Online Privacy

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
Eckersley,Peter; Toner,Alan
Article
2015
Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
Complaints filed against telecom companies for their role in UK mass surveillance programme
Privacy International
Article
2013
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint : Sources News Release
Article
2015
EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
Google doesn't want you to limit its ability to follow you around the internet
Article
2014
Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
Article
2014
Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying...
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
Online Survival Kit
Article
2013
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
An Online Tracking Device That’s Virtually Impossible to Block
Angwin, Julia
Article
2014
A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
Malcolm, Jeremy; Sutton, Maira
Article
2015
Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal i...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Six Tips to Protect Your Search Privacy
Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.

Sources Experts & Spokespersons

Sources Library

Authorities turn their sights on microblogging
Sources News Release
2010
Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
EU: Enact Controls on Digital Weapons Trade
2012
Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance...
For journalists, danger lurking in your email
O'Brien, Danny
2012
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Forward Secrecy Brings Better Long-Term Privacy to Wikipedia
Higgins, Parker
2014
Wikipedia readers and editors can now enjoy a higher level of long-term privacy, thanks to the Wikimedia Foundation's rollout last week of forward secrecy on its encrypted connections.
Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
2011
Appraising the risks to personal data held in cloud computing systems.
Global Coalition to Facebook: 'Authentic Names' Are Authentically Dangerous for Your Users
Kayyali, Nadia
2015
Facebook claims its practice of forcing users to go by their "real names" (or "authentic identities" as Facebook spins it) makes the social network a safer place. In fact, the company has often claime...
Google's new advertising program tracks offline line shoppers, violates privacy
Varlin, Josh
2017
The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
How can you protect yourself from online snooping?
Sources News Release
2013
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
The internet's cyber radicals: heroes of the web changing the world
A generation of political activists have been transformed by new tools developed on the internet.
Krotoski, Aleks
2010
Internet activists speak about censorship, the democratising impact of open source technology, and the importance of oportunities for anonimity in a post 9-11 world.
NSA surveillance may cause breakup of internet, warn experts
Taylor, Matthew; Hopkins, Nick; Kiss, Jemima
2013
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing
Sources News Release
2015
Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment
Sources News Release
2016
EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
2014
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Stop Sneaky Online Tracking with EFF's Privacy Badger
Sources News Release
2014
Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...
Tor (anonymity network)
Wikipedia article
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi...
Tor is for Everyone
Why You Should Use Tor
Quintin, Cooper
2014
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
2015
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...
Why anger is all the rage
The internet has made critics of us all. But why do so many commenters exploit the anonymity of chatrooms to promote hatred.
Adams, Tim
2011
Anonymity in the online community has its proponents and detractors, the author interviews the founder of wikipedia and a facebook employee about the importance of moderation in social media. He comes...
Will Full Encryption Sideline Google's Targeted Ads?
Miners, Zach
2014
Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source?