Connexions Durchsuchen



Connexions Archiv

Artikel, Bücher, Dokumente, Zeitschriften, Audio-Visuelle Medien


Titelindex

Autorenindex

Fachgebiete Index

Chronologischer Index

Format Index

Dewey-System Index

Library of Congress Classes


Connexions Verzeichnis
von Verbänden & Nichtstaatlichen Organisationen

Fachgebiete Index

Verbände Index

Ausgesuchte Artikel nach
Fachgebiete

Spenden oder Ehrenamtliche Mitarbeit

Ihre Spenden machen unsere Arbeit möglich. Bitte spenden Sie noch heute

Ehrenamtliche Mitarbeit und Praktika

Donate to Connexions
Search engine optimization

Anonymit„t im Internet
Das Connexions Archiv

Um weitere Informationen Anzuzeigen, wie Herausgeber, Erscheinungsdatum, Identifikationsnummer, usw. anzuzeigen, klicken Sie auf einen Titel. Für die meisten Einträge ist eine Inhaltsangabe vorhanden und zusätzlich ein Link, wenn der vollständige Text Online zur Verfügung steht. Einige Einträge enthalten ebenfalls Links zu verwandten Fachgebieten und Einträge im Themenindex. Besonders empfehlenswerte Titel sind mit dem roten Connexions Logo gekennzeichnet.

  1. Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
    Resource Type: Article
    First Published: 2015
    Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
  2. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    First Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  3. Caveat Surfer: Beware When Using Electronic Communication
    Resource Type: Article
    First Published: 2000
    Points about electronic communication and online security.
  4. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    First Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  5. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    First Published: 2014
  6. Fifteen minutes of online anonymity
    Resource Type: Article
    First Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  7. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    First Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  8. Google doesn't want you to limit its ability to follow you around the internet
    Resource Type: Article
    First Published: 2014
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  9. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
    Resource Type: Article
    First Published: 2014
    Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
  10. How to Leak to The Intercept
    Resource Type: Article
    First Published: 2015
    Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
  11. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    First Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  12. Information Overload
    Driving a Stake Through the National Security State

    Resource Type: Article
    First Published: 2012
    Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do this, the NSA would have to employ all 15 million unemployed Americans just to begin to look at all those transcripts!
  13. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  14. Journalist Security Guide
    Covering the news in a dangerous and changing world

    Resource Type: Article
    First Published: 2012
    This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
  15. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    First Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  16. Metadata - your files talk for you
    Resource Type: Article
    First Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  17. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    First Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  18. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    First Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  19. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  20. Online Survival Kit
    Resource Type: Article
    First Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  21. An Online Tracking Device That’s Virtually Impossible to Block
    Resource Type: Article
    First Published: 2014
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  22. Preparing for a Digital 9/11
    Resource Type: Article
    First Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  23. Privacy for the other five billion
    Resource Type: Article
    First Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  24. Profiled
    From Radio to Porn, British Spies Track Web Users’ Online Identities

    Resource Type: Article
    First Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  25. Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
    Resource Type: Article
    First Published: 2013
    In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
  26. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    First Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  27. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    First Published: 2009   Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  28. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    First Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  29. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    First Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  30. Surveillance Self-Defense
    Resource Type: Website
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  31. Ten Steps You Can Take Right Now Against Internet Surveillance
    Resource Type: Article
    First Published: 2013
    One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
  32. Who does that server really serve?
    Resource Type: Article
    First Published: 2010   Published: 2013
    On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
  33. Why I'm Saying Goodbye to Apple, Google and Microsoft
    I'm putting more trust in communities than corporations

    Resource Type: Article
    First Published: 2015
    Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.

Experts on Anonymit„t im Internet in the Sources Directory

  1. Wikileaks

    Connexions Information Sharing Services

Connexions Archiv

Ein Katalog mit mehr als 7000 Büchern, Artikeln, Filmen, Zeitschriften, Webseiten und anderen Quellen.
Sortiert nach Autor, Titel, Format, Fachgebiet, Dewey-System Nummer, Library of Congress Systematik, Erscheinungsjahr.
Connexions Verzeichnis Verbände und nichstaatliche Organisationen die sich mit sozialen und ökologischen Themen beschäftigen — A-Z Index oder Fachgebiete Index.
Für Fachleute und Medienvertreter, besuchen Sie auch das Sources Verzeichnis und den umfangreichen Sources Fachgebiete Index.
Links Ausgesuchte Internet-Quellen mit Informationen über Alternativen.
Kalender Veranstaltungen in ganz Kanada. Siehe auch: Sources Kalender and Pressemeldungen.
Öffentlichkeitsarbeit und Medien Quellen, Publikationen und Artikel die Ihnen helfen die Aufmerksamkeit der Medien zu bekommen und das Bewusstsein für Ihr Anliegen zu schärfen. Außerdem: Verzeichnis von Namen & Nummern aus der kanadischen Medienwelt, ein Verzeichnis von Namen & Nummern aus dem kanadischen Parlament, und Adressenlisten.
Spenden Connexions freut sich über Ihre Unterstützung. Ihre Spenden machen unsere Arbeit möglich. Ehrenamtliche Mitarbeiter sind stets Willkommen.
Mission Connexions ist gedacht für die Unterstützung von Personen und Gruppen, die sich für Freiheit und Soziale Gerechtigkeit einsetzen. Unser anliegen ist es die Aufzeichnungen vom wirken von Menschen und deren Kampf gegen Unterdrückung und für gesellschaftlichen Wandel zur Verfügung zu stellen. Wir glauben daran, dass je mehr wir über die Konflikte, Siege und Niederlagen der Vergangenheit und über diejenigen die daran Teilgenommen haben wissen, desto besser sind wir dazu in der Lage eine neue Welt zu gestallten. Connexions verfügt sowohl über einen Bestand an Büchern und Dokumenten und ist außerdem bemüht das bereits bestehende digitale Archiv an Dokumenten weiter auszubauen. Wir arbeiten daran einen weiten Themenbereich abzudecken, der eine Vielzahl von unterschiedlichen Ansichten und Herangehensweisen für Gesellschaftlichen Wandel umfasst, alles mit dem Grundsätzlichen anliegen der Unterstützung der Demokratie, Bürgerrechte, freie Meinungsäußerung, Menschenrechen, Säkularität, Gleichheit, wirtschaftlichen Gerechtigkeit, ökologisches Verantwortungsbewusstsein und dem erschaffen und dem erhalt von Gemeinschaft. Wir sind International orientiert, allerdings haben wir als kanadisches Projekt eine besonders große Auswahl an kanadischen Dokumenten und Informationen über kanadische Organisationen.