Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Privacy Protection
AlterLinks Topic Index

  1. Beyond Implementation: Policy Considerations for Secure Messengers
    Resource Type: Article
    Published: 2018
    The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewardship.
  2. Canadian HIV/AIDS Legal Network
    Media Profile in Sources

    Resource Type: Organization
  3. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  4. Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
  5. Connexions
    Volume 4, Number 1 - February 1979 - National Security/Securite Nationale

    Resource Type: Serial Publication (Periodical)
    Published: 1979
  6. Connexions
    Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation

    Resource Type: Serial Publication (Periodical)
    Published: 1980
  7. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    Published: 1984
  8. Connexions Digest
    Issue 54 - February 1992- A Social Change Sourcebook

    Resource Type: Serial Publication (Periodical)
    Published: 1992
  9. The Corporate State of Surveillance
    Opting Out

    Resource Type: Article
    Published: 2013
    America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on what’s-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
  10. Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere
    Sources News Release

    Resource Type: Article
    Published: 2015
    Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies that threaten users' security and privacy.
  11. Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
    Resource Type: Article
    Published: 2011
    Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever.
  12. Edward Snowden's Warning to Canada
    Resource Type: Article
    Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  13. EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
    Sources News Release

    Resource Type: Article
    Published: 2014
    Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
  14. EFF Report Charts Companies on Next Frontier of User Privacy
    Sources News Release

    Resource Type: Article
    Published: 2015
    Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
  15. Electronic Nightmare
    The Home Communications Set and Your Freedom

    Resource Type: Book
    Published: 1981
  16. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  17. Facebook and the Rise of Anti-Social Media
    Resource Type: Article
    Published: 2018
    For those who haven't thought about it, the internet is insidious because of the very capacity that Cambridge Analytica claims to be able to exploit: customization. Users have limited ability to confirm the authenticity of anything they see, read or hear on it. Print editions can be compared and contrasted-- technology limits print media to large-scale deceptions. With the capacity to create entire realms of deception -- identities, content, web pages and entire online publications, trust is made a function of gullibility.
  18. Fifteen minutes of online anonymity
    Resource Type: Article
    Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  19. For journalists, danger lurking in your email
    Resource Type: Article
    Published: 2012
    Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
  20. Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
    Sources News Release

    Resource Type: Article
    Published: 2014
    EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
  21. Get your head out of the clouds
    If we allow our personal data to be stored in giant electornic centres, we deserve what we get

    Resource Type: Article
    Published: 2011
    Appraising the risks to personal data held in cloud computing systems.
  22. HealthSources.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring information and resources about health, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  23. 'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
    Resource Type: Article
    Published: 2014
    Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
  24. How can you protect yourself from online snooping?
    Sources News Release

    Resource Type: Article
    Published: 2013
    Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
  25. How to Leak to The Intercept
    Resource Type: Article
    Published: 2015
    Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
  26. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  27. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  28. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  29. Journalist Security Guide
    Covering the news in a dangerous and changing world

    Resource Type: Article
    Published: 2012
    This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
  30. Metadata - your files talk for you
    Resource Type: Article
    Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  31. Net Crimes and Misdemeanors
    Outmaneuvering the Spammers, Swindlers, and Stalkers Who are Targeting You Online

    Resource Type: Book
    Published: 2002
    Deals with themes such as: protecting one's privacy and personal security in the Internet age, stalking, harassment, identity theft, spam, online fraud, trolls, encryption, online shopping and banking, children, viruses and firewalls.
  32. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
    Resource Type: Article
    Published: 2015
    Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
  33. Nobody's Business
    The Paradoxes of Privacy

    Resource Type: Book
    Published: 1990
  34. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  35. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  36. Online Survival Kit
    Resource Type: Article
    Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  37. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  38. Other Voices: The Connexions Newsletter - April 21, 2018
    Their Interent or Ours?

    Resource Type: Serial Publication (Periodical)
    Published: 2018
    The Internet, which was at one time a free and open space for sharing information and ideas, has been privatized and twisted to serve the profit-making agenda of huge corporations, working hand-in-glove with governments which want to suppress opposition and alternatives. What can we do about it? Is it our Internet or theirs?
  39. PM Prorogues Politics Over National Security
    Sources News Release

    Resource Type: Article
    Published: 2010
    Ambiguity of Conservative MP's statements around body scanners could violate Canadian privacy law.
  40. A practical guide to protecting your identity and security when using mobile phones
    Resource Type: Article
    Published: 2013
    Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
  41. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  42. Privacy!
    How to get it .... How to enjoy it

    Resource Type: Book
    Published: 1977
  43. Privacy
    A Manifesto

    Resource Type: Book
    Published: 2008
    Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
  44. Privacy Badger 1.0 Blocks the Sneakiest Kinds of Online Tracking
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF) today released Privacy Badger 1.0, a browser extension that blocks some of the sneakiest trackers that try to spy on your Web browsing habits.
  45. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    Published: 1992
  46. Privacy for the other five billion
    Resource Type: Article
    Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  47. Protect Students from Corporate Data-Mining in the Classroom
    Resource Type: Article
    Published: 2015
    Across the political spectrum there is debate as to whether data should be collected about students.
  48. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  49. Recommendations on the right to be forgotten
    Resource Type: Article
    Published: 2014
    On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Privacy and freedom of expression are fundamental rights of equal value. Whenever one conflicts with the other, a balance must be reached under a judge’s authority because, as a matter of principle, one cannot be given more importance than the other.
  50. Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
    Sources News Release

    Resource Type: Article
    Published: 2014
    Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
  51. Sending encrypted emails using Thunderbird and PGP
    Resource Type: Article
    Published: 2013
    There are easy ways to ensure your Internet activities remain confidential.
  52. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  53. Software that tracks people on social media created by defence firm
    Resource Type: Article
    Published: 2013
    Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
  54. Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
    Sources News Release

    Resource Type: Article
    Published: 2009
    Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
  55. Sources welcomes OrangeWebsite
    Sources News Release

    Resource Type: Article
    Published: 2011
    Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
  56. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  57. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  58. Tails - live operating system
    theamnesicincognitolivesystem

    Resource Type: Article
    Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
    * use the Internet anonymously and circumvent censorship;
    * all connections to the Internet are forced to go through the Tor network;
    * leave no trace on the computer you are using unless you ask it explicitly;
    * use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
  59. Tails: The amnesic Incognito Live System
    Resource Type: Article
    Published: 2013
    Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
  60. Test Your Online Privacy Protection with EFF's Panopticlick
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Browser and Add-Ons for Successful Tracker Block
  61. They're Going to be Stuffing Our Kids
    Resource Type: Article
    Published: 1991
    Will technology in the classroom be a boon to educators in the future, or a disaster waiting to happen?
  62. Tor is for Everyone
    Why You Should Use Tor

    Resource Type: Article
    Published: 2014
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  63. UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
    Resource Type: Article
    Published: 2015
    In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
  64. Virtual Private Network (VPN)
    Resource Type: Article
    Published: 2013
    This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
  65. What Are Your Options Now For Secure Email?
    Resource Type: Article
    Published: 2014
    It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.
  66. What publishers should do to implement data privacy protection
    Resource Type: Article
    Published: 2015
    With advancing technology, increased cloud integration and general increased reliance on vulnerable networks, keeping information away from skilled 'hacktivists' and tech-savvy malicious misfits is becoming harder by the day.
  67. Who Knows
    Safegurding Your Privacy in a Networked World

    Resource Type: Book
    Published: 1995

Experts on Privacy Protection in the Sources Directory

  1. Article 19

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.