09/04/29 Unrelated linkage
09/04/26 Unrelated linkage
09/04/25 Unrelated linkage
09/04/21 Unrelated linkage
09/04/20 Unrelated linkage
09/04/14 Unrelated linkage
09/04/13 Unrelated linkage
09/04/12 Unrelated linkage
Google profiling. Cybercrime. FBI hacking. Everything else.
Google profiling.
The official Google blog: Search for "me" on Google
Wired epicenter: Google wants you to profile yourself
Cybercrime.
Finextra: Hackers steal 285m electronic records in 2008 - Verizon
Blogzilla: Hackers stole 285 million electronic records in 2008
Blog Critics: Twin reports suggest we are losing the cybercrime war
FBI hacking.
Wired threat level: Documents - FBI has been snaring extortionists, hackers for years
Wired threat level: More FBI hacking - feds crack wi-fi to gather evidence
Freedom to tinker: FBI's spyware program
Everything else.
Darkreading: Jericho Forum issues best practices for secure cloud computing
Three strikes, you're still in. Data breaches. Amazon not anti-gay. The cyber civil rights symposium. Everything else.
Three strikes, you're still in.
La quadrature du net: HADOPI, French "three strikes" law rejected!
Wired threat level: French reject 'three-strikes' piracy measure
Data breaches.
The GFI software SME security report (PDF)
GFI: UK SMEs underestimate danger posed by their employees
Darkreading: Many enterprises still don't recognize insider threat, studies say
Wired threat level: PIN crackers nab holy grail of bank card security
View from the bunker: Credit card information... going cheap
Darkreading: Study - despite increased security spending, severity of breaches is on the increase
Amazon not anti-gay.
Wired epicenter: Amazon 'glitch' delists gay-themed books, interwebs cry foul
Wired epicenter: Amazon says it, not hacker, responsible for The Great Amazon Gay Book Debacle - UPDATED
Clay Shirky: The failure of #amazonfail
The cyber civil rights symposium.
SSRN: Danielle Keats Citron, Cyber civil rights
Concurring opinions: Cyber civil rights symposium
Everything else.
Physorg.com: Software improves p2p privacy by hiding in the crowd
Schneier on security: P2P privacy
Office of the Privacy Commissioner of Canada: Deep packet inspection - A collection of essays from industry experts
Darkreading: Tech insight - making the most of open-source forensics tools
The privacy, identity and consent blog
Talking identity: On anonymity, pseudonymity and personas
Racingsnake: Liberty, pseudonymity and personas
Europa press releases RAPID: Telecoms - Commission launches case against UK over privacy and personal data protection
BBC News: EC starts legal action over Phorm
Techdirt: Europe begins legal action against the UK for allowing Phorm to proceed
Facebook and search engines. Anonymity and social networks. Google streetview. Everything else.
Facebook and search engines.
University of Cambridge Computer Laboratory: Eight friends are enough - social graph approximation via public listings (PDF)
Darkreading: Public search engines mine private Facebook details
Anonymity and social networks.
Arvind Narayanan and Vitaly Shmatikov: De-anonymizing social networks
Ars Technica: Pulling back the curtain on "anonymous" Twitterers
BBC News: Social sites dent privacy efforts
Schneier on security: Identifying people using anonymous social networking data
Google streetview.
The privacy, identity and consent blog: Streetview - the public fight back
The technology liberation front: New heights in Googlephobia - "A delinquent, sociopathic parasite?"
Everything else.
Schneier on security: Privacy and the fourth amendment
The Consumerist: Corporate lawyer to corporations - stop suing websites
Techdirt: Lawyers realizing that suing gripe sites might not make much sense
Catching up (part 5 of 5). Anonymity. DNA.
Anonymity.
33 bits of entropy: De-anonymizing social networks
Techdirt: New study shows anonymous data isn't very anonymous at all
DNA.
WSJ: To sketch a thief - genes draw likeness of suspects
The technology libertion front: Gattaca, here we come!
Everything else.
Schneier on security: Massive Chinese espionage network
Wired threat level blog: Electronic spy network focused on Dalai Lama and embassy computers
Risk management blog: GhostNet
Dark reading: Attack of the mini-botnets
Ranum's Rants: The anatomy of security disasters
Risk management blog: Risk takers and security disasters
Wired Epicenter: Google makes finding friends on social sites safer, more secure
The department of social scrutiny: Identity card application forms
Catching up (part 4 of 5). Data retention. Privacy in the UK. Identity fraud. Google versus Privacy International. Everything else.
Data retention.
Stoppt die Vorratsdatenspeicherung: Administrative court - data retention is "invalid"
Techdirt: German court finds data retention to be a violation of privacy
Privacy in the UK.
Blogzilla: Database state
Telegraph: Let people control their own data
Blogzilla: Let people control their own data
Racingsnake: U-turns, u-turns...
Identity fraud.
Security document world: US officials duped in ePassport issuance sting
Digital identity forum: Government interface
Google versus Privacy International.
Techdirt: UK privacy activist claims Google maps is illegal
The Guardian: Google and Privacy International at war over claims of dirty PR tricks and Microsoft bias
NTO UK: The privacy wars
Everything else.
Darkreading: 6 tips for doing more security with less
Techdirt: A closer look at how the takedown process is widely abused
Blogzilla: Robust privacy protection for the future web
David Lacey's security blog: Better standards for standards please
The technology liberation front: ICANN at a crossroads - please choose carefully
Darkreading: Small business - the new black in cybercrime targets
Freedom to tinker: A "Social networking safety act"
Wired Epicenter: Google's data culture drives designer crazy - and out
Risktical ramblings: Stuart King - Information security annoyances - response 1
Risktical ramblings: Stuart King - Information security annoyances - response 2
Risk management blog: Top 5 information security annoyances - #2
Psychology Today: Mass murder is nothing to fear
Schneier on Security: Fear and the availability heuristic
Schneier on Security: Election fraud in Kentucky
Catching up (part 3 of 5). Data breach notification. Privacy in the UK. Naughty auntie. Google. EPIC versus Google. Everything else.
Data breach notification.
Techdirt: Are breach notification laws anything more than window dressing?
Privacy in the UK.
BBC News: Ministers drop data sharing plan
Computer Weekly: Jack Straw U-turn on "Big Brother" data law
The privacy, identity and consent blog: Government scraps Coroners and Justice clauses
Blogzilla: Tracking UK travellers
Naughty auntie.
Techdirt: Did the BBC break the law by exposing botnets?
Securiteam blogs: code red, the BBC, and the Computer Misuse Act
David Lacey's security blog: Keep away from the dark
Google.
The technology liberation front: Google, CDT, online advertising & preserving persistent user choice across ad networks through plug-ins
Wired epicenter blog: Google Latitude to cops: 'I don't remember'
EPIC versus Google.
Cloud security: Dissecting the EPIC complaint against Google
The technology liberation front: Should the FTC shut down Gmail and Google Docs because of an already-fixed bug?
Everything else.
Risk management blog: Top 5 information security annoyances
Risktical ramblings: Application security risk assessments
Wired epicenter: Facebook privacy changes hint at a brave new, Twitter-like, world
The technology liberation front: Privacy solutions (part 4) - Firefox privacy features
Concurring opinions: when can government punish its employees' off-duty speech to protect its own expression?
Schneier on security: IT security - blaming the victim
Schneier on security: The doghouse - Sentex keypads
Techdirt: Italian proposal to ban anonymity online written by DVD industry
Catching up (part 2 of 5). Data breaches. Identity fraud. Privacy in the UK. Privacy anywhere. Everything else.
Data breaches.
Wired Threat Level blog: Do breach notification laws work?
The privacy, identity and consent blog: Privacy 101 - introducing the laws of the bleedin' obvious
Techdirt: Making credit-card payments more secure by making breaches more expensive
Identity fraud.
FTC: FTC releases list of top consumer complaints in 2008
The Economist: Onlike fraud - where your identity is more likely to be stolen
Kim Cameron's Identity weblog: Where is your identity more likely to be stolen?
Privacy in the UK.
Datonomy: Jack Straw agrees to revise information sharing proposals
Racingsnake: Government to withdraw "data sharing" clauses
NTO UK: Online privacy and the future of the internet
Privacy anywhere.
Schneier on security: Privacy in the age of persistence
The technology liberation front: Privacy trade-offs - why we don't really care about our privacy as much as we say
The technology liberation front: Google's ad preference manager - one small step for Google, one giant leap for privacy
Everything else.
The technology liberation front: Privacy solutions series, part 3 - Internet Explorer privacy features
Techdirt: When you treat your customers like criminals, don't be surprised when they go to different suppliers
Techdirt: Verizon's claims that its info-sharing plans are harmless ring hollow
Schneier on security: More European chip and pin insecurity
EFF: The surveillance self-defense project
Kim Cameron's Identity Weblog: Project Geneva (1), (2), (3), (4), (5)
Catching up (part 1 of 5). Privacy in the UK. (Even more) data retention. Data breaches. Biometrics. Digital television. Nothing to hide, nothing to fear - busted once more. Data destruction. Everything else.
Privacy in the UK.
BCS: The British Computer Society's (BCS) Concerns about the data sharing implications of the Coroners and Justice Bill (PDF)
Datonomy: BCS says bill drives "coach and horses" through informed consent
The privacy, identity and consent blog: The injustice of data sharing
BCS: Coroners and Justice Bill - Adios checks and balances
(Even more) data retention.
The technology liberation front: The return of data retention
Wired threat level blog: Feds propose storing internet user data for 2 years
Data breaches.
Wired threat level blog: Clues to massive hacks hidden in plain sight
Datonomy: Do security breaches show how well the system works?
Biometrics.
Digital identity forum: At whose fingerprints?
Digital television.
Philosecurity: DTV coupons - personal tracking
Nothing to hide, nothing to fear - busted once more.
The privacy, identity and consent blog: NTHNTF: More Mythbus(t)ing
Data destruction.
Computerworld storage: Why information must be destroyed
The technology liberation front: The case for data destruction (and why data retention mandates would make it impossible)
Everything else.
NYT: As data collecting grows, privacy erodes
David Lacey's security blog: When laptops go missing
Blog critics: RSA report points to an increase in cyber crime
Emergent chaos: Don't put Peter Fleischer on ice
RFID weblog: ST-694 GlobalTag - the marriage of RFID, satellite communications and GPS
The technology liberation front: Nuts & Bolts - a user's guide to ISP network management
Law and technology theory: Are we all control freaks now?
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.