Internet Privacy Assurance
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
A site offering services to allow anonymous Internet browsing, to defeat Internet sites which steal your information and violate your privacy.
The FBI Can Bypass Encryption: Why Cyber Security is a Magic Act
Fifteen minutes of online anonymity
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
How to Leak to The Intercept
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
Improve your privacy and security on the Internet using Tor
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalist Security Guide: Covering the news in a dangerous and changing world
This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The NSA Has Effectively Destroyed Internet Privacy: Snowden's Latest
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
Online Survival Kit
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
Privacy for the other five billion
Donovan, Kevin; Nyst, Carly
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
Sending encrypted emails using Thunderbird and PGP
There are easy ways to ensure your Internet activities remain confidential.
Six Tips to Protect Your Search Privacy
Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Tails: The amnesic Incognito Live System
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
Ten Steps You Can Take Right Now Against Internet Surveillance
One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...
Virtual Private Network (VPN)
This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
Sources Experts & Spokespersons
Beyond Implementation: Policy Considerations for Secure Messengers
The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewards...
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Google: don't expect privacy when sending to Gmail
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
Google and the future of search: Amit Singhal and the Knowledge Graph
An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
How can you protect yourself from online snooping?
Sources News Release
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing
Sources News Release
Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
Stop Sneaky Online Tracking with EFF's Privacy Badger
Sources News Release
Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...
Test Your Online Privacy Protection with EFF's Panopticlick
Sources News Release
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...
Tor (anonymity network)
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi...
Tor is for Everyone
Why You Should Use Tor
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...
Will Full Encryption Sideline Google's Targeted Ads?
Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source?