
|
 |
|
Privacy Resources

The
Vault is a Perl driven search
engine designed to traverse a large
information security database. Government
Sites Federal Bureau of Investigation
The mission of the NIPC is both
a national security and law enforcement
effort to detect, deter, assess,
warn of, respond to, and investigate
computer intrusions and unlawful
acts, both physical and "cyber,"
that threaten or target our critical
infrastructures. The NIPC's job
is not simply to investigate and
respond to attacks after they occur,
but to learn about preventing them.
|

Commercial
Version
of
PGP
This
is
the
commercial
version
of
the
Pretty
Good
Privacy
package.
PGP
can
be
used
to
encrypt
email
documents
and
normal
files
using
strong
cryptography.
Technotronic
Features
new
and
useful
security
tools
and
freeware
products.
Zero
Knowledge
dedicated
to
providing
our
customers
with
the
tools
to
protect
their
privacy
and
freedom
while
on
the
Internet.
Our
goal
is
to
redefine
identity
on
the
Internet.
Our
customers
will
control
their
identities
and
the
amount
of
information
that
is
created,
collected,
and
profiled
about
those
identities.
Our
solution
is
to
create
authenticated
digital
pseudonyms
that
bear
no
necessary
relation
to
the
actual
person
behind
them.
This
allows
our
users
total
freedom
to
express
ideas,
communicate
and
live
in
cyberspace.

Computer
Security
and
Industrial
Cryptography
The
goal
of
COSIC's
research
activities
is
to
create
an
electronic
equivalent
for
primitives
in
the
physical
world
such
as
confidentiality,
signatures,
identification,
anonymity,
notarization,
and
payments.
To
achieve
this
goal,
the
research
concentrates
on
the
design,
evaluation,
and
implementation
of
cryptographic
algorithms
and
protocols,
and
on
the
development
of
security
architectures
for
computer
systems
and
telecommunications
networks.
Crypto
Law
Survey
This
is
a
survey
of
existing
and
proposed
laws
and
regulations
on
cryptography
-
systems
used
for
protecting
information
against
unauthorized
access.
Governments
have
long
restricted
export
of
cryptography
for
fear
that
their
intelligence
activities
are
hampered
by
the
crypto
use
of
foreign
states
and
scoundrels.
Since
the
rise
of
crypto
use
over
the
past
decades,
governments
increasingly
worry
about
criminals
using
cryptography
to
thwart
law
enforcement.
Erehwon's
Crypto
Links
This
is
compilation
of
cryptography
related
sites.
It
includes
links
to
Commercial
Organizations,
University
Computer
Sites,
Cryptography
&
Security
Newsgroups,
Cryptography
Books
&
Publications,
Number
Theory,
Cryptographic
Algorithms
&
Protocols,
Cryptographers
Home
Pages,
Cryptographic
Software
&
Security
Tools,
ECC
Elliptic
Curve
Cryptosystems,
STU-III
(Secure
Telephone
III),
and
a
variety
of
other
related
topics.
Introduction
to
Cryptography
People
mean
different
things
when
they
talk
about
cryptography.
Children
play
with
toy
ciphers
and
secret
languages.
However,
these
have
nothing
to
do
with
real
security
and
strong
encryption.
Strong
encryption
is
the
kind
of
encryption
that
can
be
used
to
protect
information
of
real
value
against
organized
criminals,
multinational
corporations,
and
major
governments.
Strong
encryption
used
to
be
only
military
business;
however,
in
the
information
society
it
has
become
one
of
the
central
tools
for
maintaining
privacy
and
confidentiality.
Papers
from
Ross
Anderson
Over
the
last
seven
years,
I
have
been
involved
in
studying
how
computer
security
systems
fail
in
real
life.
This
is
a
prerequisite
for
building
robust
secure
systems;
many
security
designs
are
poor
because
they
are
based
on
unrealistic
threat
models.
This
work
began
with
a
study
of
automatic
teller
machine
fraud,
and
then
expanded
to
other
applications
as
well.
PGP
Timeline
The
topic
of
PGPs
history
seems
to
be
fraught
with
controversy,
and
it
is
difficult
for
a
new
comer
to
discover
the
full
story
Popular
Cryptography
-
The
Journal
of
Internet
Privacy
If
you're
looking
for
electronic
privacy
information
(including
Private
Idaho,
TEMPEST,
and
PGP),
you'll
want
to
jump
over
to
Popular
Cryptography.
Python
Cryptography
Toolkit
Home
Page
The
Python
Cryptography
Toolkit
is
free
software
by
Andrew
Kuchling.
Due
to
the
USA's
export
restrictions,
this
site
only
has
documentation.
The
toolkit,
itself,
is
available
via
anonymous
FTP
in
the
ftp.cwi.nl:/pub/pct
directory
[Visit-Source]
RSA
Security
One
of
the
leaders
in
cryptography
software.
Snake
Oil
Warning
Signs:
Encryption
Software
to
Avoid
Good
cryptography
is
an
excellent
and
necessary
tool
for
almost
anyone.
Many
good
cryptographic
products
are
available
commercially,
as
shareware,
or
free.
However,
there
are
also
extremely
bad
cryptographic
products
which
not
only
fail
to
provide
security,
but
also
contribute
to
the
many
misconceptions
and
misunderstandings
surrounding
cryptography
and
security.
Speak
Freely
is
a
Windows
application
that
allows
you
to
talk
(actually
send
voice,
not
typed
characters)
over
a
network.
If
your
network
connection
isn't
fast
enough
to
support
real-time
voice
data,
four
forms
of
compression
may
allow
you,
assuming
your
computer
is
fast
enough,
to
converse
nonetheless.
ORGANIZATIONS
AND
ASSOCIATIONS
Center
for
Democracy
and
Technology
The
Center
for
Democracy
and
Technology
works
to
promote
democratic
values
and
constitutional
liberties
in
the
digital
age.
With
expertise
in
law,
technology,
and
policy,
CDT
seeks
practical
solutions
to
enhance
free
expression
and
privacy
in
global
communications
technologies.
CDT
is
dedicated
to
building
consensus
among
all
parties
interested
in
the
future
of
the
Internet
and
other
new
communications
media.
The
Global
Internet
Liberty
Campaign
advocates
freedom
of
expression
and
privacy
on
the
Internet
Members
of
the
coalition
include
the
American
Civil
Liberties
Union,
the
Electronic
Privacy
Information
Center,
Human
Rights
Watch,
the
Internet
Society,
Privacy
International,
the
Association
des
Utilisateurs
d'Internet,
and
other
civil
liberties
and
human
rights
organizations.
The
Internet
Society
(ISOC)
provides
leadership
in
addressing
issues
that
confront
the
future
of
the
Internet,
and
is
the
organizational
home
for
groups
responsible
for
Internet
infrastructure
standards,
including
the
Internet
Engineering
Task
Force
(IETF)
and
the
Internet
Architecture
Board
(IAB).
Privacy
Council
Internet
library
on
global
privacy
law
and
an
extensive
balanced
link
to
privacy
on
the
internet.
Privacy
Surveys
with
benchmarks.
Privacy
International
(PI)
is
a
human
rights
group
formed
in
1990
as
a
watchdog
on
surveillance
by
governments
and
corporations.
PI
is
based
in
London,
England,
and
has
an
office
in
Washington,
DC
PI
has
conducted
campaigns
throughout
the
world
on
issues
ranging
from
wiretapping
and
national
security
activities,
to
ID
cards,
video
surveillance,
data
matching,
police
information
systems,
and
medical
privacy.
Union
for
the
Public
Domain
(UPD)
is
a
nonprofit
citizens
group.
Its
mission
is
to
protect
and
enhance
the
public
domain
in
matters
concerning
intellectual
property.
Attrition
is
a
computer
security
Web
site
dedicated
to
the
collection,
dissemination
and
distribution
of
information
about
the
industry
for
anyone
interested
in
the
subject.
They
maintain
one
of
the
largest
catalogs
of
security
advisories,
cryptography,
text
files,
and
denial
of
service
attack
information.
They
are
also
known
for
the
largest
mirror
of
Web
site
defacements
and
their
crusade
to
expose
industry
frauds
and
inform
the
public
about
incorrect
information
in
computer
security
articles.
Fringe
of
the
Web
The
Fringe
of
the
Web
has
returned
again.
Started
in
1994
by
Bronc
Buster
and
Silicon
Toad,
as
a
ring
of
only
the
best,
or
'fringe,'
underground
and
computer
security
sites.
Users
may
vote
on
which
site
is
the
best,
bringing
the
quality
sites
to
the
top
and
slowly
eliminating
the
lacking
sites.
The
Fringe
is
run
by
the
community,
for
the
community.
Help
Net
Security
has
been
online
since
October
1998.
From
the
initial
site
that
was
conceived
as
a
download
archive,
the
site
grew
into
a
daily
updated
security
related
news
site
with
lots
of
additional
content.
The
HNC
Network
is
a
ongoing
project
working
to
provide
a
common
ground
between
developers,
administrators,
IT/IS
Professionals
and
the
common
everyday
web
surfer.
We
provide
a
ever-growing
archive
of
tools
[
IDS,
portscanning,
encryptions,
crackers,
*nix
distributions
and
utilities,
etc.
],
a
wide
selection
of
reading
material
and
guides
to
secure,
protect,
and
disseminate
attacks
to
your
network.
We
assist
people,
in
their
personal
education
on
security,
programming,
protocols
and
even
neophyte
oriented
materials.
The
Text
File
Warehouse
At
the
text
file
warehouse
not
only
do
we
provide
text
files
for
reading
online,
but
we
provide
over
30
categories
packed
with
text
files
and
currently
hold
over
3,000
files
in
our
archive.
Our
mission
is
to
provide
the
Internet
the
largest
database
of
computer
and
Internet
related
text
files
available.
Our
staff
members
search
the
net
and
BBS'S
daily
and
retrieve
thousands
of
files
for
your
viewing.
TESO
is
an
international
group
of
young
and
motivated
computer
programmers
and
security
enthusiasts.
With
more
than
one
dozen
members
specialized
in
the
network
security
field
they
do
spend
a
lot
of
time
in
research
and
development
of
new
vulnerabilities
and
exploitation
tools
that
are
useful
to
both
'hackers'
and
security
professionals.
Wiretrip
A
compilation
of
security
related
information
and
tools
as
presented
by
Rain
Forest
Puppy
w00w00
(WSD),
with
30+
active
members,
is
currently
the
largest
nonprofit
security
team
in
the
world.
w00w00
was
created
a
little
under
two
years
ago
and
has
since
grown
rapidly.
They
have
members
on
three
continents,
and
in
eight
countries
(Australia,
Canada,
France,
Russia,
United
Kingdom,
Netherlands,
Sweden,
Germany,
and
11
states
(USA).
Each
member
is
diverse
in
his
or
her
abilities,
location,
and
ethnicity.
Our
major
affiliations
include
(in
no
particular
order)
eEye
Digital
Security,
CW
Security
Research,
Bindview
Development
Inc.,
Roses
Labs,
ADM,
Technotronic,
rfp.labs,
Napster
Inc.,
el8.org,
and
attrition.org.
Active
Privacy:
to
protect
your
personal
information
while
you
use
the
Internet.
Anonymous
on
the
Internet
(CNIL)
Everything
you
ever
wanted
to
know
about
the
way
you
are
traced
on
the
net,
including
environment
variables,
cookies,
cache
memory
and
log
file
demonstrations.
Shows
you
the
traces
you
leave
there
and
explains
you
how
it
works.
FreeCrypto.org:
-
Software
called
"Freedom"
protects
the
privacy
of
web
browsing
and
email,
without
the
user
having
to
do
anything.
Site
also
has
news
on
Internet
privacy
and
other
issues.
Internet
privacy
software:
Freedom(R)
internet
privacy
software
allows
for
anonymous
surfing
online
to
protect
your
personal
interests.
NovuWeb,
Inc.:
This
paper
provides
an
approach
to
e-consumer
information
which
enables
online
corporations
to
find
and
use
the
trends/patterns
in
their
data
without
ever
releasing
any
identifiable
personal
information.
Online
Privacy
Alliance:
-
A
group
of
corporations
and
associations
who
cooperate
to
promote
business-wide
actions
to
promote
individuals'
privacy
online.
P3P
or
Platform
for
Privacy
Preferences
Project,
protocol
for
privacy
protection
on
the
Web.
P3P
FAQ:
-
Answers
to
frequently
asked
questions
about
data
privacy
and
P3P;
from
Computer
Professionals
for
Social
Responsibility.
Privacy
on
the
Internet:
(Bob
Sherman)
Computers
collect
information
about
every
aspect
of
your
life.
Without
taking
precautions,
your
activities
can
be
recorded
and
matched
up
with
databases
of
your
other
activities.
Privacy
Resources:
Issues
affecting
privacy,
security,
anonymity,
and
encryption
on
the
internet.
SurferBeware.com:
Internet
safety,
protecting
online
privacy,
virus
prevention,
web
security
and
e-mail
tips.
TinHat:
-
Security
and
privacy
issues
for
Internet
users.
WebVeil.Com:
Internet
users'
privacy
and
what
can
be
done
to
control
cookies
and
keep
Web
surfing
anonymous.

TOP

SERVICES
JunkBusters "Most
junk
doesn't
find
you
by
accident.
It's
carefully
targeted
based
on
information
about
you
held
in
what
we
call
junk
databases.
Our
free
web-based
service,
JUNKBUSTERS
DECLARE,
makes
it
easy
to
just
say
no
by
drafting
letters
for
you
to
all
the
major
list
vendors.
Our
extensive
guide
explains
how
direct
marketers
get
and
sell
your
name,
and
other
ways
to
tell
them
not
to
disclose
the
information
they
keep
about
you.
Be
aware
that
as
you
browse
the
Web,
junk
data
about
you
is
being
collected
with
your
every
mouseclick.
Some
is
even
stored
in
your
own
files
as
cookies.
Our
free
software
package,
the
Internet
Junkbuster,
stops
cookies
and
helps
you
stay
anonymous."
Publius.net:
-
Anonymity
services
like
Remailer
list,
Mixmaster
list
and
Chain
reliability
rankings.
Secure
Text:
A
free
service
that
allows
text
to
be
made
secret
in
such
a
form
that
it
still
passes
through
most
firewalls.
It
does
not
need
software
installed
and
can
be
used
direct
from
the
web
site.
WebFaucet:
-
Premium
ISP
service
providing
tools
and
environments
that
give
members
control
of
their
personal
information
from
the
moment
they
connect
to
the
Internet.

CORPORATE
OVERVIEW SERVICES
& SOLUTIONS WINN
SCHWARTAU
INFOSEC GATEWAY CONTACT HOME
Copyright
© 2000-2001 Interpact, Inc. All Rights Reserved
For comments about this page, contact: Kelley
Walker, Interpact, Inc.
Copyright Policy Privacy
Policy

|
 |
|