mfioretti: control*

Bookmarks on this page are managed by an admin user.

422 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. La rivolta in Siria non infuria solo per le strade del Paese. Anche in Rete, infatti, si combatte da mesi una vera e propria guerra digitale tra supporter e oppositori del regime di Bashar Al-Assad. Il network di hacker contro-rivoluzionari più attivo è senza dubbio il Syrian Electronic Army. Un collettivo pro-Assad che ha rivendicato centinaia di cyber-attacchi, dalla semplice interruzione del servizio (DDoS, cioè distributed denial-of-service) a vere e proprie intrusioni nelle homepage bersaglio (defacement), sostituite da messaggi di solidarietà al governo sulle cui coscienze, accusano gli osservatori internazionali, pesano migliaia di morti.
    http://www.festivaldelgiornalismo.com/post/22540
    Voting 0
  2. This year, however, as part of a project code-named Narwhal, Obama’s team is working to link once completely separate repositories of information so that every fact gathered about a voter is available to every arm of the campaign.
    http://www.slate.com/articles/news_an...gram_could_change_the_2012_race_.html
    Tags: , , , , by M. Fioretti (2012-02-16)
    Voting 0
  3. Material mined online has been used against people battling for child custody or defending themselves in criminal cases. Your application for credit could be declined not on the basis of your own finances or credit history, but on the basis of aggregate data - what other people whose likes and dislikes are similar to yours have done
    http://www.nytimes.com/2012/02/05/opi...unday/facebook-is-using-you.html?_r=1
    Voting 0
  4. Google announced perhaps the biggest change it has ever made to its massive network of web services: Starting in March, your search and surf habits across all of Google’s products will be combined to form the mother of all behavioral profiles. So now, Google is Fubar
    http://www.extremetech.com/computing/115425-google-is-fubar
    Voting 0
  5. The new laws, set to be ratified by member states by 2014—2015, will include harsh new penalties for companies that flout the laws, as well as patching transatlantic flaws between U.S. law and existing European law, including legal overlaps such as those made by FISA and the USA PATRIOT Act.
    http://www.zdnet.com/blog/london/new-...facebook-google-face-tough-times/2551
    Voting 0
  6. lightweight, cloud-centric devices don't merely represent a change in form factor. Rather, we're seeing an unprecedented shift of power from end users and software developers on the one hand, to operating system vendors on the other. This is a little for the better, and much for the worse author » Jonathan Zitttrain
    http://www.law.harvard.edu/news/2011/...in-the-personal-computer-is-dead.html
    Voting 0
  7. In occasione del Monaco Media Forum, Google ha confessato cosa se ne fa davvero di un social network come Google Plus: una macchina estrattrice di informazioni. Ed ecco perché la gente, che ormai conosce Google, è cauta
    http://nbtimes.it/prime/13047/le-poss...lla-diffidenza-verso-google-plus.html
    Voting 0
  8. Hacker Moxie Marlinspike debuts two free programs for seemingly unsnoopable voice and text communications.
    http://www.forbes.com/sites/firewall/...-allow-wiretap-proof-cell-phone-calls
    Voting 0
  9. -
    http://techpresident.com/blog-entry/g...llance-far-outstrips-wiretap-requests
    Voting 0
  10. -
    http://blogs.gartner.com/andrea_dimai...ploit-us/comment-page-1/#comment-7717
    Voting 0

Top of the page

First / Previous / Next / Last / Page 42 of 43 Online Bookmarks of M. Fioretti: Tags: control

About - Propulsed by SemanticScuttle