Kiwi ISP Slingshot lets users bypass copyright geo-blocking to access servi
!Cool Resources
How to Easily Create A Linux Live USB in Mac OS X
Report, Ordered by Obama, Says Self Defense is Common, Gun Carriers Less Li
Keep It Simple: Yet Another Wrap-Up of Privacy Tools
…as one former NSA official noted, “You have to assume everything is being collected.” (Read More) Source: I’m not willing to trade privacy (defined by people being able to…
How Hard Work got Chris Fired | Leadership Freak
Heads down hard work lands you out the door, eventually.
Is It the Dawn of the Encryption App?
DuckDuckGo Search & Stories
Download the DuckDuckGo browser to search and browse more privately. Available for Windows, Mac, iOS, and Android.
Data Security Is a Classroom Worry, Too
Experts warn that educators may be embracing technology without doing enough to secure student data.
Phil Zimmermann, Creator of PGP, Quote on Government & Crypto from 1996
Phil Zimmermann, the creator of PGP, successfully predicted an incident similar to the one happening right now with PRISM and the NSA over 17 years ago.
VPNs: What They Do, How They Work, and Why You're Dumb for Not Using One
Top five data breaches in 2013...so far
Cell Phone Users Beware: How to Protect Yourself from Government Spying
13 Android Apps to Protect Your Privacy
A Wonderful Chart on iPad Vs Chromebook ~ Educational Technology and Mobile
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Where Orwell got it wrong
In his novel 1984, George Orwell forecasted a dystopian society 36 years in the future, in which an all-powerful state uses advanced technology to exert totalitarian control over the thoughts, words…
The Government Is Watching You: 8 Ways to Disappear Online
New NSA Leak Sheds Light on Encrypted Data Retention
Two more leaked NSA documents explain how the spy agency handles encrypted data it collects from non-U.S. persons and how long it’s retained.
What is the encryption standard used for resolving wireless security issues
Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As
If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn't much matter if you're a foreigner or an American: Your communications are subject to an extra dose of surveillance. Since 29-year-old systems administrator Edward Snowden began leaking secret documentation of the NSA's broad surveillance [...]
The First Web-based Console to Control Encryption
Bringing Up the Bandwidth
ConnectED initiative aims high, but there’s more to consider. GUEST COLUMN | by John Harrington President Obama has called for high speed digital connections to our schools and libraries, “en…
Why, What and How to Encrypt: Security Expert Insights
News and Analysis on Big Data, the Cloud, BI and Analytics
There soon will be no “offline”
In response to the ongoing NSA debacle, I’ve heard and read a lot of people discussing “going off the grid”. Examples would be using more cash instead of credit cards, not purchasing things online…
Internet users, spooked by US spying, seek tools to hide presence on web
News of the US National Security Agency's surveillance has sent web users scrambling to find new ways to avoid tracking. It might have seemed paranoid not long ago when internet users used tools to hide their tracks, "shred" data or send self-destructing messages.
Full NSA access built into every Windows OS since 1997
Was VA Secretary Misled About Breaches?
Leaders of the House Veterans Affairs Committee suggest that VA Secretary Eric Shinseki may have been misled about multiple breaches of department computers since
‘Do Not Extradite Snowden!’: Hundreds Of Protesters In The Streets Of Hong
"You Now Have To Assume Everything Is Beling Collected"
ZeroHedge - On a long enough timeline, the survival rate for everyone drops to zero
The Snowden Principle
At the heart of Edward Snowden's decision to expose the NSA's massive phone and Internet spying programs was a fundamental belief in the people's right-to-know. "My sole motive is to inform the public as to that which is done in their name and that which is done against them," he …
NSA admits listening to U.S. phone calls without warrants