|
Online Privacy
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryAdblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web Eckersley,Peter; Toner,Alan Article 2015 Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy. Complaints filed against telecom companies for their role in UK mass surveillance programme Privacy International Article 2013 On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ... Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint : Sources News Release Article 2015 EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools Google doesn't want you to limit its ability to follow you around the internet Article 2014 Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox Article 2014 Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying... 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy Solove, Daniel J. Article 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai... No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy O'Brien, Danny Article 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc... NSA and GCHQ target Tor network that protects anonymity of web users Ball, James; Schneier, Bruce; Greenwald, Glenn Article 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun... The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored Lopez, Alfredo Article 2013 The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone... Online Survival Kit Article 2013 This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov... An Online Tracking Device That’s Virtually Impossible to Block Angwin, Julia Article 2014 A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn. Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights Malcolm, Jeremy; Sutton, Maira Article 2015 Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal i... 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help Eckersley, Peter Article 2009 The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ... Six Tips to Protect Your Search Privacy Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek Article 2006 Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h... Think the Left Won the Culture War? Think Again deBoer, Fredrik Article 2015 With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war. Sources Experts & SpokespersonsSources LibraryAuthorities turn their sights on microblogging Sources News Release 2010 Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services. Email privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... EU: Enact Controls on Digital Weapons Trade 2012 Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance... For journalists, danger lurking in your email O'Brien, Danny 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta... Forward Secrecy Brings Better Long-Term Privacy to Wikipedia Higgins, Parker 2014 Wikipedia readers and editors can now enjoy a higher level of long-term privacy, thanks to the Wikimedia Foundation's rollout last week of forward secrecy on its encrypted connections. Get your head out of the clouds If we allow our personal data to be stored in giant electornic centres, we deserve what we get Harris, John 2011 Appraising the risks to personal data held in cloud computing systems. Global Coalition to Facebook: 'Authentic Names' Are Authentically Dangerous for Your Users Kayyali, Nadia 2015 Facebook claims its practice of forcing users to go by their "real names" (or "authentic identities" as Facebook spins it) makes the social network a safer place. In fact, the company has often claime... Google's new advertising program tracks offline line shoppers, violates privacy Varlin, Josh 2017 The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy. How can you protect yourself from online snooping? Sources News Release 2013 Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data. The internet's cyber radicals: heroes of the web changing the world A generation of political activists have been transformed by new tools developed on the internet. Krotoski, Aleks 2010 Internet activists speak about censorship, the democratising impact of open source technology, and the importance of oportunities for anonimity in a post 9-11 world. NSA surveillance may cause breakup of internet, warn experts Taylor, Matthew; Hopkins, Nick; Kiss, Jemima 2013 Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying. Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing Sources News Release 2015 Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment Sources News Release 2016 EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies Reporters Without Borders and Torservers.net, partners against online surveillance and censorship Sources News Release 2014 Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network. Stop Sneaky Online Tracking with EFF's Privacy Badger Sources News Release 2014 Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha... Tor (anonymity network) Wikipedia article Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi... Tor is for Everyone Why You Should Use Tor Quintin, Cooper 2014 EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu... The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press Kaye, David 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to... Why anger is all the rage The internet has made critics of us all. But why do so many commenters exploit the anonymity of chatrooms to promote hatred. Adams, Tim 2011 Anonymity in the online community has its proponents and detractors, the author interviews the founder of wikipedia and a facebook employee about the importance of moderation in social media. He comes... Will Full Encryption Sideline Google's Targeted Ads? Miners, Zach 2014 Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source? |