I found these articles on Choosing Your Desktop Linux Distribution and Desktop Linux Hardening to both be interesting. At the bottom, you'll see that they recommend using Whonix. Pretty clear Whonix is designed to be used within VirtualBox. When I tried installing straight to Virtualbox using the Virtualbox instructions, it took about five minutes on … Continue reading Whonix in VirtualBox
Tag: privacy
Alex Karp: Palantir & Privacy
"Palantir Technologies is considered as one of the most secretive companies in the world. The customer list of the data specialist from Palo Alto, California, by all accounts includes nearly all governments and secret services of the Western world. As well as an increasing number of companies who want to deliver better products thanks to the structured data analysis … Continue reading Alex Karp: Palantir & Privacy
Conceal Network
"Conceal Network is a secure peer-to-peer privacy framework empowering individuals and organizations to anonymously communicate and interact financially in a decentralized and censorship resistant environment."-https://conceal.network/
Privacy is For Finding Out Who We Are When We Are Not Performing Ourselves
"Privacy is essential to human agency and dignity. Denying someone privacy—even when it’s as seemingly small as a parent who won’t let their kid close the door—has a corrosive effect, eroding trust as well as our sense of interiority. When we scale up the individual to a body politic, it is the private sphere that’s … Continue reading Privacy is For Finding Out Who We Are When We Are Not Performing Ourselves
No. 1 Rule: Keep Your Shit to Yourself
"A day before I sent Malcolm the email saying I wanted to break up, I came across a term online: solo polyamory. It described a person who is romantically involved with many people but is not seeking a committed relationship with anyone. What makes this different from casual dating is that they’re not looking for … Continue reading No. 1 Rule: Keep Your Shit to Yourself
Jumbo
"Jumbo (Android, iOS) isn't a social media app replacement as such, but it can help you lock down the social networks that you're already signed up for (and where your friends will already be). At the moment it comprehensively covers Facebook, Twitter, and Instagram, and though some of its features require a subscription, you do … Continue reading Jumbo
Librem AweSIM
"Major cellular providers are creating unified customer identifiers based on customer account information (name, address, billing information) and unique identifiers on your mobile devices so they can 'identify users across multiple devices and serve them relevant advertising'. Librem AweSIM adds an extra layer of privacy to your customer data to protect you from targeted tracking. … Continue reading Librem AweSIM
Blacklight: A Real-Time Website Privacy Inspector
"Who is peeking over your shoulder while you work, watch videos, learn, explore, and shop on the internet? Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site—and who’s getting your data. You may be surprised at what you learn."https://themarkup.org/blacklight
The Watchers Are Watching
"For brands, following someone’s precise movements is key to understanding the “customer journey” — every step of the process from seeing an ad to buying a product. It’s the Holy Grail of advertising, one marketer said, the complete picture that connects all of our interests and online activity with our real-world actions.Once they have the … Continue reading The Watchers Are Watching
Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance
"...This paper will focus on corporate “third-party” tracking: the collection of personal information by companies that users don’t intend to interact with. It will shed light on the technical methods and business practices behind third-party tracking...The first step is to break the one-way mirror. We need to shed light on the tangled network of trackers … Continue reading Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance
