<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>Privacy</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Privacy-focused Linux Distributions to Secure Your Online Presence in 2021</title>
  <link>https://www.linuxjournal.com/content/privacy-focused-linux-distributions-secure-your-online-presence-2021</link>
  <description>  &lt;div data-history-node-id="1340851" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img loading="lazy" src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/privacy-focused-linux-distributions.jpg" width="850" height="500" alt="Privacy-focused Linux Distributions to Secure Your Online Presence in 2021" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/suparna-ganguly" lang="" about="https://www.linuxjournal.com/users/suparna-ganguly" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Suparna Ganguly&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Linux distros are usually more secure than their Windows and Mac counterparts. Linux Operating Systems being open-source leaves very less scope of unauthorized access to its core. However, with the advancement of technologies, &lt;a href="https://www.techradar.com/in/news/synology-nas-devices-are-being-hacked-to-target-linux-systems"&gt;incidents &lt;/a&gt;of attacks are not rare.&lt;/p&gt;

&lt;p dir="ltr"&gt;Are you in a fix with the coming &lt;a href="https://www.zdnet.com/article/microsoft-warns-over-this-unusual-malware-that-targets-windows-and-linux/"&gt;reports&lt;/a&gt; of Linux systems targeted malware attacks? Worried about your online presence? Then maybe it’s time to go for a secure, privacy-focused Linux distro. This article presents a guide to 3 privacy-oriented Linux distributions that respect your privacy online.&lt;/p&gt;

&lt;h2 dir="ltr"&gt;Why You Need a Privacy-focused Linux Distro&lt;/h2&gt;

&lt;p dir="ltr"&gt;But before jumping into that, let’s have a brief overview regarding the importance of a secure Linux Operating System. You may know that the Operating System is the core software of your computer. It helps maintain communication across all the hardware, software, memory, and processor of the system. It also manages the hardware parts.&lt;/p&gt;

&lt;p dir="ltr"&gt;If your computer isn’t secure enough to use, then hackers can get easy access to the OS and can exploit it to view your files and track your presence on the internet. Privacy-focused Linux distributions offer a lot of good choices packed with the most reliable features to select from.&lt;/p&gt;

&lt;h2 dir="ltr"&gt;5 Privacy-focused Linux Distributions&lt;/h2&gt;

&lt;p dir="ltr"&gt;Now let’s take a look at the most privacy-focused Linux distros that allow staying secure.&lt;/p&gt;

&lt;h3 dir="ltr"&gt;Septor Linux

&lt;/h3&gt;&lt;p dir="ltr"&gt;&lt;a href="https://sourceforge.net/projects/septor/"&gt;Septor Linux &lt;/a&gt;is an OS created by the project called Serbian Linux. Serbian Linux also produces Serbian language-based general general-purpose Linux distribution. Septor implements the&lt;a href="https://kde.org/plasma-desktop/"&gt; KDE Plasma desktop &lt;/a&gt;environment and is a newcomer among all other distros.&lt;/p&gt;

&lt;p dir="ltr"&gt;The Septor operating system offers a stable and reliable user experience. It’s suitable for a vast range of computers because it is built upon &lt;a href="https://www.debian.org/"&gt;Debian GNU/Linux.&lt;/a&gt; So, a solid privacy level is what you can expect. The distro routes all of the internet traffic through &lt;a href="https://www.torproject.org/"&gt;Tor &lt;/a&gt;network to earn privacy credentials. The distro used to use a launcher script to pick up the latest Tor, however, now Tor comes in bundles with it by default.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/privacy-focused-linux-distributions-secure-your-online-presence-2021" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 22 Sep 2021 16:00:00 +0000</pubDate>
    <dc:creator>Suparna Ganguly</dc:creator>
    <guid isPermaLink="false">1340851 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Tutanota Interviews Tim Verheyden, the Journalist Who Broke the Story on Google Employees Listening to People's Audio Recordings</title>
  <link>https://www.linuxjournal.com/content/tutanota-interviews-tim-verheyden-journalist-who-broke-story-google-employees-listening</link>
  <description>  &lt;div data-history-node-id="1340782" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/matthias-pfau" lang="" about="https://www.linuxjournal.com/users/matthias-pfau" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Matthias Pfau&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Google employees listen to you, but the issue of "ghost workers" transcends Google. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Investigative journalist &lt;a href="http://timverheyden.com"&gt;Tim Verheyden&lt;/a&gt;, who broke the story on how Google employees listen to people’s audio recordings, explains in an interview how he got hold of the story, why he is now using the encrypted contact form Secure Connect by Tutanota and why the growing number of "ghost workers" in and around Silicon Valley is becoming a big issue in Tech.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tutanota:&lt;/strong&gt; Tim, you have broken a great story on &lt;a href="https://www.vrt.be/vrtnws/en/2019/07/10/google-employees-are-eavesdropping-even-in-flemish-living-rooms/"&gt;VRT News&lt;/a&gt; about how employees of Google subcontractors listen to our conversations when using devices such as Google Home. What was that story about? What was the privacy violation?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tim Verheyden:&lt;/strong&gt; Google provides a range of information on privacy—and data gathering. In this particular case, Google says on audio gathering that it can save your audio to learn the sound of your voice, learn how we say phrases and words, recognize when we say "Ok Google" to improve speech recognition. Google does not speak about the human interaction in the chain of training the AI on speech recognition. For some experts, this is a violation of the new GDPR law.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tutanota:&lt;/strong&gt; How did the employee of the Google subcontractor who leaked the story get in touch with you?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tim:&lt;/strong&gt; By email, he shared his thoughts on an article we wrote about Alexa (Amazon) after Bloomberg broke the news about humans listening.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tutanota:&lt;/strong&gt; Tutanota has recently launched &lt;a href="https://tutanota.com/secure-connect"&gt;Secure Connect&lt;/a&gt;, and you had added this encrypted contact form to your website a few weeks ago. What do you expect from Secure Connect?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tim:&lt;/strong&gt; I hope it will encourage people with a story to get in contact. It does not always need to be a whitsleblower story. Because of security concerns—and other reasons—people are sometimes reluctant to contact a journalist. I hope Secure Connect will help build trust in relationships with journalists.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tutanota:&lt;/strong&gt; More and more journalists are offering Secure Connect so that whistleblowers can drop important information or get in touch with investigative journalists confidentially. Why do you believe a secure communication channel is important?&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/tutanota-interviews-tim-verheyden-journalist-who-broke-story-google-employees-listening" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 07 Aug 2019 14:30:00 +0000</pubDate>
    <dc:creator>Matthias Pfau</dc:creator>
    <guid isPermaLink="false">1340782 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Why Smart Cards Are Smart</title>
  <link>https://www.linuxjournal.com/content/why-smart-cards-are-smart</link>
  <description>  &lt;div data-history-node-id="1340643" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;If you use GPG keys, learn about the benefits to storing them on a smart card.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
GPG has been around for a long time and is used to secure everything
from your email to your software. If you want to send an email to
someone and be sure that no one else can read or modify it, GPG
signing and encryption are the main method you'd use. Distributions use
GPG to sign their packages, so you can feel confident that the ones you
download and install from a package mirror have not been modified from
their original state. Developers in many organizations follow the best
practice of GPG-signing any code they commit to a repository. By signing
their commits, other people can confirm that the changes that claim to
come from a particular developer truly did. Web-based Git front ends
like GitHub and GitLab let users upload their GPG public keys, so when
they do commit signed code, the interface can display to everyone else
that it has been verified.
&lt;/p&gt;

&lt;p&gt;
Yet, all of the security ultimately comes down to the security of
your private key. Once others have access to your private key, they
can perform all of the same GPG tasks as though they were you. This
is why you are prompted to enter a passphrase when you first set up
a GPG key. The idea is that if attackers are able to copy your key,
they still would need to guess your password before they could use the
key. For all of the importance of GPG key security, many people still
just leave their keys in ~/.gnupg directories on their filesystem and
copy that directory over to any systems where they need to use GPG.
&lt;/p&gt;

&lt;p&gt;
There is a better way. With OpenPGP smart cards, you can store your keys on
a secure device that's protected with a PIN and not only store your keys
more securely, but also use them more conveniently. Although some laptops come
with integrated smart card readers, most don't. Thankfully, these devices
are available as part of multi-function USB security token devices from
a number of different vendors, and &lt;em&gt;Linux Journal&lt;/em&gt; has published reviews of such
products in the past. In this article, I discuss
all the reasons OpenPGP smart cards are a better choice for storing
your keys than your local filesystem.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
Reason 1: Tamper-proof Key Storage&lt;/span&gt;

&lt;p&gt;
One of the main benefits of a smart card is that it stores your GPG keys
securely. When you store your keys on a filesystem, anyone who can access
that filesystem can copy off the keys. On a smart card, once keys go in,
they never leave, neither accidentally nor from tampering. The smart card
chips themselves are designed to be tamper-proof and resist attempts to
extract key data even when someone has physical access. By putting keys
on a smart card, you can have a reasonable assurance that your keys are
safe, even from a determined attacker.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/why-smart-cards-are-smart" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 12 Jun 2019 11:30:00 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1340643 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Facebook, Not Microsoft, Is the Main Threat to Open Source</title>
  <link>https://www.linuxjournal.com/content/facebook-not-microsoft-main-threat-open-source</link>
  <description>  &lt;div data-history-node-id="1340607" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/glyn-moody" lang="" about="https://www.linuxjournal.com/users/glyn-moody" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Glyn Moody&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;In the future, Facebook won't be a social-media site.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
Facebook is under a lot of scrutiny and pressure at
the moment. It's accused of helping foreign actors to
subvert elections by using ads and fake accounts to spread lies—&lt;a href="https://www.newyorker.com/magazine/2018/10/01/how-russia-helped-to-swing-the-election-for-trump"&gt;in
the US&lt;/a&gt;, for example—and of acting as a conduit for terrorism in &lt;a href="https://www.nbcnews.com/tech/tech-news/streamed-facebook-spread-youtube-new-zealand-shooting-video-circulates-online-n983726"&gt;New
Zealand&lt;/a&gt; and elsewhere. &lt;a href="https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust"&gt;There
are calls&lt;/a&gt; to &lt;a href="https://www.nbcnews.com/tech/tech-news/elizabeth-warren-calls-break-facebook-google-amazon-n980911"&gt;break
up the company&lt;/a&gt; or at least to rein it in.
&lt;/p&gt;

&lt;p&gt;
In an evident attempt to head off those moves, and to limit the
damage that recent events have caused to Facebook's reputation, Mark
Zuckerberg has been publishing some long, philosophical posts that
attempt to address some of the main criticisms. In his most recent
one, he calls for new regulation of the online world in four areas: &lt;a href="https://www.facebook.com/4/posts/10107013839885441?sfns=mo"&gt;harmful
content, election integrity, privacy and data portability&lt;/a&gt;.
The call for data portability mentions Facebook's support for the &lt;a href="https://datatransferproject.dev/"&gt;Data Transfer Project&lt;/a&gt;.
That's clearly an attempt to counter accusations that Facebook
is monopolistic and closed, and to burnish Facebook's reputation
for supporting openness. Facebook does indeed use and support &lt;a href="https://opensource.facebook.com/"&gt;a large number of open-source
programs&lt;/a&gt;, so to that extent, it's a fair claim.
&lt;/p&gt;

&lt;p&gt;
Zuckerberg' previous post, from the beginning
of March 2019, is much longer, and it outlines an
important shift in how Facebook will work to what he calls &lt;a href="https://www.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/"&gt;"A
Privacy-Focused Vision for Social Networking"&lt;/a&gt;. Greater protection
for privacy is certainly welcome. But, it would be naïve to think that
Zuckerberg's post is simply about that. Once more, it is an attempt to
head off a growing chorus of criticism—in this case, that Facebook
undermines data protection. This is the key idea:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
I believe the future of communication will increasingly shift
to private, encrypted services where people can be confident what they
say to each other stays secure and their messages and content won't
stick around forever.
&lt;/p&gt;&lt;/blockquote&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/facebook-not-microsoft-main-threat-open-source" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 04 Jun 2019 13:24:19 +0000</pubDate>
    <dc:creator>Glyn Moody</dc:creator>
    <guid isPermaLink="false">1340607 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>WebAuthn Web Authentication with YubiKey 5</title>
  <link>https://www.linuxjournal.com/content/webauthn-web-authentication-yubikey-5</link>
  <description>  &lt;div data-history-node-id="1340427" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/todd-jacobs" lang="" about="https://www.linuxjournal.com/users/todd-jacobs" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Todd A. Jacobs&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;A look at the recently released YubiKey 5 hardware
authenticator series and how web authentication with the new
WebAuthn API leverages devices like the YubiKey for painless website
registration and strong user authentication.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
I covered the YubiKey 4 in the May 2016 issue of &lt;em&gt;Linux Journal&lt;/em&gt;, and
the magazine has published a number of other articles on both YubiKeys
and other forms of multi-factor authentication since then.
Yubico recently has introduced the YubiKey 5 line of products. In addition to the
YubiKey's long-time support of multiple security protocols, the most
interesting feature is the product's new support for FIDO2 and WebAuthn.
&lt;/p&gt;

&lt;p&gt;
WebAuthn is an application programming interface (API) for web
authentication. It uses cryptographic "authenticators", such as a YubiKey
5 hardware token to authenticate users, in addition to (or even instead
of) a typical user name/password combination. WebAuthn is currently a
World Wide Web Consortium (W3C) candidate recommendation, and it's already
implemented by major browsers like Chrome and Firefox.
&lt;/p&gt;

&lt;p&gt;
This article provides an overview of the YubiKey 5 series, and then
goes into detail about how the WebAuthn API works. I also look at
how hardware tokens, such as the YubiKey 5 series, hide the complexity of
WebAuthn from users. My goal is to demonstrate how easy it is to use a
YubiKey to register and authenticate with a website without having to
worry about the underlying WebAuthn API.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
About the YubiKey 5 Series&lt;/span&gt;

&lt;p&gt;
The YubiKey 5 series supports a broad range of two-factor and
multi-factor authentication protocols, including:
&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;
Challenge-response (HMAC-SHA1 and Yubico OTP).
&lt;/li&gt;

&lt;li&gt;
Client to Authenticator Protocol (CTAP).
&lt;/li&gt;

&lt;li&gt;
FIDO Universal 2nd-Factor authentication (U2F).
&lt;/li&gt;

&lt;li&gt;
FIDO2.
&lt;/li&gt;

&lt;li&gt;
Open Authorization, HMAC-Based One-Time Password (OATH-HOTP).
&lt;/li&gt;

&lt;li&gt;
Open Authorization, Time-Based One-Time Password (OATH-TOTP).
&lt;/li&gt;

&lt;li&gt;
OpenPGP.
&lt;/li&gt;

&lt;li&gt;
Personal Identity Verification (PIV).
&lt;/li&gt;

&lt;li&gt;
Web Authentication (WebAuthn).
&lt;/li&gt;

&lt;li&gt;
Yubico One-Time Password (OTP).
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
In addition, the entire YubiKey 5 series (with the exception of the
U2F/FIDO2-only Security Key model) now supports OpenPGP public key
cryptography with RSA key sizes up to 4096 bits. This is a notable bump
from the key sizes supported by some earlier models. Yubico's OpenPGP
support also includes an additional slot for an OpenPGP authentication
key for use within an SSH-compatible agent, such as GnuPG's
&lt;code&gt;gpg-agent&lt;/code&gt;.
&lt;/p&gt;

&lt;img src="https://www.linuxjournal.com/sites/default/files/styles/max_650x650/public/u%5Buid%5D/12568f1.jpg" width="650" height="434" alt="""" class="image-max_650x650" /&gt;&lt;p&gt;&lt;em&gt;Figure 1. YubiKey 5 Series&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/webauthn-web-authentication-yubikey-5" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 21 May 2019 12:00:00 +0000</pubDate>
    <dc:creator>Todd A. Jacobs</dc:creator>
    <guid isPermaLink="false">1340427 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Open Source--It's in the Genes</title>
  <link>https://www.linuxjournal.com/content/open-source-its-genes</link>
  <description>  &lt;div data-history-node-id="1340561" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/glyn-moody" lang="" about="https://www.linuxjournal.com/users/glyn-moody" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Glyn Moody&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;What happens when you release 500,000 human genomes as open source?
This.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
&lt;a href="https://books.google.nl/books/about/Digital_Code_of_Life.html?id=Q960CIDzRuIC&amp;redir_esc=y"&gt;DNA
is digital&lt;/a&gt;. The three billion chemical bases that make up the human
genome encode data not in binary, but in a quaternary system, using four
compounds—adenine, cytosine, guanine, thymine—to represent four
genetic "digits": A, C, G and T. Although this came as something of a
surprise in 1953, when Watson and Crick proposed an A–T and C–G pairing as
a "copying mechanism for genetic material" in their &lt;a href="http://www.sns.ias.edu/~tlusty/courses/landmark/WatsonCrick1953.pdf"&gt;famous
double helix paper&lt;/a&gt;, it's hard to see how hereditary information could
have been transmitted efficiently from generation to generation in any
other way. As anyone who has made photocopies of photocopies is aware,
analog systems are bad at loss-free transmission, unlike digital encodings.
Evolution of progressively more complex structures over millions of years
would have been much harder, perhaps impossible, had our genetic material
been stored in a purely analog form.
&lt;/p&gt;

&lt;p&gt;
Although the digital nature of DNA was known more than half a century ago, it
was only after many years of further work that quaternary data could be
extracted at scale. The &lt;a href="https://www.genome.gov/10001772/all-about-the--human-genome-project-hgp/"&gt;Human
Genome Project&lt;/a&gt;, where laboratories around the world pieced together the
three billion bases found in a single human genome, was completed in 2003,
after 13 years of work, for a &lt;a href="https://www.genome.gov/sequencingcosts/"&gt;cost of around $750
million&lt;/a&gt;. However, since then, the cost of sequencing genomes has
fallen—in fact, it has &lt;a href="https://www.genome.gov/sequencingcostsdata"&gt;plummeted even faster
than Moore's Law&lt;/a&gt; for semiconductors. A complete human genome now
can be sequenced for a few hundred dollars, with &lt;a href="https://en.wikipedia.org/wiki/$1,000_genome"&gt;sub-$100 services
expected soon&lt;/a&gt;.
&lt;/p&gt;

&lt;p&gt;
As costs have fallen, new services have sprung up offering to
sequence—at least partially—anyone's genome. Millions have sent
samples of their saliva to companies like 23andMe in order to learn things
about their &lt;a href="https://www.23andme.com/en-eu"&gt;"ancestry, health,
wellness and more"&lt;/a&gt;. It's exciting stuff, but there are big downsides
to using these companies. You may be giving a company the right to use
your DNA for other purposes. That is, you are losing control of the most
personal code there is—the one that created you in the boot-up
process we call gestation. &lt;a href="https://www.bloomberg.com/news/articles/2018-06-15/deleting-your-online-dna-data-is-brutally-difficult"&gt;Deleting
sequenced DNA can be hard&lt;/a&gt;.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/open-source-its-genes" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 06 May 2019 14:06:59 +0000</pubDate>
    <dc:creator>Glyn Moody</dc:creator>
    <guid isPermaLink="false">1340561 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Purism Launches Librem One, a Suite of Privacy-Protecting, No-Track, No-Ad Apps and Services</title>
  <link>https://www.linuxjournal.com/content/purism-launches-librem-one-suite-privacy-protecting-no-track-no-ad-apps-and-services</link>
  <description>  &lt;div data-history-node-id="1340614" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/bryan-lunduke" lang="" about="https://www.linuxjournal.com/users/bryan-lunduke" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Bryan Lunduke&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Some time back, the folks from Purism sent me a question: "Would you like to record some voice-over for a little commercial we're making?"&lt;/p&gt;

&lt;p&gt;"Sure," I say. "Why not?"&lt;/p&gt;

&lt;p&gt;They give me a script, show me a rough cut of the footage, and I record a few lines. Easy peasy.&lt;/p&gt;

&lt;p&gt;The only problem? The commercial was for something that I think is a really great idea. &lt;em&gt;And&lt;/em&gt;, the finished commercial gave me a serious case of the giggles. Yet I couldn't tell anyone about it. I was sworn to secrecy.&lt;/p&gt;

&lt;p&gt;For a person who runs his mouth for a living, secrecy isn't always so easy. Keeping my big, dumb mouth shut was downright painful. Painful, I say!&lt;/p&gt;

&lt;p&gt;Luckily, I can now, as of today, spill the beans without getting into trouble.&lt;/p&gt;

&lt;p&gt;Purism has just launched an online service it has dubbed "&lt;a href="https://librem.one"&gt;Librem One&lt;/a&gt;", which is, as Purism calls it, a "suite of apps and services designed to provide users with convenient alternatives to Big Tech products".&lt;/p&gt;

&lt;p&gt;There are two components of Librem One that are offered free of cost (or, at least, choose your own price): Chat and Social Media.&lt;/p&gt;

&lt;p&gt;The chat component—the aptly named "Librem Chat"—is built on Matrix (which I am also a big fan of) and includes end-to-end encrypted text chat plus audio and video chatting. And, since it's built on Matrix, it has access to all the other users on Matrix out there. Which may not be as big of a user pool as, say, Hangouts or something, but the user base is growing. Quickly.&lt;/p&gt;

&lt;p&gt;The Social Media component is built using Activity Pub and Mastodon (a federated, free software social network system).&lt;/p&gt;

&lt;p&gt;I want to pause right there a moment, because this is really interesting to me.&lt;/p&gt;

&lt;p&gt;That means we now have a social media server that is supported via a subscription model.  Not advertisements. Not data collection. Subscription. Which, in my opinion, is just a much better way to build a social network that respects user data and privacy.&lt;/p&gt;

&lt;p&gt;Plus, this solves one of the biggest problems with picking and utilizing a Mastodon server up until this point—that they've mostly been run by hobbyists in their spare time. Thus, servers could go up or down or lose data at any time (which happened to me more than once). A professionally administered Mastodon social-media server supported as part of a subscription online service? Heck yes.&lt;/p&gt;

&lt;p&gt;Then there are the services that aren't part of the free (in cost) tier, the ones you'll need to pay to gain access to: Librem Mail (encrypted email), Librem Tunnel (a VPN service), and, according to the Purism folks, they have plans to add a few additional services to Librem One in the future:&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/purism-launches-librem-one-suite-privacy-protecting-no-track-no-ad-apps-and-services" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 30 Apr 2019 15:00:07 +0000</pubDate>
    <dc:creator>Bryan Lunduke</dc:creator>
    <guid isPermaLink="false">1340614 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Wizard Kit: How I Protect Myself from Surveillance</title>
  <link>https://www.linuxjournal.com/content/wizard-kit-how-i-protect-myself-surveillance</link>
  <description>  &lt;div data-history-node-id="1340539" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/augustine-fou" lang="" about="https://www.linuxjournal.com/users/augustine-fou" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Augustine Fou&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Ever since the Electronic Frontier Foundation’s&lt;span&gt; &lt;/span&gt;&lt;a href="https://panopticlick.eff.org/"&gt;&lt;u&gt;Panopticlick initiative in 2010&lt;/u&gt;&lt;/a&gt;, I’ve been sensitized to the risks and potential harms that come from adtech’s tracking of consumers. Indeed, in the years since, it has gotten far far worse. People are only now discovering the bad stuff that has been going on. For example, iPhone apps have been secretly recording users' keystrokes (see&lt;span&gt; &lt;/span&gt;&lt;u&gt;&lt;a href="https://www.zdnet.com/article/iphone-snooping-apple-cracks-down-on-apps-that-secretly-record-taps-keystrokes/"&gt;ZDNet, Feb 8, 2019&lt;/a&gt;&lt;/u&gt;), and Android apps with more than 2 billion downloads were committing ad fraud on real humans’ devices behind their backs (see&lt;span&gt; &lt;/span&gt;&lt;a href="https://www.buzzfeednews.com/article/craigsilverman/android-apps-cheetah-mobile-kika-kochava-ad-fraud"&gt;&lt;u&gt;BuzzFeed News, Nov 2018&lt;/u&gt;&lt;/a&gt;). For many more examples of spying on consumers, documented over the years, see&lt;span&gt; &lt;/span&gt;&lt;u&gt;&lt;a href="https://www.peerlyst.com/posts/kinda-obvious-but-know-who-is-spying-on-you-at-all-times-dr-augustine-fou-cybersecurity-ad-fraud-researcher"&gt;Know Who’s Spying on You at All Times&lt;/a&gt;.&lt;/u&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;The popular apps that many humans use continue to track then even if they are logged out, and they also track users who never created an account in the first place (see &lt;u&gt;&lt;a href="https://www.businessinsider.com/facebook-tracks-both-non-users-and-logged-out-users-2018-4/"&gt;Facebook tracks both non-users and logged out users&lt;/a&gt;).&lt;/u&gt; And Google tracks users’ locations even if they turned off location and denied permissions to apps (see &lt;u&gt;&lt;a href="https://www.bloomberg.com/news/articles/2018-08-13/google-tracks-location-data-even-when-users-turn-service-off-ap"&gt;Google Tracks Location Even When Users Turn Service Off&lt;/a&gt;).&lt;/u&gt; Even good apps that never intended to track users may actually be doing so because the SDKs (software development kits) with which they were built may be tracking users and sending data off to others’ servers without their knowledge. Remember the story about the low cost bathroom scale that didn’t work if location was turned off on the smartphone and there was no internet connection? It turns out that the scale was sending data to bare IP addresses that could be traced back to China.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/wizard-kit-how-i-protect-myself-surveillance" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 22 Mar 2019 11:30:00 +0000</pubDate>
    <dc:creator>Augustine Fou</dc:creator>
    <guid isPermaLink="false">1340539 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Spy Games: the NSA and GCHQ Offer Their Software to the Open Source Community</title>
  <link>https://www.linuxjournal.com/content/spy-games-nsa-and-gchq-offer-their-software-open-source-community</link>
  <description>  &lt;div data-history-node-id="1340506" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/david-habusha" lang="" about="https://www.linuxjournal.com/users/david-habusha" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;David Habusha&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Spies worth their salt are generally expected to be good at keeping secrets. With dead drops, encryption, cyanide pills and the like, openly sharing useful information isn’t supposed to be a part of the job description.&lt;/p&gt;

&lt;p&gt;So it caught more than a few of us off guard when a couple years ago, some of the top spy agencies began contributing code to GitHub, making it available to the masses by open-sourcing some of their software.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://code.nsa.gov/"&gt;&lt;u&gt;National Security Agency&lt;/u&gt;&lt;/a&gt;, the American signals intelligence organization that is tasked with the majority of the cyber-snooping, has released two separate pages on GitHub. The first is the NSA's primary account on GitHub that has &lt;a href="https://github.com/nationalsecurityagency"&gt;&lt;u&gt;17 listed repos&lt;/u&gt;&lt;/a&gt;, followed up by its more substantive “&lt;a href="https://github.com/nsacyber"&gt;&lt;u&gt;NSA Cybersecurity&lt;/u&gt;&lt;/a&gt;” page with its 31 repositories.&lt;/p&gt;

&lt;p&gt;Even though the NSA appears to have been posting some of its software as open source since 2017, presumably a result in part of the effort from the US government to make more of the code produced by the USG &lt;a href="https://obamawhitehouse.archives.gov/blog/2016/03/09/leveraging-american-ingenuity-through-reusable-and-open-source-software"&gt;&lt;u&gt;available to the public&lt;/u&gt;&lt;/a&gt;, the agency made news in early January when it announced plans to release a new product to the Open Source community.&lt;/p&gt;

&lt;p&gt;The software is called GHIDRA, and it has been described as a tool for reverse-engineering malware. According to &lt;a href="https://www.bleepingcomputer.com/news/security/nsa-releasing-the-ghidra-reverse-engineering-tool-at-rsaconference/"&gt;&lt;u&gt;reports&lt;/u&gt;&lt;/a&gt;, GHIDRA has been referenced in the past during the Vault7 document leaks and is available for use across all the major operating systems. Those who are curious for more information on this tool and how to use it can catch a glimpse at a demonstration that the NSA has committed to putting on at this year’s RSA conference.&lt;/p&gt;

&lt;p&gt;However, with perhaps less fanfare, it would seem as though it was the Brits who first made the move to take some of their code open source. The British SigInt agency GCHQ released its first piece of open-source tooling with the Gaffer graph database &lt;a href="https://motherboard.vice.com/en_us/article/bmvxdm/gchq-the-uks-secretive-spy-agency-now-has-an-open-source-github-account"&gt;&lt;u&gt;back in 2015&lt;/u&gt;&lt;/a&gt;, beating the Americans by two years. At the time of writing, the good folks at Her Majesty’s cyber-snooping agency have &lt;a href="https://github.com/GCHQ"&gt;&lt;u&gt;39 repositories&lt;/u&gt;&lt;/a&gt; on offer for all to try out, including one called the &lt;u&gt;&lt;a href="https://github.com/gchq/CyberChef"&gt;CyberChef&lt;/a&gt;,&lt;/u&gt; which is billed as the “Cyber Swiss Army Knife—a web app for encryption, encoding, compression, and data analysis”.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/spy-games-nsa-and-gchq-offer-their-software-open-source-community" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 07 Mar 2019 12:30:00 +0000</pubDate>
    <dc:creator>David Habusha</dc:creator>
    <guid isPermaLink="false">1340506 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Privacy, Mine: the Right of Individual Persons, Not of the Data</title>
  <link>https://www.linuxjournal.com/content/privacy-mine-right-individual-persons-not-data</link>
  <description>  &lt;div data-history-node-id="1340497" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/augustine-fou" lang="" about="https://www.linuxjournal.com/users/augustine-fou" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Augustine Fou&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;em&gt;“For true, lasting privacy, we must shift from the ‘privacy policies’ of companies, which spring from data protection laws, to the ‘privacy’ of individual persons, as contemplated by &lt;a href="https://www.google.com/url?q=https://www.un.org/en/universal-declaration-human-rights/&amp;sa=D&amp;ust=1551120952217000"&gt;human rights laws&lt;/a&gt;.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;How do we accomplish this shift?&lt;/p&gt;

&lt;p&gt;TL;DR (in summary)&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;Privacy pertains to the person; “privacy” is the state of being free from public attention and unwanted intrusion.&lt;/li&gt;
	&lt;li&gt;Data is not privacy, but data from or about a person can be private or not private depending on how it’s used, who is using it and who has control of it.&lt;/li&gt;
	&lt;li&gt;In the digital world, a person’s privacy policy is like the clothing that one puts on to signal what data they consider private and what is not private.&lt;/li&gt;
	&lt;li&gt;The companies (sites, apps and so on) that respect a person’s privacy will build relationships with that person over time.&lt;/li&gt;
	&lt;li&gt;The accumulation of trust over time incentivizes good behavior by both parties, to preserve value and not lose it instantly.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;We live in the age of surveillance marketing, where consumers’ privacy is being violated without their knowledge, consent or recourse. Data from and about consumers is collected en masse by ad-tech companies and traded for profit. But few consumers knew about it until things blow up like the Cambridge Analytica/Facebook scandal. Most consumers think they are interacting with the sites they’re visiting or the apps (like Facebook) they’re using, but they aren't aware of the dozens of hidden ad-tech trackers that siphon their data off to other places or the aggressive data collection and cross-device tracking of apps. Not only are they not aware, they also definitely did not give consent to third parties to use, buy and sell their data. They wouldn’t even know who ABCTechCompany was anyway if it asked for consent.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consent Is Not the Same as Permission, But Consumers Are Tricked Anyway&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/privacy-mine-right-individual-persons-not-data" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 27 Feb 2019 13:15:15 +0000</pubDate>
    <dc:creator>Augustine Fou</dc:creator>
    <guid isPermaLink="false">1340497 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
