indexmenu_n_9

공사 중입니다.

스스로 보호하는 법

  • John Borland, Freenet Re-energizes File-sharing, ZDNet, October 28, 2002.
    • Freenet works by having each person involved dedicate a portion of their hard drive to hold content uploaded to the network. This is encrypted, so no person will know what is in their cache at any given time or be knowingly responsible for hosting any particular piece of content.
  • Michael Rosenwald, Ducking Google in search engines, Washington Post, November 9, 2012
    • his business model would eventually call for serving up just one or two easy-to-miss ads based on the search query, which would generate enough revenue, he thought, to build a nice little business
  • Bill Budington, Digital Security Tips for Protesters, EFF, november 16, 2016
    • Many protesters may not be aware of the unfortunate fact that exercising their First Amendment rights may open themselves up to certain risks.
  • Amelia Heathman, Protect your privacy with anti-surveillance clothing, Wired, 4 January 2017
    • artist and technologist Adam Harvey wants to create clothing that overwhelms and confuses facial recognition systems so they can’t tell the difference between clothes and their wearer.
  • Steven J. Vaughan-Nichols, If you want privacy you need to run Linux, Computerworld, Jan 31, 2017
    • As for Chrome OS, Android and iOS, come on===== They’re all built around cloud services; by design, they share everything you do with third-party services. What’s the answer? Desktop Linux.

소개 사이트

    • GPG프로그램의 윈도우 버전, 쉽고 자세한 설명이 덛붙혀 있다.
    • * Mastodon is a free, open-source social network server. A decentralized solution to commercial platforms, it avoids the risks of a single company monopolizing your communication. Anyone can run Mastodon and participate in the social network seamlessly.
  • 김성윤, 공개 소프트웨어 실 업무 적응기, 공개SW포털, 2011
    • 리눅스 기반으로 자신의 업무를 전환을 하기 위햐서는 반드시 필요 한것 3가지를 뽑으라고 하면, 첫 번째, 꾸준함 두 번째, 사고 방식 전환 세 번째, 교류 입니다
  • 필터링 컨텐츠는 이를 하는 권력이 가장 방어하기 곤란한, 방어에 취약한, 위협이 되는 내용이다.
  • 웹베이스 우회(web-based circumentor)
  • 프록시 서버 + 터널링(tunneling)
  • Secure Shell (SSH) has a built-in socks proxy http://www.openssh.com
  • 토르

분산 저장

  • 개인 메일서버
  • Adam Schwartz, Digital Privacy at the U.S. Border: Protecting the Data On Your Devices and In the Cloud, EFF, March 9, 2017
    • This guide (updating a previous guide from 20112) helps travelers understand their individual risks when crossing the U.S. border, provides an overview of the law around border search, and offers a brief technical overview to securing digital data.
    • As increasing concern among Android and iOS users grow around personal data they give up through WiFi connections, application installations and basic location services, Purism hopes to address those concerns by manufacturing phones that will operate with free/libre and open source software within the kernel, the operating system, and all software applications