Peer2Politics
Follow
Find tag "security"
71.6K views | +8 today
Peer2Politics
on peer-to-peer dynamics in the field of politics, economics and institutions
Curated by jean lievens
Your new post is loading...
Scooped by jean lievens
Scoop.it!

The Open Source Tool That Lets You Send Encrypted Emails to Anyone - Wired

The Open Source Tool That Lets You Send Encrypted Emails to Anyone - Wired | Peer2Politics | Scoop.it

In the wake of the mass NSA surveillance scandal sparked by whistleblower Edward Snowden, all sorts of hackers, academics, startups, and major corporations are working to build tools that let us more easily secure our email messages and other online communications.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Over 90% Of Cloud Services Used In Healthcare Pose Medium To High Security ... - Forbes

Over 90% Of Cloud Services Used In Healthcare Pose Medium To High Security ... - Forbes | Peer2Politics | Scoop.it

According to cloud security vendor Skyhigh Networks, more than 13% of cloud services used in healthcare are high‒risk and 77% are medium risk ‒ as measured across 54 different security attributes (like data encryption and “two factor” authentication).

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

'Your Money or Your Files' as Threat of Online Stickups Grows

'Your Money or Your Files' as Threat of Online Stickups Grows | Peer2Politics | Scoop.it

You’re an entrepreneur, managing the business from your PC. You’re a doting mother, with hundreds of photos of your children on your laptop. Now, if someone seized all those files, how much would you pay to get them back?

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Hacking Gmail App with 92 Percent Success Rate

Hacking Gmail App with 92 Percent Success Rate | Peer2Politics | Scoop.it
Android weakness allows researchers to Hack Gmail with 92 Percent Success Rate.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

▶ Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014 - YouTube

Power exists to be used. Some wish for cyber safety, which they will not get. Others wish for cyber order, which they will not get. Some have the eye to discern cyber policies that are "the least worst thing;" may they fill the vacuum of wishful thinking.

Meer weergeven
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Russia Has Put a Bounty on Tor

Russia Has Put a Bounty on Tor | Peer2Politics | Scoop.it
The Russian government has reportedly issued a bounty of nearly 4 million rubles ($100,000) to be awarded to anyone who can deanonymise users of the Tor network.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Emergency terror law — Dark Mountain — Medium

Emergency terror law — Dark Mountain — Medium | Peer2Politics | Scoop.it
Phone companies, internet companies, to be required to retain data on their customesr, who is communicating with who, who is accessing what.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

How to remember all your passwords and keep them safe - Quartz

How to remember all your passwords and keep them safe - Quartz | Peer2Politics | Scoop.it

The second part is never store your passwords or other account information in a public cloud, where they could always be at risk of leaking or being hackedNever store passwords in a Google Doc, or even in your smartphone’s notepad app—you’re asking for trouble.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Noam #Chomsky: Whose Security?

Noam #Chomsky: Whose Security? | Peer2Politics | Scoop.it

The question of how foreign policy is determined is a crucial one in world affairs.  In these comments, I can only provide a few hints as to how I think the subject can be productively explored, keeping to the United States for several reasons.  First, the U.S. is unmatched in its global significance and impact.  Second, it is an unusually open society, possibly uniquely so, which means we know more about it.  Finally, it is plainly the most important case for Americans, who are able to influence policy choices in the U.S. -- and indeed for others, insofar as their actions can influence such choices.  The general principles, however, extend to the other major powers, and well beyond.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Open-Source Everything Manifesto - P2P Foundation

Open-Source Everything Manifesto - P2P Foundation | Peer2Politics | Scoop.it

'The Open-Source Everything Manifesto is a distillation of author, strategist, analyst, and reformer Robert David Steele life's work: the transition from top-down secret command and control to a world of bottom-up, consensual, collective decision-making as a means to solve the major crises facing our world today. The book is intended to be a catalyst for citizen dialog and deliberation, and for inspiring the continued evolution of a nation in which all citizens realize our shared aspiration of direct democracy—informed participatory democracy. Open-Source Everything is a cultural and philosophical concept that is essential to creating a prosperous world at peace, a world that works for one hundred percent of humanity. The future of intelligence is not secret, not federal, and not expensive. It is about transparency, truth, and trust among our local to global collective. Only "open" is scalable.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Groundbreaking new tool aims to protect online journalists - Arizona State University

Groundbreaking new tool aims to protect online journalists - Arizona State University | Peer2Politics | Scoop.it

Online freedom of speech is getting some extra help this week from a company called CloudFlare, which helps websites stay online when they are hit with "distributed denial of service" (DDoS) attacks that overload servers with requests for information, rendering them basically unreachable.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

The open source revolution is coming and it will conquer the 1% - ex CIA spy - The Guardian

The open source revolution is coming and it will conquer the 1% - ex CIA spy - The Guardian | Peer2Politics | Scoop.it

Robert David Steele, former Marine, CIA case officer, and US co-founder of the US Marine Corps intelligence activity, is a man on a mission. But it's a mission that frightens the US intelligence establishment to its core.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

5 Steps to Keeping Your Private Communications Secure - Entrepreneur

5 Steps to Keeping Your Private Communications Secure - Entrepreneur | Peer2Politics | Scoop.it


Stories of hacking, government surveillance and information theft abound.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

SQL, Open Source, Security Stand Out In Hadoop Ecosystem - Forbes

SQL, Open Source, Security Stand Out In Hadoop Ecosystem - Forbes | Peer2Politics | Scoop.it

SQL is the gateway drug to enterprise adoption says analysts at recent developer conference.  Hadoop Summit, leading big data developer conference, saw the maturation of the Hadoop ecosystem.  Hadoop is one of the necessary requirements in realizing the promise of Big Data’s application growth in the enterprise, and key players have emerged among those most influential in this development.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

After Snowden, do you feel less safe? David Aaronovitch on Glenn Greenwald ... - New Statesman

After Snowden, do you feel less safe? David Aaronovitch on Glenn Greenwald ... - New Statesman | Peer2Politics | Scoop.it

The Snowden affair turned Greenwald from the humourless Occupy Wall Street version of Richard Littlejohn into that matinée idol of the modern era, the investigative journalist with a big story. 

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Can Cell Phones Stop Crime in the World's Murder Capitals?

Can Cell Phones Stop Crime in the World's Murder Capitals? | Peer2Politics | Scoop.it

These numbers come courtesy not of Guatemalan law-enforcement but ofAlertos.org, a new platform that recruits citizens to report crimes. And they've enlisted in the effort, using email, Twitter, Facebook, mobile apps, and text messaging to chronicle thousands of criminal activities since last year—in a country where a hobbled police force is struggling to address the fifth-highest murder rate in the world.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

The political science of cybersecurity V: Why running hackers through the FBI ... - Washington Post (blog)

The political science of cybersecurity V: Why running hackers through the FBI ... - Washington Post (blog) | Peer2Politics | Scoop.it

One of the most difficult challenges of cybersecurity is that it enables private actors to play a significant role in international security. Both security officials and international relations scholars tend to assume that states are the most important security actors. With a couple of minor exceptions (mercenary forces and the like) private actors simply don’t have the firepower to play a substantial role. Even terrorist groups with international ambitions usually require some kind of state to provide them with safe haven or to back them. Many (although certainly not all) experts argue that cybersecurity is different. Computers and Internet access are all that you need to carry out many kinds of attack, allowing private actors to become a real force in international cyber politics.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Britons' privacy at 'real risk' from weakly-regulated street cams – watchdog - RT (blog)

Britons' privacy at 'real risk' from weakly-regulated street cams – watchdog - RT (blog) | Peer2Politics | Scoop.it

Britain’s ‘surveillance society’ increasingly functions in ways the public is unaware of. An abundance of CCTV – and roadside – cameras misleads the public as to the true nature and scope of government snooping, the surveillance watchdog says.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

NSA Knew About And 'Exploited' Heartbleed For Years: Bloomberg

NSA Knew About And 'Exploited' Heartbleed For Years: Bloomberg | Peer2Politics | Scoop.it

The Heartbleed bug just went from bad to worse to truly, utterly terrifying.

The National Security Agency knew of the existence of the catastrophic bug for at least two years and kept it a secret from the public and the cybersecurity community in order to exploit it, according to a bombshell report from Bloomberg News. However, the agency is denying the story.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Sources And Methods: The Potential of Social Network Analysis in Intelligence

Sources And Methods: The Potential of Social Network Analysis in Intelligence | Peer2Politics | Scoop.it

The legality of the National Security Agency’s (NSA’s) use of US citizens’ metadata to identify and track foreign intelligence organizations and their operatives is currently a subject of much debate.  Less well understood (and consequently routinely misreported) are the capabilities and limitations of social network analysis, the methodology often used to evaluate this metadata.


more...
No comment yet.
Scooped by jean lievens
Scoop.it!

DIY Drones - = a site for all things about amateur Unmanned Aerial Vehicles (UAVs): How-to's, videos, discussion and mor

DIY Drones - = a site for all things about amateur Unmanned Aerial Vehicles (UAVs): How-to's, videos, discussion and mor | Peer2Politics | Scoop.it

"DIY Drones, which has blossomed into a community of 30,000 registered members. The site gets 1.4 million page views a month, has 6,000 blog posts, 8,000 discussion threads, and 80,000 comments a year. Anderson has marshaled that community to create open-source software for all sorts of drones." (http://venturebeat.com/2012/07/27/open-source-model-disrupts-the-commercial-drone-business/)

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Bitcoin Security Model: Trust By Computation - Forbes

Bitcoin Security Model: Trust By Computation - Forbes | Peer2Politics | Scoop.it

Bitcoin fundamentally inverts the trust mechanism of a distributed system. Traditionally, as we see in payment and banking systems, trust is achieved through access control, by carefully vetting participants and excluding bad actors. This method of trust requires encryption, firewalls, strong authentication and careful vetting. The network requires investing trust in those gaining access.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Dark Wallet = wallet linked to an independent Bitcoin implementation

Dark Wallet = wallet linked to an independent Bitcoin implementation | Peer2Politics | Scoop.it

= It consists of a web browser wallet linked to an independent Bitcoin implementation that will work on added measures for privacy and security of its users.


more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Security, Privacy & The Democratization Of Data - InformationWeek

Security, Privacy & The Democratization Of Data - InformationWeek | Peer2Politics | Scoop.it

Fifty-one years ago President Kennedy shocked the world when he revealed reconnaissance photos of Soviet missile launch sites in Cuba. Today, I can browse satellite images of the same locations from the comfort of my sofa on Google Earth. This once top secret capability has become democratized and available to all. At some point, today's top secret technology will also be accessible from your sofa.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Tech giants urge crackdown on Internet spying - Toronto Star

Tech giants urge crackdown on Internet spying - Toronto Star | Peer2Politics | Scoop.it


The companies, including Google, Microsoft, Facebook, and Apple launched a website and published an open letter in major newspapers Monday asking U.S.

more...
No comment yet.
Curated by jean lievens
Economist, specialized in political economy and peer-to-peer dynamics; core member of the P2P Foundation