09/05/31 Doctor Who: The Christmas invasion
09/05/29 Unrelated linkage
09/05/25 Unrelated linkage
09/05/17 Unrelated linkage
09/05/09 Unrelated linkage
09/05/06 Unrelated linkage
Getting started with my reviews of new Doctor Who, second series.
The review can be found here:
The Christmas invasion (2005)
Data breaches. Privacy legislation evaluated. Data deletion. Location data and anonymity. Data non-deletion. Data correlation.
Data breaches.
Wired threat level: Data breach exposes RAF staff to blackmail
Blogzilla: Data breaches go on, and on...
Privacy legislation evaluated.
Rand Europe (hosted on ico.gov.uk:) Review of the European Data Protection Directive (PDF)
Forbes: The hidden cost of privacy
Techdirt: More privacy laws don't mean more privacy
Data deletion.
The Guardian: NHS patients given right to delete electronic record
Out-law.com: Patients win right to delete records on controversial health database
Location data and anonymity.
Palo Alto Research Center: On the anonymity of home / work location pairs (PDF)
33 bits of entropy: Your morning commute is unique: on the anonymity of home / work location pairs
The Register: Scrubbed geo-location data not so anonymous after all
Techdirt: And yet another 'anonymous' dataset proves to be not anonymous
Data non-deletion.
BBC dot.life: Your photos - stuck in the cloud?
BBC news: Websites 'keeping deleted photos'
View from the bunker: Once it's out there...
Data correlation.
Office of the Privacy Commissioner of Canada: Trading information for ads, discounts and coupons
Kim Cameron's identity weblog: Do people care about data correlation?
Data leak. Data mining. Identity management. P2P. Fandom rights. The internet sucks. Everything else.
Data leak.
VNUnet.com: Hard drive theft led to MPs expenses crisis
Data mining.
NYT: What does your credit-card company know about you?
Concurring Opinions; Credit cards, data mining, and privacy
Identity management.
My ID score
The technology liberation front: My ID score
Technology review: Are your "Secret questions" too easily answered?
Microsoft Research: Measuring the security and reliability of authentication via 'secret' questions
The blog of content protection: Retrieving lost passwords through social interaction
P2P.
PRS for music: The long tail of P2P (PDF)
Wired Epicenter: Report challenges long tail theory on P2P networks
Fandom rights.
The Guardian: When love is harder to show than hate
Techdirt: Why isn't there a fan-use exception to copyright law?
The internet sucks.
Times Online: Break free of this world wide delusion
Techdirt: Did you know that the web is a plot by a bunch of California cultists to destroy your life?
Everything else.
The Register: Viral web infection siphons ad dollars from Google
The privacy, identity and consent blog: CCTV of little use - well there's a surprise
The technology liberation front: Is Facebook violating federal wiretapping laws?
Tune into RFID: EC recognised EPCglobal message over RFID
RFID and privacy. Cloud security. Google. Botnets. Everything else.
RFID and privacy.
European Commision: Commission recommendation of 12.5.2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification (RFID) (PDF)
European Commission: Small chips with big potentia - new EU recommendations make sure 21st century bar codes respect privacy
Cloud security.
Cloud Security: The Cloud Security Alliance needs you
Google.
Computerworld: What Google knows about you
Botnets.
University of California, Santa Barbara: Your botnet is my botnet - analysis of a botnet takeover (PDF)
Ars technica: Researchers hijack botnet, score 56,000 passwords in an hour
Schneier on security: Researchers hijack a botnet
Everything else.
The Register: Fetish club forces ID scanner climbdown
Racingsnake: Excellent privacy article on The Register
Techdirt: The rise of corporate identity fraud
Talking identity: Entitlement managment - more than meets the eye
European legislation. Security architecture. Cloud security. Privacy notices. Privacy in the UK. Everything else.
European legislation.
Techdirt: EU says no to three strikes on accusation only; requires court order
European Commission: EU telecoms reform agreed - 12 reforms to boost a consumer-friendly European single telecoms market
Techdirt: EU reaches draft deal that would make three strikes provisions more difficult
Security architecture.
David Lacey's security blog: Drowning in a sea of security frameworks
David Lacey's security blog: Principles of good security architecture
Cloud security.
Privacy value networks: Home run
Privacy notices.
The Register: Privacy notices work best in tables, says US gov research
Racingsnake: Privacy good practice
Privacy in the UK.
New Statesman: The database tyranny
Financial Times: Lady Thatcher would despise today's vision
Everything else.
Wired epicenter: Facebook's e-mail censorship is legally dubious, experts say
Experientia: Identity management manifesto
Wired Epicenter: Libraries warn of censorship, privacy, cost in Google's digital library
NTOUK: Improving public sector IT
New Media Knowledge: Exclusive interview - Oxford Internet Institute sets out the privacy threats in 2009
Techdirt: Italy's troubling view of the Internet
The privacy, identity and consent blog: Opt-out or opt-in
Phorm. UK ID cards and public opinion. Data privacy. Everything else.
Phorm.
Techdirt: UK officials accused of colluding with Phorm
The privacy, identity and consent blog: Phiting dirty
The privacy, identity and consent blog: More on Phorm
UK ID cards and public opinion.
Future Identity: David Cameron on "Today" programme
Data privacy.
Schneier on Security: Unfair and deceptive data trade practices
Techdirt: Just because a site has a privacy policy, doesn't mean it will keep your data private
The technology liberation front: Schneier on RealAge.com - factually incorrect
Everything else.
Wired threat level: U.K. man sues bank over 'phantom' withdrawals from chip-and-PIN account
Concurring opinions: Family privacy rights in death-scene images of the deceased
Cloudsecurity.org: ENISA cloud risk assessment - what are your concerns about cloud computing?
Wired epicenter: Your Facebook profile makes marketers' dreams come true
Concurring opinions: Google profiles and online self-ownership
Wired Threat level: Swedish ISP thwarts copyright cops by erasing data
Techdirt: UK drops plan for government internet and phone database; tells ISPs and operators to retain the data instead
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.