OpenSnitch – an Application Firewall for Linux [Review]

OpenSnitch – an Application Firewall for Linux [Review]

The main thing that OpenSnitch does is track internet requests made by applications you have installed. OpenSnitch allows you to create rules for which apps to allow to access the internet and which to block. The installation instructions on the OpenSnitch GitHub page are aimed at Ubuntu users.

An Amazon employee might have listened to your Alexa recording

An Amazon employee might have listened to your Alexa recording

A spokesperson defended the company's practices, however, telling Bloomberg that the e-commerce giant only listens to "an extremely small sample" and that its employees do not have access to identifying information:. We only annotate an extremely small sample of Alexa voice recordings in order [to] improve the customer experience.

Reasons to Abandon Windows For Linux

Reasons to Abandon Windows For Linux

Although you can download individual applications from websites and install them with a package manager that automates the process similar to Windows, finding new programs on Linux is generally as simple as searching for it in the software repository and clicking install.

AMA : technology

AMA : technology

PI challenges overreaching state and corporate surveillance, so that people everywhere can have greater security and freedom through greater personal privacy. Frederike Kaltheuner , PI's Lead on Corporate Exploitation and Christopher Weatherhead , Technology Officer will be here to discuss our research, findings and our environment!

On privacy

On privacy

For many years, I thought privacy was a fake virtue and only valuable for self-defense. If you’re not allowing these unshareworthy thoughts and feelings a space to come out, they still affect your feelings and behavior– you just don’t know how or why.

Decentralized Internet and Privacy devroom

Decentralized Internet and Privacy devroom

Decentralized Internet and Privacy devroom Room : UD2.218A Calendar: iCal, xCal Free Software initial promises were to empower individuals when it came to computing. PCs are less and less used while smartphones are soaring and data is collected and stored on servers on which we have very limited control as users.

11 key readings on children’s data and privacy online

11 key readings on children’s data and privacy online

Here we highlight 11 studies that we have found valuable for insights regarding how children conceptualise privacy, their (often frustrated and resigned) interactions with digital environments as they negotiate privacy, their understandings of data, and the role of parents in children’s privacy online.

How to Setup and Use a Virtual Machine to Increase Security and Protect Your Privacy

How to Setup and Use a Virtual Machine to Increase Security and Protect Your Privacy

To set up a virtual machine, you’ll need a VM app. It works on MacOS, Windows, and Linux and offers all the features you need to create a virtual machine. Open the app and create a new virtual machine.

Microsoft Office Was Hackers' Favorite App Target This Year

Microsoft Office Was Hackers' Favorite App Target This Year

Kaspersky blocked 796.8 million attacks around the globe in Q1 2018, and the company found that one popular productivity suite was the victim of more than 47 percent of exploits: Microsoft Office.

NHS Grampian accused of using sensors stuck to desks to spy on staff • Digit

NHS Grampian accused of using sensors stuck to desks to spy on staff • Digit

“This is likely to create an oppressive work environment where employees feel constantly and scrupulously monitored. “It is essential that the workforce has a say in this as if put in the wrong hands, it is very possible that staff could be made to feel like they are working in a very oppressive workplace.

Sadd: anonymous virtual desktops with Tor built-in

Sadd: anonymous virtual desktops with Tor built-in

Two of the main downsides to using the service are that it is restricted to 15 minutes of virtual desktop access at a time and that HTTPS is not used to connect to the virtual environment for free users.