6 private links
Utiliser une montre connectée pour suivre ses performances physiques n'est parfois pas sans conséquence sur sa vie privée. Sur Polar Explorer, il était encore récemment possible de remonter jusqu'à l'adresse personnelle de personnes s'entrainant dans des lieux réputés sensibles. Une faille est aussi évoquée, mais Polar réfute.
Pop!_OS is beautiful, thanks in no small part to a consistent minimalist visual style and Kate Hazen’s beautiful space-themed illustrations. Pop!_OS 18.04 is a GNU/Linux distribution curated by US-based computer maker System76. It is the state of the art in usability and experience when it comes to desktop Linux today1.
The genius of the System76 team was in realising that all the components for a usable, convenient, and delightful GNU/Linux desktop experience are already here, they’re just not tastefully curated.
KeePass is probably one of the most popular password managers. Simple, free and open source, it quickly became largely adopted at home and at work. Beware, a non-official website using an URL similar to the real one lets you download a tampered version of the password manager with some adware in it.
Researchers found 20 flaws in Samsung’s SmartThings Hub controller - opening up supported third-party smart home devices to attack.
The Chrome team is delighted to announce the promotion of Chrome 68 to the stable channel for Windows, Mac and Linux. This will roll out ove...
Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant
Amazon’s face surveillance technology is the target of growing opposition nationwide, and today, there are 28 more causes for concern. In a test the ACLU recently conducted of the facial recognition tool, called “Rekognition,” the software incorrectly matched 28 members of Congress, identifying them as other people who have been arrested for a crime. The members of Congress who were falsely matched with the mugshot database we used in the test include Republicans and Democrats, men and women, and legislators of all ages, from all across the country.
Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted email interoperability. Starting with the latest release of ProtonMail on web (v3.14), iOS and Android (v1.9), and the latest versions of the ProtonMail IMAP/SMTP Bridge, ProtonMail now supports Address Verification, along with full PGP interoperability …
Stay away from any websites or apps (there's numerous) powered by Metabrite's SDK. They data mine and resell [1] the receipts scanned.
In early July, Intel issued security advisories SA-00112 and SA-00118 regarding fixes for vulnerabilities in Intel Management Engine. ...
Un rapport prouve l’inefficacité de la vidéosurveillance
Souvent, la réponse aux inquiétudes concernant la confidentialité de nos données consiste à dire que ceux qui ne transgressent pas la loi ...
Supporters of wholesale government surveillance are fond of saying that only the guilty should be worried about spying. Let's put that spurious argument out to pasture once and for all. Commentary by Bruce Schneier.
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. -- David Cole
What's the problem with ubiquitous surveillance? Don't think Orwell; think Kafka.
On entend régulièrement la formule « Celui qui n'a rien à se reprocher n'a rien à cacher ». Cet aphorisme devrait vous rassurer lorsque vous vous inquiétez de l'invasion des technologies dans votre vie. Je voudrais illustrer la tromperie de cette phrase au travers d'une anecdote réelle, vécue à une
Quand on est, comme moi, un vieil activiste désabusé, il y a des lieux et des moments où on s’attend à déposer les armes.Se reposer l’esprit en assistant à un débat réunissant des gens qui partagent nos idées. Écouter tranquillement sans avoir à repérer les pièges et les non-dits. Lâcher prise.Et puis, paf le chien.