PrivacyGroup: Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
mNo edit summary
Line 5: Line 5:
== Questions To Answer ==
== Questions To Answer ==
'' general place to put largish, privacy-related questions ''
'' general place to put largish, privacy-related questions ''
* What are the different varieties of privacy? (To be addressed soon in a meeting on Topics in Differential Privacy, see calendar).
* How much can a person at various levels of authority access of email sent from/to a University of Arizona email account? The rumor is that a lot can be accessed by a lot of people.
* How much can a person at various levels of authority access of email sent from/to a University of Arizona email account? The rumor is that a lot can be accessed by a lot of people.



Revision as of 00:21, 13 January 2016

This page is an effort to maintain an updated collection of important work on privacy.

Questions To Answer

general place to put largish, privacy-related questions

  • What are the different varieties of privacy? (To be addressed soon in a meeting on Topics in Differential Privacy, see calendar).
  • How much can a person at various levels of authority access of email sent from/to a University of Arizona email account? The rumor is that a lot can be accessed by a lot of people.

Calendar

Events in this calendar are links to readings on differential privacy. <EventCalendar> namespace = PrivacyGroup_Event aspectratio = 1.35 </EventCalendar>

Tools help

browser tools

  • RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
  • NoScript (I prefer the version without trackers lists -- latest I have is 2.6.9.x)
  • PrivacyBadger (EFF)
  • Self-Destructing Cookies
  • HTTPS Everywhere (EFF)
  • BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache) NEW

other tools

various


Additional Sources

why care about privacy?

giving up privacy

how universities can help

miscellaneous

BI: How would you respond to claims Hacking Team's tools help governments infringe on citizens' privacy?

DV: In the digital age, criminals and terrorists take full advantage of the secrecy provided by the Internet, encrypted communications over mobile and fixed devices and Internet services such as Tor to conduct crime. Each of us runs the risk of becoming a victim of fraud, extortion or worse because of this situation. There are examples of crime every day, such as the theft of financial data, that have a direct impact on both consumers and business. Law enforcement must have a way to do what it has always done, that is to track criminals and prevent or prosecute crime. With the development of global terrorism and especially the ‘lone wolf’ terrorist, this requirement is even more important. Hacking Team has helped fight crime by providing a surveillance tool to law enforcement. The company believes this is a small step toward a more secure world for all who wish to used the Internet and digital tools lawfully.