Censorship

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups…

13 years ago

India, inadequate laws, wrong policies and the hazard of regression

India, a nation technologically advanced, of which we have so much discussed in recent weeks. We have discussed about the…

13 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

13 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

13 years ago

A Distributed Satellite Ground Station Network for internet freedom

The news that I desire to discuss with you is the will to put into orbit a satellite system to…

13 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

13 years ago

GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due…

13 years ago

Israeli spy gear sent to Iran via Denmark, the dirty trade

Today I will discuss with you about the news that I was very impressed regarding the sale of a internet…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago