Category: #diy

  • PREAMBLE I recognize technology as a product of human effort, a product serving no other purpose than to benefit man in general, not merely some men; man in the totality of his humanity, encompassing all his manifold interests and needs, not merely some one particular concem of his. Humanistically viewed, technology is not an end […]

  • Fooling Facebook: Telling Lies To Protect Your Privacy

    Sounds like a hopelessly naive idea to me… “With a nod toward Bayes theorem, Ludlow basically wants to confuse the advertisers trying to profile him and the algorithmic machines that are trying to make predictions about him by throwing lots of false information about himself onto their radars. So he’s become a digital Scheherazade, weaving […]

  • Apple, meet GPG, GPG, meet Apple. | I Am Security

    The guys at GPGTools are doing some fantastic work in bringing a comprehensive GPG implementation into Mac OS X, and Apple seem to not only ignore the need for such an important tool, but consistently screw things up with Mail such that every new OS X update the GPGMail plugin is rendered useless. Apple, meet […]

  • Hacken voor het vrije woord | Sargasso

    Een groepje Nederlandse hackers helpt activisten en journalisten online aanvallen te weerstaan. Hacken voor het vrije woord | Sargasso. #diy #greenhost #hackaton #lawandpolitics #lookingforsolutions #saragasso #security

  • Quick Guide to Email encryption

    This chapter will introduce you to some basic concepts behind mail encryption. It is important to read to get some feeling of how mail encryption actually works and what its caveats and limitations are. PGP (Pretty Good Privacy) is the protocol we shall use for e-mail encryption. This protocol allows us to digitally sign and […]

  • Commotion: Let’s get Meshy!

    WHAT’S COMMOTIONCommotion, is an open source “device-as-infrastructure” communication platform that integrates users’ existing cell phones, Wi-Fi enabled computers, and other wireless-capable devices to create community- and metro-scale, peer-to-peer communications networks. HOW IT WORKSCommotion is organized and maintained by community members to fit their needs. It can act as a backbone for last-mile infrastructure, a local […]

  • Basic Internet Security – Download the book

    The digital world is changing at a tremendous speed. New communication technologies open up new possibilities, but by using them you can also expose yourself, and others, to risks. Many people have trouble assessing these risks especially with regard to the subject of safe digital communication. This is particularly true for people working in regimes […]

  • DIY identities

    The Status Project. Our identity is constructed as human beings, that can possess one or more natural persons straw men and control one or more artificial persons corporations. Lower class human beings possess one severely reduced natural person and no control of an artificial person. Middle class human beings possess one natural person and perhapscontrol […]

  • Some fun security software from @moxie

    Click this link #diy #foundprivacy #lookingforsolutions #security #software

  • Password Meter

    Test de sterkte van je wachtwoorden via dosch.it/pass Password Meter – A visual assessment of password strengths and weaknesses. #diy #security #software