On a article appeared on Security Affairs, is reported the analysis of NSA Director Admiral Mike Rogers, confirming the risks of efficient cyber espionage by at least two countries other than China.
This fact, joined to the continuation of massive data gathering activity on US citizens (even if data harvesting rules have been changed after the datagate) has an incredible side effect: in fact, not only the US government has spied or continue to spy on his citizens but what’s worst is that they can’t provide an effective protection to this data.
A new essay has been released on the amazon kindle store. In this ebook you will find an analysis of common privacy issues and wrong practices that threatens our privacy and the privacy of our children.
It also gives you few advices to avoid these problems. An easy read for everyone.
About 8 pages of 2000 characters, English language: GET THE EBOOK
Also available on Amazon.co.uk, Amazon.it and worldwide on your Amazon store.
The need of privacy in the actual telecommunication based World is a fact that most of Internet citizens do not properly realize.
The wide spread privacy concept is: Alice, alone in her room, telecommunicating with Bob, alone in his room. It seems that Alice and Bob are communicating privately and no one else is able to read Alice and Bob’s dialogue. That’s not true.
It’s a technology fact: virtual peripherals controls hardware peripherals in the virtual domain size.
Once a system is connected to the Internet, the virtual domain assumes the dimensions of the Internet: worldwide.
Your screen, your webcam, your microphone, your input methods, your disks… practically each part of your computer/smartphone/device is controllable by the Internet.
Sometimes these features are enabled by the owner, other times by pirates attacking the system of the victim with a malware and least but not last, standing to Snowden revelations, even Governmental interception systems has the capability of activate a data stream from you computer.
There’s about two months now that my old phone is gone. It was a dual sim QWERTY brick phone, so my next choice was to get out from the cave and finally take a smapho but just as a second phone.
Think on it. A smartphone is a mobile multiprotocol terminal, in practice it’s an ARM portable computer with the ability to make phone calls.
Privacy and smartphones are two words that doesn’t match. Also smartphones and reliability doesn’t match too.
When we send and receive emails we can adopt some precautions to start a more secure correspondence with our contacts.
First of all we have to know well the main fields of a standard email because also this knowledge makes us able to choose the better privacy solution in sending messages.
As you know, the “To” field is reserved to the receivers of the email, the people who you want to start a conversation with.
But there’s not only this field reserved to the recipients, also Cc and Bcc are useful fields.
Once upon a time, security of our systems was up to us to manage. Choosing a more secure system against malware, making smart installations and regularly updates of the software, backing up data, hardening the OS and encrypting the disks was a good way to live secure with our data.
Today this scenario has changed or, better to say, extended. To be clear, all of the previous steps are today valid to build your local system but the reality is that only a little bunch of our data resides in our property memory devices.
A big part of our life is stored somewhere far away from us, managed by someone we don’t know in a system we miss the implementation design where happens things we are totally unaware of!