Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
hacker_culture [2024/03/31 16:04]
ntnsndr [10. Security culture]
hacker_culture [2024/03/31 16:23]
ntnsndr [10. Security culture] updating links
Line 222: Line 222:
   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)
  
-**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/Journal/archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspxabout the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​coveryourtracks.eff.org/​) and how they might be mitigated. What do online services you use [make you agree to](https://​privacyspy.org/​)?​ Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.consumerreports.org/issue/data-privacyon [potential threats](https://​coveryourtracks.eff.org/​) and how they might be mitigated. What do online services you use [make you agree to](https://​privacyspy.org/​)?​ Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.
  
 ### 11. Disintermediation ### 11. Disintermediation