Blog Posts Tagged with "Anonymization"

65be44ae7088566069cc3bef454174a7

Six Good Reasons to De-Identify Data

May 08, 2012 Added by:Rebecca Herold

Even though it sounds complicated there are many good methods you can use to accomplish de-identification. The great thing is, under many legal constructs de-identification is an acceptable way to use personal information for purposes beyond which the personal data was collected...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Vague Cybersecurity Legislation Threatens Civil Liberties

April 02, 2012 Added by:Electronic Frontier Foundation

Using cryptography to protect communications could be taken as a way to defeat an operational control. Measuring the performance of one's ISP or analyzing whether packets are being modified maliciously could all be seen as security threats under this definition...

Comments  (1)