| |
Internet Security, Privacy, and Anonymity, Privacy Organisations,
Government Organisations, Javascript, Cookies, Cryptography, SPAM, Security, Privacy
Mailing Lists
Anonymizer.com Proxy server
MyWebProxy.Com Proxy server
Provides Anonymous Surfing Serivce
SafeWeb Proxy server
Anonymizer.com How to send the letter, that
nobody has guessed, from whom it?How to be on a site, that there have not marked my
IP-address?But Anonymizer.com itself will know your data.
Anonymity and privacy on the
Internet Explains how to use the Internet safely and anonymously.Also covers basic
security for private data and programs.On this site you will find information on how to be
anonymous, and how to secure your communications and files from third parties, as well as
several other important security aspects that may arise when you are on the Internet.
Anonymity: There are many reasons to hide your real identity when you use the Internet.
You might want to protect yourself against an oppressive government, or post personal
messages to a Usenet newsgroup without identifying yourself to the whole world as the
poster.The anonymity section covers instructions and explanations on how to be anonymous
on the Net, Several options are available, ranging from simple pseudonymous servers such
as anon.penet.fi to the almost impregnable anonymity offered by Mixmaster remailers.
Privacy: Although everyone takes privacy in normal life for granted, trying to get the
same level of privacy on the Internet (or even on your own computer) is a little less
accepted, and sometimes a bit more complicated, While the general attitude his hard to
change, many ways exist to enhance your privacy online, The Privacy index lists programs
such as PGP and Securedrive to keep the contents of files secure, It also discusses other
aspects of electronic privacy, Security: When dealing with computers, security and privacy
are almost synonyms, This explains why the security index has some overlap with the
privacy section, However, protecting your site against unauthorized intruders is also an
important aspect of security Arnoud
"Galactus" Engelfriet
Bacard's Privacy Page
Beyond Concern:
Understanding Net Users' Attitudes About Online Privacy by Lorrie Faith Cranor, Joseph
Reagle, and Mark S, Ackerman
Big brother inside - Intel's chip
identification system for the Pentium III
CERT Advisories
Computer Security Superstore, Safe
Computing by Associated Services for Computing, We will be open soon with all of the
services regarding computer security, computer
security
Computers, Freedom and Privacy '99 Conference
Discovery
Online, Feature Stories -- Cybersurveillance THE MARKETPLACE: At the Big Brother
Surveillance store, shoplifting is not an issue, CLANDESTINE CAMS: Not quite sure about
the nanny? DATA FOR SALE: Are we creating privacy outlaws? FUTURE SPIES: A computer virus
with attitude WEBLINKS: The best surveillance sites on the Web, High tech espionage
Electronic
Communications Privacy Act ("ECPA") What Kind Of Privacy Protection Does The
ECPA Afford System Users, Exceptions Of The ECPA And Government Authorities, What Happens
When The ECPA Is Violated
Federal Computer Week White House
shifts encryption strategy
Full Disclosure Privacy, Anti-Privacy,
& Security, If You're Not Concerned About Privacy...Why do you close your window
shades at night? Stalker's Home Page, Get Your FBI File, Full Disclosure Live (My weekly
Radio Show), Public Sources of SSN's, Turn OFF the Filters, Why We Should FEAR Congress,
FREE Classified Ads Outrage, Have your Say, Glen Roberts, Internet Entreprenuer, Software
& Hardware: Complete Systems & Parts, A Few Programs for your PC, For Your Web
Page, Oil City, PA 16301, Glen L, Roberts
Iname.com free email service, Your IP-address will
not be included in header of the letter, if you use www mail service (no POP3 or
forwarding)
Index on Censorship
Note About Web Browsers &
Privacy, 1994 and A word about anonymous ftp servers, Some WWW browsers allow
configuring an email address Ed Kubaitis
PC
Magazine's Internet Security and Privacy page offers advice for protecting your home
computer and business, and a download center for software.
Postal Watch By June 24, 1999, all Commercial
Mail Recieving Agencies (CMRAs) must obtain home address, home telephone number, and ID
information about anyone utilizing their services, ?Let your congressman know (If You are American)
Privacy.net by Consumer.Net
Information gathering when surfing: Do web sites capture information about me without my
knowledge when I surf? Do companies keep my information secure when I register or buy
something? Can companies gather information about my computer when I load their software?
Are Internet 'cookies' violating my privacy or do they make surfing easier? Do information
gathering techniques make it easier and more convenient for me to use the Internet or does
it violate my privacy? What is the difference between opt-out and opt-in? How do all these
junk e-mailers get my e-mail address? Are children vulnerable to privacy invasions when
using the Internet? Developing personal profiles of users: Can companies compile
information about me from different sources and create a profile? Is profiling good or
bad? Is my Internet provider tracking where I go and selling the information? Is profiling
different on the Internet than in the non-Internet world? How can prevent continued
profiling ("opt-out") if profiling has already been done? Will the transfer of
this type of information affect international commerce? Encryption: Is my credit card and
other person information protected when I shop on the Internet? Are my Internet
communications being captured by others? Can companies protect sensitive information by
using encryption? Can criminals use encryption to avoid being caught by law enforcement?
Do law enforcers violate my privacy by capturing private information? web consumer.net
- Internet privacy-related software Software packages that: Clean your system of the
tracks you leave behind when visiting the Internet, Manage cookies, Java, ActiveX, etc,
Personal firewalls that detect Trojan horse programs and software companies who collect
information from your system when you load their programs,
- Get your Privacy.net e-mail address, @privacy.net Choose from e-mail forwarding to your
current account or web-based e-mail, You can also choose from over 40 other interesting
and fun domain names. For added security the log-in name is NOT the same as your e-mail
account
- Tired of companies requiring your e-mail address for registration? Is your e-mail
address being captured from newsgroup postings or chat rooms? Use the Privacy.net stealth
address: @privacy.net.
- Privacy Analysis of your Internet Connection
- Bake your own Internet cookie A demonstration that shows how "cookies" work.
- Privacy Periodicals: Privacy Times - 23 issues per year,
- Privacy Periodicals: Privacy Journal - Monthly newsletter,
- Is your personal information from your driver's license or registration being sold to
marketers? For most states the answer is yes, Click here for a state-by-state list with
"opt-out" instructions for those states that do sell the lists.
- First ever Internet Privacy Day scheduled for January 15, 2000, Information coming soon
to PrivacyDay.com
- Free personal information searches on the Internet. Addresses, phone numbers, e-mail
addresses, homepages, etc.
Privacy.org A useful resource by EPIC and PI for
cryptography, encryption, or electronic privacy information, Keywords: privacy, electronic
privacy, encryption, decryption, cryptography, EPIC, Electronic Privacy Information
Center, Internet Privacy Coalition, Privacy International, keys, EFF, cryptographic
information, hacking, hackers
Privacy International
Privacy-Policy.com privacy policy of the Consumer.Net group of web sites and tips for privacy
policies at other webs
Universal Declaration of Human Rights
USA.net / Netaddress.com free email
service.Your IP-address will not be included in header of the letter, if you use www mail
service (no POP3 or forwarding)
Wassenaar Arrangement The 33 member countries
of the Wassenaar Arrangement have agreed to
restrict cryptographic exports above 64 bits
World Wide Web Security
FAQ, WWW Security w3.org - Security Faq
This information is provided by ?Lincoln
D. Stein, The World Wide Web Consortium (W3C) hosts this document as a service to the
Web Community; however, it does not endorse its contents.
Alliance for Public Technology
American Bankers Association
American Association for the Advancement of Science
Directorate for Science and Policy Programs Anonymous Communications on the Internett anonymity and privacy
American Library Association
American Civil Liberties Union
Americans for Computer Privacy (ACP)
Americans for Computer Privacy (ACP) is a broad-based coalition working to ensure that the
privacy of all Americans' confidential files and communications is preserved and protected
in the information age, Keywords: americans, computer privacy, encryption, health
information, medical records, critical infrastructure, air safety, ed gillespie, jack
quinn, goodlatte, leahy, burns, eshoo, privacy, security, electronic commerce, healthcare,
louis freeh, competition, trade, export, right to privacy, fourth amendment, constitution,
consumer privacy, wiretap, computer privacy
Association for Computing Machinery, US Public
Policy Office
Azalea Software, Inc.
Cato Institute
CDT's Privacy Watchdog We want to find out if
the business community is starting to provide increased privacy protections, The Center
For Democracy & Technology 1634 Eye Street NW, Suite 1100 Washington, DC 20006 (v)
+1.202.637.9800 (f) +1.202.637.0968, become
a watchdog privacy .
Center for Democracy and Technology
Computer Professionals for Social Responsibility
consumer.net
DIGEX, Inc.
DigiCash
Electronic Frontier Foundation court documents from
cases challenging the government's crypto restrictions, Crypto Export Archive - articles,
law texts, analyses, etc, The EFF Encryption "Key Escrow" Archive - background,
govt, proposals, articles, Golden Key, EFF is asking you to participate in the PRIVACY
NOW, campaign to show support for the essential human right of privacy, This fundamental
building block of free society has been affirmed by the U.S. Supreme Court, the
constitutions and laws of many countries, and the U.N, Declaration of Human Rights, YOUR
privacy is endangered by the Arms Export Control Act, the ITAR Regulations, "key
escrow" or "key recovery" policies of the US Federal government, and by the
other anti-encryption actions of legislatures and executive agencies of many other
countries, Encryption technology is the key to the future of the information revolution,
It allows businesses and individuals to communicate securely online, without fear of
eavesdropping, snooping, or theft of information, Current laws severely restrict the
availability of strong, but easy-to-use, encryption products, while the Clinton
Administration has tried to force us all to sacrifice privacy and security, by pushing the
repressive government "key escrow" or "key recovery" policies, that
aim to give police and spy agencies "instant access" to all of YOUR e-mail and
other computer files, Additionally, lifting the export controls on encryption will free US
companies to develop products to meet the privacy and security needs of Internet users, Send questions about the PRIVACY NOW, Campaign webmaster
Electronic Privacy Information Center (EPIC) EPIC is a
public interest research center in Washington, D.C, It was established in 1994 to focus
public attention on emerging civil liberties issues and to protect privacy, the First
Amendment, and constitutional values, EPIC is a project of the Fund for Constitutional Government, EPIC
works in association with Privacy
International, an international human rights group based in London, UK and is also a
member of the Global Internet Liberty Campaign,
the Internet Free Expression Alliance, the Internet Privacy Coalition, and the Trans Atlantic Consumer Dialogue (TACD).
U.S.A.666 Pennsylvania Ave, SE, Suite 301, Washington, DC 20003, +1 202 544 9240 (tel) *
+1 202 547 5482 (fax), epic.org
- Privacy Rights Clearinghouse
- Privacy.org
- The EPIC Alert, The current and back issues of
EPIC's award-winning newsletter on civil liberties in the information age, Subscribe now,
- EPIC's Bill-Track, Track
pending legislation on Privacy and Cyber-Liberties in the 106th Congress.
- EPIC Bookstore, Browse the cyber shelves of
good books on privacy, free speech, and civil liberties at the Internet's only bookstore
devoted to online freedom, Shipping, discounts, and gift wrapping provided,
- Former Secrets, View
scanned images of previously classified government documents obtained by EPIC under the
Freedom of Information Act.
- EPIC's Online Guide to Practical
Privacy Tools, Information on how to get PGP, RSA SecurPC, and other encryption
programs, anonymous remailers and surfing the net anonymously.
- EPIC's Online Guide to
Privacy Resources, All the best sites, newsletters, conferences, and organizations on
and off the net.
- Computer Security, Is Cyberspace secure?
Hackers, information warfare, laws and guidelines, Includes resources on Critical Infrastructure
Protection,
- Cryptography Policy, Who holds the keys to
online privacy? Clipper Chip, key escrow, export controls, reports and more.
- Free Speech, Freedom of speech issues on
the Internet including anonymous speech, liability, censorship, and the pending challenge
to the Child Online Protection Act.
EPIC's Faulty
Filters report is also online.
- Freedom of Information, How to use the
Freedom of Information Act and other laws to obtain information on government activities.
See documents EPIC has obtained, Learn how to get your own files.
- Privacy, The A to Z's of privacy, From
airline passenger profiling and Caller ID to Social Security Numbers and Wiretapping.
Electronic Frontier Foundation
European Parliament European Parliament - Development of
Surveillance Technology and Risk of Abuse of Economic Information Development of Surveillance Technology
and Risk of Abuse of Economic Information
FBI
Fund for Constitutional Government
Georgetown Internet Privacy
Policy Study (GIPPS) mirror
site Two reports are now available in final form: the Georgetown Internet Privacy
Policy Survey (GIPPS) and a report commissioned by the Online Privacy Alliance (OPA) on
the Top 100 Web sites, Project Director The McDonough School of Business 202-687-3802
Georgetown Internet Privacy Policy Study Professor Mary
J, Culnan
Individual Reference Services Group (IRSG)
Institute of Electronics and Electrical Engineers,
US Activities Board
Internet Mail Consortium
Internet Privacy Coalition The mission of the
Internet Privacy Coalition is to promote privacy and security on the Internet through
widespread public availability of strong encryption and the relaxation of export controls
on cryptograph.Internet Privacy Coalition
Junkbusters
National Computer Security Association
National Consumers League
Nortel - Northern Telecom
Online Privacy by EFC Golden Key - Strong Crypto.Online
Privacy is a non-profit group of computer professionals who intend to educate and help the
public preserve their privacy while online and use data security tools, Helping Canadians
protect themselves online, Governments & Privacy Other Privacy groups, Cryptography
tools and resources, Email encryption made simple, a publication of the Information and
Privacy Commissioner/Ontario, Online Privacy, Banned Books Week: "Free People Read
Freely", Keywords: privacy,cryptography,Canada,anonymous
Online Privacy Alliance The Online
Privacy Alliance is a diverse group of corporations and associations who have come
together to introduce and promote business-wide actions that create an environment of
trust and foster the protection of individuals' privacy online, OPA Press Release on
Surveys, Georgetown Internet Privacy Policy Survey Executive Summary, Georgetown Internet
Privacy Policy Survey Results, OPA Top 100 Study, Privacy Initiatives by Private Sector.
Helpful Tips and Technical Tools for safeguarding your privacy, Keywords: privacy, online
privacy, online privacy alliance, privacy policy, children, kids, childrens privacy, kids
privacy,privacy alliance
People for the American Way, Action Fund
Pretty Good Privacy Inc.
Privacy International.org Privacy International Privacy International is a
human rights group formed in 1990 as a watchdog on surveillance by governments and
corporations, PI is based in London, UK and has an office in Washington, D.C, PI has
conducted campaigns in Europe, Asia and North America to counter abuses of privacy by way
of information technology such as telephone tapping, ID card systems, video surveillance,
data matching, police information systems, and medical records, Country Reports.
Country-by-country archives, Documents, International agreements on privacy and human
rights from the UN, European Union and other international bodies, Private Parts Online.
The International Privacy Newswire, Recent stories from around the world on privacy.
Reports, Privacy International reports, guides and handbooks, Issues: ID cards, Mondex and
Anonymous Digital Money, Outsourcing, Telephone Tapping and Encryption, Video
Surveillance,
- Privacy and Human Rights
- Big Brother Awards, Privacy International
held the first Big Brother Awards in London in October 98 and the US awards in
Washington,DC on April 7, 1999, Awards were given to the companies, government agencies
and individuals that have most directly undercut privacy
Qualcomm
RSA Data Security, Inc.
Senate.gov
Terisa Systems
The Named
TRUSTe - See PrivacyPolicy.com
US Department of Commerce (DOC), National Telecommunications & Information
Administration (NTIA)
US Federal Communications Commission (FCC)
US Federal Trade Commission (FTC)
US Privacy Council
Verisign, Inc.
Yahoo
Wired Magazine
Computer Crime
Computer Crime and Intellectual Property Section
by usdoj.gov
Javascript Steals Your autoexec.bat
Nasty Javascript Tricks killing your browser, View your autoexec.bat
Computer security.com -
Cookies
Cookie Central.com Cookie central.com -
unofficial cookie faq Cookie
Controversy ?Dark Side of Cookies
persistent cookies, HTTP cookies, and cookies with JavaScript
EPIC Cookies Page
How Web Servers' Cookies
Threaten Your Privacy
Privacy.net - cookie bug page
Privacy.net - cookies - Bake your own
Internet Cookie
To view all the cookies on your system you can use Window's Magazine free 'Cookie
Crumbs' software
CDT's crypto page
Counterpane Systems
Cripto.com - Encryption Policy Resource Page
Cryptography
Cryptography Archives
EFF's crypto pages
EPIC's crypto page
FreeCrypto site Zero-Knowledge systems has
launched the FreeCrypto site, as a reminder that
privacy is a fundamental human right, as recognized in the Universal Declaration of Human Rights, You
can use the site to ?contact your government.
File safety.com site of Charles Booher, an
independent software developer
Handbook of Applied Cryptography in
PostScript и pdf formats, Там же - ссылка на страницу
Kriptopolis.com
National Institute of Standards and Technology
released top secret SKIPJACK, the cryptographic algorithm used in the controversial
Clipper technology
RSA Data Security, Inc. RSA Crypto FAQ
United Copyprotection/Cryptography Labs UCLabs
Vince Gate - Cripto developer
Aladdin, Inc. ?FTP Aladdin, Inc. Site of the company - HASP
Eutron manufacturer of electronic keys SmartKey.
Data Security Corporation manufacturer of
electronic keys SecuriKey
Microcomputer Applications, Inc. manufacturer of
electronic keys Key-Lok II.
Microcosm Ltd. manufacturer of electronic
keys DinKey.
NOVEX Software manufacturer of electronic keys
NOVEX KEY, NOVEX STEALTH KEY.
Rainbow, Inc. ?FTP Rainbow, Inc. manufacturer of electronic keys
Sentinel.
Softlok International Ltd. manufacturer of
electronic keys Softlok II.
WIBU Systems manufacturer of electronic keys
WIBU-KEY.
If you wish to continue to try and get them shut down, it will require a little more
work, You need to determine, from the spam's headers, the server the spam actually
originated from.
abuse.net NETWORK ABUSE CLEARINGHOUSE
Anti-Spam Howto
how you can get address of spammers
Basic spam
information - FAQ ANTISPAM
Cauce.org Coalition Against Unsolicited Commercial
Email Cauce.org - resources
Caube.org.au Fight Against Spam, Australia
Euro.cauce Fight Against Spam
faqs.org - faqs -
net abuse faq - spam faq - Figuring Out Fake E-mail & News Posts
FTC.gov
Tracking the source of email spam
Spammers often forge the headers of their email in an attempt to avoid losing their
accounts and to evade email filters, These notes may help you track the source of spam
Junkbusters
Net citizens against spam
RECA Responsible Electronic
Communication Alliance (RECA), responsible email
Recycle your Spam Fight Against Spam
spam cop
Spam FAQ
Spam Hunter Whois, DNS-search
(nslookup)
SPAMKILLER
Actions of proceeding against
spammers Plenty of the descriptions of substantial actions of proceeding placed on the
server of Legal School of the John Marshall (USA)
Spam: Where to Complain About Frauds
& Scams
Crypto-Gram Newsletter
Crypto-Gram is a free monthly e-mail newsletter on computer security and cryptography from
Bruce Schneier (author of Applied Cryptography, inventor of Blowfish and Twofish, President of Counterpane Systems, general crypto pundit and occasional crypto curmudgeon), Becoming a
cryptographer, export rules, AMD, PKI slogans, key length, Open source, NSAKEY, CESA,
E*Trade, factoring RSA, Back Orifice 2000, AES news, HPUX, web-based encrypted mail.
Future of crypto-hacking, bungled SSL, reader comments, E-mail viruses, hacking archives,
international encryption policy, Internationalization of cryptography, export rules,
TWINKLE, Smart card threats, attacking certificates with viruses, news, Security hole in
IE/Outlook and Office, AES news, RSA-140 factored, Snake oil, NSA and crypto export,
WinXFiles, back doors, Intel's processor ID, Cracking contests, recognizing plaintext, zip
disks, Commerce Dept, committee, Electronic commerce, micro locks, copy protection, more
on steganography, Steganography, TriStrata, Rapid Remote, memo to amateur cipher
designers, Cramer-Shoup, impossible cryptanalysis, street performer, Private Doorbel.l
Hardware DES cracker, KEA, chosen protocol attack, biometrics, Breaking RSA, declassifying
Skipjack, secure audit logs, WIPO, Side channel attacks, risks of key escrow,
pseudo-random number generators, AES, secret story of non-secret encryption, conditional
purchase orders
The EPIC Alert, The current and back issues of
EPIC's award-winning newsletter on civil liberties in the information age, Subscribe now
IPC Alert for all the latest news about
crypto policy and the Golden Key campaign, Send email to ipc-announce@privacy.org Include the phrase
subscribe ipc-announce in the message body
PI-News electronic mailing list
X-Force Mailing Lists by Internet
Security Systems, Inc..ISS Forum This moderated list is dedicated to: ISS Security product
announcements, ISS Security product updates, How to use ISS SAFEsuite products, including,
Internet Scanner, System Scanner for Servers (Unix or Windows), System Scanner for Windows
Desktops, Database Scanner, RealSecure Engines (network-based IDS), RealSecure Agents
(host-based IDS), RealSecure for HP OpenView, SAFEsuite Decisions, General product
implementation issues, Our goal is to provide quality network security information.
Internet Security Systems (ISS) moderates this list to ensure that inappropriate language,
blatant commercial solicitations, personal attacks and off-topic submissions are kept to
an absolute minimum, NSA - Network Security Assessment This mailing list is open to
discussion of the following topics: How to do an assessment of hosts, networks, and
firewalls, What are vulnerability checks that should be part of an audit, How do you
rate/score the state of network security, What is the security gap between written policy
and actual implementation, Discuss the latest vulnerabilities appearing on heterogeneous
networks, How to make a report of all the data analyzed, NT Security: This is a moderated
mailing list discussing security for the following platforms: Windows NT, Windows 95,
Windows For Work Groups, The issues discussed are the host and application level security
as well as at the network level, ProtoWorX: This moderated list is dedicated to the
discussion of ISS ProtoWorX research and development projects, and other related X-Force
emerging security technology issues, Our goal is to provide quality network security
information, Inappropriate language, blatant commercial solicitations, personal attacks
and off-topic submissions should be kept to an absolute minimum, SecNews - Security News:,
This mailing list is for those people interested in receiving the latest information on
network security events and news announcements, including: Security press releases.
Security conferences, and security industry events, SecTech - Security Technology: This
mailing list is intended to keep people informed of the latest network security technology
advances, including: Public domain, shareware, and commercial security product
information, New security product upgrades, security patches
UP
|