Which VPN Providers Really Take Anonymity Seriously?

from TorrentFreak by enigmax

As detailed in yesterday?s article, if a VPN provider carries logs of their users? activities the chances of them not being able to live up to their claim of offering an anonymous service begins to decrease rapidly.

There are dozens of VPN providers, many of which carry marketing on their web pages which suggests that the anonymity of their subscribers is a top priority. But is it really? Do their privacy policies stand up to scrutiny? We decided to find out.

Tunisian blogger leading Nobel Prize nominee

from AL JAZEERA ENGLISH (IN DEPTH)
On eve of the awards, Al Jazeera interviewees young blogger who documented Tunisia’s uprising as it happened.

Detecting Emerging Conflicts with Web Mining and Crisis Mapping

from iRevolution by Patrick Meier

My colleague Christopher Ahlberg, CEO of Recorded Future, recently got in touch to share some exciting news. We had discussed our shared interests a while back at Harvard University. It was clear then that his ideas and existing technologies were very closely aligned to those we were pursuing with Ushahidi?s Swift River platform. I?m thrilled that he has been able to accomplish a lot since we last spoke. His exciting update is captured in this excellent co-authored study entitled ?Detecting Emergent Conflicts Through Web Mining and Visualization? which is available here as a PDF.

6 Best Practices for Universities Embracing Social Media

from Mashable! by Dan Klamm

Charlie Beckett: WikiLeaks symptomatic of a trend that’s going to accelerate

from Editors Weblog – all postings by Hannah Vinter

Nobody can accuse Wikileaks of being afraid of the spotlight. The whistleblower organization hit the headlines again this month as the un-redacted US Embassy cables became available online, and old arguments about its status as an institution resurfaced. Many have scrambled to have their say, but few have given the matter as much thought as Charlie Beckett.

Iran blocks TOR, TOR unblocks itself later that day

by Cory Doctorow

The Only Post You Need To Read About The New Facebook

by Nick O’Neill

7 Things I Want To See In Facebook?s Timeline

by Jackie Cohen

7 Ways To Play Facebook?s New Social Feedback Loop

by Guest Writer
Facebook?s ticker, timeline, Open Graph and GraphRank create a feedback loop that drives social discovery, engagement, and targeting opportunities.

Arab World: Nobel Peace Prize for Revolution Netizens?

by Amira Al Hussaini
Twitter is abuzz with excitement tonight as the names of Arab netizens are being circulated as possible candidates for the Nobel Peace Prize for the roles they have played in the Arab revolutions.

Social Game Revenue Will Outgrow Facebook By 2014

by David Cohen
Despite its 800 million-plus members, Facebook is not the only game in town when it comes to social gaming, especially when venturing outside the confines of North America.

Guidelines for Securing Open Source Software

from EFF.org Updates by dan

Part two in a short series on EFF?s Open Source Security Audit

Our recent security audit of libpurple and related libraries got us thinking about the general problem of open source security auditing, and we wanted to share what we?ve learned. Free and open source software that happens to be community-supported can be challenging from a security perspective. There is a fair amount ofrecent literature on this topic, and it is debatable whether openly readable source code helps defenders more than it helps attackers. The key issue is not about source code but the fact that community-based open source software projects often lack the organized resources of their corporate cousins. If large corporate projects choose to prioritize security, they can usually afford to hire experts to do regular security reviews; community projects need to find and coordinate volunteers with this specialized focus. In an environment where developers are stretched thin and often have a wide array of responsibilities, the search for security bugs may be less organized and lag behind. How do we combat this problem? How can we ensure good security in a world where vulnerabilities in important open source software can have disastrous consequences for users all over the world?

Tagged in: , , , , , , , , , ,

%d bloggers like this: