This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 License.
By default the Chrombook allows anyone with a Google account to sign in. But for some, that amount of sharing might be a little too open. If you would like to limit who can sign in to your Chomebook to a specific list of users, open settings and search restrict. You’ll be guided to the “Manage other users…” button. Click that then check “Restrict sign-in to to the following users:” and add the allowed usernames in the box. Click Done and close settings and now only those on your list can sign into your Chrombook. (Don’t forget you may also want to disallow Guest access too.)
There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.
Ian Urbina, author of The Secret Lives of Passwords, talks about what passwords mean to people beyond their access to email or social networking accounts. Published on Dec 29, 2014
Here’s the video of my LastPass presentation from the Nebraska Library Association Conference presented on 10 October 2014.
We’re excited to announce that the Auto-Password Change feature we released to our Pre-Build Team last week is now available for all users in beta. LastPass can now change passwords for you, automatically. We’re releasing this feature for free to all our users, on Chrome, Safari, and Firefox (starting with version 3.1.70).
Auto-Password Change already supports 75 of the most popular websites, including Facebook, Twitter, Amazon, Pinterest, Home Depot, and Dropbox. When clicking “edit” for a supported site, a “Change Password Automatically” button appears.
Once clicked, LastPass opens a new tab where it logs in for you, creates a new password, and submits the changes on the website, while also saving them to LastPass. Next time you log in to that website, LastPass will autofill with the newly-generated password. And all you had to do was click a button!
Read the full article @ Blog.LastPass.com
Harvard Law School Professor Lawrence Lessig interviewed Edward Snowden at Harvard Law School on Oct. 20.
This morning I received the following notice (read the PDF) from Wuala informing me that their secure storage will no longer be free come January 1, 2015. For those of you not familiar with Wuala, think Dropbox but with end-to-end trust-no-one encryption. Granted, for 5GB of space you need only pay $12/year so I’m thinking I’ll pay it. But there goes the one free secure Dropbox replacement that I was aware of.
Adobe came under fire a few weeks ago when news was brought to light that critical user data was being sent to their servers from anyone using Adobe Digital Editions 4. The most important aspect of this story was that it was being done in clear text, with no encryption. Adobe has just patched ADE 4, to solve this issue.
This is from May but I’m a bit behind in some of my reading. However it is worth every moment you’ll spend reading it.
A great deal of confusion has been created by the distinction between data and metadata, as though there were a difference and spying on metadata were less serious.
Illegal interception of the content of a message breaks your secrecy. Illegal interception of the metadata of a message breaks your anonymity. It isn’t less, it’s just different. Most of the time it isn’t less, it’s more.
In particular, the anonymity of reading is broken by the collection of metadata. It wasn’t the content of the newspaper Douglass was reading that was the problem – it was that he, a slave, dared to read it.
The president can apologise to people for the cancellation of their health insurance policies, but he cannot merely apologise to the people for the cancellation of the constitution. When you are president of the United States, you cannot apologise for not being on Frederick Douglass’s side.
Read the full article @ The Guardian.
This week, a group of hackers released a list of about 5 million Gmail addresses and passwords. This list was not generated as a result of an exploit of WordPress.com, but since a number of emails on the list matched email addresses associated with WordPress.com accounts, we took steps to protect our users.
We downloaded the list, compared it to our user database, and proactively reset over 100,000 accounts for which the password given in the list matched the WordPress.com password. We also sent email notification of the password reset containing instructions for regaining access to the account.
Read the full article @ blog.wordpress.com