Featured

Your decade highlight 2010s on internetcookies

What is your internetcookies main hightlight of the 2010s decade? Feel free to comment!
Is it the Facebook’s Cambridge Analytica scandal of March 2017? Becoming awareness of the impact of social media on daily live? Cookies will follow you every click on your digital journey also in the 2020s.

THE BLOB! – Google’s new threat to Internet privacy and security

“Google is proposing a new standard called WebBundles,” according to Brave’s senior privacy researcher. Brave is an alternate web browser, …

THE BLOB! – Google’s new threat to Internet privacy and security
Photo by bongkarn thanyakij on Pexels.com
Will this be the momentum for The Onion Route TOR networking?

Blockchain Cloud Encryption Solution

Cryptomator.

Boxcryptor.
— more information www.boxcryptor.com/en/blog/post/cryptomator-check-cloud-encryption/

ProtonDrive is under active development, and we aim to have a public beta later this year 2020.

Twitter photo

Facebook is like a bad high school party — you don’t really want to be there, but feel like you have to go. – Paul Agone

Proton goes to the Cloud: ProtonDrive

twitter.com/protonmail/status/1278389663078768641

X CLOUD, SECURITY AND PRIVACY FULLY ASSURED

X CLOUD, SECURITY AND PRIVACY FULLY ASSURED

https://privacyandsecurityoninternet.wordpress.com/2020/03/06/x-cloud-security-and-privacy-fully-assured/
— Lees op privacyandsecurityoninternet.wordpress.com/2020/03/06/x-cloud-security-and-privacy-fully-assured/

Cloud service security and privacy depends on all layers and protocols your files are transmitted by. Hence a fully privacy and security is of paramount importance.

What makes X Cloud different? In X Cloud you are really the owner of your files, they encrypt your documents and fragment them into several pieces and thanks to their use of Blockchain technology each piece of your file goes to different nodes completely encrypted and only you know the password to open them since they don’t have access to it.

S/MIME

Did you know even the “From:” field in an email, so the sender email address itself, can be compromised in standard email?

Regular email has no class protection.

Class 1 protection declares that the sender is the owner of the “From:” email address in the sense that the sender can receive email sent to that address, and so merely proves that an email received really did come from the “From:” address given.

Class 2 protection provides a more in-depth identity verification process, and this involves making inquiries about the would-be certificate holder.

S/MIME

S/MIME provides the following cryptographic security services for electronic messaging applications:

  • Authentication
  • Message integrity
  • Non-Repudiation of origin (using digital signatures)
  • Privacy
  • Data security (using encryption)

Use S/MIME to send encrypted messages in an Exchange environment in iOS – Apple Support

iOS offers support for S/MIME so that you can send encrypted email messages. 

— more: support.apple.com/en-us/HT202345

E-mail by default is infringing your privacy. No law for privacy applies, like there is with regular (non-digital) mail.

Exchange provides an environment to support a degree of privacy on an iPhone or iPad: “In iOS 13.4 and later, when you reply or forward a message, the encryption state of your message will match the state of the incoming message rather than your system default setting.

AUTHY

Authy is a free mobile / desktop app for two factor authentication, as well as security partner and SMS delivery service of many websites that want to make two-factor authentication work better for their users.

authy.com

How often do you use this app? Feel free to answer and comment.

reCAPTCHA – owned by Google

Extra verification, many websites depend on reCAPTCHA. In 2009 this services is acquired by Google. Wikipedia states:

The current iteration of the system has been criticized for its reliance on tracking cookies and promotion of vendor lock-in with Google services; administrators are encouraged to include reCAPTCHA tracking code in all pages of their website to analyze the behavior and “risk” of users, which determines the level of friction presented when a reCAPTCHA prompt is used. Google stated in its privacy policy that user data collected in this manner is not used for personalized advertising. It was also discovered that the system favors those who have an active Google account login, and displays a higher risk towards those using anonymizing proxies and VPN services.

https://en.wikipedia.org/wiki/ReCAPTCHA

In my opinion this service should be open-source software code. Not used by tracking companies to restrict acces to a website if not used. So no gstatic.com no google.com no googleapis.com. In the above screenshot the reCAPTCHA can only be submitted if allowed to use:

2 cookies, 2 from google.com.
20 Cascading Style Sheets (or CSS), 12 from google.com, 1 from googleapis.com and 7 from gstatic.com (gstatic is also part of Google); a style sheet language used for describing the presentation of a document written in a markup language like HTML. Privacy infringement: it allowed websites to uncover a user’s browsing history and figure out what sites the user had visited. Combined with other Web technology such as JavaScript or simply loading of background images, lets Web pages determine whether a URL is in the user’s history very quickly and without any interaction from the user. This is mitigated by browsers.
6 images, an (leaky) image can reveal whether the user is visiting a specific website. None from third-party sources.

VPN new generation

As VPN is already well known among privacy aware internet users, now a new generation VPN comes available. It is called WireGuard and it has benefits compared to mainstream OpenVPN protocol.

https://www.privateinternetaccess.com/blog/wireguide-all-about-the-wireguard-vpn-protocol/

The link above explains WireGuard. Technically explained.

Create your website at WordPress.com
Get started
%d bloggers like this: