Corey Parker

Corey Parker

Choosing among African safari companies can be overwhelming because there are literally thousands of them in the market. Before you go on the adventure of a lifetime, know how to make an informed, safe, and affordable choice.

Image titled Choose the Best African Safari Operator for Your Safari Step 1

1-Get recommendations from others

Some of the best advice you can get about a safari company is from someone who has been on an African safari with them in the past. There are dozens of websites on the web that list safari trip reports and journals written by previous travelers. Learn from them. It is also a good idea to see their website as usually people have commented on them in the attached blog.


Image titled Choose the Best African Safari Operator for Your Safari Step 2

2- Check their credentials.
Once you have shortlisted safari operators you need to check them out to make sure they are reputable. Here are the associations you can check: KATO - Kenya Association of Tour Operators, TATO - Tanzania Association of Tour Operators, SATSA - Southern Africa Tourism Services Association, TASA - Tours and Safari Association of Namibia, ATA - Africa Travel Association, ATTA - African Travel and Tourism Association, ASTA - American Society of Travel Agents, IATAN - International Airlines Travel Agent Network and APTA - Association for the Promotion of Tourism to Africa.
Image titled Choose the Best African Safari Operator for Your Safari Step 3
3-Ask the right questions.
Find out how many other people will be on your trip. Being crammed into a minibus with twelve other people is not the best way of going on safari. Make sure what it's included and what's not. Try to see the car before booking.
Image titled Choose the Best African Safari Operator for Your Safari Step 4

4-Find out what their payment policies are.

Some operators have a trust that they place your money into before your trip which should protect it if they go into liquidation in the meantime.

Image titled Choose the Best African Safari Operator for Your Safari Step 5

5-Get a clear explanation of their cancellation and refund policy and find out exactly when payments need to be made.

Tips : 

  • Ask your prospective safari operator for recommendations from past clients and then contact them to ask for their views. You can weed out a lot of the fly by nighters like this.


  • When a safari is not fully booked it might not be profitable for the ground operator to run it and your safari could get cancelled for that reason. Find out what the safari companies policy is in a case like this.

Source : wikihow

Friday, 11 November 2016 16:15

The ins and outs of keyword research

When looking for opportunities to grow search traffic, keyword expansions can be valuable. Columnist Amy Bishop discusses when keyword expansions do and do not make sense, along with tips for identifying quality terms.

A great way to expand your PPC account is by performing keyword research in order to uncover untapped opportunities. Keyword research is a key tactic for growing an account — especially new accounts, but even mature accounts can stand to benefit from ongoing expansions.

When keyword research does & does not make sense

Keyword research is sometimes debated as being unnecessary, and it is fair to say that certain methods of keyword research are futile. Back in the day, it wasn’t uncommon to hear search marketers taking pride in the number of keywords managed, but it’s a different ballgame now; keyword counts don’t correlate to positive performance or even account health. All that to say, there’s no need to add keywords just for the sake of adding keywords!

A good goal with keyword research is to try to identify entirely new themes. There may be some room to flesh out existing themes, but there’s only so much expansion on existing keywords before you’ll pass the point of diminishing returns due to lack of volume as keywords become more and more specific or similar to existing terms.

For example, instead of trying to find every possible hyper-specific description of a shirt (“pink polka dotted yellow shirt”), look for other opportunities to branch out, like tapping into “tops” terms, or terms for different types of shirts, like “blouses,” “sweaters,” “tees,” “button-ups,” “sweat shirts,” “fleeces” and “cardigans.”


You can also look for additional qualities or benefits that might have enough volume to be worth expanding into. You may have already exhausted terms to describe warm sweatshirts, but there are other qualities that consumers search for, such as “half-zip,” “pull-over,” or “hoodie.” Identifying new themes for root terms and adjectives will help you to uncover worthwhile keyword expansions.

Beyond that, it helps to check out the keyword search volume estimates to see if keywords are even worth the time. There’s no use cluttering your account with terms that aren’t going to have a real impact — not to mention the waste of time that it would take to organize said keywords into campaigns.

The same can be said for keywords that are really similar to, or possibly even already covered by, keywords that are in your account already. It may make sense on a one-off basis to add keywords of this nature if you intend to set a different bid and/or if you believe that search query matching will make it worthwhile to have both terms.

Be careful about adding these types of keywords in bulk without a plan to keep an eye on performance. Additions of keywords that are highly similar to existing terms should be monitored closely to ensure that the new keywords contribute to incremental gains, as opposed to robbing Peter to pay Paul.


Monitoring the impact of new keywords

In order to monitor performance to ensure that the new keywords are adding value to the account, I highly recommend labeling the new keywords as they are added. Labeling the new keywords allows for quick and easy performance reviews. Furthermore, it is good practice to analyze positive performance, as well as poor performance. Make certain that positive performance of new keywords isn’t to the detriment of existing keywords — or, if it is, then make certain that overall account performance is stronger.

In addition to monitoring keyword performance, I also prefer to get rid of keywords that are flagged for low search volume. Now that keywords can truly be deleted if they haven’t generated impressions, I prefer to get rid of these keywords so that they aren’t cluttering the account. In large accounts, downloading and syncing the account can take quite a bit of time, so there’s no need to further bog it down with unnecessary keywords.

Beware the broad match duplicate keywords

Most advertisers are pretty careful to avoid duplicate keywords to ensure that the same keyword isn’t competing against itself. However, when auditing accounts, I have often found broad match keywords that compete against each other.


Since broad match keywords don’t rely on the order of the terms, two different keywords can still be considered duplicates. For example, the terms yellow rain jacket and rain jacket yellow would compete for the same queries.

Tips for identifying worthwhile keywords

Expand upon your top performers. Take a look at your best performing keywords and search terms to brainstorm additional variations, themes or qualifiers that might bring in incremental volume. Be wary of adding terms that are too close to existing terms — for the reasons given above — but your top performers may help you identify qualifiers that could be used with other root terms. Putting these terms into a keyword research tool may help to cover other relevant terms, as well.

Talk the talk. In order to manage an account well, it’s imperative to understand the business and the industry. These means understanding industry terms and the features, benefits and differentiators. All of these qualifiers can help drive keyword research and open up new themes.

Think like a consumer. There are industry terms and then there are layman’s terms. Sometimes advertisers get so caught up in their own professional terminology that they don’t account for the ways that someone without technical knowledge might seek out their products. This is especially true of B2C. Of course the exception makes the rule, and there are certain instances where it makes sense to maintain an account with only highly specific, technical keywords but generally speaking, there is more volume and therefore more profit (even if at a slightly lower ROAS) in layman’s terms.


Identify gaps in organic traffic. Monitoring Google Analytics organic traffic trends can help to determine areas where organic traffic has decreased, or where there isn’t much traction. If you aren’t already bidding on said terms, you might consider adding them to your paid search accounts to become more aggressive.

Competitive research. Where better to identify industry terms than to look toward your competitors? There are various tools that you can use to look at terms your competitors are bidding on, which can then be compared to your own keyword list to identify opportunities. Don’t limit yourself toward only using paid search tools – you can also use SEO tools to identify keywords based upon analysis of your competitors’ websites, as well.

Source : searchengineland

The darknet (or darkweb/any variation thereof) has an undeniable stigma. Some know the hidden sites to be a gateway to speaking freely. Others use darknet marketplaces to purchase drugs that are safer than those on the street. Another group may use the anonymity to share child pornography. In the words of Ross Ulbricht, “I learned… when you give people freedom, you don’t know what they’ll do with it.”

Researchers from Terbium Labs claim to have found evidence that disputes the majorly negative reputation the darknet has garnered.

Anonymity does not mean criminality,” the study’s landing page displays. “In the industry’s first data-driven, fact-based research report, Terbium Labs analyzes what’s really taking place on the far corners of the Internet.”


Dr. Clare Gollnick and Emily Wilson, according to Engadget, claimed to be the first to conduct such a study. While the exact intention or scope of the claim remains unknown, Terbium Labs is far from the first entity to conduct a scan of onion links. Thanks to the well-known security and privacy researcher Sarah Jamie Lewis, we have OnionScan. And again, thanks to Lewis, we have a list of darknet papers and studies conducted throughout the last decade.

The Terbium Labs paper listed the the full methodology at the end of the paper, but the introduction holds “what you need to know to get started.” To start, Dr. Clare Gollnick and Emily Wilson used data pulled from 400 URLs. The URLs were pulled by an automated crawler over the course of a single day. Each URL, the paper noted, was used as an independent unit.

A team of analysts classified the contents of each URL. The categories were predefined were labeled with one of the following terms: Legal, Explicit, Drugs, Pharmaceuticals, Fraud, Multiple Categories (Illicit), Falsified Documents & Counterfeits, Exploitation, Hacking & Exploits, Weapons, Extremism, Weapons of Mass Destruction, Other Illicit Activity, Unknown/Site Down, Downloadable File.

Legal content made the majority of the 400 domains documented and it mirrored what could be found on the clearnet. According to the study, 6.8% of the legal content was porn. The rest consisted of nothing worthwhile. There were political blogs, graphic design firms, and even forums to discuss erectile dysfunction. The legal content appeared to be seemingly no different than content anywhere else.

After the legal category came everything else.

The majority of the content in the study is simply a description for each of the aforementioned categories. For example:

We defined Drugs as any non-pharmaceutical drug or substance bought or sold for recreational purposes. To provide a more detailed breakdown of the kinds of drugs available on the dark web, we separately classified any Pharmaceuticals available for sale as well. We include marijuana as a drug and not a pharmaceutical for the purposes of this study.

And similarly:

Pharmaceuticals include any kind of drug that a doctor might prescribe, excluding painkillers and their derivatives. For our classification, Pharmaceuticals include ADD/ADHD and anti-anxiety medications, even though these medications are often used recreationally… No prescriptions, unlimited refills, and no questions asked. Dark web pharmacies provide unfettered access to prescription medications, recalled over-the-counter drugs, and unregulated supplements.

Note that in this study, prescription drugs and street drugs were not categorized together.


The study found that the “drugs” category constituted close to 44.5% of the illegal content on the darknet.


Illegal pharmaceuticals only accounted for another 11.9%.


Both categories combined, the study found, made up the majority of the darknet content at around 56%.

For the most part, the remaining categories, save for “Multiple Categories (Illicit),” made little impact. “Weapons” and “Weapons of Mass Destruction,” among others, yielded no results in study. One category stood out to researchers: Exploitation.


Researchers discovered more content depicting the exploitation of children than content in several other categories. The exploitation category was almost as large as the fraud category.


The results of this study should not necessarily be treated as canon. Various scans over the years have had very different results. Most scans with accompanying data have been far more in-depth than this one. This doesn’t change the fact that legal content exists on the darknet. Similarly, this study’s inaccuracies and small sample size do not inherently disqualify other findings.


Sarah Jamie Lewis, on Twitter, pointed out some issues with these types of studies. One-third or more of darknet sites have a duplicate or clone, according to Lewis. In a study like the one from Terbium Labs, pulling any number of duplicates paints an inaccurate picture. Likewise, Lewis wrote that she had never seen a study that did anything other than http-only. Other factors like site ownership and a website’s weight need to be taken into account.

Source : deepdotweb

Google’s Symptom Search is revolutionizing the patient path to treatment, and doctors should embrace this development as an opportunity to provide better care, rather than as a threat to their credibility.

This past week, I was catching up with a friend who told me about a recent life-or-death situation he found himself in.

He had just undergone foot surgery to take care of bone spurs – a pretty standard procedure that offers little cause for concern. After returning home, he found himself experiencing calf pain, yet being the type to grin and bear it, he just decided to ignore it. But soon enough his pain became too intense for even him to hide and his wife grew increasingly concerned.

She decided to join her husband for his post-op appointment with the doctor, assuming he would downplay the severity of his pain. Just as she expected, my friend acted as if nothing was wrong, and the doctor unsurprisingly sent him on his way.

Luckily, she had the wherewithal to whip out her phone and do a Google search on calf pain after foot surgery before they left the office. Her search resulted in multiple possibilities: foot pain, bunion, Deep Vein Thrombosis (DVT), blood clot, and embolism.


After filtering through the options Google presented, she determined that a blood clot could be a major risk to her husband, so she dragged him back into the exam room and asked the doctor if DVT (the technical term for a blood clot in a vein typically found in the leg) was a possibility. With a roll of his eyes, he agreed to give the leg another look.

After further examination, the doctor sent my friend to the hospital for a more in-depth evaluation, and what do you know? Scans revealed a blood clot in his leg.

Given a few more days without treatment, my friend could have easily had larger concerns than calf pain or bone spurs. He was running the risk of losing the leg or even his life.

Thankfully, his wife’s intuition and the resources available while performing a search on Google saved him from a potentially harrowing affair. Once we knew he was going to be alright, my interest immediately turned to her experience with the search process – after all, I’m in digital marketing.

Google Symptom Search and the patient path to treatment

Google’s decision to roll out symptom search comes as a direct response to key changes that have occurred in the patient path to treatment over the past decade or so.


Recent data shows that 43% of consumers rely on the internet as their go-to resource for health-related information – far more than the 14% of people who claim they first turn to doctors. What’s more, the volume of online health queries is rising at a rate of roughly 7% per year.

However, the massive amount of unfiltered, unsubstantiated information available – thanks to sites like WebMD and a growing number of online forums – have made the search for accurate medical advice incredibly difficult. As a result, patients are more likely to stumble across alarmist diagnoses or, conversely, overlook a serious condition.

Symptom search represents a big step forward in the fight against misinformation in the digital patient path to treatment. Currently available only on mobile, the feature allows users to enter just a few symptoms, yielding a short, vetted list of related conditions, possible causes, and treatments.

It’s designed to avoid alarmist diagnoses while focusing on the most likely causes of your condition.

According to Google’s blog, it intends to help users “quickly get to the point where [they] can do more in-depth research on the web or talk to a health professional.”


With more and more patients going online to conduct their own research at the first sign of illness or injury, a streamlined, accurate service like Symptom Search is a welcome addition to a previously convoluted patient journey.

Consumer-driven disruption in healthcare

Of course, symptom search isn’t the only development to emerge out of this shift in the “balance of power.” Digital optimization and on-demand services have become a baseline expectation for consumers in all aspects of day-to-day life (think Uber, Seamless, even Tinder). As a result, the healthcare industry has found itself with little to no say in the matter.

Back in the 1930s, nearly 40% of doctor visits were at-home, but by the early 1980s, the practice had effectively vanished.

Today, the massive proliferation of one-touch, on-demand smartphone services are forcing doctors to bring back the personalized approach – or risk losing patients to others who are more flexible and willing to embrace this trend.

As a result, we’ve seen the emergence of the “Uber-ization” of medical appointments. Companies like Heal, Dispatch, Pager, and MedZed have already been making waves with app-enabled house and in-office calls.

Similarly, remote patient monitoring technologies and startups have taken off in recent years – for example, BeWell Connect, a subsidiary of Viseomed, is using cutting-edge technologies in order to improve the quality of life for patients with conditions that require ongoing monitoring from a physician or specialist.

Its wide range of devices, from thermometers to blood sugar meters to health and fitness trackers, are all connected and managed through a single, intuitive app.


This provides seamless access to vital health information for the entire family, helping patients and caregivers stay one step ahead of health-related issues without having to take on the often untenable cost and time burden of regular in-office visits.

Personal opinions and political leanings aside, recent legislation has also reflected this trend towards a consumer-centric healthcare industry. For example, portions of the Affordable Care Act, such as price transparency requirements and the institution of an online, open-access marketplace, come as a direct response to consumer demand for increased personal control. (See also the federal government’s $30 billion dollar push for electronic health records in 2009).

Here’s a brief glimpse at some of the key markets in which this consumer-driven disruption has already had a demonstrable impact:

  • Consumers have overwhelmingly embraced the wearables and connected devices market, purchasing these products by the millions to improve their overall health and well-being. The wearables market grew to $12.6 billion in 2015, and is predicted to hit $95.3 billion within the next five years.
  • The remote care and patient monitoring technologies markets are booming. Today, 84% of 18-34-year-olds would prefer a mobile-mediated consultation to an office visit, and there will be 3 million remotely-monitored patients by 2019. Moreover, the remote monitoring tech market is expected to reach $20.9 billion by the end of this year.
  • Demand for increased efficiency and price transparency has prompted a surge of venture capital investment into disruptive digital health and biotech startups. Funding topped $16 billion last year, up 34% from 2014.
  • 95% of consumers demand online access to health records, says Accenture, driving cloud adoption and making software a “core competency” for medical companies. In fact, 82% of small practices in urban areas have already switched over to cloud-based EHR systems. What’s more, the widespread interconnection of medical devices could save healthcare $30 billion annually.


Embracing change

Importantly, this apparent shift in the “healthcare power structure,” and the tools that have emerged as a result (i.e., Symptom Search) will never fully negate a medical professional’s expertise or authority, nor are they designed to.

However, as my friend’s story shows, digital technologies and services can be an invaluable preliminary resource for today’s increasingly “active” patients.

Moreover, the canon of medical science is simply too expansive for any one doctor to maintain an encyclopaedic knowledge of every last condition. As such, doctors shouldn’t resist these changes – rather, they should approach them with open arms, recognizing that such developments can actually help improve the accuracy of diagnoses and enhance the overall level of care.

One proponent of this idea, Dr. Bobby Ghaheri, recently published a post on his Facebook accountoutlining a conversation he had with a patient who had conducted his own research online and actually taught him a lesson.

As he tells it, the two of them share a rare condition, and his patient was the first to inform him about cutting-edge research on the topic. As Dr. Ghaheri declares:

“No longer will parents and patients just accept with blind faith everything said by their doctor (nor should they). If mutual cooperation to optimize a patient’s health isn’t embraced, I truly feel like the doctor is failing. We as a medical profession need to suck it up, swallow our egos, and start striving to learn more, regardless of the source of that information.”



I fully agree with Dr. Ghaheri here: technology shouldn’t be viewed as a threat to a doctor’s credibility or an insult to their expertise. So listen to what your patients have to say – worst-case scenario, you correct their misinformation. Best case, you just might save someone’s life.

Source : searchenginewatch

The US presidential election of 2016 will be remembered for many things, but serious discussion of issues probably isn’t one of them.

Yes, some big general public policy problems got mentioned. Immigration is a case in point. But on the whole the campaign was dominated by a focus on personality that was unprecedented, even by the nation’s already low political standards.

The actual decisions the next president will have to quickly make, from how to deal with the continuing conflicts in the Middle East to how to bolster the current slow improvement in the US economy, received an order of magnitude less attention than Hillary Clinton’s emails or Donald Trump’s statements about women.

Thus the actual opening agenda of the 45th president of the United States may remain unusually undefined. 

“I cannot imagine or remember an election that has been less focused on any issue of any substance whatsoever. Instead we have driven ourselves entirely into a popularity contest between the class bully and the teacher’s pet,” says Jeffrey Engel, director of the Center for Presidential History at Southern Methodist University in Dallas.

This popularity contest did occasionally widen into a discussion of larger problems of American life. As Dr. Engel notes, at many points the campaign touched on race, gender, ethnicity, and income inequality. (We’re talking about the months of the general election here, so all you Bernie Sanders voters, please note.)

WikiLeaks’ publication of internal Clinton campaign emails likely stolen by Russian hackers did provide a rare glimpse into the actual internal workings of US public and political operations.

“We’ve seen a whole lot of how the sausage is made in Washington over money and influence,” says Engel.


What didn’t get mentioned much in the Clinton/Trump debates or in Trump rallies or Clinton speeches was the unavoidable choices the next POTUS must make on detailed and boring questions of actual governance.

Take health care. Obamacare is dogged by rising prices and narrowing choices for consumers as insurers back out of market exchanges – what’s the next president going to do? How does the next president envision the evolution of the larger US structure of health providers in the context of the Affordable Care Act’s struggles?

“What are we to make of this relatively small amount of debate on the most significant social legislation of the past half-century?” asked Employment Benefits Advisor, a trade publication for professionals, in an election eve story.

Or employment – the numbers have improved for 73 months straight. How do we keep that going? Donald Trump has offered the traditional Republican response of a tax-cut plan, but it seems perfunctory, and he doesn’t mention it much on the stump. The Clinton campaign has lots of white papers offering such nostrums as increased national infrastructure spending, but how will she get stuff like that passed through a House that is likely to remain in GOP hands, and a Senate that will be Republican or barely Democratic?

There’s been nothing like the austerity versus stimulus debate of the 2008 and 2012 elections and their intervening midterms, asserted liberal economist Paul Krugman recently on his Twitter feed.

“When this election is finally over, I’m planning to celebrate with an orgy of . . . serious policy discussion. Won’t it be great?” tweeted Mr. Krugman in late October.

It’s true that complaining about lack of attention to issues is something of a “gasbag lament,” as Tommy Craggs wrote in Slate earlier this week. It’s the sort of thing that think tank fellows say over finger sandwiches at lunch policy discussions. It’s an editorial board point, a pundit’s perceived problem. Guilty as charged!


But US presidents play many roles. They are comforter-in-chief at times of national crisis. They are cheerleaders and advocates for national innovation. They lead national discussions on important issues.

But they’re also the lead on lots of specific national policy solutions. That’s not necessarily how the Founders designed the US system, with a chief executive who is relatively weak in terms of legislation. It’s how US politics has evolved, though. What will those solutions be? That’s the hole so far in the 2016 discussion.

Source : csmonitor

string of misguided moves has led what once was considered the king of the Internet to spiral downward to the point of irrelevance.

In fact, if it weren’t for bad news (shrinking earnings, invasive hacks) Yahoo wouldn’t be in the news at all, which brings us to the recent news that the company provided and allowed U.S. intelligence agencies to read through Yahoo user emails.

Let’s be clear. We’re not talking about tracking terrorists or undesirables here. We’re talking about Yahoo handing over the right for the US and likely other friendly governments to scan all incoming emails in search of red flag phrases or keywords.

Think about this for a second. All those emails you’ve written and received with discussions about politics and people that were assumed to be private and meant as inside jokes for you and your friends were being filtered through CIA headquarters.

Kind of makes you wonder what you’ve written in the past few years, doesn’t it?

Yahoo was recently hacked exposing people's data
Yahoo was recently hacked exposing people's data

Imagine becoming a person of interest because you make a meaningless comment to your mother, brother or best friend that uses a few unintentionally scary keywords.

Hmmm, that likely puts just about everyone on a government “watch” list.

Everything you write, public or private, not only is now available to be held against you in a court of law – it all becomes part of your “permanent record,” that nasty electronic dossier on you that lives forever in the hands of those who watch.

Yahoo has of course been pummeled in all the headlines for what unfolded.

But Yahoo alone isn’t the problem. They didn’t create the practice of online snooping. That’s been going on just about as long as the Internet itself.

Neither did they elevate the offense. The telecommunications industry led by AT&T, Verizon, Samsung and countless others has been caught infringing on privacy rights numerous times this year.

It is well documented that millions of dollars has changed hands between the US government and large telecoms in exchange for the annual set of communication records of their customers.

Then there’s Facebook.

Facebook has been watching you
Facebook has been watching you

Facebook the 'privacy villain of the year'

Two weeks ago, the European Digital Rights (EDRi), a coalition of civil rights organizations, presented the social media giant with its “privacy villain of the year” award.


Facebook has been looking at all your content, your pictures, contacts, and words since inception. It has experimented with manipulating the content you see and the emotions you express, tracked what you’re playing on your smartphone while digitally identifying you in photos, and much more. Facebook even tracks non-members.

Gmail left the door open from the start
Gmail left the door open from the start

And what about Google?

Google claims it wants to help you in every way possible. They are a search engine, a smart thermostat, a map, a video site, a place to create content and socialize and much more.

The list goes on and on with what they do and offer based on their many acquisitions.

What they don’t tell you in any way obvious, is that they scan every slice of Google that you use. All that information . . . becomes part of your “permanent record.” They argue it’s useful in order to customize your experience.


Google is doing everything they can to subvert your right to be forgotten. They seem to know literally everything you’re doing and what the temperature in your house is.

Remember, this is the same Google that was fined millions of dollars by several different countries when they literally stole IP addresses and WiFi passwords from citizens’ homes as they drove by in their quest to map the world. By this time we are all exhausted by the mind-numbing targeted ads and content we receive. Who is that really useful to? To them of course.

While it lacked the tech back then it doesn't now
While it lacked the tech back then it doesn't now

This isn't a new thing

The real scary part is that in many instances, this was the intention from day one.

Look at the patent Google filed for Gmail in 2005. Google put its cards face up there, spelling out that while it then currently lacked the technology to scan emails and attachments, it left the door open to in the future.


Today they’ve been scanning for years. Data brokers enjoy over 1,500 pieces of data on all of us, thanks to services like Google and Facebook. And now as we’ve learned, it is Yahoo’s turn to offend.

These huge companies I prefer to call “data vacuums.” Their members are products sold to their customers – data brokers, advertisers, and as we often learn later, governments.

They willingly sacrifice their users in exchange for dollars, no matter who the customer. It gives a black eye to technology in general.

This hasn’t been lost on Silicon Valley.

Within 24 hours of the news about Yahoo, companies such as Microsoft, Twitter, and yes, Facebook and Google, quickly denied following any such practice themselves, claiming they would fight such government demands up to the Supreme Court.


While hypocritical in many ways, these tech giants are smart enough to know who butters their bread and that the perception of trust outweighs the reality of it. But isn’t it the government who ultimately ends up with the data if a company is intentionally spying on us and building a huge record about each of us?

WhatsApp is now owned by Facebook
WhatsApp is now owned by Facebook

WhatsApp is tracking you

Ah the irony of it all. A few weeks ago Facebook egregiously announced that they had changed WhatsApp’s privacy policy and are now tracking all WhatsApp members.

Facebook owns WhatsApp, by the way.

For WhatsApp users, you may want to run quickly – because you are now just another data nugget and your privacy, which was the very premise of WhatsApp, has been compromised mercilessly.


In your permanent record they now note who you are talking to, when/what time you are talking with them, and where you are when you are talking with them.

It just seems predictable that at some point some hacker is going to make public all of our permanent records. This could wreak havoc on our jobs, our relationships, our families, and so much more. It is likely – perhaps not today, but certainly in the coming years.

Going forward, incidents such as this latest Yahoo fiasco thankfully increase the demand for user control and privacy as a fundamental right.

People of the world want to have their personal privacy respected, and as Pew Research has recently reported, now more than ever.

The good news is that companies can easily enough produce apps that follow privacy-by-design principles.

I know this in practice. As founder of MeWe, the next-gen social network, we protected users with an industry-exclusive Privacy Bill of Rights.

It has no dossier on users, because it was built with no tracking, no algorithm and no target ads or content.

It is possible.

So what can we learn from Yahoo’s actions?

This whole episode is yet another symptom of an overall disease concerning the lack of privacy online that has spread to all corners of the globe.


Enough is enough already. The best way to cause corporate behavioral changes is to change our behavior as consumers.

We can take action, by terminating our accounts and marching away from these data-grabbing/selling entities and realign ourselves with companies philosophically aligned with the inalienable human privilege that democracy is intended to protect, the right to personal privacy.

Source : mirror

Bryan Cranston, Miley Cyrus and others may be headed overseas if they don’t get their way on Election Day

It's not uncommon for people to joke/threaten about leaving the U.S. if the "wrong" person becomes president. But Donald Trump has Hollywood in such a froth that loads of celebrities are now talking about pulling up stakes. Here's a small collection of them, ranging from silly jokes to serious plans.

Lena Dunham has been one of the most active celebrity Clinton supporters out there, but she saysshe'll move to Canadaif Trump wins: "I know a lovely place in Vancouver, and I can get my work done from there."

While promoting "The Hateful Eight,"Samuel L. Jacksontold Jimmy Kimmelthat in the wake of a Trump victory he would "move my black ass to South Africa."

Trump's Super Tuesday victory in the primaries leftMiley Cyrusdistraught. She hasn't said where she'll go, but promised onInstagramthat "I am moving if this is my president! I don't say things I don't mean!"

Cherhas a history of feuding with Trump even before he announced his candidacy and has been often asked about what she thinks about his attempts to become President.Chertweetedthat if he wins she will "move to Jupiter."

IfCherdoes get a SpaceX flight to another planet, she might haveJon Stewartas her window-seat buddy, as he joked to People Magazine that he “would consider getting in a rocket and going to another planet, because clearly this planet’s gone bonkers.”


Even before Trump officially got nominated, she promised on The View thatshe would leavefor Canada if any Republican got elected: "I literally bought my ticket, I swear."

Natasha Lyonne might not leave the country, but whenasked by Starzwhere she might go, she said she might check herself into a mental hospital.

George Lopez toldTMZthat he would move south of the border if Trump won, and that other Latinos would come with him: "If he wins, he won't have to worry about immigration; we'll all go back."

Al Sharptonsaid in Februarythat he had "reserved his ticket" to leave if Trump won and that he would support anyone necessary to beat him.

"House of Cards" star Neve Campbell is a natural-born Canadian citizen, so for her moving to another country is easy, and she's said she'sready to do it.

Chelsea Handler toldKelly Ripaon "Live!" that her plans to move aren't just words. She has already bought a house in Spain and is ready to go if necessary.

Barbra Streisand has been hitting the campaign trail hard for Hillary, but she too is ready to abandon ship if her campaign fails. She said she would decide between moving to Australia and Canada if Trump takes office.


In the final days of the campaign,Bryan Cranstonadded his name to the exodus list: "I would definitely move. ... It's not real to me that that would happen. I hope to God it won't."

But some threats to leave America are a bit more tongue-in-cheek. Take Spike Lee, who vowed to respond to a Trump victory by "moving back to the republic of Brooklyn."

Source : thewrap

With the Galaxy Note 7 out of the race this holiday season, there are only two new flagship smartphones most people will consider buying this Christmas. That’s Apple’s iPhone 7 or Google’s Pixel. But which one should you choose? 

Every year, the latest iPhone is one of the first handsets many people look at during the holiday shopping season. It represents the best mobile tech Apple can pack in its best-selling product. The same wasn’t necessarily true about Google’s now-dead Nexus phones. But the Pixels are something entirely different. They’re high-end phones that offer the same iPhone design — yes, they’re HTC-built iPhone lookalikes — but they speak Google. The Pixels represent Google’s best mobile product yet, hands down.

So if you’re looking to choose one of the four flagship phones currently available from Apple and Google — that’s the iPhone 7, iPhone 7 Plus, Pixel, and Pixel XL — you’re probably looking for all sorts of complex comparisons to help you make this important decision. After all, this is a very expensive purchase, so you had better make an informed decision.


That’s where this massive infographic comes in handy. It tells you everything you need to know about each of these hot phones in one single place.

Sure, specs alone will never tell the whole story, but this infographic, which was created by MediaKix, is still a very helpful tool for anyone who might be comparing these popular devices. Check it out below.



Source : bgr

Less than a week before the election, alarm bells went off over Hillary Clinton’s perceived “black voter problem.”

new poll conducted by the African American Research Collaborative, which polled 1,200 African-American registered voters representative of the national black voting population — excluding low-propensity voters and focusing on Nevada, Pennsylvania, and Georgia — found that black voters are, in fact, less enthusiastic about voting in the presidential election. Only 20 percent of black voters say they are more excited to vote in 2016 than they were in 2012, compared with 54 percent who said they were more enthusiastic about voting in 2012.

On some level, this confirmsanxiety among Democrats over minority voters, prompted by recent early voting reports in Florida indicating a decrease in black early voter turnout — a trend that could make the swing state more attainable for Republican nominee Donald Trump.

But there is an important distinction here: While enthusiasm is down, the “perceived importance” of voting for the president is higher this year than it was in 2012 — 56 percent of black voters said it was more important to vote in 2016, compared with only 8 percent who said 2012 was more important. In other words, black voters are still committed to casting their ballots this cycle.

That Hillary Clinton may not have the same black early voter turnout as President Barack Obama, our first African-American president, did in 2008 and 2012 is not particularly surprising. “In 2008 and 2012, black voter turnout rose enough to erase the gap in participation between blacks and whites,” early voting expert Barry Burden, a political scientist with the University of Wisconsin Madison, said.

Early voting is a good measure of enthusiasm — and enthusiasm is down among black voters. But that doesn’t mean all hope is lost for the Clinton camp.


As University of Florida early voting expert Daniel Smith pointed out, black early voting in Florida jumped a whole point after the Obamas campaigned for Clinton in the state this week, confirming the AARC findings that Michelle Obama and Barack Obama are the most effective political messengers among black voters.

All this goes to show that it’s important to remember early voting is not a strong indicator of Election Day results, but is a good representation of enthusiasm.

Early voting is a good measure of enthusiasm

Early voting is usually a good measure of enthusiasm; lots of early voters means lots of decided voters.

And while there doesn’t seem to be much enthusiasm for either candidate this year, there is some speculation that people voting against the opposing candidate rather than affirmatively voting for their candidate might bring people to the polls.

When the early voting periods were about to open, University of Florida early voting expert Michael McDonald told CNBC he was watching theHispanic and rural white vote. "There is speculation that Trump's rhetoric could entice Hispanics to vote against him, and there is some evidence in polls that Hispanic voting enthusiasm is running higher than normal," he told CNBC.

His prediction has come to fruition, with record-breaking numbers of Latino voters this year. The same theory can be applied with other demographics of voters, Paul Gronke, a professor of political science at Reed College, said.

"Trump continues to make statements that alienate African-American voters, and he struggles to get beyond 2 percent in some state polls. Under that circumstance, and faced with a well-oiled Democratic [get-out-the-vote] machine, why would African-American voters wait?" Gronke told me in September, noting that Trump also doesn’t seem to have much of an early voter ballot-chasing operation.



According to the AARC poll, black voters do recognize the stakes of the election, and Trump’s dog-whistling to white nationalist voters has resonated negatively among African-American voters.

"All of this might lead to an early electorate that is even more Democratic and more diverse than in the Obama elections — but all of this is contingent on all kinds of assumptions," Gronke said.

Minority voters have become an important demographic for early voting

Put simply: Early voters are decided voters, Gronke told me when early voting started in September. "Individuals who cast an early ballot make up their minds early," he said.

There has been a shift in early voting demographics in the past two decades. "Prior to 2008, these ‘decided’ early voters matched demographic patterns that are well-established in American politics," Gronke said; they were older, educated, wealthier, ideological, and highly partisan. And for the most part, particularly with mail-in voters, these early voters mostly leaned Republican, which can also be attributed to a strong GOP push for mail-in absentee voting in the 1990s and 2000s. Meanwhile, in-person early voters tend to lean more toward Democrats.


Barack Obama’s presidential campaign made a big stride with Democratic in-person early voting in 2008, targeting areas with higher Democratic voter potential — areas that also had higher populations of African-American voters. Black churches used Sunday services to push people to the polls in what they called "souls to the polls" initiatives, University of Wisconsin’s Burden recalls.

In 2012, more restrictive early voting laws also served as a mobilization tool to get out the vote, Gronke notes. “It ended up being nearly impossible to extract out the impact of the laws from the impact of the campaign,” he said.

For the most part, 2016 remains consistent with these trends. Notably, Democrats and the Clinton campaign have focused this year’s efforts on mail-in voting. They have had tangible results in states like Florida, where voter registration between Democrats and Republicans has evened out. While “compared to in-person early voting, absentee voting patterns in Florida do not deviate as much from 2012,” as Burden notes, Republicans don’t lead Democrats with as wide a margin in absentee voting this year.And according to the Clinton campaign, more African Americans requested mail ballots in this election than ever before.

African-American voters haven’t always been billed as typically early voters. But, Gronke notes, in the past two elections black Americans have fit the behavioral profile of a "decided voter."

"There was very little that would change the minds of many African Americans, particularly in 2008, when they had the first opportunity ever to cast a ballot for an African-American presidential candidate," Gronke said. "Why wait?"

Clinton may not have the same pull this year. But it’s still early to tell, and as University of Florida’s McDonald wrote for the Huffington Post Sunday, Democrats still have a lot of unreturned ballots in their hands:



Second, there are 71,700 more Democrats than Republicans who have requested mail ballots but have not returned them. While Democrats typically have a problem with unreturned mail ballots, my sense is given this lopsided number that at some point Democrats will start achieving at least daily parity in the returned mail ballots.

There are limitations to reading the early voting tea leaves

It’s important to remember — as a general scan of contradicting headlines on early voting from the New York Times to Fox News will show you — that it’s still early to say definitively that these early voting numbers indicate final results:

“It is quite difficult to discern what the election results will be from early voting numbers,” Burden said. “The patterns do not tell a coherent national story. … Ballots are coming in at different rates for the parties in each state. The messages appear to differ from one state to the next.”

And as McDonald warns in his weekly update on the early voting numbers for Huffington Post: “These are still early hints of the direction of the election. There is still much time left in the election, and these numbers can be affected by how election officials run the election, campaign strategies to mobilize voters, and voters’ behaviors.”

There are a lot of limitations: States reporting early voting totals don’t always include all counties; some states, like North Carolina, require party registration, while others, like Wisconsin, don’t; and numbers derived from party registrations are fallible. These distinctions can explain some of the early results.

University of Denver political scientist Seth Masket crunched the numbers forFiveThirtyEight on how well early voting numbers predicted the final tally in past elections. He simply concluded, “The relationship is positive, but it’s pretty noisy. In other words, knowing how a party is doing in early voting doesn’t tell you much about how it will do once all the votes are counted.” In fact, he found that looking at early voting numbers in 2012 would give you “wildly misleading” results:

Democrats maintained substantial leads among early voters in North Carolina, Louisiana and West Virginia, and were trailing by a relatively narrow margin in Oklahoma, but still lost those states when all the votes were counted. Republicans won early voters in Pennsylvania and Colorado but lost the final tallies there. Maryland was a safely Democratic state in 2012, but the 75 percent of the early vote that went the Democrats’ way was a far cry from the 63 percent of the total vote they won once voting was finished.

If black voters don’t turn out, it could be a point of concern for the Clinton campaign, but it’s important to recognize that black voters not turning out early does not necessarily mean they will not turn out at all.


Source : vox.com

Make no mistake: Professional and state-sponsored cybercriminals are trying to compromise your identity -- either at home, to steal your money; or at work, to steal your employer’s money, sensitive data, or intellectual property.

Most users know the basics of computer privacy and safety when using the internet, including running HTTPS and two-factor authentication whenever possible, and checking haveibeenpwned.com to verify whether their email addresses or user names and passwords have been compromised by a known attack.

But these days, computer users should go well beyond tightening their social media account settings. The security elite run a variety of programs, tools, and specialized hardware to ensure their privacy and security is as strong as it can be. Here, we take a look at this set of tools, beginning with those that provide the broadest security coverage down to each specific application for a particular purpose. Use any, or all, of these tools to protect your privacy and have the best computer security possible.

Everything starts with a secure device

Good computer security starts with a verified secure device, including safe hardware and a verified and intended boot experience. If either can be manipulated, there is no way higher-level applications can be trusted, no matter how bulletproof their code.

Enter the Trusted Computing Group. Supported by the likes of IBM, Intel, Microsoft, and others, TCG has been instrumental in the creation of open, standard-based secure computing devices and boot pathways, the most popular of which are the Trusted Platform Module (TPM) chip and self-encrypting hard drives. Your secure computing experience begins with TPM.

TPM. The TPM chip provides secure cryptographic functions and storage. It stores trusted measurements and private keys of higher-level processes, enabling encryption keys to be stored in the most secure manner possible for general-purpose computers. With TPM, computers can verify their own boot processes, from the firmware level up. Almost all PC manufacturers offer models with TPM chips. If your privacy is paramount, you’ll want to ensure the device you use has an enabled TPM chip.

UEFI. Universal Extensible Firmware Interface is an open standards firmware specification that replaces the far less secure BIOS firmware chips. When enabled, UEFI 2.3.1 and later allow device manufacturers to “lock” in the device’s originating firmware instructions; any future updates must be signed and validated in order to update the firmware. BIOS, on the other hand, can be corrupted with a minimum number of malicious bytes to “brick” the system and make it unusable until sent back to the manufacturer. Without UEFI, sophisticated malicious code can be installed to bypass all your OS’s security protections.

Unfortunately, there is no way to convert from BIOS to UEFI, if that’s what you have.

Secure operating system boot. Your operating system will need self-checking processes to ensure its intended boot process hasn’t been compromised. UEFI-enabled systems (v.2.3.1 and later) can use UEFI’s Secure Boot process to begin a trusted boot process. Non-UEFI systems may have a similar feature, but it’s important to understand that if the underlying hardware and firmware do not have the necessary self-checking routines built in, upper-level operating system checks cannot be trusted as much.


Secure storage. Any device you use should have secure, default, encrypted storage, for both its primary storage and any removable media storage devices it allows. Local encryption makes it significantly harder for physical attacks to read your personal data. Many of today’s hard drives are self-encrypting, and many OS vendors (including Apple and Microsoft) have software-based drive encryption. Many portable devices offer full-device encryption out of the box. You should not use a device and/or OS that does not enable default storage encryption.

Two-factor authentication. Two-factor authentication is fast becoming a must in today’s world, where passwords are stolen by the hundreds of millions annually. Whenever possible, use and require 2FA for websites storing your personal information or email. If your computing device supports 2FA, turn it on there. When 2FA is required, it ensures an attacker can’t simply guess or steal your password.

(Note that using a single biometric factor, such as a fingerprint, is not even close to being as secure as 2FA. It’s the second factor that gives the strength.)

2FA ensures that an attacker cannot phish you out of your logon credentials as easily as they could if you were using a password alone. Even if they get your password or PIN, they will still have to get the second logon factor: biometric trait, USB device, cellphone, smart card, device, TPM chip, and so on. It has been done, but is significantly more challenging.

Be aware, though, that if an attacker gains total access to the database that authenticates your 2FA logon, they will have the super admin access necessary to access your data without your 2FA credentials.

Logon account lockout. Every device you use should lock itself when a certain number of bad logons have been attempted. The number isn’t important. Any value between 5 and 101 is reasonable enough to keep an attacker from guessing your password or PIN. However, lower values mean that unintentional logons might end up locking you out of your device.


Remote find. Device loss or theft is one of the most common means of data compromise. Most of today’s devices (or OSes) come with a feature, often not enabled by default, to find a lost or stolen device. Real-life stories abound in which people have been able to find their devices, often at a thief’s location, by using remote-find software. Of course, no one should confront a thief. Always get law enforcement involved.

Remote wipe. If you can’t find a lost or stolen device, the next best thing is to remotely wipe all personal data. Not all vendors offer remote wipe, but many, including Apple and Microsoft, do. When activated, the device, which is hopefully already encrypted and protected against unauthorized logons, will either wipe all private data when a certain number of incorrect logons are entered or when instructed to do so upon the next connection to the internet (after being instructed to wipe itself by you).

All of the above provide a foundation for an overall secure computing experience. Without firmware, boot, and storage encryption protection mechanisms, a truly secure computing experience cannot be ensured. But that’s only the start.

True privacy requires a secure network

The most paranoid computer security practitioners want every network connection they use to be secured. And it all starts with a VPN.

Secure VPN. Most of us are familiar with VPNs, from connecting remotely to our work networks. Corporate VPNs provide secure connectivity from your offsite remote location to the company network, but often offer no or limited protection to any other network location.


Many hardware devices and software programs allow you to use a secure VPN no matter where you connect. With these boxes or programs, your network connection is encrypted from your device to your destination, as far as possible. The best VPNs hide your originating information and/or randomly tunnel your connection among many other participating devices, making it harder for eavesdroppers to determine your identity or location.

Tor is the most used, free, secure VPN service available today. Using a Tor-enabled browser, all of your network traffic is routed over randomly selected intermediate nodes, encrypting as much as the traffic as possible. Tens of millions of people rely on Tor to provide a reasonable level of privacy and security. But Tor has many well-known weaknesses, ones that other secure VPN solutions, such as MIT’s Riffle or Freenet are attempting to solve. Most of these attempts, however, are more theoretical than deployed (for example, Riffle) or require opt-in, exclusionary participation to be more secure (such as Freenet). Freenet, for example, will only connect to other participating Freenet nodes (when in “darknet” mode) that you know of in advance. You can’t connect to other people and sites outside of Freenet when in this mode.

Anonymity services. Anonymity services, which may or may not provide VPN as well, are an intermediate proxy that completes a network request on behalf of the user. The user submits his or her connection attempt or browser connection to the anonymity site, which completes the query, obtains the result, and passes it back to the user. Anyone eavesdropping on the destination connection would be more likely to be stopped from tracking beyond the anonymity site, which hides the originator’s information. There are loads of anonymity services available on the web.

Some anonymity sites store your information, and some of these have been compromised or forced by law enforcement to provide user information. Your best bet for privacy is to choose an anonymity site, like Anonymizer, that doesn’t store your information for longer than the current request. Another popular, commercial secure VPN service is HideMyAss.

Anonymity hardware. Some people have attempted to make Tor and Tor-based anonymity easier using specially configured hardware. My favorite is Anonabox (model: anbM6-Pro), which is a portable, Wi-Fi-enabled VPN and Tor router. Instead of having to configure Tor on your computer/device, you can simply use Anonabox instead.


Secure VPNs, anonymity services, and anonymity hardware can enhance your privacy greatly by securing your network connections. But one big note of caution: No device or service offering security and anonymity has proved to be 100 percent secure. Determined adversaries and unlimited resources can probably eavesdrop on your communications and determine your identity. Everyone who uses a secure VPN, anonymity services, or anonymity hardware should communicate with the knowledge that any day their private communications could become public.

Secure applications are a must as well

With a secure device and secure connections, security experts use the most (reasonable) secure applications they can find. Here’s a rundown of some of your best bets for protecting your privacy.

Secure browsing. Tor leads the way for secure, almost end-to-end Internet browsing. When you can’t use Tor or a Tor-like VPN, make sure the browser you use has been set to its most secure settings. You want to prevent unauthorized code (and sometimes legitimate code) from executing without your being aware. If you have Java, uninstall it (if not using it) or make sure critical security patches are applied.

Most browsers now offer “private browsing” modes. Microsoft calls this feature InPrivate; Chrome, Incognito. These modes erase or do not store browsing history locally and are useful in preventing local, unauthorized forensic investigations from being as fruitful.

Use HTTPS for all internet searches (and connections to any website), especially in public locations. Enable your browser’s Do Not Track features. Additional software can prevent your browser experience from being tracked, including browser extensions Adblock Plus, Ghostery, Privacy Badger, or DoNotTrackPlus. Some popular sites try to detect these extensions and block your use of their sites unless you disable them while on their sites.

Secure email. The original “killer app” for the internet, email is well-known for violating user’s privacy. The internet’s original open standard for securing email, S/MIME, is being less used all the time. S/MIME requires each participating user to exchange public encryption keys with other users. This requirement has proved overly daunting for less savvy users of the internet.

These days most corporations that require end-to-end email encryption use commercial email services or appliances that allow secure email to be sent via HTTPS-enabled sites. Most commercial users of these services or devices say they are easy to implement and work with, but can sometimes be very expensive.

On the personal side there are dozens of secure email offerings. The most popular (and widely used in many businesses) is Hushmail. With Hushmail, you either use the Hushmail website to send and receive secure email or install and use a Hushmail email client program (available for desktops and some mobile devices). You can use your own, original email address, which gets proxied through Hushmail’s proxy services, or obtain a Hushmail email address, a cheaper solution.

Secure chat. Most OS- and device-provided chat programs do not offer strong security and privacy. For strong end-to-end security you need to install an additional chat program. Luckily, there are dozens of chat programs, both free and commercial, that claim to offer greater security. Some require installation of a client app; others offer website services. Most require all parties to communicate with the same program or use the same website (or at least the same chat protocol and protection).

Common secure chat programs include ChatCrypt, ChatSecure, and Cryptocat. Most secure chat clients have the same basic features, so pick the one that enables you to communicate with the broadest set of people you need to securely chat with.


Secure payments. Most payment systems are required to store lots of information about you and your purchases, and they are usually required to provide payment or payer details when asked by law enforcement. Even if they aren’t required to provide detailed data to the police or governments, many payment databases are compromised each year by malicious hackers.

Most users wishing for greater payment anonymity on the internet are turning to online cryptocurrencies, such as bitcoin. Users must first buy bitcoins, usually via traditional online payment methods, and must go through bitcoin exchanges to get their bitcoin value back out into traditional currencies. Each exchange into and out of bitcoin typically takes a small payment fee.

Of course, the privacy and anonymity of virtual currencies comes with real risk. They are usually not considered legal currency and may not be provided the same protections under law as “real” currencies. They may also have incredible price volatility, with the value of your holdings potentially jumping or declining by huge margins in a single day. It’s also possible that a single crypto attack could result in permanent, unrecoverable loss. Hackers have been successful in stealing millions of dollars in bitcoins, and sometimes those thefts are not reimbursed by the compromised holders.

As for credit cards, you can buy and use temporary online (or physical) credit cards. Most credit card agencies offer temporary cards, often at slightly high fee rates, which can be used for a temporary set period of time or even one-time use. If a website gets compromised, exposing your temporary credit card, you won’t be at a loss because you’ll never use it again.

Secure file transfers. Probably the only class of applications that offer more alternatives than secure email is secure file transfer. Any program using SSH or SCP allows encrypted and secure file sharing, and there are dozens, if not hundreds, of commercial offerings.

Users who wish to securely share files while also preserving their anonymity have a myriad of choices. One of the most popular commercial services is BTGuard. It provides file anonymity services over the BitTorrent, a very popular peer-to-peer file sharing protocol.


Anything Phil Zimmerman creates. Phil Zimmermann, creator of Pretty Good Privacy (PGP), cares deeply about privacy. He was willing to risk being arrested, imprisoned, and even potentially faced the U.S. death penalty because he strongly believed that everyone on the planet deserved good privacy tools.

Every good and experienced computer security person I know and trust uses PGP. To work with PGP, each participant creates their own private/public key pair and shares their public key with other participants for securely sending files, emails, or other content.

Symantec bought and has supported PGP commercially since 2010, but dozens of open source versions are available and trusted, including OpenPGP. If you don’t have PGP, get it, install it, and use it.

Zimmermann, who was also behind Hushmail, is a co-founder of Silent Circle, which offers secure solutions for a range of technologies. It even offers the Blackphone, which was designed from the ground up to be the most secure, generally accessible cellphone ever. There have been some hacks of the Blackphone, but it still is the cellphone that prizes privacy and security above all other features -- at least as much as one can and still sell the product to the general population.

Whatever Phil Zimmermann creates or promotes can be assured to be well thought out, delivering privacy and security in spades.

Source : infoworld

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media

Finance your Training & Certification with us - Find out how?      Learn more