Rechercher avec Connexions



Bibliothèque Connexions

Articles, livres, documents, périodiques, multi-média

Library Catalogue

Index des Titres

Index des noms d'Auteurs

Index par Objet

Index de Chronologique

Index de Format

Index de Dewey

Index de la Biblioteque du Congrès


Connexions Directory
of Associations & NGOs

Index par Objet

Index par Associations

Selected Articles by
Subject Area

Donate or Volunteer

Votre soutien rend possible notre travail. – Merci de faire un don aujourd’hui.

Volunteer Opportunities and Internships

Confidentialit‚ sur internet
La Bibliotheque Connexions (Editon francais)

Clicking on the title of an item takes you to the bibliographic reference for the resource, which will typically also contain an abstract, a link to the full text if it is available online, and links to related topics in the subject index. Particularly recommended items have a red Connexions logo beside the title.

Search engine optimization
Donate to Connexions
  1. Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
    Resource Type: Article
    First Published: 2015
    Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
  2. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    First Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  3. Caveat Surfer: Beware When Using Electronic Communication
    Resource Type: Article
    First Published: 2000
    Points about electronic communication and online security.
  4. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    First Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  5. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    First Published: 2014
  6. Fifteen minutes of online anonymity
    Resource Type: Article
    First Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  7. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    First Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  8. Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint
    Sources News Release

    Resource Type: Article
    First Published: 2015
    EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
  9. Google doesn't want you to limit its ability to follow you around the internet
    Resource Type: Article
    First Published: 2014
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  10. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
    Resource Type: Article
    First Published: 2014
    Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
  11. How to Leak to The Intercept
    Resource Type: Article
    First Published: 2015
    Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
  12. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    First Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  13. Information Overload
    Driving a Stake Through the National Security State

    Resource Type: Article
    First Published: 2012
    Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do this, the NSA would have to employ all 15 million unemployed Americans just to begin to look at all those transcripts!
  14. IntelligentSearch.ca
    Resource Type: Website
    First Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  15. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  16. Journalist Security Guide
    Covering the news in a dangerous and changing world

    Resource Type: Article
    First Published: 2012
    This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
  17. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    First Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  18. Metadata - your files talk for you
    Resource Type: Article
    First Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  19. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    First Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  20. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    First Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  21. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  22. Online Survival Kit
    Resource Type: Article
    First Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  23. An Online Tracking Device That’s Virtually Impossible to Block
    Resource Type: Article
    First Published: 2014
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  24. Other Voices: The Connexions Newsletter - March 26, 2015
    Sustainability, ecology, and agriculture

    Resource Type: Serial Publication (Periodical)
    First Published: 2015
    This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issues, "Blue Betrayal," the film "The Future of Food," the Independent Science News website, which focuses on the science of food and agriculture, and the memoir "Journey of an Unrepentant Socialist" by Brewster Kneen, a former farmer and long-time critic of corporate agriculture.
  25. Ours to Hack and To Own
    The Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet

    Resource Type: Book
    First Published: 2016
    The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-century technologies, free from monopoly, exploitation, and surveillance.
  26. Preparing for a Digital 9/11
    Resource Type: Article
    First Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  27. Privacy for the other five billion
    Resource Type: Article
    First Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  28. Profiled
    From Radio to Porn, British Spies Track Web Users' Online Identities

    Resource Type: Article
    First Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  29. Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
    Resource Type: Article
    First Published: 2013
    In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
  30. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    First Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  31. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    First Published: 2009   Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  32. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    First Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  33. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    First Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  34. Surveillance Self-Defense 
    Resource Type: Website
    First Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  35. Ten Steps You Can Take Right Now Against Internet Surveillance
    Resource Type: Article
    First Published: 2013
    One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
  36. Who does that server really serve?
    Resource Type: Article
    First Published: 2010   Published: 2013
    On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
  37. Why I'm Saying Goodbye to Apple, Google and Microsoft 
    I'm putting more trust in communities than corporations

    Resource Type: Article
    First Published: 2015
    Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.

Experts on Confidentialit‚ sur internet in the Sources Directory

  1. Wikileaks

    Connexions Information Sharing Services

Connexions Library

Catalogue of more than 7,000 books, articles, films, periodicals, websites and other resources.
Indexed by Author, Title, Format, Subject, Dewey number, Library of Congress classification, Year of Publication.
Connexions Directory Associations and NGOs dealing with social and environmental issues — A-Z Index or Subject Index.
For experts and media spokespersons also see the Sources directory and the comprehensive Sources Subject Index.
Links Selected Internet resources featuring information about alternatives.
Calendar Events from across Canada. Also see: Sources Calendar and news releases.
Publicity and Media Resources, publications and articles to help you get publicity and raise awareness. Plus Media Names & Numbers Canadian media directory, the Parliamentary Names & Numbers Canadian government directory, and mailing lists.
Donations Connexions welcomes your support. Your donations make our work possible. Volunteers always welcome.
Mission Connexions exists to support individuals and groups working for freedom and social justice. We work to maintain and make available a record of the theory and practice of people struggling against oppression and for social change. We believe that the more we know about the struggles, victories, and defeats of the past, and about those who took part in them, the better equipped we will be to bring a new world into being. Connexions maintains a physical archive of books and documents, and is engaged in an ongoing project to build and expand an indexed digital archive of documents. We try to feature a wide variety of resources reflecting a diversity of viewpoints and approaches to social change within our overall mandate of support for democracy, civil liberties, freedom of expression, universal human rights, secularism, equality, economic justice, environmental responsibility, and the creation and preservation of community. We are internationalist in our orientation, but as a Canadian-based project we feature an especially extensive collection of Canadian documents and profiles of Canadian activist organizations.