It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
How It Works TrackMeNot runs in Firefox as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and MSN. It hides users' actual search trails in a cloud of 'ghost' quer
Stiftung Secure Information and Communication Technologies SIC offers a wide range of cryptography- and security-related Java products, covering all aspects of data and communication security.
Identity theft is the crime that keeps on giving. Years after victims' identities have been compromised they can still be managing the effects of a ruined credit history, which can cost them bank mortgages or jobs. Victims can even face jail time for crim