Rechercher avec Connexions



Bibliothèque Connexions

Articles, livres, documents, périodiques, multi-média

Library Catalogue

Index des Titres

Index des noms d'Auteurs

Index par Objet

Index de Chronologique

Index de Format

Index de Dewey

Index de la Biblioteque du Congrès


Connexions Directory
of Associations & NGOs

Index par Objet

Index par Associations

Selected Articles by
Subject Area

Donate or Volunteer

Votre soutien rend possible notre travail. – Merci de faire un don aujourd’hui.

Volunteer Opportunities and Internships

Protection des donn‚es en ligne
La Bibliotheque Connexions (Editon francais)

Clicking on the title of an item takes you to the bibliographic reference for the resource, which will typically also contain an abstract, a link to the full text if it is available online, and links to related topics in the subject index. Particularly recommended items have a red Connexions logo beside the title.

Search engine optimization
Donate to Connexions
  1. Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
    Resource Type: Article
    First Published: 2015
    Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
  2. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    First Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  3. Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint
    Sources News Release

    Resource Type: Article
    First Published: 2015
    EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
  4. Google doesn't want you to limit its ability to follow you around the internet
    Resource Type: Article
    First Published: 2014
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  5. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
    Resource Type: Article
    First Published: 2014
    Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
  6. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  7. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    First Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  8. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    First Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  9. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  10. Online Survival Kit
    Resource Type: Article
    First Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  11. An Online Tracking Device That’s Virtually Impossible to Block
    Resource Type: Article
    First Published: 2014
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  12. Preparing for a Digital 9/11
    Resource Type: Article
    First Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  13. Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
    Resource Type: Article
    First Published: 2015
    Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal in Atlanta. Some of the more dangerous threats to the public's rights to free expression, access to knowledge, and privacy online are contained in the copyright provisions in the Intellectual Property (IP) chapter. Now that the entire agreement is published, we can see how other chapters of the agreement contain further harmful rules that undermine our rights online and over our digital devices and content.
  14. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    First Published: 2009   Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  15. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    First Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  16. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    First Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.

Experts on Protection des donn‚es en ligne in the Sources Directory

  1. Wikileaks

    Connexions Information Sharing Services

Connexions Library

Catalogue of more than 7,000 books, articles, films, periodicals, websites and other resources.
Indexed by Author, Title, Format, Subject, Dewey number, Library of Congress classification, Year of Publication.
Connexions Directory Associations and NGOs dealing with social and environmental issues — A-Z Index or Subject Index.
For experts and media spokespersons also see the Sources directory and the comprehensive Sources Subject Index.
Links Selected Internet resources featuring information about alternatives.
Calendar Events from across Canada. Also see: Sources Calendar and news releases.
Publicity and Media Resources, publications and articles to help you get publicity and raise awareness. Plus Media Names & Numbers Canadian media directory, the Parliamentary Names & Numbers Canadian government directory, and mailing lists.
Donations Connexions welcomes your support. Your donations make our work possible. Volunteers always welcome.
Mission Connexions exists to support individuals and groups working for freedom and social justice. We work to maintain and make available a record of the theory and practice of people struggling against oppression and for social change. We believe that the more we know about the struggles, victories, and defeats of the past, and about those who took part in them, the better equipped we will be to bring a new world into being. Connexions maintains a physical archive of books and documents, and is engaged in an ongoing project to build and expand an indexed digital archive of documents. We try to feature a wide variety of resources reflecting a diversity of viewpoints and approaches to social change within our overall mandate of support for democracy, civil liberties, freedom of expression, universal human rights, secularism, equality, economic justice, environmental responsibility, and the creation and preservation of community. We are internationalist in our orientation, but as a Canadian-based project we feature an especially extensive collection of Canadian documents and profiles of Canadian activist organizations.