Delicious/allardstrijker

Delicious/allardstrijker


8_friends_paper.pdf (application/pdf Object)

Posted: 25 Aug 2009 01:38 PM PDT

The popular social networking website Facebook exposes a \public view" of user proles to search engines which in- cludes eight of the user's friendship links. We examine what interesting properties of the complete social graph can be inferred from this public view. In experiments on real social network data, we were able to accurately approximate the degree and centrality of nodes, compute small dominating sets, nd short paths between users, and detect commu- nity structure. This work demonstrates that it is dicult to safely reveal limited information about a social network.

This posting includes an audio/video/photo media file: Download Now

Printers | Electronic Frontier Foundation

Posted: 25 Aug 2009 01:36 PM PDT

Is Your Printer Spying On You? Imagine that every time you printed a document, it automatically included a secret code that could be used to identify the printer - and potentially, the person who used it. Sounds like something from an episode of "Alias," right? Unfortunately, the scenario isn't fictional. In a purported effort to identify counterfeiters, the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information. That means that without your knowledge or consent, an act you assume is private could become public. A communication tool you're using in everyday life could become a tool for government surveillance. And what's worse, there are no laws to prevent abuse.

Privacy | Electronic Frontier Foundation

Posted: 25 Aug 2009 01:35 PM PDT

Privacy New technologies are radically advancing our freedoms, but they are also enabling unparalleled invasions of privacy. Your cell phone helps you keep in touch with friends and families, but it also makes it easier for the feds to track your location. Your Web searches about sensitive medical information might seem secret, known only to you and search engines like Google. But by logging your online activities, these companies are creating a honeypot of personal information, potentially available to any party wielding a subpoena. And the next time you try to board a plane, watch out—you might be turned away after being mistakenly placed on a government watch list based on erroneous data.

Home – Veiliginternetten.nl

Posted: 25 Aug 2009 01:15 AM PDT

We doen steeds meer online: van netwerken tot onze bankzaken. Helaas heeft dat ook risico's. Virussen kunnen voor ongewenste reclame zorgen, of je wachtwoord kan gestolen worden. En er zijn nog veel meer manieren waarop kwaadwillenden je gegevens kunnen achterhalen. Want veel van wat je onbeveiligd op internet zet, is openbaar. Gelukkig kun je met een aantal maatregelen je gegevens goed beschermen tegen cybercrime, zoals deze criminaliteit op internet ook wel genoemd wordt. Op deze pagina's lees je hoe je dat kunt doen en waar je meer informatie vindt.