Discussion:PrivacyNightmare : Différence entre versions
(Created page with "Article à lire/ ajouter Le mise en page est la suivante : ===NomDuSite - [url Nom de l'article] (date)=== Extraits pertinents... Mettre un "~" devant les a...") |
|||
(34 révisions intermédiaires par 3 utilisateurs non affichées) | |||
Ligne 1 : | Ligne 1 : | ||
− | |||
− | |||
Le mise en page est la suivante : | Le mise en page est la suivante : | ||
===NomDuSite - [url Nom de l'article] (date)=== | ===NomDuSite - [url Nom de l'article] (date)=== | ||
+ | |||
+ | Extraits pertinents... | ||
+ | |||
+ | Mettre un "~" et une petite explication devant les articles lus et considérés comme peu pertinents. | ||
+ | Put a ~ and a short explanation in front of articles that are read and considered to be less relevant. | ||
+ | |||
+ | Dataindustry: | ||
+ | http://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/ | ||
+ | |||
+ | Data breach | ||
+ | |||
+ | http://www.hilltimes.com/open-government/2013/01/28/privacy-breaches-underline-weak-secretive-federal-data-protection-laws/33460 | ||
+ | weak data protection laws allow for your personal data to exist unencrypted on free-floating harddrives (in some countries). These are prone to get lost. | ||
+ | |||
+ | Surveillance state | ||
− | + | weak data protection laws allow governments to pass laws giving RETROACTIVE immunity to companies who share personal data with the government http://www.harvardlawreview.org/issues/122/february09/Recent_Legislation_527.php | |
+ | |||
+ | government agents in Australia seek power to break into discrete networks like Tor. http://www.crikey.com.au/2013/05/30/revealed-australian-spies-seek-power-to-break-into-tor/ | ||
+ | |||
+ | http://press.uchicago.edu/ucp/books/book/chicago/P/bo5503960.html - Privacy at RiskTHE NEW GOVERNMENT SURVEILLANCE AND THE FOURTH AMENDMENT | ||
+ | Studies | ||
+ | http://www.ceps.eu/book/online-personal-data-processing-and-eu-data-protection-reform | ||
− | |||
− | |||
− | + | ~ pas une bonne reference (it's not a great newspaper... sometimes perhaps but better to find a better journal) http://www.dailymail.co.uk/news/article-2368336/Anonymous-claim-hacked-Femas-servers-posting-staff-details-online-retaliation-threats-agency.html | |
http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling | http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling | ||
− | |||
− | |||
liste d'études ; https://edri.pad.foebud.org/coll-resource-eudatap? | liste d'études ; https://edri.pad.foebud.org/coll-resource-eudatap? | ||
~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/ | ~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/ | ||
− | |||
− | |||
~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/ | ~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/ | ||
~ what an IP Address Can Reveal About You: http://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp | ~ what an IP Address Can Reveal About You: http://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp | ||
− | |||
− | |||
− | |||
− | |||
~ Apple deluged by police demands to decrypt iPhones : http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-by-police-demands-to-decrypt-iphones/ | ~ Apple deluged by police demands to decrypt iPhones : http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-by-police-demands-to-decrypt-iphones/ | ||
Ligne 39 : | Ligne 48 : | ||
http://www.pcmag.com/article2/0,2817,2418659,00.asp | http://www.pcmag.com/article2/0,2817,2418659,00.asp | ||
− | |||
− | |||
− | |||
− | |||
− | |||
http://consent.law.muni.cz/view.php?cisloclanku=2013040001 | http://consent.law.muni.cz/view.php?cisloclanku=2013040001 | ||
Ligne 50 : | Ligne 54 : | ||
http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf | http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf | ||
− | + | Verizon/NSA | |
+ | http://www.wired.com/threatlevel/2013/06/nsa-verizon-call-records | ||
+ | |||
+ | http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order | ||
http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf | http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf | ||
− | |||
− | |||
http://www.smh.com.au/technology/technology-news/online-data-collectors-may-breach-privacy-codes-20130429-2ioun.html | http://www.smh.com.au/technology/technology-news/online-data-collectors-may-breach-privacy-codes-20130429-2ioun.html | ||
Ligne 61 : | Ligne 66 : | ||
http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article | http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
http://www.huntonprivacyblog.com/2013/01/articles/eu-parliament-committee-issues-study-on-cybercrime-and-the-privacy-implications-of-cloud-computing/ | http://www.huntonprivacyblog.com/2013/01/articles/eu-parliament-committee-issues-study-on-cybercrime-and-the-privacy-implications-of-cloud-computing/ | ||
− | http://www.wired.com/wiredenterprise/2013/04/siri-two-years/ | + | ~http://www.wired.com/wiredenterprise/2013/04/siri-two-years/ This article just says that Siri keeps recordings that users made for up to two years, initially the recordings are saved with a random number, after that the associated numbers are deleted... main point it makes is that it's good that apple finally made this public but that they should include this more openly in their user agreements. |
https://pinboard.in/u:hugoroy/t:privacy | https://pinboard.in/u:hugoroy/t:privacy | ||
Ligne 87 : | Ligne 76 : | ||
https://www.nytimes.com/2013/03/31/technology/web-privacy-and-how-consumers-let-down-their-guard.html | https://www.nytimes.com/2013/03/31/technology/web-privacy-and-how-consumers-let-down-their-guard.html | ||
− | |||
− | |||
http://www.pnas.org/content/early/2013/03/06/1218772110.full.pdf+html?sid=33687e4a-51bb-4f3b-9aed-764f3b0c9bf5 | http://www.pnas.org/content/early/2013/03/06/1218772110.full.pdf+html?sid=33687e4a-51bb-4f3b-9aed-764f3b0c9bf5 | ||
− | |||
http://www.zdnet.com/the-end-of-privacy-everyone-worries-about-data-leaks-but-shares-everything-anyway-7000014274/ | http://www.zdnet.com/the-end-of-privacy-everyone-worries-about-data-leaks-but-shares-everything-anyway-7000014274/ | ||
Ligne 104 : | Ligne 90 : | ||
Google Buzz | Google Buzz | ||
− | + | add the changes in user conditions wrt instagram/facebook. | |
− | |||
− | |||
− | + | gmail that shows who you sent the most email to |
Version actuelle datée du 25 novembre 2013 à 00:07
Le mise en page est la suivante :
===NomDuSite - [url Nom de l'article] (date)=== Extraits pertinents...
Mettre un "~" et une petite explication devant les articles lus et considérés comme peu pertinents. Put a ~ and a short explanation in front of articles that are read and considered to be less relevant.
Dataindustry: http://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/
Data breach
http://www.hilltimes.com/open-government/2013/01/28/privacy-breaches-underline-weak-secretive-federal-data-protection-laws/33460 weak data protection laws allow for your personal data to exist unencrypted on free-floating harddrives (in some countries). These are prone to get lost.
Surveillance state
weak data protection laws allow governments to pass laws giving RETROACTIVE immunity to companies who share personal data with the government http://www.harvardlawreview.org/issues/122/february09/Recent_Legislation_527.php
government agents in Australia seek power to break into discrete networks like Tor. http://www.crikey.com.au/2013/05/30/revealed-australian-spies-seek-power-to-break-into-tor/
http://press.uchicago.edu/ucp/books/book/chicago/P/bo5503960.html - Privacy at RiskTHE NEW GOVERNMENT SURVEILLANCE AND THE FOURTH AMENDMENT Studies
http://www.ceps.eu/book/online-personal-data-processing-and-eu-data-protection-reform
~ pas une bonne reference (it's not a great newspaper... sometimes perhaps but better to find a better journal) http://www.dailymail.co.uk/news/article-2368336/Anonymous-claim-hacked-Femas-servers-posting-staff-details-online-retaliation-threats-agency.html
http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling
liste d'études ; https://edri.pad.foebud.org/coll-resource-eudatap?
~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/
~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/
~ what an IP Address Can Reveal About You: http://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp
~ Apple deluged by police demands to decrypt iPhones : http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-by-police-demands-to-decrypt-iphones/
~ https://www.nytimes.com/2013/05/13/business/media/bloomberg-admits-terminal-snooping.html
~ Condamnation Apple : http://www.huntonprivacyblog.com/2013/05/articles/german-court-rules-apples-privacy-policy-violates-german-law/
http://www.pcmag.com/article2/0,2817,2418659,00.asp
http://consent.law.muni.cz/view.php?cisloclanku=2013040001 http://consent.law.muni.cz/view.php?cisloclanku=2013040002
http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf
Verizon/NSA http://www.wired.com/threatlevel/2013/06/nsa-verizon-call-records
http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order
http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf
http://www.ftc.gov/opa/2013/02/path.shtm
http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article
~http://www.wired.com/wiredenterprise/2013/04/siri-two-years/ This article just says that Siri keeps recordings that users made for up to two years, initially the recordings are saved with a random number, after that the associated numbers are deleted... main point it makes is that it's good that apple finally made this public but that they should include this more openly in their user agreements.
https://pinboard.in/u:hugoroy/t:privacy
http://europe-v-facebook.org/EN/en.html
http://mashable.com/2011/08/19/germany-like-button/
anecdote orange accès mail
Google Buzz
add the changes in user conditions wrt instagram/facebook.
gmail that shows who you sent the most email to