PrivacyinPrivate 33 - 09 Aug 2017 - Main.MichaelWeholt
|
|
META TOPICPARENT | name="LawNetSoc" |
Separating Privacy, Secrecy, and Anonymity | | Privacy | |
> > | Merritt Baer, Chinmayi Sharma, Your Voter Records Are Compromised. Can You Sue? Theories of Harm in Data-Breach Litigation, Lawfare, August 7, 2017 | | Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000
Christine Maxwell and Howard Gutowitz, Data Mining Solutions and the Establishment of a Data Warehouse: Corporate Nirvana for the 21st Century?, First Monday, May 1997 |
|
PrivacyinPrivate 32 - 09 Aug 2017 - Main.MichaelWeholt
|
|
META TOPICPARENT | name="LawNetSoc" |
Separating Privacy, Secrecy, and Anonymity | | <-- Links in this section good as of 8/8/17 --> | |
> > | Daniel Oberhaus, Your 'Anonymous' Browsing Data Isn't Actually Anonymous, Vice, August 3, 2017 | | United States v. Horton, No. 16-3976 (8th Cir. 2017)
Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008 |
|
PrivacyinPrivate 31 - 04 Aug 2017 - Main.MichaelWeholt
|
|
META TOPICPARENT | name="LawNetSoc" |
Separating Privacy, Secrecy, and Anonymity | | Anonymity | |
> > | <-- Links in this section good as of 8/8/17 -->
United States v. Horton, No. 16-3976 (8th Cir. 2017)
Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008 | | McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995)
Buckley v. American Constitutional Law Foundation, Inc., 525 U.S. 182 (1999) | | John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000 | |
> > | | | Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009 |
|
PrivacyinPrivate 29 - 06 Nov 2014 - Main.NigelMustapha
|
|
META TOPICPARENT | name="LawNetSoc" |
Separating Privacy, Secrecy, and Anonymity | | GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document. | |
< < | Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998 | > > | Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998 | | Eben Moglen, So Much For Savages, Comments on Encryption Policy, NYU Law School, November 19, 1998 (revised). | |
< < | Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998. | > > | Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998. | | David Chaum, Achieving Electronic Privacy, Scientific American, August 1992 |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|