- Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
Resource Type: Article Published: 2015 Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
- An Open Letter to the Members of the Wassenaar Arrangement
Sources News Release Resource Type: Article Published: 2014 As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH), Human Rights Watch, Open Technology Institute
- Authorities turn their sights on microblogging
Sources News Release Resource Type: Article Published: 2010 Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
- BitTorrent study finds most file-sharers are monitored
Resource Type: Article Published: 2012 Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-sharer downloading popular content would be logged by a monitoring firm within three hours.
- Canary Watch
Resource Type: Website "Warrant canary" is a colloquial term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Canarywatch tracks and documents these statements. This site lists warrant canaries we know about, tracks changes or disappearances of canaries, and allows submissions of canaries not listed on the site.
- Capitalist Surveillance State: Everyone's a Target
Threatening Reporters, Spying on Public Resource Type: Article Published: 2013 There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
- Caveat Surfer: Beware When Using Electronic Communication
Resource Type: Article Published: 2000 Points about electronic communication and online security.
- Coalition Announces New Do Not Track Standard for Web Browsing
Sources News Release Resource Type: Article Published: 2015 The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger Do Not Track (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
- Come Again? Second Thoughts on My Ashley Madison Affair
Resource Type: Article Published: 2015
- Companies that cooperate with dictatorships must be sanctioned
Sources News Release Resource Type: Article Published: 2011 Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
- Complaints filed against telecom companies for their role in UK mass surveillance programme
Resource Type: Article Published: 2013 On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
- Draconian cyber security bill could lead to Internet surveillance and censorship
Sources News Release Resource Type: Article Published: 2012 Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress.
- EFF Report Charts Companies on Next Frontier of User Privacy
Sources News Release Resource Type: Article Published: 2015 Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
- Email privacy
Wikipedia article Resource Type: Article Published: 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
- EU: Enact Controls on Digital Weapons Trade
Resource Type: Article Published: 2012 Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance and censorship technologies. Repressive governments use these technologies to enable human rights violation.
- The FBI Can Bypass Encryption
Why Cyber Security is a Magic Act Resource Type: Article Published: 2014
- Fifteen minutes of online anonymity
Resource Type: Article Published: 2013 Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative how to have 15 minutes of online anonymity.
- For journalists, danger lurking in your email
Resource Type: Article Published: 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
- GCHQ and European spy agencies worked together on mass surveillance
Resource Type: Article Published: 2013 Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
- Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint
Sources News Release Resource Type: Article Published: 2015 EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
- Google doesn't want you to limit its ability to follow you around the internet
Resource Type: Article Published: 2014 Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
- Google: don't expect privacy when sending to Gmail
Resource Type: Article Published: 2013 People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
- 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
Resource Type: Article Published: 2014 Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
- How can you protect yourself from online snooping?
Sources News Release Resource Type: Article Published: 2013 Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
- How to Leak to The Intercept
Resource Type: Article Published: 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
- Improve your privacy and security on the Internet using Tor
Resource Type: Article Published: 2013 This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
- Information Overload
Driving a Stake Through the National Security State Resource Type: Article Published: 2012 Heres an idea. Lets all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do this, the NSA would have to employ all 15 million unemployed Americans just to begin to look at all those transcripts!
- IntelligentSearch.ca
Resource Type: Website Published: 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
- 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Resource Type: Article Published: 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
- ixquick
Resource Type: Website A meta-search engine which does not record users' IP addresses. It provides a range of advanced search options, and ranks results according to how other search engines aggregately rank a page.
- Journalist Security Guide
Covering the news in a dangerous and changing world Resource Type: Article Published: 2012 This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
- Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release Resource Type: Article Published: 2009 Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in practice limiting free expression and press rights.
- Lessons of the Snowden Revelations
You are the Target! Resource Type: Article Published: 2013 We in the Left have long worried about police state tactics. Now we have to confront the police state structure. Its here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
- Metadata - your files talk for you
Resource Type: Article Published: 2013 Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
- NSA and GCHQ target Tor network that protects anonymity of web users
Resource Type: Article Published: 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
- The NSA Has Effectively Destroyed Internet Privacy
Snowden's Latest Resource Type: Article Published: 2013 Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
- NSA surveillance may cause breakup of internet, warn experts
Resource Type: Article Published: 2013 Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
- The NSA's Invasion of Google and Yahoo Servers
Your Email is Likely Being Monitored Resource Type: Article Published: 2013 The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called MUSCULAR) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
- Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing
Sources News Release Resource Type: Article Published: 2015 Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
- Online Survival Kit
Resource Type: Article Published: 2013 This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
- An Online Tracking Device Thats Virtually Impossible to Block
Resource Type: Article Published: 2014 A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
- Other Voices: The Connexions Newsletter - March 26, 2015
Sustainability, ecology, and agriculture Resource Type: Serial Publication (Periodical) Published: 2015 This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issues, "Blue Betrayal," the film "The Future of Food," the Independent Science News website, which focuses on the science of food and agriculture, and the memoir "Journey of an Unrepentant Socialist" by Brewster Kneen, a former farmer and long-time critic of corporate agriculture.
- Ours to Hack and To Own
The Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet Resource Type: Book Published: 2016 The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-century technologies, free from monopoly, exploitation, and surveillance.
- Preparing for a Digital 9/11
Resource Type: Article Published: 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
- Privacy Badger 1.0 Blocks the Sneakiest Kinds of Online Tracking
Sources News Release Resource Type: Article Published: 2015 The Electronic Frontier Foundation (EFF) today released Privacy Badger 1.0, a browser extension that blocks some of the sneakiest trackers that try to spy on your Web browsing habits.
- Privacy for the other five billion
Resource Type: Article Published: 2013 Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
- Profiled
From Radio to Porn, British Spies Track Web Users' Online Identities Resource Type: Article Published: 2015 Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQs (Government Communications Headquarters) existing electronic eavesdropping capabilities.
- Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
Resource Type: Article Published: 2013 In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
- Protect Yourself from Electronic Spying with Surveillance Self-Defense
Sources News Release Resource Type: Article Published: 2014 The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
- Recommendations on the right to be forgotten
Resource Type: Article Published: 2014 On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Privacy and freedom of expression are fundamental rights of equal value. Whenever one conflicts with the other, a balance must be reached under a judges authority because, as a matter of principle, one cannot be given more importance than the other.
- Revealed: how Whisper app tracks anonymous users
Resource Type: Article Published: 2014 The company behind Whisper, the social media app that promises users anonymity and claims to be the safest place on the internet, is tracking the location of its users, including some who have specifically asked not to be followed.
- 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
4 Ways the Rest of Us Can Help Resource Type: Article Published: 2010 The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
- Six Tips to Protect Your Search Privacy
Resource Type: Article Published: 2006 Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
- Software Meant to Fight Crime Is Used to Spy on Dissidents
Resource Type: Article Published: 2012 Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
- Sources welcomes OrangeWebsite
Sources News Release Resource Type: Article Published: 2011 Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
- Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection Resource Type: Article Published: 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
- Stop Sneaky Online Tracking with EFF's Privacy Badger
Sources News Release Resource Type: Article Published: 2014 Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content that tracks you without your permission. See https://www.eff.org/privacybadger
- Surveillance Self-Defense
Resource Type: Website Published: 2018 Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
- Ten Steps You Can Take Right Now Against Internet Surveillance
Resource Type: Article Published: 2013 One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
- Test Your Online Privacy Protection with EFF's Panopticlick
Sources News Release Resource Type: Article Published: 2015 The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Browser and Add-Ons for Successful Tracker Block
- Tor (anonymity network)
Wikipedia article Resource Type: Article Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user.
- Tor is for Everyone
Why You Should Use Tor Resource Type: Article Published: 2014 EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
- The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Resource Type: Unclassified Published: 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption tools and guarantee the anonymity and privacy of users so as to safeguard the right to freedom of expression online.
- Who does that server really serve?
Resource Type: Article Published: 2013 On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
- Who's the true enemy of internet freedom - China, Russia, or the US?
Resource Type: Article Published: 2015 Beijing and Moscow are rightly chastised for restricting their citizens' online access but it's the US that is now even more aggressive in asserting its digital sovereignty.
- Why I'm Saying Goodbye to Apple, Google and Microsoft
I'm putting more trust in communities than corporations Resource Type: Article Published: 2015 Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
- You selling to me?
Resource Type: Article Published: 2013 Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.
Experts on Internet Privacy in the Sources Directory
- Wikileaks
|
AlterLinks
© 2021.
|