397 liens privés
"""
The Climate Action Tracker (CAT) is an independent scientific analysis produced by four research organisations tracking climate action and global efforts towards the globally agreed aim of holding warming below 2°C, since 2009.
"""
Avec des rapports/données pour chaque pays.
Exemple pour la Chine: http://climateactiontracker.org/countries/china.html
Sans surprise pour l'Arabie Saoudite qui n'a rendu aucun engagement pour la COP21 (tout comme l'Iran, le Qatar, le Venezuela, Angola) . Les hydrocarbures sont leurs principales sources de devise et ces pays n'ont pas intérêt à ce que la transition se fasse rapidement. http://climateactiontracker.org/countries/saudiarabia.html
Le Canada est également un très mauvais élève avec l'extraction de pétrole dans les sables bitumineux de l'Athabasca dans la province d'Alberta https://fr.wikipedia.org/wiki/Sables_bitumineux_de_l'Athabasca#Impacts_environnementaux
http://climateactiontracker.org/countries/canada.html (ctrl+F : tar sands)
"""
In particular, Canada’s extraction of oil from tar sands is expected to contribute to a significant proportion of the emissions increase. Emissions from tar sands have already increased by 79% from 2005 to 61 MtCO2e in 2012, to represent 9% of Canada’s total emissions (Environment Canada, 2014). By 2020, emissions from tar sands will be even more significant, reaching 103 MtCO2e, or 14% of Canada’s total emissions (Environment Canada, 2014).
"""
"""
uMatrix: A point-and-click matrix-based firewall, with many privacy-enhancing tools.
"""
Par le même auteur que uBlock origin.
Par défaut ça bloque tout script tier (dont le domaine n'est pas celui du site visité, enfin c'est plus subtile que ça) et on peut débloquer à la volée.
C'est plus complexe à mettre en oeuvre que uBlock mais complémentaire.
"""
According to the RFID Journal, the devices “range from the size of a grain of sand to a brick. The size depends on whether the tag uses a battery to broadcast a signal or simply reflects a signal back from the reader.” There are various types of RFID tags. The tags installed in clothing are typically passive, which have no battery, but can be “turned on” by an outside source. This is the same technology used by Easy Pass tolls on the freeways. These tags can be scanned by anyone with a scanner tuned to the corresponding signal. This signal — pulsing form the RFID chip — cannot be turned off, even if removed from the clothing. These tags provide a potent method for tracking people as they walk sales floors.
"""
L'article parle de puces RFID passives de la taille d'un gros grain de sable placées dans des vêtements. Utilisées à des fin d'inventaire/logistique, elles pourraient être exploitées (ou c'est déja le cas et alors j'ai mal lu) pour tracer des individus à l'aide de bornes RFID positionnées dans des lieux stratégiques.
Après le "spyware", voici le "spywear".
"""
Why use it
The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools to monitor and manipulate communications from a parked car in your residential neighborhood; notably for stealing passwords or credit card data from people nearby who make purchases on their phones.
The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them traceless. This app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking.
"""
"""
As reported by The Guardian [http://www.theguardian.com/technology/2015/aug/03/privacy-smartphones-battery-life], a paper entitled The Leaking Battery [http://eprint.iacr.org/2015/616.pdf] by Belgian and French privacy and security experts say that the API can be used in device fingerprinting. The API can be used to determine the capacity of a website visitor's battery, as well as its current charge level, and the length of time it will take to fully discharge. When combined, these pieces of information create a unique identifier which can be used like a supercookie.
"""
"""
At a high-level, Security Monkey consists of the following components:
Watcher - The component that monitors a given AWS account and technology (e.g. S3, IAM, EC2). The Watcher detects and records changes to configurations. So, if a new IAM user is created or if an S3 bucket policy changes, the Watcher will detect this and store the change in Security Monkey’s database.
Notifier - The component that lets a user or group of users know when a particular item has changed. This component also provides notification based on the triggering of audit rules.
Auditor - Component that executes a set of business rules against an AWS configuration to determine the level of risk associated with the configuration. For example, a rule may look for a security group with a rule allowing ingress from 0.0.0.0/0 (meaning the security group is open to the Internet). Or, a rule may look for an S3 policy that allows access from an unknown AWS account (meaning you may be unintentionally sharing the data stored in your S3 bucket). Security Monkey has a number of built-in rules included, and users are free to add their own rules.
"""
"""
At a high-level, Security Monkey consists of the following components:
Watcher - The component that monitors a given AWS account and technology (e.g. S3, IAM, EC2). The Watcher detects and records changes to configurations. So, if a new IAM user is created or if an S3 bucket policy changes, the Watcher will detect this and store the change in Security Monkey’s database.
Notifier - The component that lets a user or group of users know when a particular item has changed. This component also provides notification based on the triggering of audit rules.
Auditor - Component that executes a set of business rules against an AWS configuration to determine the level of risk associated with the configuration. For example, a rule may look for a security group with a rule allowing ingress from 0.0.0.0/0 (meaning the security group is open to the Internet). Or, a rule may look for an S3 policy that allows access from an unknown AWS account (meaning you may be unintentionally sharing the data stored in your S3 bucket). Security Monkey has a number of built-in rules included, and users are free to add their own rules.
"""
udp://tracker.openbittorrent.com:80/announce
udp://tracker.publicbt.com:80/announce
udp://open.demonii.com:1337/announce
udp://tracker.istole.it:80/announce
udp://tracker.prq.to/announce