User Tools

Site Tools


systems:security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Last revisionBoth sides next revision
systems:security [2013/11/18 23:43] – created superwizardsystems:security [2016/12/25 20:59] superwizard
Line 1: Line 1:
 +====== VPN reviews and comparison charts ======
 +
 +From: https://thatoneprivacysite.net/vpn-comparison-chart/
 +
 +<code>
 +Excellent VPN reviews
 +</code>
 +
 +====== Tools and knowledge for privacy ======
 +
 +From: https://www.privacytools.io/
 +
 +<code>
 +You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities.
 +
 +Recommended VPN services and other stuff
 +</code>
 +
 ====== Say Goodbye to the Password ====== ====== Say Goodbye to the Password ======
  
Line 14: Line 32:
     But instead of having to read the password off the token and retype it, employees can simply plug     But instead of having to read the password off the token and retype it, employees can simply plug
     the token into a USB port or touch it on a mobile device using near-field communication     the token into a USB port or touch it on a mobile device using near-field communication
 +    
 +    risk-based authentication. This technology sifts through masses of user data from various groups 
 +    at a company to establish "normal" behavior, then assigns risk scores to each user.
 +    
 +    Test subjects in the research wore a headset that measured their brain-wave signals as they imagined 
 +    performing a particular task, and the researchers were able to distinguish between different people 
 +    with 99% accuracy.
 +    
 +    London-based PixelPin Ltd., meanwhile, wants to replace passwords with pictures. Choose a picture of 
 +    your spouse, for example, and log in by clicking on four parts of her face in a sequence you've memorized
systems/security.txt · Last modified: 2019/03/30 05:03 by superwizard