nce online, our every movement, every click, sent or received email, our every activity produces a vast amount of invisible traces. These traces, once collected, put together and analysed, can reveal ...
Pročitaj još
Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software
At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još
Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software
At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još
n April 2014, we collected about 2000 pages of documents and reports through the series of FOIA1 requests to the Commissioner2 related to the 2012 Report on the inspection procedure over the ...
Pročitaj još
n the previous story we explored the exciting life of our hero – one small Internet packet, but in order to create a wider picture of the data flow and map key locations and actors we conducted a ...
Pročitaj još
There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even ...
Pročitaj još
Users, even advanced ones, often neglect the importance of the Terms of Service, Privacy Policies and other legal documents they are bound to by installing applications on their devices. On the other ...
Pročitaj još
Regulatory approaches to protection of human rights in the digital society: international standards for the protection of personal data
As data we give to corporations while using their services ...
Pročitaj još