Tag Archives: dotrights

Protect Your Digital Privacy: Email Pt. 1 (S/MIME)

Using encryption for correspondence in America is older than the country and as American as apple pie, so much so that Thomas Jefferson even invented an encryption device during the Revolution and later used it for dispatches while he was … Continue reading

Posted in Post | Tagged , , , , | 2 Comments

Protect Your Digital Privacy: WiFi

Coffee houses have a historical caché as the place where revolutions are born, but today they are also one of the easiest places for the authorities or others to eavesdrop on your electronic communications. Broadband wireless, or WiFi, is not … Continue reading

Posted in Post | Tagged , , , , , , | 1 Comment

Protect Your Digital Privacy: Passwords

In George Orwell’s 1984, Winston Smith finally comes undone and betrays the person about whom he cares most when he is confronted with the thing of which he is most afraid. No matter how otherwise secure an encryption algorithm is, … Continue reading

Posted in Post | Tagged , , , , , , | 3 Comments

Protect Your Digital Privacy: Browser Security

The Revolution Will Be Facebooked It might seem hard to believe that Ben Ali’s Tunisian dictatorship tried to nip the Arab Spring in the bud by stealing Facebook passwords. Yet as the revolution spread by message and image on the … Continue reading

Posted in Post | Tagged , , , , , , | 3 Comments

Protect Your Digital Privacy: Introduction

The two most potent weapons to protect your digital privacy are a strong dose of common sense and encryption, i.e. scrambling digital data so that the only people who can read it are people authorized with a key or a … Continue reading

Posted in Post | Tagged , , , , | 4 Comments

Protecting your online privacy — a series by Bill Day

Starting this week, Montgomery County Civil Rights Coalition is pleased to host a series of posts on protecting your online privacy, written by Bill Day.  The posts now include… Protect Your Digital Privacy: Introduction Protect Your Digital Privacy: Browser Security … Continue reading

Posted in Post | Tagged , , , , , | 3 Comments