONTRIBUTOR

Simon Perkins
Sign-In

Sign-In to Folksonomy

Can't access your account?

New to Folksonomy?

Sign-Up or learn more.