Law in the Internet Society

View   r43  >  r42  >  r41  >  r40  >  r39  >  r38  ...
PrivacyinPrivate 43 - 04 Oct 2023 - Main.GraceHopper
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 349 to 349
 Great FT opinion: "The metaverse is just the latest incarnation of Las Vegas" by Izabella Kaminska - 27 November 2021 -https://www.ft.com/content/739235bc-c418-4895-a426-3bd245ec6a00

-- DanielaWeerasinghe - 29 Nov 2021

Added:
>
>

One of my favorite books on how things spy on you and how you can fight it short of giving up on all technology: https://inteltechniques.com/book7.html

-- GraceHopper - 04 Oct 2023

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 42 - 29 Nov 2021 - Main.DanielaWeerasinghe
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 344 to 344
 My Phone Was Spying on Me, so I Tracked Down the Surveillants

-- JakeGlendenning - 03 Dec 2020

Added:
>
>

Great FT opinion: "The metaverse is just the latest incarnation of Las Vegas" by Izabella Kaminska - 27 November 2021 -https://www.ft.com/content/739235bc-c418-4895-a426-3bd245ec6a00

-- DanielaWeerasinghe - 29 Nov 2021

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 41 - 03 Dec 2020 - Main.JakeGlendenning
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 339 to 339
 Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps

-- PatricioMartinezLlompart - 01 Dec 2016

Added:
>
>

My Phone Was Spying on Me, so I Tracked Down the Surveillants

-- JakeGlendenning - 03 Dec 2020

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 40 - 11 Nov 2020 - Main.JakeGlendenning
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 86 to 86
 Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999
Changed:
<
<
Saul Hansell, Phorm’s All-Seeing Parasite Cookie, NY Times, April 7, 2008
>
>
Saul Hansell, Phorm’s All-Seeing Parasite Cookie, NY Times, April 7, 2008
 Faisal Enayat Khan, Sweden sets sights on new snoop law, The Local, June 11, 2008

PrivacyinPrivate 39 - 23 Nov 2019 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 16 to 16
 Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.
Changed:
<
<
David Chaum, Achieving Electronic Privacy, Scientific American, August 1992
>
>
David Chaum, Achieving Electronic Privacy, Scientific American, August 1992
 

PrivacyinPrivate 38 - 22 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 142 to 142
 
<-- NOTE: Links not commented out are working as of 08/15/17 -->
Added:
>
>
Tim Cushing, Federal Judge Upholds Magistrate's Ruling, Says Google Must Hand Over Data From Overseas Servers, Techdirt, August 21st 2017
 Operando Consortium, Retrieved August 17, 2017.

NIST Crafts Next-Generation Safeguards for Information Systems and the Internet of Things, NIST, August 15, 2017


PrivacyinPrivate 37 - 17 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 142 to 142
 
<-- NOTE: Links not commented out are working as of 08/15/17 -->
Added:
>
>
Operando Consortium, Retrieved August 17, 2017.
 NIST Crafts Next-Generation Safeguards for Information Systems and the Internet of Things, NIST, August 15, 2017

We Fight for the Users, Dreamhost Blog, August 14, 2017


PrivacyinPrivate 36 - 16 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 142 to 142
 
<-- NOTE: Links not commented out are working as of 08/15/17 -->
Added:
>
>
NIST Crafts Next-Generation Safeguards for Information Systems and the Internet of Things, NIST, August 15, 2017
 We Fight for the Users, Dreamhost Blog, August 14, 2017

Julia Carrie Wong and Olivia Solon, US government demands details on all visitors to anti-Trump protest website, Guardian, August 15, 2017


PrivacyinPrivate 35 - 15 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 140 to 140
 

Privacy

Added:
>
>
<-- NOTE: Links not commented out are working as of 08/15/17 -->
 We Fight for the Users, Dreamhost Blog, August 14, 2017

Julia Carrie Wong and Olivia Solon, US government demands details on all visitors to anti-Trump protest website, Guardian, August 15, 2017

Line: 245 to 247
 
 Carolyn Johnson, Project 'Gaydar', The Boston Globe, September 20, 2009
Added:
>
>
-->
 Nathan Eagle, Inferring friendship network structure by using mobile phone data, National Academy of Sciences, July 1, 2009
Added:
>
>
 Chunka Mui, Facebook's Privacy Issues Are Even Deeper Than We Knew, Forbes, August 8, 2011 (Facial recognition)

PrivacyinPrivate 34 - 15 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 140 to 140
 

Privacy

Added:
>
>
We Fight for the Users, Dreamhost Blog, August 14, 2017

Julia Carrie Wong and Olivia Solon, US government demands details on all visitors to anti-Trump protest website, Guardian, August 15, 2017

 Merritt Baer, Chinmayi Sharma, Your Voter Records Are Compromised. Can You Sue? Theories of Harm in Data-Breach Litigation, Lawfare, August 7, 2017

Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000

Line: 208 to 213
 Bob Tedeschi, E-Commerce Report: Critics Press Legal Assault on Tracking of Web Users, New York Times, February 6, 2000
Added:
>
>
 Associated Press, Personal Web Data Theft Flourishing, New York Times, September 13, 2000
Line: 224 to 231
 Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
Added:
>
>
 Saul Hansell, One Subpoena Is All It Takes to Reveal Your Online Life, New York Times, July 7, 2008
Line: 234 to 243
 Cory Doctorow, WhatTheInternetKnowsAboutYou: your browser is giving away your history, BoingBoing? , September 2, 2009
Added:
>
>
 Carolyn Johnson, Project 'Gaydar', The Boston Globe, September 20, 2009

PrivacyinPrivate 33 - 09 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 140 to 140
 

Privacy

Added:
>
>
Merritt Baer, Chinmayi Sharma, Your Voter Records Are Compromised. Can You Sue? Theories of Harm in Data-Breach Litigation, Lawfare, August 7, 2017
 Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000

Christine Maxwell and Howard Gutowitz, Data Mining Solutions and the Establishment of a Data Warehouse: Corporate Nirvana for the 21st Century?, First Monday, May 1997


PrivacyinPrivate 32 - 09 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 111 to 111
 
<-- Links in this section good as of 8/8/17 -->
Added:
>
>
Daniel Oberhaus, Your 'Anonymous' Browsing Data Isn't Actually Anonymous, Vice, August 3, 2017
 United States v. Horton, No. 16-3976 (8th Cir. 2017)

Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008


PrivacyinPrivate 31 - 04 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 109 to 109
 

Anonymity

Added:
>
>
<-- Links in this section good as of 8/8/17 -->

United States v. Horton, No. 16-3976 (8th Cir. 2017)

Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008

 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995)

Buckley v. American Constitutional Law Foundation, Inc., 525 U.S. 182 (1999)

Line: 119 to 125
 John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000
Added:
>
>
 Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009

PrivacyinPrivate 30 - 01 Dec 2016 - Main.PatricioMartinezLlompart
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 301 to 301
 Electronic Frontier Foundation, Surveillance Self-Defense

-- BastiaanSuurmond - 04 Nov 2014

Added:
>
>

Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps

-- PatricioMartinezLlompart - 01 Dec 2016

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 29 - 06 Nov 2014 - Main.NigelMustapha
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 10 to 10
 GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document.
Changed:
<
<
Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998
>
>
Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998
 Eben Moglen, So Much For Savages, Comments on Encryption Policy, NYU Law School, November 19, 1998 (revised).
Changed:
<
<
Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.
>
>
Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.
 David Chaum, Achieving Electronic Privacy, Scientific American, August 1992

PrivacyinPrivate 28 - 04 Nov 2014 - Main.BastiaanSuurmond
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 295 to 295
 Cops to Congress: We need logs of American's test message Cnet, December 3, 2012

-- JohnStewart - 04 Dec 2012

Added:
>
>
Free Software Foundation, Email Self-Defense - a guide to fighting surveillance with GnuPG encryption

Electronic Frontier Foundation, Surveillance Self-Defense

-- BastiaanSuurmond - 04 Nov 2014

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 27 - 23 Aug 2014 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 299 to 299
 I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy http://hal.inria.fr/docs/00/63/27/80/PDF/skype.pdf \ No newline at end of file
Added:
>
>
META FILEATTACHMENT attachment="120925designerwareanal.pdf" attr="" comment="FTC paper about PC Rental Agent and the %22Detective mode%22 on their rent-to-buy computers" date="1348853492" moveby="Main.EbenMoglen" movedto="LawNetSoc.PrivacyinPrivate.120925designerwareanal.pdf" movedwhen="1408823438" movefrom="LawNetSoc.WebHome.120925designerwareanal.pdf" name="120925designerwareanal.pdf" path="120925designerwareanal.pdf" size="27452" stream="120925designerwareanal.pdf" user="Main.CamilleFrancois" version="1"

PrivacyinPrivate 26 - 04 Dec 2012 - Main.JohnStewart
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 290 to 290
 Found this article on an alternative to Google search: in a more recent Washington Post article.

-- JasonPyke - 12 Nov 2012

Added:
>
>

Cops to Congress: We need logs of American's test message Cnet, December 3, 2012

-- JohnStewart - 04 Dec 2012

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 25 - 12 Nov 2012 - Main.JasonPyke
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 285 to 285
 http://www.nytimes.com/2009/01/31/your-money/credit-and-debit-cards/31money.html

-- JohnStewart - 08 Nov 2012

Added:
>
>

Found this article on an alternative to Google search: in a more recent Washington Post article.

-- JasonPyke - 12 Nov 2012

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 24 - 08 Nov 2012 - Main.JohnStewart
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 278 to 278
 

-- SylviaDuran - 10 Nov 2011

Added:
>
>

This is an older story but given the advertising value many place on the data Facebook has it's easy to forget that social networks are only a proxy for what you might like. The companies that know where you actually spend your money are in many ways more valuable.

http://www.nytimes.com/2009/01/31/your-money/credit-and-debit-cards/31money.html

-- JohnStewart - 08 Nov 2012

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 23 - 04 Sep 2012 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 125 to 125
 Paul Ohm, Netflix's Impending (But Still Avoidable) Multi-Million Dollar Privacy Blunder, freedom-to-tinker.com, September 21st, 2009
Changed:
<
<
>
>
T.C. Sottek, New York state lawmakers challenge anonymous online speech with proposed bill, theverge.com, May 22, 2012
 

Privacy

Line: 231 to 230
 Dana Oshiro, Picasa 3.5: Ruining Your Good Name with Face Recognition Tagging, Read Write Web, September 22, 2009
Added:
>
>
Chunka Mui, Facebook's Privacy Issues Are Even Deeper Than We Knew, Forbes, August 8, 2011 (Facial recognition)
 
Added:
>
>
Allan Dodds Frank, Lydia Cacho Blasts Facebook, The Daily Beast, October 21, 2011
 
Added:
>
>
Every picture uploaded by Facebook users is run through a program called 'Photo DNA' to look for possible matches with offenders. The company saves the data and makes referrals to law-enforcement agencies.          —Joe Sullivan, Facebook
 

Student Suggestions:


PrivacyinPrivate 22 - 10 Nov 2011 - Main.SylviaDuran
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 267 to 267
 "Government agencies and courts sent a total of 5,950 user data requests between January 1 and June 30, 2011, covering 11,057 separate users and accounts. Google said that it fully or partially complied with 93% of them." --http://blogs.wsj.com/digits/2011/10/25/google-reports-surge-in-government-requests-for-user-data/

-- SpencerWan - 05 Nov 2011

Added:
>
>

Facebook Sees 600,000 Compromised Logins Per Day http://techcrunch.com/2011/10/28/facebook-sees-600000-comprised-logins-per-day/

-- SylviaDuran - 10 Nov 2011

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 21 - 08 Nov 2011 - Main.NatachaEsteves
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 268 to 268
 -- SpencerWan - 05 Nov 2011
 
<--/commentPlugin-->
\ No newline at end of file
Added:
>
>
I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy http://hal.inria.fr/docs/00/63/27/80/PDF/skype.pdf
 \ No newline at end of file

PrivacyinPrivate 20 - 05 Nov 2011 - Main.SpencerWan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 262 to 262
 "Unthink" social network response to Facebook: http://www.readwriteweb.com/enterprise/2011/10/should-facebook-be-worried-abo.php - October 25, 2011

-- AlexeySokolin - 28 Oct 2011

Added:
>
>

"Government agencies and courts sent a total of 5,950 user data requests between January 1 and June 30, 2011, covering 11,057 separate users and accounts. Google said that it fully or partially complied with 93% of them." --http://blogs.wsj.com/digits/2011/10/25/google-reports-surge-in-government-requests-for-user-data/

-- SpencerWan - 05 Nov 2011

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 19 - 28 Oct 2011 - Main.AlexeySokolin
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 257 to 257
 -- BrianS - 17 Dec 2009
Added:
>
>

"Unthink" social network response to Facebook: http://www.readwriteweb.com/enterprise/2011/10/should-facebook-be-worried-abo.php - October 25, 2011

-- AlexeySokolin - 28 Oct 2011

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 18 - 17 Dec 2009 - Main.BrianS
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 255 to 252
 You’re Leaving a Digital Trail. What About Privacy?, NYTimes Nov. 29, 2008

-- ElliottAsh - 30 Nov 2008

Added:
>
>
Insurgents Hack U.S. Drones WSJ.com, Dec. 17, 2009 (discussing briefly encryption in the context of Predator drones)

-- BrianS - 17 Dec 2009

 
 
<--/commentPlugin-->

PrivacyinPrivate 17 - 23 Sep 2009 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 100 to 100
 Declan McCullagh, U.N. agency eyes curbs on Internet anonymity, Cnet News, September 12, 2008
Added:
>
>
John Markoff, New Technology to Make Digital Data Self-Destruct , New York Times, July 20, 2009

John Markoff, Universities Spar Over Disappearing Electronic Messages, New York Times, September 21, 2009

 

Anonymity

Line: 114 to 119
 John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000
Changed:
<
<
* Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000 [BROKEN LINK]
>
>
* Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000 [BROKEN LINK] Slashdot coverage
 
Changed:
<
<
Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009.
>
>
Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009

Paul Ohm, Netflix's Impending (But Still Avoidable) Multi-Million Dollar Privacy Blunder, freedom-to-tinker.com, September 21st, 2009

 
Line: 220 to 227
 Carolyn Johnson, Project 'Gaydar', The Boston Globe, September 20, 2009
Added:
>
>
Nathan Eagle, Inferring friendship network structure by using mobile phone data, National Academy of Sciences, July 1, 2009

Dana Oshiro, Picasa 3.5: Ruining Your Good Name with Face Recognition Tagging, Read Write Web, September 22, 2009

 

PrivacyinPrivate 16 - 21 Sep 2009 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 216 to 218
 Deborah Yao, Web-monitoring software gathers data on kid chats, Associated Press, September 5, 2009
Added:
>
>
Carolyn Johnson, Project 'Gaydar', The Boston Globe, September 20, 2009
 

Student Suggestions:


PrivacyinPrivate 15 - 11 Sep 2009 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 116 to 116
 * Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000 [BROKEN LINK]
Added:
>
>
Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009.
 

Privacy


PrivacyinPrivate 14 - 08 Sep 2009 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 212 to 212
 Cory Doctorow, WhatTheInternetKnowsAboutYou: your browser is giving away your history, BoingBoing? , September 2, 2009
Added:
>
>
Deborah Yao, Web-monitoring software gathers data on kid chats, Associated Press, September 5, 2009
 

Student Suggestions:


PrivacyinPrivate 13 - 04 Sep 2009 - Main.IanSullivan
Line: 1 to 1
Changed:
<
<
META TOPICPARENT name="WebHome"
>
>
META TOPICPARENT name="LawNetSoc"
 

Separating Privacy, Secrecy, and Anonymity

Line: 208 to 208
 Matthew Sparkes, Government proposes email and internet tracking, PCPro, August 13, 2008
Added:
>
>
Adam Cohen, A Casualty of the Technology Revolution: ‘Locational Privacy’, New York Times, August 31, 2009

Cory Doctorow, WhatTheInternetKnowsAboutYou: your browser is giving away your history, BoingBoing? , September 2, 2009

 

Student Suggestions:


PrivacyinPrivate 12 - 30 Nov 2008 - Main.ElliottAsh
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 225 to 225
 Google Uses Web Searches to Track Flu's Spread, NYTimes Nov. 12, 2008

-- ElliottAsh - 12 Nov 2008

Added:
>
>

You’re Leaving a Digital Trail. What About Privacy?, NYTimes Nov. 29, 2008

-- ElliottAsh - 30 Nov 2008

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 11 - 19 Nov 2008 - Main.RickSchwartz
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 114 to 114
 John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000
Changed:
<
<
* Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000
>
>
* Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000 [BROKEN LINK]
 

PrivacyinPrivate 10 - 12 Nov 2008 - Main.ElliottAsh
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 220 to 220
 The Center for Democracy and Technology report on browser privacy modes. -- JoshS - 06 Nov 2008
Added:
>
>

Google Uses Web Searches to Track Flu's Spread, NYTimes Nov. 12, 2008

-- ElliottAsh - 12 Nov 2008

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 9 - 06 Nov 2008 - Main.JoshS
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 212 to 212
 

Student Suggestions:

I thought this might be interesting for this topic: http://news.cnet.com/8301-13739_3-10038963-46.html

Deleted:
<
<
 -- JasonChan - 11 Sep 2008
Deleted:
<
<
 On Firefox's new 'Private Browsing Mode': http://www.webmonkey.com/blog/Firefox_s_Private_Browsing__AKA__Porn_Mode__Arrives
Deleted:
<
<
 -- JulianDunn - 06 Nov 2008
Added:
>
>
The Center for Democracy and Technology report on browser privacy modes. -- JoshS - 06 Nov 2008
 
 
<--/commentPlugin-->

PrivacyinPrivate 8 - 06 Nov 2008 - Main.JulianDunn
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 214 to 214
 I thought this might be interesting for this topic: http://news.cnet.com/8301-13739_3-10038963-46.html

-- JasonChan - 11 Sep 2008

Added:
>
>

On Firefox's new 'Private Browsing Mode': http://www.webmonkey.com/blog/Firefox_s_Private_Browsing__AKA__Porn_Mode__Arrives

-- JulianDunn - 06 Nov 2008

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 7 - 28 Oct 2008 - Main.DanielHarris
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 8 to 8
 

Coming to Terms with Encryption

Changed:
<
<
GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document.
>
>
GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document.
 Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998

PrivacyinPrivate 6 - 17 Sep 2008 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 86 to 86
 Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999
Added:
>
>
Saul Hansell, Phorm’s All-Seeing Parasite Cookie, NY Times, April 7, 2008
 Faisal Enayat Khan, Sweden sets sights on new snoop law, The Local, June 11, 2008

Steve Boggan, ‘Fakeproof’ e-passport is cloned in minutes, The Times, August 6, 2008

Line: 94 to 96
 Duncan Graham-Rowe, Road Tolls Hacked, Technology Review, August 25, 2008
Added:
>
>
Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, University of Colorado Law School, August 30, 2008
 Declan McCullagh, U.N. agency eyes curbs on Internet anonymity, Cnet News, September 12, 2008

PrivacyinPrivate 5 - 16 Sep 2008 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 42 to 42
 Bernstein v. Dept of State from EFF archive
Changed:
<
<
* Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999
>
>
Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999
 
Changed:
<
<
* Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999
>
>
Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999
 
Changed:
<
<
* Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999
>
>
Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999
 
Changed:
<
<
* Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999
>
>
Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999
 Steven Lee Myers, Justice Dept. Proposes Bill to Fight Computer Encryption, New York Times, August 20, 1999
Changed:
<
<
* John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999
>
>
John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999
 
Changed:
<
<
* Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999
>
>
Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999
 
Changed:
<
<
* Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999
>
>
Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999
 
Changed:
<
<
* Jeri Clausing, Administration Plans to Loosen Encryption Restrictions, New York Times, September 14, 1999
>
>
Jeri Clausing, Administration Plans to Loosen Encryption Restrictions, New York Times, September 14, 1999
 
Changed:
<
<
* Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999
>
>
Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999
 
Changed:
<
<
* John Schwartz, U.S. Selects a New Encryption Technique, New York Times, October 3, 2000
>
>
John Schwartz, U.S. Selects a New Encryption Technique, New York Times, October 3, 2000
 
Line: 76 to 76
 Reuters, Tracking of Swiss Mobile Phone Users Starts Row, InfoBeat, December 28, 1997
Changed:
<
<
* Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999
>
>
Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999
 
Changed:
<
<
* Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999
>
>
Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999
 
Changed:
<
<
* John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999
>
>
John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999
 
Changed:
<
<
* Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999
>
>
Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999
 
Changed:
<
<
* Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999
>
>
Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999

Faisal Enayat Khan, Sweden sets sights on new snoop law, The Local, June 11, 2008

Steve Boggan, ‘Fakeproof’ e-passport is cloned in minutes, The Times, August 6, 2008

Laura Margottini, Snoop software makes surveillance a cinch, New Scientist, August 23, 2008

Duncan Graham-Rowe, Road Tolls Hacked, Technology Review, August 25, 2008

Declan McCullagh, U.N. agency eyes curbs on Internet anonymity, Cnet News, September 12, 2008

 
Line: 132 to 142
 Sarah Lyall, A Country Unveils Its Gene Pool and Debate Flares, New York Times, February 16, 1999
Changed:
<
<
* John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999
>
>
John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999
 
Changed:
<
<
* John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999
>
>
John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999
 
Changed:
<
<
* Jeri Clausing, Business Group Unveils Plan for Online Privacy, New York Times, March 18, 1999
>
>
Jeri Clausing, Business Group Unveils Plan for Online Privacy, New York Times, March 18, 1999
 
Changed:
<
<
* Matt Richtel, AOL Records Sought on Virus, New York Times, April 2, 1999
>
>
Matt Richtel, AOL Records Sought on Virus, New York Times, April 2, 1999
 
Changed:
<
<
* Jeri Clausing, Lawmaker Plans Bill to Protect Consumer Privacy Online, New York Times, April 8, 1999
>
>
Jeri Clausing, Lawmaker Plans Bill to Protect Consumer Privacy Online, New York Times, April 8, 1999
 
Changed:
<
<
* Jeri Clausing, Hearing on Viruses Becomes Debate on Privacy, New York Times, April 16, 1999
>
>
Jeri Clausing, Hearing on Viruses Becomes Debate on Privacy, New York Times, April 16, 1999
 
Changed:
<
<
* Jeri Clausing, New Bill Keeps Online Privacy at Center Stage, New York Times, April 17, 1999
>
>
Jeri Clausing, New Bill Keeps Online Privacy at Center Stage, New York Times, April 17, 1999
 
Changed:
<
<
* Robert Pear, Future Bleak for Bill to Keep Health Records Confidential, New York Times, June 21, 1999
>
>
Robert Pear, Future Bleak for Bill to Keep Health Records Confidential, New York Times, June 21, 1999
 Joel Brinkley, FTC Says GeoCities Violated Privacy Rules, New York Times, August 14, 1998

Saul Hansell, Big Web Sites to Track Steps of Their Users, New York Times, August 16, 1998

Changed:
<
<
* Evelyn Nieves, Privacy Issues Raised in Syphilis Cases Linked to San Francisco Chat Room, New York Times, August 25, 1999
>
>
Evelyn Nieves, Privacy Issues Raised in Syphilis Cases Linked to San Francisco Chat Room, New York Times, August 25, 1999
 
Changed:
<
<
* David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999
>
>
David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999
 
Changed:
<
<
* Denise Caruso, Digital Commerce: Consumers' Desire for Information Privacy Ignored, New York Times, August 30, 1999
>
>
Denise Caruso, Digital Commerce: Consumers' Desire for Information Privacy Ignored, New York Times, August 30, 1999
 
Changed:
<
<
* Jeri Clausing, Capital Dispatch: Government Has More Questions for Internet Board, New York Times, November 2, 1999
>
>
Jeri Clausing, Capital Dispatch: Government Has More Questions for Internet Board, New York Times, November 2, 1999
 
Changed:
<
<
* Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999
>
>
Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999
 
Changed:
<
<
* Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999
>
>
Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999
 
Changed:
<
<
* Jeri Clausing, Revised Banking Legislation Raises Concerns About Privacy, New York Times, October 25, 1999
>
>
Jeri Clausing, Revised Banking Legislation Raises Concerns About Privacy, New York Times, October 25, 1999
 
Changed:
<
<
* Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000
>
>
Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000
 Reno v. Condon, No. 98-1464, US Supreme Court, January 12, 2000
Line: 186 to 196
 John Leyden, Smart Phone Predicts Owner's Behavior, The Register, November, 25 2004
Changed:
<
<
* Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
>
>
Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
 Brett Winterford, Logged in or out, Facebook is watching you, ZDNet.au, December 4, 2007
Line: 195 to 205
 Matthew Sparkes, Government proposes email and internet tracking, PCPro, August 13, 2008
Added:
>
>

Student Suggestions:

 I thought this might be interesting for this topic: http://news.cnet.com/8301-13739_3-10038963-46.html

PrivacyinPrivate 4 - 11 Sep 2008 - Main.JasonChan
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 194 to 194
 Matthew Sparkes, Government proposes email and internet tracking, PCPro, August 13, 2008
Added:
>
>

I thought this might be interesting for this topic: http://news.cnet.com/8301-13739_3-10038963-46.html

-- JasonChan - 11 Sep 2008

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 3 - 14 Aug 2008 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 188 to 188
 * Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
Added:
>
>
Brett Winterford, Logged in or out, Facebook is watching you, ZDNet.au, December 4, 2007

Saul Hansell, One Subpoena Is All It Takes to Reveal Your Online Life, New York Times, July 7, 2008

Matthew Sparkes, Government proposes email and internet tracking, PCPro, August 13, 2008

 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 2 - 01 Aug 2008 - Main.IanSullivan
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Line: 42 to 42
 Bernstein v. Dept of State from EFF archive
Changed:
<
<
Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999
>
>
* Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999
 
Changed:
<
<
Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999
>
>
* Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999
 
Changed:
<
<
Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999
>
>
* Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999
 
Changed:
<
<
Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999
>
>
* Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999
 Steven Lee Myers, Justice Dept. Proposes Bill to Fight Computer Encryption, New York Times, August 20, 1999
Changed:
<
<
John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999
>
>
* John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999
 
Changed:
<
<
Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999
>
>
* Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999
 
Changed:
<
<
Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999
>
>
* Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999
 
Changed:
<
<
Jeri Clausing, Administration Plans to Loosen Encryption Restrictions, New York Times, September 14, 1999
>
>
* Jeri Clausing, Administration Plans to Loosen Encryption Restrictions, New York Times, September 14, 1999
 
Changed:
<
<
Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999
>
>
* Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999
 
Changed:
<
<
John Schwartz, U.S. Selects a New Encryption Technique, New York Times, October 3, 2000
>
>
* John Schwartz, U.S. Selects a New Encryption Technique, New York Times, October 3, 2000
 
Line: 76 to 76
 Reuters, Tracking of Swiss Mobile Phone Users Starts Row, InfoBeat, December 28, 1997
Changed:
<
<
Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999
>
>
* Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999
 
Changed:
<
<
Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999
>
>
* Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999
 
Changed:
<
<
John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999
>
>
* John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999
 
Changed:
<
<
Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999
>
>
* Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999
 
Changed:
<
<
Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999
>
>
* Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999
 
Line: 100 to 100
 John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000
Changed:
<
<
Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000
>
>
* Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000
 
Line: 132 to 132
 Sarah Lyall, A Country Unveils Its Gene Pool and Debate Flares, New York Times, February 16, 1999
Changed:
<
<
John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999
>
>
* John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999
 
Changed:
<
<
John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999
>
>
* John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999
 
Changed:
<
<
Jeri Clausing, Business Group Unveils Plan for Online Privacy, New York Times, March 18, 1999
>
>
* Jeri Clausing, Business Group Unveils Plan for Online Privacy, New York Times, March 18, 1999
 
Changed:
<
<
Matt Richtel, AOL Records Sought on Virus, New York Times, April 2, 1999
>
>
* Matt Richtel, AOL Records Sought on Virus, New York Times, April 2, 1999
 
Changed:
<
<
Jeri Clausing, Lawmaker Plans Bill to Protect Consumer Privacy Online, New York Times, April 8, 1999
>
>
* Jeri Clausing, Lawmaker Plans Bill to Protect Consumer Privacy Online, New York Times, April 8, 1999
 
Changed:
<
<
Jeri Clausing, Hearing on Viruses Becomes Debate on Privacy, New York Times, April 16, 1999
>
>
* Jeri Clausing, Hearing on Viruses Becomes Debate on Privacy, New York Times, April 16, 1999
 
Changed:
<
<
Jeri Clausing, New Bill Keeps Online Privacy at Center Stage, New York Times, April 17, 1999
>
>
* Jeri Clausing, New Bill Keeps Online Privacy at Center Stage, New York Times, April 17, 1999
 
Changed:
<
<
Robert Pear, Future Bleak for Bill to Keep Health Records Confidential, New York Times, June 21, 1999
>
>
* Robert Pear, Future Bleak for Bill to Keep Health Records Confidential, New York Times, June 21, 1999
 Joel Brinkley, FTC Says GeoCities Violated Privacy Rules, New York Times, August 14, 1998

Saul Hansell, Big Web Sites to Track Steps of Their Users, New York Times, August 16, 1998

Changed:
<
<
Evelyn Nieves, Privacy Issues Raised in Syphilis Cases Linked to San Francisco Chat Room, New York Times, August 25, 1999
>
>
* Evelyn Nieves, Privacy Issues Raised in Syphilis Cases Linked to San Francisco Chat Room, New York Times, August 25, 1999
 
Changed:
<
<
David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999
>
>
* David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999
 
Changed:
<
<
Denise Caruso, Digital Commerce: Consumers' Desire for Information Privacy Ignored, New York Times, August 30, 1999
>
>
* Denise Caruso, Digital Commerce: Consumers' Desire for Information Privacy Ignored, New York Times, August 30, 1999
 
Changed:
<
<
Jeri Clausing, Capital Dispatch: Government Has More Questions for Internet Board, New York Times, November 2, 1999
>
>
* Jeri Clausing, Capital Dispatch: Government Has More Questions for Internet Board, New York Times, November 2, 1999
 
Changed:
<
<
Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999
>
>
* Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999
 
Changed:
<
<
Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999
>
>
* Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999
 
Changed:
<
<
Jeri Clausing, Revised Banking Legislation Raises Concerns About Privacy, New York Times, October 25, 1999
>
>
* Jeri Clausing, Revised Banking Legislation Raises Concerns About Privacy, New York Times, October 25, 1999
 
Changed:
<
<
Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000
>
>
* Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000
 Reno v. Condon, No. 98-1464, US Supreme Court, January 12, 2000
Line: 186 to 186
 John Leyden, Smart Phone Predicts Owner's Behavior, The Register, November, 25 2004
Changed:
<
<
Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
>
>
* Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004
 
 
<--/commentPlugin-->
\ No newline at end of file

PrivacyinPrivate 1 - 01 Aug 2008 - Main.IanSullivan
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="WebHome"

Separating Privacy, Secrecy, and Anonymity

Secrecy

Coming to Terms with Encryption

GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document.

Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998

Eben Moglen, So Much For Savages, Comments on Encryption Policy, NYU Law School, November 19, 1998 (revised).

Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.

David Chaum, Achieving Electronic Privacy, Scientific American, August 1992

Navajo Wins Narrowly:
The Slow Death of Encryption Export Regulation

National Research Council, Cryptography's Role in Securing the Information Society, May 1996

Encryption Export Control Regulations, 15 C.F.R. sect. 742.15, as of January 1, 1999

Anti-virus Software and Info-War, New York Times, January 30, 1997

Head of Cyber-Terrorism Panel Says Encryption Rules May Be Needed, New York Times, November 6, 1997

John Markoff, White House May Tighten Data Exports, New York Times, November 24, 1997

Jeri Clausing, Congress Faces List of Internet Issues, New York Times, January 28, 1998.

Jeri Clausing, New Encryption Legislation Billed as a Compromise, New York Times, May 13, 1998.

Jeri Clausing, Encryption Debate Heats Up in Washington, New York Times, June 9, 1998

Carl S. Kaplan, Is Software Like a Can Opener or a Recipe?, New York Times, July 17, 1998

Bernstein v. Dept of State from EFF archive

Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999

Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999

Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999

Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999

Steven Lee Myers, Justice Dept. Proposes Bill to Fight Computer Encryption, New York Times, August 20, 1999

John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999

Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999

Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999

Jeri Clausing, Administration Plans to Loosen Encryption Restrictions, New York Times, September 14, 1999

Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999

John Schwartz, U.S. Selects a New Encryption Technique, New York Times, October 3, 2000

But We're All Still Listening...

Jeri Clausing, New Fight Over Encryption Rules, September 21, 1999

Cyberspace Electronic Security Act of 1999, White House Proposal, September 16, 1999 (published by the Center for Democracy and Technology)

Bruno Giussani, Dutch Law Goes Beyond Enabling Wiretapping To Make It a Requirement, New York Times, April 14, 1998. Please look at the English text of the new Dutch Telecommunications Act linked to the article.

Reuters, Tracking of Swiss Mobile Phone Users Starts Row, InfoBeat, December 28, 1997

Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999

Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999

John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999

Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999

Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999

Anonymity

McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995)

Buckley v. American Constitutional Law Foundation, Inc., 525 U.S. 182 (1999)

Peter Wayner, Traveling the Web Invisibly, Through a One-Way Mirror, New York Times, November 5, 1997

Ian Goldberg and David Wagner, TAZ Servers and the Rewebber Network Enabling Anonymous Publishing on the World Wide Web, First Monday, April 1998

John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000

Associated Press, Anonymous Net Posting Not Protected, New York Times, October 16, 2000

Privacy

Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000

Christine Maxwell and Howard Gutowitz, Data Mining Solutions and the Establishment of a Data Warehouse: Corporate Nirvana for the 21st Century?, First Monday, May 1997

Bill Helling, Web-Site Sensitivity to Privacy Concerns, First Monday, February 1998

Amitai Etzioni, Some Privacy, Please, for E-Mail, New York Times, November 23, 1997

It Isn't Just Big Brother Who Is Watching, CyberTimes, January 12, 1998

Sailor's Case Becomes Privacy and Rights Cause, CyberTimes, January 14, 1998

Sailor Who Has Become a Symbol Wins Delay, CyberTimes, January 16, 1998

Philip Shenon, Navy and America Online Settle Case on Gay Privacy, New York Times, June 12, 1998

Jeri Clausing, Administration Seeks Input on Privacy Policy, New York Times, November 6, 1998

Pamela Mendels, New Serious Side to Child's Play on Web, New York Times, November 26, 1998

Jeri Clausing, Intel Alters Plan Said to Undermine PC Users' Privacy, New York Times, January 26, 1999

Peter Wayner, NEWS ANALYSIS: Debate on Intel Chip Misses Piracy Issue, New York Times, January 30, 1999

Sarah Lyall, A Country Unveils Its Gene Pool and Debate Flares, New York Times, February 16, 1999

John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999

John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999

Jeri Clausing, Business Group Unveils Plan for Online Privacy, New York Times, March 18, 1999

Matt Richtel, AOL Records Sought on Virus, New York Times, April 2, 1999

Jeri Clausing, Lawmaker Plans Bill to Protect Consumer Privacy Online, New York Times, April 8, 1999

Jeri Clausing, Hearing on Viruses Becomes Debate on Privacy, New York Times, April 16, 1999

Jeri Clausing, New Bill Keeps Online Privacy at Center Stage, New York Times, April 17, 1999

Robert Pear, Future Bleak for Bill to Keep Health Records Confidential, New York Times, June 21, 1999

Joel Brinkley, FTC Says GeoCities Violated Privacy Rules, New York Times, August 14, 1998

Saul Hansell, Big Web Sites to Track Steps of Their Users, New York Times, August 16, 1998

Evelyn Nieves, Privacy Issues Raised in Syphilis Cases Linked to San Francisco Chat Room, New York Times, August 25, 1999

David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999

Denise Caruso, Digital Commerce: Consumers' Desire for Information Privacy Ignored, New York Times, August 30, 1999

Jeri Clausing, Capital Dispatch: Government Has More Questions for Internet Board, New York Times, November 2, 1999

Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999

Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999

Jeri Clausing, Revised Banking Legislation Raises Concerns About Privacy, New York Times, October 25, 1999

Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000

Reno v. Condon, No. 98-1464, US Supreme Court, January 12, 2000

Bob Tedeschi, E-Commerce Report: Critics Press Legal Assault on Tracking of Web Users, New York Times, February 6, 2000

Stephen Labaton, U.S. Is Said to Seek New Law to Bolster Internet Privacy, New York Times, May 19, 2000

Wired News, Privacy Group Drops Amazon, September 14, 2000

Associated Press, Personal Web Data Theft Flourishing, New York Times, September 13, 2000

John Borland, Freenet Re-energizes File-sharing, ZDNet, October 28, 2002.

Julia Scheeres, Librarians Split on Sharing Info, Wired, January 16, 2003

Caroline Mayer, FTC Says Identity Theft Is Rampant, Washington Post, September 4, 2003.

John Leyden, Smart Phone Predicts Owner's Behavior, The Register, November, 25 2004

Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004

 
<--/commentPlugin-->

Revision 43r43 - 04 Oct 2023 - 20:42:48 - GraceHopper
Revision 42r42 - 29 Nov 2021 - 14:07:30 - DanielaWeerasinghe
Revision 41r41 - 03 Dec 2020 - 15:28:43 - JakeGlendenning
Revision 40r40 - 11 Nov 2020 - 16:06:47 - JakeGlendenning
Revision 39r39 - 23 Nov 2019 - 16:58:12 - EbenMoglen
Revision 38r38 - 22 Aug 2017 - 15:34:50 - MichaelWeholt
Revision 37r37 - 17 Aug 2017 - 19:35:17 - MichaelWeholt
Revision 36r36 - 16 Aug 2017 - 16:01:39 - MichaelWeholt
Revision 35r35 - 15 Aug 2017 - 20:49:42 - MichaelWeholt
Revision 34r34 - 15 Aug 2017 - 17:16:38 - MichaelWeholt
Revision 33r33 - 09 Aug 2017 - 18:45:11 - MichaelWeholt
Revision 32r32 - 09 Aug 2017 - 15:44:08 - MichaelWeholt
Revision 31r31 - 04 Aug 2017 - 20:14:14 - MichaelWeholt
Revision 30r30 - 01 Dec 2016 - 17:43:45 - PatricioMartinezLlompart
Revision 29r29 - 06 Nov 2014 - 01:15:01 - NigelMustapha
Revision 28r28 - 04 Nov 2014 - 13:55:12 - BastiaanSuurmond
Revision 27r27 - 23 Aug 2014 - 19:50:38 - EbenMoglen
Revision 26r26 - 04 Dec 2012 - 16:45:13 - JohnStewart
Revision 25r25 - 12 Nov 2012 - 00:14:26 - JasonPyke
Revision 24r24 - 08 Nov 2012 - 17:11:56 - JohnStewart
Revision 23r23 - 04 Sep 2012 - 21:53:30 - IanSullivan
Revision 22r22 - 10 Nov 2011 - 17:44:53 - SylviaDuran
Revision 21r21 - 08 Nov 2011 - 00:00:23 - NatachaEsteves
Revision 20r20 - 05 Nov 2011 - 02:44:14 - SpencerWan
Revision 19r19 - 28 Oct 2011 - 14:15:18 - AlexeySokolin
Revision 18r18 - 17 Dec 2009 - 23:01:06 - BrianS
Revision 17r17 - 23 Sep 2009 - 19:58:39 - IanSullivan
Revision 16r16 - 21 Sep 2009 - 16:01:19 - IanSullivan
Revision 15r15 - 11 Sep 2009 - 15:25:59 - IanSullivan
Revision 14r14 - 08 Sep 2009 - 15:10:46 - IanSullivan
Revision 13r13 - 04 Sep 2009 - 17:56:12 - IanSullivan
Revision 12r12 - 30 Nov 2008 - 21:30:39 - ElliottAsh
Revision 11r11 - 19 Nov 2008 - 21:41:07 - RickSchwartz
Revision 10r10 - 12 Nov 2008 - 19:44:55 - ElliottAsh
Revision 9r9 - 06 Nov 2008 - 22:15:34 - JoshS
Revision 8r8 - 06 Nov 2008 - 16:26:27 - JulianDunn
Revision 7r7 - 28 Oct 2008 - 15:37:38 - DanielHarris
Revision 6r6 - 17 Sep 2008 - 03:00:53 - IanSullivan
Revision 5r5 - 16 Sep 2008 - 20:48:01 - IanSullivan
Revision 4r4 - 11 Sep 2008 - 20:03:53 - JasonChan
Revision 3r3 - 14 Aug 2008 - 16:47:29 - IanSullivan
Revision 2r2 - 01 Aug 2008 - 20:56:42 - IanSullivan
Revision 1r1 - 01 Aug 2008 - 19:32:34 - IanSullivan
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM