This is the second story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process hidden behind ...
Pročitaj još
This is the third and final story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process ...
Pročitaj još
ccording to Bulgarian theoretician Alexander Kiossev, there is something that he calls “Self-colonizing metaphor”. He used this concept for explaining cultures subordinated to the cultural power ...
Pročitaj još
It was when the commercial use of geolocation technologies began by the end of the last decade, that a possibility of “digital interaction with the physical environment” led the global networked ...
Pročitaj još
nce online, our every movement, every click, sent or received email, our every activity produces a vast amount of invisible traces. These traces, once collected, put together and analysed, can reveal ...
Pročitaj još
by: oli
Author: Domen Savič, an Internet freedom activist from Slovenia. See more ...
Pročitaj još
Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software
At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još
Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software
At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još
Internal emails of public sector employees are considered to be official working documents and therefore available under the Law on Free Access to Information of Public Importance, Share Foundation ...
Pročitaj još
n April 2014, we collected about 2000 pages of documents and reports through the series of FOIA1 requests to the Commissioner2 related to the 2012 Report on the inspection procedure over the ...
Pročitaj još