John Gilmore's home pagehttp://www.toad.com/gnu/
they're super secret information (SSI). I petitioned the US Supreme Court to examine whether the Feds can enforce secret regulations. I lost every one of these lawsuits. The Const
Frequently asked questions by the Press - Tim BLhttps://www.w3.org/People/Berners-Lee/FAQ.html
which shares contact information). Could you log on and update your address book, please? Then we can keep in touch and easily track changes to each other's addresses. A: No, I ha
The Power of Centralizationhttps://secushare.org/centralization
Overload Distributed Information Flow Introduction: History of Decentralization Attempts We're now in wave 3 of attempts to decentralize personal data. Wave 1 was in the late '90s
GRC | Steve Gibson's WebZone:https://www.grc.com/stevegibson.htm
was going on. From that information I was able to help Internet users deal with this menace. OptOut — the original spyware detection and removal tool The work on the I
Steve Gibson's Little Corner of the Web.
Meditopia -- Chapter 3, Section 2https://www.meditopia.org/chap3-2.htm
containing my case information. "Well, let's see here," he began, buying time while munching on a snack and fiddling with the keyboard. "Inmate Number zero, seven, two, four, five
Live-Workhttps://logicmag.io/home/live-work/
Zhang researches global information capitalism and intersectionality with a focus on China and the Chinese people in global encounters. Tu Lan is an economic geographer based at t
Working from home on the peripheries.
Piet Beertema's websitehttps://godfatherof.nl/
and "nothing to hide" information (yet at the sa,e time stealing a lot of your personal and thus private information. At the same time e-mail headers have literally exploded, from
Readspike - Simple news aggregatorhttps://readspike.com/
which analyzes profile information to predict whether a user is under 13, across Europe in the coming weeks (Supantha Mukherjee/Reuters) A profile of Wikipedia as it faces challen
Aggregating the news from around the web every minute
Java Tester - Other Testershttps://javatester.org/othertesters.html
offering detailed information about the activities a browser does while visiting a site Norton Safe Web from Symantec Much like this list, Lenny Zeltser has is own list of Free On
Other Testers
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
human rights activist, information security professional, and a sysadmin Johan Halse 'm Johan Halse: web developer, feared duelist, renowned lover, compulsive liar Xe Iaso Technic
Privacy Policy — Postimageshttps://postimages.org/privacy
Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other inform
Provides free image uploading and hosting integration for forums. Free picture hosting and photo sharing for websites and blogs.
Spyware, Adware, and Malware-- Research, Testing, Legislation, and Suitshttps://www.benedelman.org/spyware/
and transmit user information to remote servers and/or show targeted advertisements. As distinguished from the design model anticipated by whatis.com 's definition of adware (&quo
Index of original research on 'spyware' programs, their transmissions, the ads displayed, and their target sites. Specifically tracks legislative efforts and pending lawsuits.
Find more...