Content filtering

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in…

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social…

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident…

From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to…

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross…

The utopian privacy

Are you able to imagine a world in which everybody is free to communicate without…

Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to…

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to…

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to…

Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe…

This website uses cookies.