Search Results
Search type | Search syntax |
---|---|
Tags | [tag] |
Exact | "words here" |
Author |
user:1234 user:me (yours) |
Score |
score:3 (3+) score:0 (none) |
Answers |
answers:3 (3+) answers:0 (none) isaccepted:yes hasaccepted:no inquestion:1234 |
Views | views:250 |
Code | code:"if (foo != bar)" |
Sections |
title:apples body:"apples oranges" |
URL | url:"*.example.com" |
Saves | in:saves |
Status |
closed:yes duplicate:no migrated:no wiki:no |
Types |
is:question is:answer |
Exclude |
-[tag] -apples |
For more details on advanced search visit our help page |
Results tagged with privacy
Search options not deleted
user 16228
The attribute of a system that prevents the release of data to unauthorized individuals. The ability or expectation of an individual or group to reveal information about themselves selectively or not at all.
2
votes
Avoid third party access to system
First of all, the German customs don't just randomly install spyware on people's computers. I don't know whence you've gotten that information. Like any other state body that conducts legal wiretappin …
2
votes
How to download data anonymously?
If you're looking for something sufficiently safe and user-friendly, I suggest downloading a copy of Tails then burning it on a DVD or USB stick. Whenever you want to access the Internet anonymously a …
4
votes
Using Private Browsing mode while connected to organization's network
Yes they would.
Private Browsing Mode (in most browsers) is designed to make the browser avoid saving the history of visited URLs on your computer. Your network administrator can still view the logs …
8
votes
Accepted
Is it safe to abandon a free webmail account that has been in use for a significant amount o...
No. Never close email accounts that are associated with you or any other accounts you have/had.
After your address is free, somebody can take it and use it to recover other accounts, mess your relati …
2
votes
Automated scanning of personal email
I believe that your quest will end in disappointment. Almost all email providers automatically scan the emails for many reasons including spam detection, malicious attachment detection, phishing links …
7
votes
Pop-ups in Private Browsing?
You're starting with a wrong premise. Pop-ups originating from a Private-Browsing window (legitimate and illegitimate ones) are already started in private-browsing windows.
117
votes
Accepted
Is it dangerous to post my MAC address publicly?
Disclosing the MAC address in itself shouldn't be a problem. MAC addresses are already quite predictable, easily sniffable, and any form of authentication dependent on them is inherently weak and shou …
10
votes
Accepted
How safe can connecting to VPN really be?
Connecting to VPN and using the Internet in the scenario you described is actually very secure. In the case you're talking about (mutual authentication), it is safe to say that ISPs aren't able to int …
13
votes
Does excluding Tor nodes by country improve privacy?
In my opinion, this is an opinion-based question. Why? Because it does make sense to filter rouge exit nodes, but how do you know which ones are and which ones aren't? Where do you draw the line in yo …
4
votes
Have the police placed a bug on my line
If warranted, the police already have the authority to request and obtain access to your Internet service provider's logs and follow your every step online. I wouldn't really worry about bugging your …
3
votes
How to prevent user's mobile phone position tracked
It's all a matter of cost-benefit analysis.
1) Why a similar concept as Tor project wont work in this scenario?
(all the nodes /towers are controlled by people/ a company that does
not want to …
22
votes
Client-side encryption, but cloud service can still decrypt data in the event of a death? Is...
Update:
PasswordBox responded to my inquiry on the subject. Personally, I couldn't really figure out what they're talking about. It could be a problem in my understanding. Below is a screenshot of th …
83
votes
Accepted
How can you be caught using Private VPN when there's no logs about who you are?
I've researched this subject for more than 3 years*: Looking for VPN providers, reading through their Privacy Policy and Legal pages, contacting them, contacting their ISPs when possible, and I've concluded … Update 2: Regarding other highly recommended super anonymous VPN services (I'll go over only the top two)
BTGuard: You only need to take one look at the Privacy Policy to know that there's something shady …
23
votes
Share certain information only after death
A little more than a year ago, I was in a situation where I feared for my life. I gave this some thought and here's what I did.
I made a video recording containing everything I wanted people to know …
11
votes
How Tor, Privoxy, Vidalia and Polipo are getting together?
HTTP traffic passed through Privoxy will have certain privacy-oriented rules applied to them. For example, Privoxy will block ads, detect and disable click-tracking scripts, disabling pop-ups, etc. … In fact, you can use them together to get the privacy benefit of Privoxy and some performance enhancement by Polipo. This can be done by chaining the traffic between them. …