Law in the Internet Society

View   r33  >  r32  >  r31  >  r30  >  r29  >  r28  ...
PrivacyinPrivate 33 - 09 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 140 to 140
 

Privacy

Added:
>
>
Merritt Baer, Chinmayi Sharma, Your Voter Records Are Compromised. Can You Sue? Theories of Harm in Data-Breach Litigation, Lawfare, August 7, 2017
 Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000

Christine Maxwell and Howard Gutowitz, Data Mining Solutions and the Establishment of a Data Warehouse: Corporate Nirvana for the 21st Century?, First Monday, May 1997


PrivacyinPrivate 32 - 09 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 111 to 111
 
<-- Links in this section good as of 8/8/17 -->
Added:
>
>
Daniel Oberhaus, Your 'Anonymous' Browsing Data Isn't Actually Anonymous, Vice, August 3, 2017
 United States v. Horton, No. 16-3976 (8th Cir. 2017)

Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008


PrivacyinPrivate 31 - 04 Aug 2017 - Main.MichaelWeholt
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 109 to 109
 

Anonymity

Added:
>
>
<-- Links in this section good as of 8/8/17 -->

United States v. Horton, No. 16-3976 (8th Cir. 2017)

Arvind Narayanan and Vitaly Shmatikov, Robust De-Anonymizationn of Large Datasets, UT Austin, February 5, 2008

 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995)

Buckley v. American Constitutional Law Foundation, Inc., 525 U.S. 182 (1999)

Line: 119 to 125
 John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000
Added:
>
>
 Nate Anderson, "Anonymized" data really isn't—and here's why not, Ars Technica, September 8, 2009

PrivacyinPrivate 30 - 01 Dec 2016 - Main.PatricioMartinezLlompart
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 301 to 301
 Electronic Frontier Foundation, Surveillance Self-Defense

-- BastiaanSuurmond - 04 Nov 2014

Added:
>
>

Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps

-- PatricioMartinezLlompart - 01 Dec 2016

 
 
<--/commentPlugin-->

I know where you are and I know what you are sharing, exploiting P2P? communication to invade user's privacy


PrivacyinPrivate 29 - 06 Nov 2014 - Main.NigelMustapha
Line: 1 to 1
 
META TOPICPARENT name="LawNetSoc"

Separating Privacy, Secrecy, and Anonymity

Line: 10 to 10
 GNU Privacy Guard: Get it if you don't have it, and please read the GNU Privacy Handbook document.
Changed:
<
<
Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998
>
>
Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998
 Eben Moglen, So Much For Savages, Comments on Encryption Policy, NYU Law School, November 19, 1998 (revised).
Changed:
<
<
Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.
>
>
Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, April 24, 1998.
 David Chaum, Achieving Electronic Privacy, Scientific American, August 1992

Revision 33r33 - 09 Aug 2017 - 18:45:11 - MichaelWeholt
Revision 32r32 - 09 Aug 2017 - 15:44:08 - MichaelWeholt
Revision 31r31 - 04 Aug 2017 - 20:14:14 - MichaelWeholt
Revision 30r30 - 01 Dec 2016 - 17:43:45 - PatricioMartinezLlompart
Revision 29r29 - 06 Nov 2014 - 01:15:01 - NigelMustapha
Revision 28r28 - 04 Nov 2014 - 13:55:12 - BastiaanSuurmond
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM