Category Archives: Privacy

ballad for a data miner

First you save some tuples, then you lose your scruples people help you along your way, not for your deeds, but how you say to take their privacy and freedom, just remind ’em they don’t pay take their money too … Continue reading

Rate this:

Posted in Privacy | Leave a comment

ad hoc T-SQL via TLS (SSL): Almost Perfect Forward Secrecy

The day the Heartbleed OpenSSL ‘vulnerability’ [don’t they mean backdoor?] hits the newswires seems an ideal moment to bring up an easy way to wrap your query results in an SSL tunnel between the database server and where ever you … Continue reading

Rate this:

Posted in Privacy, Secure Data | 3 Comments

Background Checks for EVERYBODY!

A background check simply filters and formats personal information about an eating, breathing person into a somewhat standard and therefore, presumably, useful “packet”. Much of the information in a background check is already out there in the public domain. Most … Continue reading

Rate this:

Posted in Privacy | Leave a comment

Tails from a Diskless Hyper-V

The Amnesic Incognito Live System (Tails) is open source privacy software. Tails “helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace…”. This post explores how a Windows private cloud or … Continue reading

Rate this:

Posted in Privacy, Secure Data | 2 Comments

For Privacy Open the Source & Close the Back Door

There is no surprise in the many recent corporate self-admissions that they too have given our private information. After all, they got us to release our privacy to their care with barely a flick and a click. As a direct consequence – and without … Continue reading

Rate this:

Posted in Code Review, Privacy, Secure Data | Leave a comment

Protecting Sensitive SQL Data Values from Administrative Users

Digital Non-Repudiation is about distributed communication authenticity. Non-repudiation in the digital security context is a proactive design concept intended to simulate the authentication of a fully witnessed hand written authorization. Evidence that this is a hard problem is found in … Continue reading

Rate this:

Posted in Encryption Hierarchies, Privacy, Secure Data | Leave a comment