I've only ever sent one PGP encrypted email, and I've already forgotten how to do it.
I'm going to re-learn how to do it, and meticulously document the process, with commands and screenshots.
Then, I'm going to isolate concrete usability advancements to make the process easier for more people ... Read More
Unhosted.org apps are webapps that can be run from a local html file (i.e. they don't have to be hosted anywhere). They can also make use of storage APIs (e.g. localStorage/Dropbox) to allow persistent file storage.
The privacy benefit of this methodology is that no user data is sent to the app s... Read More
The modern economy is fueled by personal data. People have a valid expectation - and sometime a legal right - to know who has what data personal data about them.
Today, there is no way to discover or request this information about you from all who have it.
[Cle... Read More
Congratulations to the winners! We are proud of our final product and hope to continue working on it to help victims and increase awareness of the policy issues underlying revenge porn publication online.
... Read More
The Legal Hack:
Through privacy principles and privacy instruments, companies are required to be "open," and to provide notice about the control and use of an individual's data.
This Hack will use the Legal Map of Consent Laws to build a Consent Receipt architecture, which asks for specifi... Read More
In jurisdictions (Like the EU and Canada) and now in California it is not legal to track people without consent or notice). The challenge is to make use of the Pre Hackathon Consent Legal Map to create a physical do not track sign for the entrance into public (and semi public) spaces.
At this ... Read More
We'll develop a tool kit for enhancing your operational security. What do we need?
To start, our tool kit will include (and you can install on your own computers):
Basic encryption (GPG) for email--including key signing party!
HTTPS Everywhere for your browser--explore what happens wh... Read More
As a peer-to-peer transaction, cryptocurrencies are inherently more private than any payment system that exists today, though the transactions themselves are public.
I'd like to draft a legal and technical guide to financial privacy, including what Know Your Customer laws apply to which cryptocur... Read More
We've all been talking about iconified privacy policies for years now, let's work on building these tools.
Using existing icons (Mozilla, Disconnect KnowPrivacy, whichever), we can work on:
This is a challenge to create a common consent legal map of consent laws by jurisdiction. Something that projects can use to hack with.
Project Lead: Mary Hodder (from Customer Commons)
If you are interested in how this map might help your hack project
Join the [#legalhack IRC](http:/... Read More
Outsourcing personal identifiable data operations in a secure-by-design environment.
Once personal data is transmitted, no matter what security measures are in place, it can be compromised. Further more, once transmitted, there are no means to guarantee undoing the operation. Personal data opera... Read More
Allow volunteers to sign up for events where the data is held encrypted at rest. Organizers can hold unencrypted data on their personal devices. Should offer protect from the third party doctrine for who signed up for an event.... Read More
Cookie Jar is a Google Chrome Extension. Cookie Jar keeps your cookies in a cloud server.
Enjoy ultimate security by keeping your cookies offsite.
Browse freely and keep your history available when not using Cookie Jar so you can have all the security of private browsing with all the benefits... Read More
We'd like to use the CSV file provided by Docracy to see what kinds of changes in privacy policies have occurred around the "permitted government disclosure" clauses, in light of Snowden etc.
We want to graze the changes and look for meaningful phenomena.... Read More
Notifies users of new ToS revisions for selected websites since the last time the site was visited. Then the differences between the old and new ToS text are shown on a resulting webpage (highlighting the deleted text with red and the additions with green).
link to team repository: https://githu... Read More