Censorship

Pierluigi Paganini January 09, 2012
Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]

Pierluigi Paganini January 02, 2012
A Distributed Satellite Ground Station Network for internet freedom

The news that I desire to discuss with you is the will to put into orbit a satellite system to combat new forms of censorship. The project is certainly ambitious and effective, an hacker group has decided to launch a series of satellites for the composition of an alternative communication platform that would be used […]

Pierluigi Paganini December 31, 2011
The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life. As with any other subject there are many and conflicting opinions on what is considered a social revolution. Millions, billions of people who daily exchange thoughts, opinions, images, emotions, anything that makes us feel alive […]

Pierluigi Paganini December 29, 2011
GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due to their impact on an audience of billions users. Some experts in the Security Research Labs in Berlin have shown how to get the remote control of mobile phones to send SMS and make calls. […]

Pierluigi Paganini December 25, 2011
Israeli spy gear sent to Iran via Denmark, the dirty trade

Today I will discuss with you about the news that I was very impressed regarding the sale of a internet traffic monitoring system sold by an Israeli company to the Iranian government. The sold system is the “NetEnforcer” and was sold through the intermediary of a Danish company RanTek A / S. NetEnforcer bandwidth management devices provide […]

Pierluigi Paganini December 22, 2011
Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments such as Russia, the country where a massive cyber repressive action was carried out […]

Pierluigi Paganini December 20, 2011
The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic of social interest. Over the past […]

Pierluigi Paganini December 15, 2011
The year of the networked protest, from SOPA act to Anonymous

It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]

Pierluigi Paganini December 12, 2011
From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]