Home Title Index Topic Index Sources Directory News Releases Sources Calendar

Internet Privacy
AlterLinks Topic Index

  1. Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
    Resource Type: Article
    Published: 2015
    Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
  2. An Open Letter to the Members of the Wassenaar Arrangement
    Sources News Release

    Resource Type: Article
    Published: 2014
    As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH), Human Rights Watch, Open Technology Institute
  3. Authorities turn their sights on microblogging
    Sources News Release

    Resource Type: Article
    Published: 2010
    Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
  4. BitTorrent study finds most file-sharers are monitored
    Resource Type: Article
    Published: 2012
    Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-sharer downloading popular content would be logged by a monitoring firm within three hours.
  5. Canary Watch
    Resource Type: Website
    "Warrant canary" is a colloquial term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Canarywatch tracks and documents these statements. This site lists warrant canaries we know about, tracks changes or disappearances of canaries, and allows submissions of canaries not listed on the site.
  6. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  7. Caveat Surfer: Beware When Using Electronic Communication
    Resource Type: Article
    Published: 2000
    Points about electronic communication and online security.
  8. Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
  9. Come Again? Second Thoughts on My Ashley Madison Affair
    Resource Type: Article
    Published: 2015
  10. Companies that cooperate with dictatorships must be sanctioned
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
  11. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  12. Draconian cyber security bill could lead to Internet surveillance and censorship
    Sources News Release

    Resource Type: Article
    Published: 2012
    Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress.
  13. EFF Report Charts Companies on Next Frontier of User Privacy
    Sources News Release

    Resource Type: Article
    Published: 2015
    Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
  14. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  15. EU: Enact Controls on Digital Weapons Trade
    Resource Type: Article
    Published: 2012
    Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance and censorship technologies. Repressive governments use these technologies to enable human rights violation.
  16. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    Published: 2014
  17. Fifteen minutes of online anonymity
    Resource Type: Article
    Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  18. For journalists, danger lurking in your email
    Resource Type: Article
    Published: 2012
    Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
  19. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  20. Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint
    Sources News Release

    Resource Type: Article
    Published: 2015
    EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
  21. Google doesn't want you to limit its ability to follow you around the internet
    Resource Type: Article
    Published: 2014
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  22. Google: don't expect privacy when sending to Gmail
    Resource Type: Article
    Published: 2013
    People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
  23. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
    Resource Type: Article
    Published: 2014
    Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
  24. How can you protect yourself from online snooping?
    Sources News Release

    Resource Type: Article
    Published: 2013
    Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
  25. How to Leak to The Intercept
    Resource Type: Article
    Published: 2015
    Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
  26. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  27. Information Overload
    Driving a Stake Through the National Security State

    Resource Type: Article
    Published: 2012
    Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do this, the NSA would have to employ all 15 million unemployed Americans just to begin to look at all those transcripts!
  28. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  29. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  30. ixquick
    Resource Type: Website
    A meta-search engine which does not record users' IP addresses. It provides a range of advanced search options, and ranks results according to how other search engines aggregately rank a page.
  31. Journalist Security Guide
    Covering the news in a dangerous and changing world

    Resource Type: Article
    Published: 2012
    This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
  32. Journalists Welcome European Call to Review Anti-Terrorism Laws
    Sources News Release

    Resource Type: Article
    Published: 2009
    Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in practice limiting free expression and press rights.
  33. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  34. Metadata - your files talk for you
    Resource Type: Article
    Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  35. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  36. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  37. NSA surveillance may cause breakup of internet, warn experts
    Resource Type: Article
    Published: 2013
    Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
  38. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  39. Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing
    Sources News Release

    Resource Type: Article
    Published: 2015
    Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
  40. Online Survival Kit
    Resource Type: Article
    Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  41. An Online Tracking Device That’s Virtually Impossible to Block
    Resource Type: Article
    Published: 2014
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  42. Other Voices: The Connexions Newsletter - March 26, 2015
    Sustainability, ecology, and agriculture

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issues, "Blue Betrayal," the film "The Future of Food," the Independent Science News website, which focuses on the science of food and agriculture, and the memoir "Journey of an Unrepentant Socialist" by Brewster Kneen, a former farmer and long-time critic of corporate agriculture.
  43. Ours to Hack and To Own
    The Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet

    Resource Type: Book
    Published: 2016
    The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-century technologies, free from monopoly, exploitation, and surveillance.
  44. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  45. Privacy Badger 1.0 Blocks the Sneakiest Kinds of Online Tracking
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF) today released Privacy Badger 1.0, a browser extension that blocks some of the sneakiest trackers that try to spy on your Web browsing habits.
  46. Privacy for the other five billion
    Resource Type: Article
    Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  47. Profiled
    From Radio to Porn, British Spies Track Web Users' Online Identities

    Resource Type: Article
    Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  48. Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
    Resource Type: Article
    Published: 2013
    In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
  49. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  50. Recommendations on the right to be forgotten
    Resource Type: Article
    Published: 2014
    On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Privacy and freedom of expression are fundamental rights of equal value. Whenever one conflicts with the other, a balance must be reached under a judge’s authority because, as a matter of principle, one cannot be given more importance than the other.
  51. Revealed: how Whisper app tracks ‘anonymous’ users
    Resource Type: Article
    Published: 2014
    The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed.
  52. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  53. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  54. Software Meant to Fight Crime Is Used to Spy on Dissidents
    Resource Type: Article
    Published: 2012
    Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
  55. Sources welcomes OrangeWebsite
    Sources News Release

    Resource Type: Article
    Published: 2011
    Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
  56. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  57. Stop Sneaky Online Tracking with EFF's Privacy Badger
    Sources News Release

    Resource Type: Article
    Published: 2014
    Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content that tracks you without your permission. See https://www.eff.org/privacybadger
  58. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  59. Ten Steps You Can Take Right Now Against Internet Surveillance
    Resource Type: Article
    Published: 2013
    One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
  60. Test Your Online Privacy Protection with EFF's Panopticlick
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Browser and Add-Ons for Successful Tracker Block
  61. Tor (anonymity network)
    Wikipedia article

    Resource Type: Article
    Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user.
  62. Tor is for Everyone
    Why You Should Use Tor

    Resource Type: Article
    Published: 2014
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  63. The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
    Resource Type: Unclassified
    Published: 2015
    David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption tools and guarantee the anonymity and privacy of users so as to safeguard the right to freedom of expression online.
  64. Who does that server really serve?
    Resource Type: Article
    Published: 2013
    On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
  65. Who's the true enemy of internet freedom - China, Russia, or the US?
    Resource Type: Article
    Published: 2015
    Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty.
  66. Why I'm Saying Goodbye to Apple, Google and Microsoft
    I'm putting more trust in communities than corporations

    Resource Type: Article
    Published: 2015
    Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
  67. You selling to me?
    Resource Type: Article
    Published: 2013
    Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.

Experts on Internet Privacy in the Sources Directory

  1. Wikileaks


AlterLinks


© 2021.