You are not logged in. LOG IN NOW >

First POST: Messaging

BY Micah L. Sifry | Wednesday, April 30 2014

How Americans are(n't) responding to the dangers of the Heartbleed bug; mobile politicking's unconquered territory; how some of Silicon Valley is embracing the "nerd prom"; and much, much more. Read More

The Server Fights Back: Calyx Foundation Bakes in Security With Experiment

BY Sam Roudman | Thursday, February 13 2014

Nick Merrill of the Calyx Institute

Secure communication online is possible; it’s still just really hard. Take for instance secure chat tools. Jabber (aka XMPP) is a chat protocol that has been a part of facebook chat and gchat over the years, but although it features a number of extensions that allow for encryption, there’s no guarantee they’ll get used, or that users will even know they exist. A server experiment by Nick Merrill at the Calyx Institute hints that the secret to greater adoption might be a matter of employing a behavioral insight enunciated by noted technology scholars DEVO in 1980: freedom of choice is what you got, freedom from choice is what you want. Read More

First POST: Exploitable

BY Micah L. Sifry | Friday, September 6 2013

Exclusively for Personal Democracy Plus subscribers: How the NSA is breaking the Internet; a peek at the inside of the GOP's new Data Center; campaign contributions in bitcoin; and much, much more. Read More

Middle Eastern Bloggers May Be Unprepared for Online Security Threats, Study Finds

BY Nick Judd | Tuesday, August 2 2011

In the face of increasing threats to their safety and their ability to publish, bloggers in the Middle East don't have a firm grasp on how to protect themselves online, according to survey results released yesterday by ... Read More

Fear Not, Flathead County Residents: Your Government Data is Insured Against the Lulz

BY Nick Judd | Monday, June 27 2011

Flathead County, Montana, has secured insurance against its databases being hacked. In an age where Citibank and Sony Entertainment cannot protect their users' confidential data, it seems that no one, truly no one, can ... Read More