This is a temporary home for the Ezine named "In-Security Bytes"
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.


6 months ago
  1. # Content
  2. ## Digital Art
  3. The digital art featured in the In-Security Bytes e-zine will all be contributed by digital artists who wish to have their art published in the ezine. There will be no compensation for the art featured here, but artists will be allowed to insert a URL of their choosing in order to promote either their own projects or a cause of their choice.
  4. The first issue's digital art will focus on data privacy in light of the plethora of data leaks that have transpired within the last decade. As data leaks become more commonplace, it's important that folk be aware of the dangers that these data leaks bring about to those who's info is being leaked. Whether it's your private IP address or your email, it's important that one be wary when sharing personally identifiable information. This is especially true with companies that have a poor track record of security.
  5. Digital art submitted should focus on these aspects of data privacy and informational security and try to take inspiration from the NSA security propaganda posters that inspired the launch of this project. The goal of these digital art pieces is to present data privacy and information security in a palatable and creative way. It's to inspire the eyes as much as it is to inspire the mind. It's to encourage critical thinking about the topics focused on in the issue and frame cyber security in a new way.
  6. ## Written Publications
  7. The written publications featured in the In-Security Bytes e-zine will all be contributed by writers/journalists who wish to have their works published in the e-zine. There will be no compensation for the written pieces featured here, but writers will be allowed to insert a URL of their choosing in order to promote either their own projects or a cause of their choice.
  8. The first issue's written pieces will focus on data privacy topics including, but not limited to, telemetry collection, website analytics, VPNs, and more. As data privacy is becoming more and more difficult to maintain, it seems that data leaks are happening every single week. It's important that pieces be accessible as well as thorough enough that readers feel like they're involving themselves in a new way of thinking about cyber security. The topics writers discuss should be relevant to the common computer user but not so relevant that the topic has been overdone. If the topic _is_ overdone, then it will be presented in a novel way.
  9. The purpose of these pieces will be to educative and informative, while also being fun to consume. The reader should feel like they've got to act now without feeling like they should be scared of the big bad internet. It is not effective, in the long run, to use fear, uncertainty, and doubt, to convince the user to act. These are fleeting emotions that will only last as long as they're reading the e-zine.
  10. ## Letter of Intent
  11. A letter of intent, speaking about the published issue of In-Security Bytes will be included at the beginning of the ezine, after the table of contents. This letter of intent will be a message regarding the primary focus of the published issue, detailing the themes and topics discussed and why they should be considered important to the reader. This letter will be written by Brandon Nolet (myself) and published to contributors to the ezine for critique and suggestions. After the critique period is finished, the letter of intent will be considered "final copy" and will be included in the ezine in that form.
  12. # Licensing
  13. Issues of In-Security Bytes will be published under a CC-BY-NC-SA Creative commons license. This means that you are free to redistribute, modify, and disseminate the e-zine and the works within as long as you publish your version with the same license, give credit to the original author(s), and do not require payment for it. An extended explanation of the license can be found [here]( and [here]( (web).
  14. We're publishing under CC-BY-NC-SA and by extension your work will be published under the same license however copyrights are retained by the owner outside of this publication. Requests can be made by the author of a work to remove it from our publication.