9 Matching Annotations
  1. Jul 2017
    1. Access Now defends and extends the digital rights of users at risk around the world. By combining innovative policy, global advocacy, and direct technical support, we fight for open and secure communications for all.

      open and secure communication through internet Acess now Tunisia

    1. Security & privacy technology research and engineering

      Researcher in security and privacy technology.

    1. Tracking Protection Working Group

      Tracking protection Working Group

    1. 1 Privacy Considerations for Web Protocols

      Interesting document about Privacy

    1. For example, an observer or eavesdropper that conducts traffic analysis may be able to determine what type of traffic is present (real-time communications or bulk file transfers, for example) or which protocols are in use, even if the observed communications are encrypted or the communicants are unidentifiable. This kind of surveillance can adversely impact the individuals involved by causing them to become targets for further investigation or enforcement activities

      good example about surveillance

    2. Privacy

      the term of privacy involves so many other terms like private data, and linkability

    1. A common solution for thefirst problem is to assume that there exists a centralizeddirectory that knows all network members.

      Back to centralization!!

    2. n this case, decentralization enables them toexchange encrypted data and obtain the sought after re-sult without relying on any particular entity to preservetheir privacy.
    3. This implies that any component in a decentralizedsystem is potentially adversarial

      That's why decentralisation isnt the only solution. It should be implement with other tools and looked at carefully