digital citizenship
8.2K views | +1 today
Follow
digital citizenship
using social media devices,b.y.o.d. use, protocols, school fair use,  teacher resources,bullying cyberbullying
Your new post is loading...
Your new post is loading...
Rescooped by Bonnie Bracey Sutton from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness | digital citizenship | Scoop.it

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 


Via Gust MEES
more...
Gust MEES's curator insight, July 27, 11:11 AM

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 

 

Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

Do Not Track | Privacy | Cookies | Tracking | eSkills

Do Not Track | Privacy | Cookies | Tracking | eSkills | digital citizenship | Scoop.it
Do Not Track, a personalized web series about privacy and the web economy. Directed by Brett Gaylor, coproduced by Upian, Arte, ONF & BR.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
more...
Gust MEES's curator insight, April 14, 2015 11:38 AM
Do Not Track, a personalized web series about privacy and the web economy. Directed by Brett Gaylor, coproduced by Upian, Arte, ONF & BR.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Bonnie Bracey Sutton from Linking Literacy & Learning: Research, Reflection, and Practice
Scoop.it!

Protecting Student Privacy Act Sets Limits on Use of School Data

Protecting Student Privacy Act Sets Limits on Use of School Data | digital citizenship | Scoop.it
Legislation introduced today in the United States Senate would restrict the use of students' personal data for commercial purposes, limit the transfer of such data and require records to be kept of any entities that have access to students' information.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES, Dean J. Fusto
more...
Gust MEES's curator insight, July 30, 2014 6:23 PM

Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Monica S Mcfeeters's curator insight, July 31, 2014 12:54 AM

Here is a new development. How could this impact your students or your teaching?

Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

Privacy: How To See All The Companies That Are Tracking You On Facebook — And Block Them

Privacy: How To See All The Companies That Are Tracking You On Facebook — And Block Them | digital citizenship | Scoop.it
If you're using Facebook, you're giving the company a ton of information about yourself which it is selling to advertisers in one form or another.

Via Gust MEES
more...
Randi Thompson's curator insight, January 28, 2014 3:21 PM

What you need to know...

Kymberley E. Pelky's curator insight, January 31, 2014 2:46 PM

I know I'm not keeping up with everything I could be doing to protect my privacy, but I'm hoping to use this information to help.

Nedko Aldev's curator insight, April 26, 2015 6:32 AM

.

177
Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

How Paranoid | Privacy, Shouldn't YOU take care!?

How Paranoid | Privacy, Shouldn't YOU take care!? | digital citizenship | Scoop.it
This is intriguing for me. I use the Disconnect.me extension in Firefox and Google Chrome for perhaps a different reason than most.  Its purpose is to block those websites who would track you.  For...

Via Gust MEES
more...
Rescooped by Bonnie Bracey Sutton from ICT
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | digital citizenship | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.

 

The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 


Via Gust MEES, Suvi Salo
more...
Gust MEES's curator insight, February 20, 10:48 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 4:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

WebRTC Block | Protect Your Network IP Address | Chrome Browser | Privacy

WebRTC Block | Protect Your Network IP Address | Chrome Browser | Privacy | digital citizenship | Scoop.it

Disable WebRTC in Your Web Browser!

WebRTC (Web Real-Time Communication) is an API definition drafted by the World Wide Web Consortium (W3C) that supports browser-to-browser applications for voice calling, video chat, and P2P file sharing without plugins. WebRTC can disclose your Local IP Addresses and making fingerprints of your Media Devices. This extension simply protects you from that! * After install, you can test it here: - https://www.browserleaks.com/webrtc


Via Gust MEES
more...
Gust MEES's curator insight, February 1, 2015 5:29 AM

Disable WebRTC in Your Web Browser!

WebRTC (Web Real-Time Communication) is an API definition drafted by the World Wide Web Consortium (W3C) that supports browser-to-browser applications for voice calling, video chat, and P2P file sharing without plugins. WebRTC can disclose your Local IP Addresses and making fingerprints of your Media Devices. This extension simply protects you from that! * After install, you can test it here: - https://www.browserleaks.com/webrtc
Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy? | digital citizenship | Scoop.it
. . WHAT Are Apps? [START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile dev...

Via Gust MEES
more...
Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

Privacy is not dead - you're just doing it wrong

Privacy is not dead - you're just doing it wrong | digital citizenship | Scoop.it
Today is Data Privacy Day. While many have declared privacy to be dead, it isn't up to them, it is up to you.

Being aware about what you are sharing with whom can go a long way towards preservi...

 

Phone apps are another story. An enigma. A mystery. Any company with a bit of cash can commission an phone app to make it easier to do business with them, but is it safe?

 

Research shows that what is going on under the hood is often far more dangerous than you might imagine.

 

Apps often ask for a bevy of permissions without any guarantee that these permissions won't be misused.

 

===> My advice is to try and break the app addiction. Wherever possible, use your mobile device's browser instead. <===

 


Via Gust MEES
Bonnie Bracey Sutton's insight:

Explore , examine , evaluate.

more...
Gust MEES's curator insight, January 28, 2014 11:09 AM

 

Phone apps are another story. An enigma. A mystery. Any company with a bit of cash can commission an phone app to make it easier to do business with them, but is it safe?

 

Research shows that what is going on under the hood is often far more dangerous than you might imagine.

 

Apps often ask for a bevy of permissions without any guarantee that these permissions won't be misused. My advice is to try and break the app addiction. Wherever possible, use your mobile device's browser instead.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Rescooped by Bonnie Bracey Sutton from 21st Century Learning and Teaching
Scoop.it!

Facebook Privacy and User Habits [Infographic]

Facebook Privacy and User Habits [Infographic] | digital citizenship | Scoop.it
Regularly checking your privacy settings is important because Facebook makes changes to the privacy section a few times per year.

Via Gust MEES
more...
No comment yet.