|
Internet Privacy
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Results36 Connexions Library1 Sources Experts & Spokespersons 24 Sources Library 1 From the Connexions Archives Connexions LibraryAdblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web Eckersley,Peter; Toner,Alan Article 2015 Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy. Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public Article 2013 There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be... Caveat Surfer: Beware When Using Electronic Communication Cowan, Kirsten Article 2000 Points about electronic communication and online security. Complaints filed against telecom companies for their role in UK mass surveillance programme Privacy International Article 2013 On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ... Fifteen minutes of online anonymity Manach, Jean-Marc Article 2013 Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ... GCHQ and European spy agencies worked together on mass surveillance Borger, Julian Article 2013 Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies. Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint : Sources News Release Article 2015 EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools Google doesn't want you to limit its ability to follow you around the internet Article 2014 Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox Article 2014 Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying... How to Leak to The Intercept Lee, Micah Article 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely. Improve your privacy and security on the Internet using Tor Article 2013 This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network Information Overload: Driving a Stake Through the National Security State Lindorff, Dave Article 2012 Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi... 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy Solove, Daniel J. Article 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai... Journalist Security Guide: Covering the news in a dangerous and changing world Smyth, Frank Article 2012 This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience. Lessons of the Snowden Revelations: You are the Target! Lopez, Alfredo Article 2013 We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing... Metadata - your files talk for you Article 2013 Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t... NSA and GCHQ target Tor network that protects anonymity of web users Ball, James; Schneier, Bruce; Greenwald, Glenn Article 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun... The NSA Has Effectively Destroyed Internet Privacy: Snowden's Latest Lopez, Alfredo Article 2013 Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy... The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored Lopez, Alfredo Article 2013 The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone... Online Survival Kit Article 2013 This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov... An Online Tracking Device That’s Virtually Impossible to Block Angwin, Julia Article 2014 A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn. Other Voices: The Connexions Newsletter - March 26, 2015: Sustainability, ecology, and agriculture Diemer, Ulli (editor); Khan, Tahmid (production) Serial Publication (Periodical) 2015 This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issue... Ours to Hack and To Own: The Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet Scholz, Trebor; Schneider, Nathan Book 2016 The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-ce... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Privacy for the other five billion Donovan, Kevin; Nyst, Carly Article 2013 Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities Gallagher, Ryan Article 2015 Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov... Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance Rogoff, Zak Article 2013 In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom." Protect Yourself from Electronic Spying with Surveillance Self-Defense: Sources News Release Article 2014 The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ... 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help Eckersley, Peter Article 2009 The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ... Six Tips to Protect Your Search Privacy Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek Article 2006 Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h... Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection Quigley, Bill Article 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho... Surveillance Self-Defense Website 2018 Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill... Ten Steps You Can Take Right Now Against Internet Surveillance O'Brien, Danny Article 2013 One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ... Who does that server really serve? Stallman, Richard Article 2010 On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing. Why I'm Saying Goodbye to Apple, Google and Microsoft: I'm putting more trust in communities than corporations Gillmor, Dan Article 2015 Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation. Sources Experts & SpokespersonsSources LibraryAuthorities turn their sights on microblogging Sources News Release 2010 Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services. BitTorrent study finds most file-sharers are monitored 2012 Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-s... Companies that cooperate with dictatorships must be sanctioned Sources News Release 2011 Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. The dark side of the internet Beckett, Andy 2009 Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web. EFF Report Charts Companies on Next Frontier of User Privacy Sources News Release 2015 Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More Email privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... EU: Enact Controls on Digital Weapons Trade 2012 Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance... For journalists, danger lurking in your email O'Brien, Danny 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta... Google: don't expect privacy when sending to Gmail Rushe, Dominic 2013 People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing. How can you protect yourself from online snooping? Sources News Release 2013 Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data. Journalists Welcome European Call to Review Anti-Terrorism Laws Sources News Release 2009 Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra... NSA surveillance may cause breakup of internet, warn experts Taylor, Matthew; Hopkins, Nick; Kiss, Jemima 2013 Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying. Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing Sources News Release 2015 Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse Recommendations on the right to be forgotten a Quadrature du Net and Reporters Without Borders 2014 On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Priva... Revealed: how Whisper app tracks ‘anonymous’ users Lewis, Paul; Rushe, Dominic 2014 The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci... Software Meant to Fight Crime Is Used to Spy on Dissidents Perlroth, Nicole 2012 Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla... Stop Sneaky Online Tracking with EFF's Privacy Badger Sources News Release 2014 Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha... Test Your Online Privacy Protection with EFF's Panopticlick Sources News Release 2015 The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br... Tor (anonymity network) Wikipedia article Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi... Tor is for Everyone Why You Should Use Tor Quintin, Cooper 2014 EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu... The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press Kaye, David 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to... Who's the true enemy of internet freedom - China, Russia, or the US? Morozov, Evgeny 2015 Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty. You selling to me? Krol, Ariane; Nantel, Jacques 2013 Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media. From the Connexions ArchivesIntelligentSearch.ca Website 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ... |