9 Matching Annotations
- Jul 2017
-
www.accessnow.org www.accessnow.org
-
Access Now defends and extends the digital rights of users at risk around the world. By combining innovative policy, global advocacy, and direct technical support, we fight for open and secure communications for all.
open and secure communication through internet Acess now Tunisia
-
-
lukaszolejnik.com lukaszolejnik.com
-
Security & privacy technology research and engineering
Researcher in security and privacy technology.
-
-
www.w3.org www.w3.org
-
Tracking Protection Working Group
Tracking protection Working Group
-
-
www.w3.org www.w3.org
-
1 Privacy Considerations for Web Protocols
Interesting document about Privacy
-
-
tools.ietf.org tools.ietf.org
-
For example, an observer or eavesdropper that conducts traffic analysis may be able to determine what type of traffic is present (real-time communications or bulk file transfers, for example) or which protocols are in use, even if the observed communications are encrypted or the communicants are unidentifiable. This kind of surveillance can adversely impact the individuals involved by causing them to become targets for further investigation or enforcement activities
good example about surveillance
-
Privacy
the term of privacy involves so many other terms like private data, and linkability
Tags
Annotators
URL
-
-
petsymposium.org petsymposium.org
-
A common solution for thefirst problem is to assume that there exists a centralizeddirectory that knows all network members.
Back to centralization!!
-
n this case, decentralization enables them toexchange encrypted data and obtain the sought after re-sult without relying on any particular entity to preservetheir privacy.
-
This implies that any component in a decentralizedsystem is potentially adversarial
That's why decentralisation isnt the only solution. It should be implement with other tools and looked at carefully
-