Skip to main content
Search type Search syntax
Tags [tag]
Exact "words here"
Author user:1234
user:me (yours)
Score score:3 (3+)
score:0 (none)
Answers answers:3 (3+)
answers:0 (none)
isaccepted:yes
hasaccepted:no
inquestion:1234
Views views:250
Code code:"if (foo != bar)"
Sections title:apples
body:"apples oranges"
URL url:"*.example.com"
Saves in:saves
Status closed:yes
duplicate:no
migrated:no
wiki:no
Types is:question
is:answer
Exclude -[tag]
-apples
For more details on advanced search visit our help page
Results tagged with
Search options not deleted user 16228

The attribute of a system that prevents the release of data to unauthorized individuals. The ability or expectation of an individual or group to reveal information about themselves selectively or not at all.

2 votes

Avoid third party access to system

First of all, the German customs don't just randomly install spyware on people's computers. I don't know whence you've gotten that information. Like any other state body that conducts legal wiretappin …
Adi's user avatar
  • 44.2k
2 votes

How to download data anonymously?

If you're looking for something sufficiently safe and user-friendly, I suggest downloading a copy of Tails then burning it on a DVD or USB stick. Whenever you want to access the Internet anonymously a …
Adi's user avatar
  • 44.2k
4 votes

Using Private Browsing mode while connected to organization's network

Yes they would. Private Browsing Mode (in most browsers) is designed to make the browser avoid saving the history of visited URLs on your computer. Your network administrator can still view the logs …
Adi's user avatar
  • 44.2k
8 votes
Accepted

Is it safe to abandon a free webmail account that has been in use for a significant amount o...

No. Never close email accounts that are associated with you or any other accounts you have/had. After your address is free, somebody can take it and use it to recover other accounts, mess your relati …
Adi's user avatar
  • 44.2k
2 votes

Automated scanning of personal email

I believe that your quest will end in disappointment. Almost all email providers automatically scan the emails for many reasons including spam detection, malicious attachment detection, phishing links …
Adi's user avatar
  • 44.2k
7 votes

Pop-ups in Private Browsing?

You're starting with a wrong premise. Pop-ups originating from a Private-Browsing window (legitimate and illegitimate ones) are already started in private-browsing windows.
Adi's user avatar
  • 44.2k
117 votes
Accepted

Is it dangerous to post my MAC address publicly?

Disclosing the MAC address in itself shouldn't be a problem. MAC addresses are already quite predictable, easily sniffable, and any form of authentication dependent on them is inherently weak and shou …
Adi's user avatar
  • 44.2k
10 votes
Accepted

How safe can connecting to VPN really be?

Connecting to VPN and using the Internet in the scenario you described is actually very secure. In the case you're talking about (mutual authentication), it is safe to say that ISPs aren't able to int …
Adi's user avatar
  • 44.2k
13 votes

Does excluding Tor nodes by country improve privacy?

In my opinion, this is an opinion-based question. Why? Because it does make sense to filter rouge exit nodes, but how do you know which ones are and which ones aren't? Where do you draw the line in yo …
Adi's user avatar
  • 44.2k
4 votes

Have the police placed a bug on my line

If warranted, the police already have the authority to request and obtain access to your Internet service provider's logs and follow your every step online. I wouldn't really worry about bugging your …
Adi's user avatar
  • 44.2k
3 votes

How to prevent user's mobile phone position tracked

It's all a matter of cost-benefit analysis. 1) Why a similar concept as Tor project wont work in this scenario? (all the nodes /towers are controlled by people/ a company that does not want to …
Adi's user avatar
  • 44.2k
22 votes

Client-side encryption, but cloud service can still decrypt data in the event of a death? Is...

Update: PasswordBox responded to my inquiry on the subject. Personally, I couldn't really figure out what they're talking about. It could be a problem in my understanding. Below is a screenshot of th …
Adi's user avatar
  • 44.2k
83 votes
Accepted

How can you be caught using Private VPN when there's no logs about who you are?

I've researched this subject for more than 3 years*: Looking for VPN providers, reading through their Privacy Policy and Legal pages, contacting them, contacting their ISPs when possible, and I've concluded … Update 2: Regarding other highly recommended super anonymous VPN services (I'll go over only the top two) BTGuard: You only need to take one look at the Privacy Policy to know that there's something shady …
Adi's user avatar
  • 44.2k
23 votes

Share certain information only after death

A little more than a year ago, I was in a situation where I feared for my life. I gave this some thought and here's what I did. I made a video recording containing everything I wanted people to know …
Adi's user avatar
  • 44.2k
11 votes

How Tor, Privoxy, Vidalia and Polipo are getting together?

HTTP traffic passed through Privoxy will have certain privacy-oriented rules applied to them. For example, Privoxy will block ads, detect and disable click-tracking scripts, disabling pop-ups, etc. … In fact, you can use them together to get the privacy benefit of Privoxy and some performance enhancement by Polipo. This can be done by chaining the traffic between them. …
Adi's user avatar
  • 44.2k

15 30 50 per page