6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Forrester Report Says Online Privacy is Matters More than Ever

Online privacy will be a defining factor in businesses’ success and failure in 2016. That’s according to new findings from Forrester Research, which says Internet privacy has become more important than ever to consumers. “In 2016, privacy strategy can no longer merely focus on aligning with compliance requirements,” one Forrester representative wrote in summarizing the findings of a recent privacy …

A Fully Open Source Laptop Is Under Construction

Two enthusiasts (Sean “xobs” Cross and bunnie) are building a completely open-source laptop. You can read an article about this project here. Here are the blueprints for the laptop.

Freedom Box: A Computer Built From The Ground Up With Privacy In Mind

The FreedomBox is basically a router loaded up with privacy-ensuring software. Once plugged into your home network, it will “protect your security, your privacy and your anonymity while you use the internet,” according to James Vasile, the executive director of the FreedomBox Foundation, the nonprofit which was formed to develop the technology using more than $85,000 raised on Kickstarter. The …

1

Mesh Networking — A Better Internet Architecture

A Mesh Network (or Meshnet) is a type of network architecture where each computer is connected to neighboring computers, usually via Wi-Fi. Mesh Networks have a self-healing capability — they continue to work even if participating computers drop out. As a result, the network is typically quite reliable and cannot be easily shut down, as there is often more than one path between a source and …