I need to make a dataset differentially private on which regression, which in more general sense could be extended to learning any model, is to be performed. I need to calculate the global sensitivity for adding noise. How do I calculate global sensitivity in such cases.
When installing Kali from Microsoft Store, I wasn’t prompted with a user agreement license.
Is Microsoft able to monitor my applications? How safe is it to use WSL in that context? (From privacy perspective)
As much as I have understood,for any query
f(x), we need to take maximum of
|f(x)-f(y)| over all neighboring databases.
please explain how to find global sensitivity of queries like average height or maximum height.
For making an (until now, un-) educated guess about the necessity of spending the effort of including the "Bluetooth LE Privacy" feature in a consumer, embedded device’s BT software, I am seeking information about the "necessity" from an information security standpoint of offering this feature – is it useful? does it really solve a security issue or is it already broken?
The BT SIG itself is fairly quiet about this feature besides well-worded blog posts, so shedding a little light on this would help tremendously in making the decision to "go the extra mile" or just leave it aside.
I’m a fan of Visual Studio, and recently installed VSC on my Linux Mint. However recently I did a deep-dive on Richard Stallman’s site reading about just how evil and depraved all the big tech companies are, including Microsoft (not that I didn’t already know that these companies are evil, I just didn’t realise the extent of their depravity).
Now I’m feeling edgy about having VSC on my machine. I’m security and privacy conscious, and use TOR browser often. I read recently that on Windows 10 machines, opening certain files through TOR browser reveals your real IP to Microsoft. This being the case, I’m wary of having microsoft software installed on my machine.
I was wondering what the risks are if I keep VSC installed on my Linux Mint 19? How can I confirm that this program is "sandboxed"? I don’t want it spying on me. What sort of information is it known to transmit to Microsoft, and what other information could it potentially be collecting without my knowledge?
Forgive me if this is a stupid question. I’m not sure how to do an independent investigation which is why I want to come here and ask the experts. If no one knows a direct answer to my question, I will still upvote pointers as to how I could investigate it independently. (I haven’t confirmed this, but knowing microsoft, VSC is closed-source, which obviously makes the job much harder)
I’m studying Auth0 and I would like to know if using a third party application like this for authentication and authorization can be a problem for privacy and data confidentiality.
Is the main site account of an Add-On Domain visible in any way? For example, my site: https://bonafidebankruptcy.com/ is an Add-On Domain, but I don't want random people to know that. Do I need to get a different level of hosting or do anything else to keep it separate?
When I search my website in google, all the pages and posts can see. I want to make only homepage visible in search results and remove other pages(privacy, contact etc). And also all the posts can visible without snippet. I want to fix this. Please help me. enter image description here
I am evaluating options to choose email providers for a HIPAA compliant web application. I understand that, if the email contains any form of PHI, it would be violating the HIPAA rule especially if the email is not encrypted.
What if the email that is been sent only contain a link to login and nothing else ? Would it still be violation of HIPAA ? I am concerned about the part that email being identified as PHI from the list of PHI’s. So, would the recipient email address itself would be considered as a PHI and violate HIPAA ?
I shall begin my question with the remark that I am not tech savvy at all!
The problem is the following:
A cluster of computers (laptops, desktops, etc.) A, B, C, D… are all connected to the same router. Let’s say my computer is computer A and I am a guest at big brother Bob’s home, who owns the router and computers B, C, D…
Assuming Bob has no physical access to my computer but can access the other computers, is there a way to prevent Bob from knowing what I am doing on the internet, or even better, to completely hide from Bob that I used internet at all? (short of his contacting his ISP and demanding a report or something which would take a non-trivial amount of time and assuming I don’t download anything or watch HD videos which could show up as a sudden spike of consumption)
When it comes to hiding the names of websites I visit and internet searches, according to some research it seems like Tor does a good job in hiding it completely, even if the ISP is contacted. However, can Bob determine quickly (i.e. without contacting his ISP, using some cmd dark arts) that computer A has connected to a Tor node at all without physically accessing computer A? (Let’s say it’s not in the cluster anymore when Bob does his checks)
According to further research it seems to be impossible to get the internet history of all connected devices to a router without access to the devices, but I am unsure and opinions seem to vary somewhat.
TL;DR I’m basically looking for a way to make my internet usage as inconspicuous as possible during a very specific time period when indirectly connected to other computers via a router I don’t own, is using Tor the best thing I can do in this situation to maximize privacy?