|
You are here |
themarkup.org | ||
| | | | |
dissidentvoice.org
|
|
| | | | | The NSA has nothing on the monitoring tools that education technologists have developed to 'personalize' and 'adapt' learning for students in public school districts across the United States. - Jesse Irwin, Model View Culture Financialization involves a highly disciplined neoliberal landscape where state power structures and private technologies facilitate and protect the activities and interests | |
| | | | |
www.schneier.com
|
|
| | | | | Today's world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It's a way to think about potential risks, possible defenses, and the costs of both. It's how experts avoid being distracted by irrelevant risks or overburdened by undue costs... | |
| | | | |
www.eff.org
|
|
| | | | | Over the past few years, data brokers and federal military, intelligence, and law enforcement agencies have formed a vast, secretive partnership to surveil the movements of millions of people. Many of the mobile apps on our cell phones track our movements with great precision and frequency. Data... | |
| | | | |
veithen.io
|
|
| | | This article gives an in-depth description how TCP backlog works in Linux and in particular what happens when the accept queue is full. Includes references to the relevant kernel sources. | ||