monitoring system

How to use Tor Metrics to discover censorship, the Ethiopia case

Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web…

12 years ago

Syria,uncomfortable assumptions on the control of dissidents

The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the…

12 years ago

OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…

12 years ago

Monitoring or censorship? The big fear

Published on The Hacker News Magazine - March 2012 During the last years we have seen the tendency to use social media as…

12 years ago

Censorship – Why Anonymous is interested to the Great Firewall of China?

  The Chinese government is famous for the high level of monitoring implemented on the internet and in the specific…

12 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

12 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

12 years ago

E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…

12 years ago

This website uses cookies.