More than questions of funding and sponsorship, Freedom House’s ‘Freedom on the Net’ report needs to be open about the problems with its methodology and approach to defining and measuring challenges to the Internet.
Even if offenders purchase new phones, they will be betrayed by their associations to others in the network.
Under the terms of a new deal, a Deutsche Telekom subsidiary will hold Microsoft customer data in “trust” in Germany, thus putting it out of reach of US government subpoenas
From a professional perspective, no longer can producers of video content think about a singular platform, but must make sure that the content is available across a number of platforms, in a number of formats, which all have individual specifications.
Every time you read an article on The New York Times, your browsing history could be disseminated to as many as 44 third-party domains.
Today is Hollywood actor Hedy Lamarr’s 101st birthday. It is being celebrated not only by movie fans but telecom engineers all over the world. Why could that be? Hedy Lamarr was born Hedwig Eva Marie Kiesler, and hit headlines as an actress with a nude swimming scene in […]
The all-too-familiar tale of digital disruption that we’ve seen play out in television, transportation, accommodation and music hasn’t quite applied to the printed word.
SelfCompileApp isn’t artificially intelligent but it is remarkably deadly because it could push already-nervous civil-servants over the edge.
As technology critic Evgeny Morozov points out, this is welfarism funded by clicks and not taxes and is accompanied by the erosion of citizen privacy and public interest.
Genetic engineering and horizontal gene transfer are phrases that have been used with delight by scare-mongers with limited appreciation of subtleties essential to their understanding.
India needs to steer international policy discussions at the World Summit on Information Society review to align with its domestic policy priorities.
At the heart of the new cyber-weapons problem is the forced confrontation of our historically most effective forms of defence with their own limitations.
If companies like Facebook, Google and Microsoft stand to earn revenues from Digital India, they should be made to contribute to the Universal Service Obligation fund which, in turn, can be used to advance public interest in specific ways.
It’s time the government standardised its communications online and made relevant information available and intuitively accessible.
Narendra Modi will be mistaken if he thinks American companies will treat the NDA differently from the previous regime.
Modi’s one-hour long speech, which was peppered with jokes, rhetorical flourishes and history lessons, was a logical culmination of his Silicon Valley and US tour.
With a strong emotional pitch, softball questions and Facebook HQ as friendly ground, the PM hits a home run – with one eye firmly on home
Modi’s method of reaching out to Silicon Valley marks a sharp difference with the approach of Chinese President Xi Jinping.
Before it was quickly retracted, the draft National Encryption Policy’s recommendations were so intrusive on privacy that they were as good as saying “don’t use encryption”.
Inspired by the disclosures of NSA whistleblower Edward Snowden, a campaign for a new global treaty against government mass surveillance was launched today in New York City.
Wales answers questions on zero-rating and net-neutrality, how digital connectivity will play a role in achieving global development, and access to openly available content.
The problem with a master key is ensuring it stays safe and secret. If someone were able to find out what the key is, then the secure system is completely broken.
Volkswagen has set aside €6.5 billion to cover the costs of the growing scandal over cheating on emissions tests in the US. Putting a number on the cost further down line will be far harder, however, as it is a crisis which calls into question the ethical credentials […]
The larger issue is that the NDA government, of late, has shown a pronounced tendency to use use a sledgehammer to kill a fly.
While it was still ‘alive’, the policy was widely panned for being ambiguous at best and for suggesting the government wanted to assume an autocratic stance on access to encrypted information.
Users of social networks in general, and of social networking kingpin Facebook in particular, are ill-equipped to evaluate the price they’re paying in this trade.
The department proposes some practices that effectively run counter to the philosophy of encryption – of data as well as devices.
Going after companies like Hacking Team alone is meaningless because they fulfil a need, albeit one we may not have fully understood but whose legitimacy manifests from time to time.
In the post-9/11 period, if a captured terrorist was found to possess an F-91W, the person was assumed to have been trained in bomb-making.
Article updated. The collaborative coding platform GitHub became the subject of a DDoS attack on August 25, its second this year after having been targeted by a massive attack in March. The issue first appeared at 3.05 pm IST, according to GitHub’s status log, when administrators began inspecting “connectivity […]
Get up to speed on the day’s top news.
The names of various prominent figures appearing in the data base have already been published, some of whom insist they never used the site.
Fair warning: ACAT works only on PCs running Windows 7 or higher.
People have till August 20 to comment on the draft bill, criticised by many as compromising privacy rights.
One of the documents even goes as far as to “highlight [AT&T’s] extreme willingness to help with NSA’s SIGINT and Cyber missions”.
While the movement in March elicited surprise from observers for being so passionate and widespread, it drew flak soon after for projecting net neutrality as a monolithic entity devoid of gray areas.
The judge was keen to protect consumers from so-called “speculative invoicing”, where copyright owners send offers to settle claims for grossly disproportionate amounts.
For developing countries, universal Internet access has become a checkbox that must be ticked as they move toward a more developed future. Sadly, ‘abstract’ notions such as online privacy are of no immediate concern to them.
The government remains evasive on the question of whether it will implement a privacy law safeguarding the information it collects from its citizens.
Stampede at Jharkhand temple kills 11 A stampede occurred near a Durga temple at Belabagan, 350 kilometres from Ranchi at 5 am on Monday. Devotees who were trying to break the queue caused a commotion, which led to the stampede. The injured are currently being treated at a nearby hospital. Chief […]