Tracy Knauer

Dropbox Improves Privacy With Two-Factor U2F Authentication

How private is Dropbox, the popular cloud storage and file syncing service?  Not as private as it could be, for sure. But the platform’s developers have been taking steps recently to beef up the service’s security and privacy protections, namely by adding more robust authentication options. To Dropbox or Not to Dropbox? If you’re super-serious …

Dropbox Improves Privacy With Two-Factor U2F Authentication Read More »

How to Set Your MAC Address Randomly Using Linux

In theory, every networking device has a unique media access control, or MAC, address. In practice, using a simple tool called macchanger, it’s easy to “spoof” your computer’s MAC address on Linux by setting a random value for it each time you connect to a network, which helps protect your privacy. Here’s how and why. …

How to Set Your MAC Address Randomly Using Linux Read More »

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection

Wouldn’t it be nice if there were an OS designed from the ground-up for privacy and security?  If you’re willing to give a Linux-based platform a try, there is: The Amnesic Incognito Live System — better known as Tails OS. It aims to make private computing a plug-and-play affair. Most mainstream operating systems do little …

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection Read More »

Lead Linux Coder Warns Against Inevitable Security Flaws

From Heartbleed to Shellshock, the world of open-source computing has faced several high-profile security breaches in the last year. What are open-source developers – whose code powers many of the servers and websites that store millions of people’s personal information – doing about them? That’s the question Linus Torvalds, lead Linux kernel developer, helped answer …

Lead Linux Coder Warns Against Inevitable Security Flaws Read More »

IBM Urges Companies to Block Tor Privacy Service

Hiding your tracks online via Tor, the software that helps conceal users’ identity by randomly routing their Internet traffic through a network of relays, may soon become tougher — at least in the office. This week, IBM is encouraging businesses (PDF) to start blocking Tor on their networks. IBM says companies should excise Tor services …

IBM Urges Companies to Block Tor Privacy Service Read More »

Scroll to Top