wiby  
Settings



John Gilmore's home page

http://www.toad.com/gnu/

they're super secret information (SSI). I petitioned the US Supreme Court to examine whether the Feds can enforce secret regulations. I lost every one of these lawsuits. The Const

Frequently asked questions by the Press - Tim BL

https://www.w3.org/People/Berners-Lee/FAQ.html

which shares contact information). Could you log on and update your address book, please? Then we can keep in touch and easily track changes to each other's addresses. A: No, I ha

The Power of Centralization

https://secushare.org/centralization

Overload Distributed Information Flow Introduction: History of Decentralization Attempts We're now in wave 3 of attempts to decentralize personal data. Wave 1 was in the late '90s

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

was going on. From that information I was able to help Internet users deal with this menace.   OptOut — the original spyware detection and removal tool The work on the I
Steve Gibson's Little Corner of the Web.

Meditopia -- Chapter 3, Section 2

https://www.meditopia.org/chap3-2.htm

containing my case information. "Well, let's see here," he began, buying time while munching on a snack and fiddling with the keyboard. "Inmate Number zero, seven, two, four, five

Live-Work

https://logicmag.io/home/live-work/

Zhang researches global information capitalism and intersectionality with a focus on China and the Chinese people in global encounters. Tu Lan is an economic geographer based at t
Working from home on the peripheries.

Piet Beertema's website

https://godfatherof.nl/

and "nothing to hide" information (yet at the sa,e time stealing a lot of your personal and thus private information. At the same time e-mail headers have literally exploded, from

Readspike - Simple news aggregator

https://readspike.com/

which analyzes profile information to predict whether a user is under 13, across Europe in the coming weeks (Supantha Mukherjee/Reuters) A profile of Wikipedia as it faces challen
Aggregating the news from around the web every minute

Java Tester - Other Testers

https://javatester.org/othertesters.html

offering detailed information about the activities a browser does while visiting a site Norton Safe Web from Symantec Much like this list, Lenny Zeltser has is own list of Free On
Other Testers

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

human rights activist, information security professional, and a sysadmin Johan Halse 'm Johan Halse: web developer, feared duelist, renowned lover, compulsive liar Xe Iaso Technic

Privacy Policy — Postimages

https://postimages.org/privacy

Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other inform
Provides free image uploading and hosting integration for forums. Free picture hosting and photo sharing for websites and blogs.

Spyware, Adware, and Malware-- Research, Testing, Legislation, and Suits

https://www.benedelman.org/spyware/

and transmit user information to remote servers and/or show targeted advertisements. As distinguished from the design model anticipated by whatis.com 's definition of adware (&quo
Index of original research on 'spyware' programs, their transmissions, the ads displayed, and their target sites. Specifically tracks legislative efforts and pending lawsuits.


Find more...