Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Privacy

Submission + - Ask Slashdot: Best VPN service for Australia? (delimiter.com.au) 1

frrrp writes: Australia has proceeded on its merry way towards being an absolute nanny/surveillance state. Yesterday -

A controversial piece of legislation aiming to bolster the powers of law enforcement agencies has passed the Federal Senate, despite vehement protests from the Greens, who argued strongly that the bill was “yet another” unnecessary expansion of the Government’s surveillance powers in Australia. Entitled the Cybercrime Legislation Amendment Bill 2011, the legislation, amongst other things, introduces a requirements for ISPs to retain data on subscribers’ Internet activities in the context of a warrant being sought. It also broadly brings Australia into line with the Council of Europe Convention on Cybercrime.

The Australian public, and media, have been largely asleep on this issue and, by Parliament standards, the speed with which this legislation has been rushed through must be a new record — with both major political parties colluding to force it through and quash any thoughts of amendment to its draconian scope. So the time has come — VPN is no longer a luxury but a necessity. The question is, which VPN service providers are best for us poor folks on the arse end of the planet? I have more or less settled on probably going with Private Internet Access. Can any of the BigBrains on Slashdot enlighten me further on the subject of personal VPN — the kind that provides the full spectrum of service as a naked direct link does?

Bitcoin

Submission + - On VPNs and Security - Safeguarding your identity (torrentfreak.com)

An anonymous reader writes: TorrentFreak provides several useful tips detailing some necessary, and not so widely known, tips to protect one's privacy online using extra measures on top of VPNs. Some tips include halting all TCP/IP activity upon VPN disconnection, paying anonymously with Bitcoins, amongst others.
Bitcoin

Submission + - Bitcoin War: The First Real Threat to Bitcoin? (privateinternetaccess.com)

An anonymous reader writes: According to the article, someone has taken 15% of the Bitcoin hashing power and is currently filling it with empty blocks. The article says that this might be an attack against bitcoin.

"He is willing to spend money to mine these empty blocks. Essentially, this can lead to a stop in bitcoin transaction processing. Some people who would do this could include governments, banks, competing currencies, or ridiculously wealthy and bored persons who have a vendetta against bitcoin. If this entity obtains 51% of hashing power and fully stops processing transactions while mining against only its own blocks, the block chain will become useless."

Privacy

Submission + - Your ISP will Spy on You Starting July 12, 2012 (cnet.com)

An anonymous reader writes: All major ISPs in the US have announced that they will begin spying on users to detect piracy starting July 12. The RIAA and the MPAA have worked to bring ISPs on board and has dubbed this the "graduated response."

From the article, "Supporters say this could become the most effective antipiracy program ever. Since ISPs are the Internet's gatekeepers, the theory is that network providers are in the best position to fight illegal file sharing."

Privacy Online News has included tips on how to protect your privacy after this goes in effect: https://www.privateinternetaccess.com/blog/2012/03/your-isp-is-going-to-spy-on-you-starting-july-12-2012/

Privacy

Submission + - Windows, Mac OS X and Linux Applications Can Access your Personal Photos too! (privateinternetaccess.com) 1

An anonymous reader writes: With the recent uproar regarding iOS and Android apps accessing private data, rasengan points out that applications on most desktop operating systems are able to access the same data and more. Whether it's paranoia or privacy, application permissions and securities need to mature quickly to keep up with the changing world.

Slashdot Top Deals

All life evolves by the differential survival of replicating entities. -- Dawkins

Working...