Login
Discover
Waves
Decks
Plus
Login
Signup
m4r4nz4
@m4r4nz4
36
Followers
17
Following
3
Resource Credits
Available
Used
Created
2017-06-04 20:37
RSS Feed
Subscribe
Blog
Blog
Posts
Comments
Communities
Wallet
m4r4nz4
privacy
2017-08-30 15:57
The Illusion of Online Privacy
As the Ashley Madison hack demonstrated, Web companies can't guarantee privacy. There was a time when people had secrets. Men could discreetly dispose of receipts for flowers, drinks or jewelry, and a
$ 0.000
2
2
m4r4nz4
befree
2017-08-30 15:49
A Dollar For Your Data
Information about you is free for the taking on the Web. A new crop of entrepreneurs wants you to collect. nless your name is Oprah Winfrey or Warren Buffett, you’d be hard pressed to find anyone to pay
$ 0.000
0
m4r4nz4
surveillance
2017-08-30 15:37
The law behind surveillance
NSA operations The law behind surveillance Foreign intelligence Sign up for our newsletter: Donate Now! Home › Surveillance programs Surveillance programs Background: the US Intelligence Community Seventeen
$ 0.000
1
1
m4r4nz4
privacy
2017-08-24 16:59
The Mission to Decentralize the Internet
In the nineteen-seventies, the Internet was a small, decentralized collective of computers. The personal-computer revolution that followed built upon that foundation, stoking optimism encapsulated by John
$ 0.000
3
2
m4r4nz4
security
2017-08-24 16:47
This Simple iPhone Case can be Used to Steal ATM PINs
ATM It’s a common wisecrack around the criminal community. This whole stealing ATM PINs thing would be a lot simple if a gadget would just do all the work. Sounds like a crazy dream, right? After all,
$ 0.000
1
1
m4r4nz4
privacy
2017-08-23 17:07
The FCC has a plan to destroy net neutrality. It’s up to us to stop it.
The Federal Communications Commission's new Chairman Ajit Pai just announced a proposal to gut net neutrality. Net neutrality is the freedom to say, watch and make what we want online without interference
$ 0.000
3
1
m4r4nz4
privacy
2017-08-23 16:57
The Eternal Value of Privacy
The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and other wholesale surveillance measures -- is this line: "If you aren't doing
$ 4.693
7
3
m4r4nz4
surveillance
2017-08-23 16:32
Who Is Publishing NSA and CIA Secrets, and Why?
There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One: someone, probably a country's intelligence
$ 0.000
2
1
m4r4nz4
security
2017-08-23 16:23
social engineering methods
Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester
$ 0.000
0
m4r4nz4
surveillance
2017-08-23 16:11
the world of surveillance
"Surveillance Is the Business Model of the Internet" Under surveillance capitalism, we’ve lost control of our devices and our data – but there is a way back. Interview with Bruce Schneier by
$ 0.000
0