![]() ![]() And this has become something possible at an affordable price ( VPS, Raspberry Pi at home, etc.). Some other applications are meant to ease self-hosting services such as email, cloud file storage, calendar, which definitely is a good way of protecting one’s privacy. These tools might be new, but the actual technology has been around for a while, essentially solid encryption standards such as PGP, RSA, AES and so on. Still, both share a common thing: the sake of privacy for which some tools try to propose a solution to. ![]() These are however two different topics: in the first case people want to avoid being watched by their governments, and in the second case people want to take control back over their digital life, a control they willingly relinquished to some companies that do not have privacy protection in their genes. It also brought to light the general matter of online privacy at stake in a GAFAM world ( GAFAM = Google Apple Facebook Amazon Microsoft). In the wake of Edward Snowden revelations on the NSA program, focus progressively increased on various tools aiming at escaping governments and various intelligence agencies mass surveillance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |