PrivacyGroup
The privacy group meets once monthly (location tba).
Questions To Answer
general place to put largish, privacy-related questions
- How much can a person at various levels of authority access of email sent from/to a University of Arizona email account? The rumor is that a lot can be accessed by a lot of people.
Calendar
please add any interesting events you find out about to this by editing PrivacyGroupEvents. You can {{#ask:Has event::+Has event start::+
| ?Has event start=start | ?Has event=summary | format=icalendar | title=testEvents | searchlabel=Export for iCalendar
}} to get these events into other calendars.
{{#ask: has group::Events|limit=100|format=eventcalendar|?has date|?has title|?has group}}
Tools help
browser tools
- RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
- NoScript (I prefer the version without trackers lists -- latest I have is 2.6.9.x)
- PrivacyBadger (EFF)
- Self-Destructing Cookies
- HTTPS Everywhere (EFF)
other tools
- installing the latest GPG
- secure SSH
- Using gpg-agent instead of ssh-agent
- dns leak test -- Test whether you're leaking DNS information while on your VPN, and fix it
various
- you broke the internet, we'll build a gnu one
- EPIC privacy-related tools
- PrivacyPal, Automated Privacy Policy Parsing
- RAPPOR for privacy-preserving stats
- Surveillance Self Defense (EFF)
Additional Sources
why care about privacy?
giving up privacy
- Americans say they want privacy, but act as if they don't
- The End of Privacy on NPR
- Atlantic article on an Arizona man whose anti-privacy views lead him to share everything, including passwords to email, banks, etc.
- Londoners give up their first born in agreeing to privacy policy
how universities can help
- boingboing on online privacy and libraries
- NSF "Dear Collegue" letter on privacy-related research
- list of Tor exit nodes. Search 'university' to see all the universities hosting
miscellaneous
- ProtectionOfHumanSubjects
- Ai Weiwei, Privacy, and the future of surveillance
- Privacy Bibliography
- police and drone use in Baltimore
- U.N. Report on Encryption as a right. "... [T]he present report examines two linked questions. First, do the rights to privacy and freedom of opinion and expression protect secure online communication, specifically by encryption or anonymity? And, second, assuming an affirmative answer, to what extent may Governments, in accordance with human rights law, impose restrictions on encryption and anonymity?"
- CMU study supports that Google cannot police abuse of its ad system, resulting in violation of privacy
- CEO of Hacking Team interviewed on BusinessInsider:
BI: How would you respond to claims Hacking Team's tools help governments infringe on citizens' privacy? DV: In the digital age, criminals and terrorists take full advantage of the secrecy provided by the Internet, encrypted communications over mobile and fixed devices and Internet services such as Tor to conduct crime. Each of us runs the risk of becoming a victim of fraud, extortion or worse because of this situation. There are examples of crime every day, such as the theft of financial data, that have a direct impact on both consumers and business. Law enforcement must have a way to do what it has always done, that is to track criminals and prevent or prosecute crime. With the development of global terrorism and especially the ‘lone wolf’ terrorist, this requirement is even more important. Hacking Team has helped fight crime by providing a surveillance tool to law enforcement. The company believes this is a small step toward a more secure world for all who wish to used the Internet and digital tools lawfully.