- Alternatives to Body Scans Do Exist
Sources News Release Resource Type: Article Published: 2010 If the technology exists to detect even greater hazards and protect privacy concerns, why wouldn't our government want to consider them?
- The Big Brother Game
Resource Type: Book Published: 1975
- Big Brother's Getting Bigger
Resource Type: Article Published: 2012 Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
- Canadian Council of Christian Charities
Media Profile in Sources Resource Type: Organization
- The Car of the Future Will Sell Your Data
Resource Type: Article Published: 2018 As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Google and Facebook.
- The City in History
Its Origins, Its Transformations, and Its Prospects Resource Type: Book Published: 1961 Beginning with an interpretation of the origin and nature of the city, Mumford follows the city's development from Egypt and Mesopotamia through Greece, Rome, and the Middle Ages to the modern world.
- Coalition Announces New Do Not Track Standard for Web Browsing
Sources News Release Resource Type: Article Published: 2015 The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger Do Not Track (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
- Connexions
Volume 4, Number 1 - February 1979 - National Security/Securite Nationale Resource Type: Serial Publication (Periodical) Published: 1979
- Connexions
Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation Resource Type: Serial Publication (Periodical) Published: 1980
- Connexions
Volume 7, Number 1 - March 1982 Resource Type: Serial Publication (Periodical) Published: 1982
- Connexions
Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social Resource Type: Serial Publication (Periodical) Published: 1984
- Connexions Annual Resource and Reading List
Resource Type: Article Published: 1994 A short and selective list of resources on issues addressed in the Connexions Annual, such as environment, education, peace, interntional development, women's issues, urban issues, housing, human rights, civil liberties, social change.
- Connexions Digest
Issue 54 - February 1992- A Social Change Sourcebook Resource Type: Serial Publication (Periodical) Published: 1992
- Connexions Library: Human Rights and Civil Liberties Focus
Resource Type: Website Selected articles, books, websites and other resources on civil liberties and human rights.
- Continuous Excursions
Politics and Personal Life Resource Type: Book Published: 1982 Colman looks at the idea that 'the personal is political'. He looks at personal life in pre-capitalist societies, the nature of politics and social relations, patriarchy and sexual relations, intimacy and personal life, indviduality and public life.
- Corporate Coercion and the Drive to Eliminate Buying with Cash
Resource Type: Article Published: 2018 Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
- The Corporate State of Surveillance
Opting Out Resource Type: Article Published: 2013 America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on whats-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
- Data Mining You
How the Intelligence Community Is Creating a New American World Resource Type: Article Published: 2012 Joseph K., that icon of single-lettered anonymity from Franz Kafkas novel The Trial, would undoubtedly have felt right at home in Washington.
- Directory of U.S. Mail Drops
Resource Type: Book Published: 1987
- Edward Snowden's Warning to Canada
Resource Type: Article Published: 2015 Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
- EFF Report Charts Companies on Next Frontier of User Privacy
Sources News Release Resource Type: Article Published: 2015 Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
- Electronic Nightmare
The Home Communications Set and Your Freedom Resource Type: Book Published: 1981
- Email privacy
Wikipedia article Resource Type: Article Published: 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
- The End of Privacy
How Total Surveillance Is Becoming a Reality Resource Type: Book Published: 1999 Whitaker argues that we live in a surveillance society; in order to get rewards and privileges, we have to give up our personal privacy to the government and corporations.
- The Face Off: Law Enforcement Use of Face Recognition Technology
Resource Type: Article Published: 2018 Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies like these is occurring without meaningful oversight, without proper accuracy testing of the systems as they are actually used in the field, and without the enactment of legal protections to prevent internal and external misuse.
- Fifteen minutes of online anonymity
Resource Type: Article Published: 2013 Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative how to have 15 minutes of online anonymity.
- For journalists, danger lurking in your email
Resource Type: Article Published: 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
- For Owners of Amazons Ring Security Cameras, Strangers May Have Been Watching Too
Resource Type: Article Published: 2019 Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-definition feed from around -and perhaps inside- their house.
- Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release Resource Type: Article Published: 2014 EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
- Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get Resource Type: Article Published: 2011 Appraising the risks to personal data held in cloud computing systems.
- Die Globale Teleueberwachung des 21. Jahrhunderts
Resource Type: Article Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
- Google: don't expect privacy when sending to Gmail
Resource Type: Article Published: 2013 People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
- Google and the future of search: Amit Singhal and the Knowledge Graph
Resource Type: Article Published: 2013 An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
- Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
Resource Type: Article Published: 2018 Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps which will continue to track you even when you specifically choose to halt such monitoring.
- Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claims
Resource Type: Article Published: 2016 Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giants latest app, saying: "Google's decision to disable end-to-end encryption by default in its new Allo chat app is dangerous, and makes it unsafe. Avoid it for now."
- Gowling Lafleur Henderson LLP
Media Profile in Sources Resource Type: Organization
- How the US government secretly reads your email
Resource Type: Article Published: 2011 Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
- How to Avoid Electronic Eavesdropping and Privacy Invasion
Resource Type: Book Published: 1972
- Improve your privacy and security on the Internet using Tor
Resource Type: Article Published: 2013 This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
- IntelligentSearch.ca
Resource Type: Website Published: 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
- Is Your Printer Spying On You?
Resource Type: Article Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
- 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Resource Type: Article Published: 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
- Lessons of the Snowden Revelations
You are the Target! Resource Type: Article Published: 2013 We in the Left have long worried about police state tactics. Now we have to confront the police state structure. Its here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
- Media Awareness Network
Media Profile in Sources Resource Type: Organization
- Medical Privacy Under Threat in the Age of Big Data
Resource Type: Article Published: 2015 Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
- Met police using surveillance system to monitor mobile phones
Resource Type: Article Published: 2011 Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
- Metadata - your files talk for you
Resource Type: Article Published: 2013 Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
- Microsoft handed the NSA access to encrypted messages
Resource Type: Article Published: 2013 Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.
- Mistaking Omniscience for Omnipotence
In a World Without Privacy, There Are No Exemptions for Our Spies Resource Type: Article Published: 2013 Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. Its a reasonable supposition that, before the Snowden revelations hit, America's spymasters had made just that mistake. If the drip-drip-drip of Snowdens mother of all leaks -- which began in June and clearly wont stop for months to come -- has taught us anything, however, it should be this: omniscience is not omnipotence. At least on the global political scene today, they may bear remarkably little relation to each other. In fact, at the moment Washington seems to be operating in a world in which the more you know about the secret lives of others, the less powerful you turn out to be.
- A More Perfect Union
Why Straight America Must Stand Up for Gay Rights Resource Type: Book Mohr uses lively examples and historical cases to explore both private and public issues affecting the gay and lesbian community.
- The Naked Society
Resource Type: Book Published: 1964 An expose of the forces which are increasingly depriving Americans of their right to privacy.
- The New Police Surveillance State
The Rising Price of Political Assembly Resource Type: Article Published: 2012 Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
- No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
Resource Type: Article Published: 2015 Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
- The No-Nonsense Guide to Global Media
Resource Type: Book Published: 2004 Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available.
- No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
Resource Type: Article Published: 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
- Nobody's Business
The Paradoxes of Privacy Resource Type: Book Published: 1990
- 'Not a Good Answer': Privacy Advocates Reject Democratic Proposal for 'Technological Wall' With Expanded Border Surveillance
'More surveillance' has become the default answer to far too many difficult policy questions Resource Type: Article Published: 2019 Digital rights advocates called on Democratic lawmakers to expand their fight against the wall into a fight for all human and constitutional rights-instead of suggesting alternative "border security" proposals that would infringe on civil liberties.
- NSA and GCHQ target Tor network that protects anonymity of web users
Resource Type: Article Published: 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
- The Obliteration of Privacy
Snowden and the NSA Resource Type: Article Published: 2014 Its remarkable how little outrage Edward Snowdens NSA revelations have provoked in the American public. One often heard response is something like, Well, I dont have anything to hide, so I dont care if the government is listening to what I say. And if they catch some terrorists, so much the better.
- On Locational Privacy, and How to Avoid Losing it Forever
Resource Type: Article Published: 2009 Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
- Open Marriage
A New Life Style for Couples Resource Type: Book Published: 1972 The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be the basis for intimacy and love.
- Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
Media Profile in Sources Resource Type: Organization
- The Other Police State
Private Cops vs. the Public Good Resource Type: Article Published: 2013 A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms ones worst suspicions about the ever-expanding two-headed U.S. security state. It details how some companies use the security apparatus, including questionable espionage tactics, against anyone who challenges their authority.
- Other Voices: The Connexions Newsletter - December 5, 2015
Ecosocialism, environment, and urban gardening Resource Type: Serial Publication (Periodical) Published: 2015 This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urban gardening, the destruction of olive trees, and how the police are able to use Google's timeline feature to track you every move, now and years into the past.
- Other Voices: The Connexions Newsletter - July 22, 2017
Secrecy and Power Resource Type: Serial Publication (Periodical) Published: 2017 Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
- A practical guide to protecting your identity and security when using mobile phones
Resource Type: Article Published: 2013 Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
- Pragmatic Anonymity
Resource Type: Article Create an account with an anonymization service. Tell everyone about that account, including the password. The account basically acts as a public mail drop, anyone can use it to send messages, with no way for the recipient to determine who originally sent it. The more people that know about this account, the better, since it makes the list of potential recipients longer and longer. If you choose the anonymizer service well, then technical means of identifying the sender will be impossible, and if you make sure enough people know about it, then the pragmatic means (i.e. "I only know one person who might set this up, so I know who sent it") are also stopped short.
- Preparing for a Digital 9/11
Resource Type: Article Published: 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
- Privacy!
How to get it .... How to enjoy it Resource Type: Book Published: 1977
- Privacy
A Manifesto Resource Type: Book Published: 2008 Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
- Privacy For Sale
How Computerization Has Made Everyone's Private Life an Open Secret Resource Type: Book Published: 1992
- Privacy for the other five billion
Resource Type: Article Published: 2013 Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
- Privacy and the Right to Strike in Canada
Resource Type: Article Published: 2013 The neoliberal assault on labour has now entered its fourth decade. Equally concerning for the labour movement has been the long assault on the post-war labour freedoms to organize, bargain, and strike.
- Privacy tapped out
Resource Type: Article Published: 2013 For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now theyve stopped fighting, and the surveillance is out of control.
- Protect Students from Corporate Data-Mining in the Classroom
Resource Type: Article Published: 2015 Across the political spectrum there is debate as to whether data should be collected about students.
- The Puritanical Glee Over the Ashley Madison Hack
Resource Type: Article Published: 2015 High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punishment of the scarlet letter is a historical fact." To see just how current is the mentality driving the scarlet letter, observe the reaction to the Ashley Madison hack.
- Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
Resource Type: Article Published: 2015 Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal in Atlanta. Some of the more dangerous threats to the public's rights to free expression, access to knowledge, and privacy online are contained in the copyright provisions in the Intellectual Property (IP) chapter. Now that the entire agreement is published, we can see how other chapters of the agreement contain further harmful rules that undermine our rights online and over our digital devices and content.
- Secrecy and Power
Introduction to the July 22, 2017 issue of Other Voices Resource Type: Article Published: 2017 It is one of the essential attributes of power that it insists on secrecy. Or, more precisely, those who wield power over others routinely claim that the details of what they do, and why they do it, are far too sensitive to be revealed to the public.
- Sending encrypted emails using Thunderbird and PGP
Resource Type: Article Published: 2013 There are easy ways to ensure your Internet activities remain confidential.
- Shame, Exposure and Privacy
Resource Type: Book Published: 1992 The author defends the individual's need for privacy, presenting healthy shame as a distinguishing mark of humanity.
- Six Tips to Protect Your Search Privacy
Resource Type: Article Published: 2006 Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
- Someone's Watching You!
From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It Resource Type: Book Published: 2011 An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
- Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
Sources News Release Resource Type: Article Published: 2009 Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
- Sources welcomes OrangeWebsite
Sources News Release Resource Type: Article Published: 2011 Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
- Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection Resource Type: Article Published: 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
- Spying on Democracy
Government Surveillance, Corporate Power, and Public Resistance Resource Type: Book Published: 2013 Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
- The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state Resource Type: Article Published: 2008 As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of citizens has become an accepted 'counter-terrorism' measure.
- Stop replacing London's phone boxes with corporate surveillance
New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you Resource Type: Article Published: 2018 Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the city.
- Surveillance Self-Defense
Resource Type: Website Published: 2018 Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
- Tails: The amnesic Incognito Live System
Resource Type: Article Published: 2013 Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
- The Age of Accountability is Now: Are You Prepared?
Sources News Release Resource Type: Article Published: 2012 Questions of accountability and building a reputation of integrity in personal and professional relationships.
- Think the Left Won the Culture War? Think Again
Resource Type: Article Published: 2015 With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
- Thirteen Ways Government Tracks Us
Resource Type: Article Published: 2012 Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track people.
- Tor is for Everyone
Why You Should Use Tor Resource Type: Article Published: 2014 EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
- Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
Resource Type: Article Published: 2015 A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
- UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
Resource Type: Article Published: 2015 In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
- Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
Resource Type: Article Published: 2013 Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
- Virtual Private Network (VPN)
Resource Type: Article Published: 2013 This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
- Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
Resource Type: Article Published: 2014 Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
- Wanted: A Hackers' Charter
Resource Type: Article
- The Watchers
The Rise of America's Surveillance State Resource Type: Book Published: 2010 An exploration of how and why the American government increasingly spies on its own citizens.
- Who Knows
Safegurding Your Privacy in a Networked World Resource Type: Book Published: 1995
- Will the government's counter-extremist programme criminalise dissent?
Resource Type: Article Published: 2015 From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. governments Prevent policy to identify would-be extremists. Under the fast-tracked Counter-Terrorism and Security Act 2015, schools, universities and health service providers can no longer opt out of monitoring students and patients for supposed radicalised behaviour.
- You selling to me?
Resource Type: Article Published: 2013 Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.
|
AlterLinks
© 2021.
|