Handboken Personlig säkerhet (2018)

Genom riskanalyser, aktiva val och medvetna förhållningssätt kan du värna om din personliga säkerhet. I handboken ges exempel på förebyggande åtgärder och skyddsåtgärder som kan användas för att förhindra eller avstyra hotfulla situationer om de skulle uppstå.

Här behandlas allt från hur du kan tänka kring sociala medier till hur du ska agera vid ett eventuellt terrorattentat. Boken är primärt skriven för politiskt aktiva, men råden fungerar lika väl för andra utsatta yrkesgrupper.


Enabling trust for connected vehicles

New technologies for vehicle-to-vehicle (V2V, Car2Car) and vehicle-to-everything (V2X, Car2X) communication enable assisted and autonomous driving, road safety applications, better road utilization and environment protection. Security is crucial for this communication, for safety and privacy reasons. Cyber attacks can threaten the privacy of the driver, damage the physical equipment, and even risk the lives of persons in and around the vehicle.


Messaging Apps: Here’s Why You Should Use Signal

Signal looks and works a lot like other basic messaging apps, so it’s easy to get started. It’s especially convenient if you have friends and family overseas because, like iMessage and WhatsApp, Signal lets you sidestep expensive international SMS fees. It also supports voice and video calls, so you can cut out Skype and FaceTime. You can send pictures, videos, and documents.

It’s available on iOS, Android, and desktop.

Plenty of apps have all that stuff. The thing that actually makes Signal superior is that it’s easy to ensure that the contents of every chat remain private and unable to be read by anyone else.


Why privacy is important, and having ”nothing to hide” is irrelevant

It doesn’t matter if you have “nothing to hide”. Privacy is a right granted to individuals that underpins the freedoms of expression, association and assembly; all of which are essential for a free, democratic society.

Loss of privacy leads to loss of freedom.

Your freedom of expression is threatened by the surveillance of your internet usage – thought patterns and intentions can be extrapolated from your website visits (rightly or wrongly), and the knowledge that you are being surveilled can make you less likely to research a particular topic. You lose that perspective, and your thought can be pushed in one direction as a result. Similarly, when the things you write online, or communicate privately to others, are surveilled, and you self-censor as a result, the rest of us lose your perspective, and the development of further ideas is stifled.

Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.

– Edward Snowden


The Privacy Threat From Always-On Microphones Like the Amazon Echo

It is a significant thing to allow a live microphone in your private space (just as it is to allow them in our public spaces). Once the hardware is in place, and receiving electricity, and connected to the Internet, then you’re reduced to placing your trust in the hands of two things that unfortunately are less than reliable these days: 1) software, and 2) policy.


The House That Spied on Me

In December, I converted my one-bedroom apartment in San Francisco into a “smart home.” I connected as many of my appliances and belongings as I could to the internet: an Amazon Echo, my lights, my coffee maker, my baby monitor, my kid’s toys, my vacuum, my TV, my toothbrush, a photo frame, a sex toy, and even my bed.

I soon discovered that the only thing worse than getting a bad night’s sleep is to subsequently get a report from my bed telling me I got a low score and “missed my sleep goal.”


Kaspersky software ’used by Russian state hackers to trawl for US secrets’

Popular anti-virus software used by hundreds of thousands of people and businesses in Britain was reportedly hijacked by Russian government hackers to trawl for American secrets. <…>

Computer users must give their anti-virus software widespread access to files so they can be scoured for viruses. But such access potentially makes the software a perfect “backdoor” for hackers, according to computer experts. Läs mer