Take Control of Your Online Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Take Control of Your Online Privacy EBOOK EXTRAS: v1.1 Downloads, Updates, Feedback TAKE CONTROL OF YOUR ONLINE PRIVACY by JOE KISSELL $10 Thank You, AgileBits This book is a gift from AgileBits, the company behind 1Password. One of the essential steps to keeping your personal information private is choosing passwords that are long, random, and different for every site and service you use. 1Password makes this process simple, and it has been my favorite password manager for many years. —Joe Kissell 2 From Dave at AgileBits To all our amazing customers. We wouldn’t be here without you. Thank you for enabling us to work at our dream jobs. —Dave Teare 3 Table of Contents Read Me First .............................................................. 7 Updates and More .......................................................... 7 Basics ......................................................................... 8 What’s New in Version 1.1 ............................................... 8 Introduction .............................................................. 10 Online Privacy Quick Start ......................................... 13 Learn What You Have to Hide .................................... 15 Things You Might Want to Keep Private ............................. 15 Personally Identifiable Information ................................... 18 Learn Who Wants Your Private Data (and Why) ....... 20 Advertisers ................................................................. 20 Local Villains ............................................................... 24 Hackers ..................................................................... 24 Big Media ................................................................... 25 Big Money .................................................................. 26 Big Data ..................................................................... 26 Big Brother ................................................................. 27 What about Privacy Policies? ........................................... 28 Develop a Privacy Strategy ....................................... 30 Fix the Easy Things ...................................................... 30 Create Privacy Rules for Yourself ..................................... 32 Cope with Special Cases ................................................ 33 Take the Pledge ........................................................... 34 Keep Your Internet Connection Private ..................... 37 Understand the Privacy Risks of Your Internet Connection ..... 37 Prevent Snooping ......................................................... 40 Turn Off Unnecessary Services ........................................ 51 4 Use a Firewall .............................................................. 54 Use an Outbound Firewall .............................................. 56 Browse the Web Privately ......................................... 58 Understand the Privacy Risks of Web Browsing ................... 58 Go to the Right Site ...................................................... 63 Browse Securely .......................................................... 64 Manage Local Storage of Private Data ............................... 65 Protect Passwords and Credit Card Info ............................ 75 Search Privately ........................................................... 77 Browse Anonymously .................................................... 77 Shop Online Privately .................................................... 81 Improve Email Privacy .............................................. 83 Understand the Privacy Risks of Email .............................. 84 Reduce Email Privacy Risks ............................................ 87 Encrypt Your Email ....................................................... 93 Send and Receive Email Anonymously .............................. 96 Use Email Alternatives ................................................... 97 Talk and Chat Privately ............................................. 99 Understand the Privacy Risks of Real-Time Communication .. 100 Improve Your Real-Time Communication Privacy ............... 101 Keep Social Media Sort of Private-ish ...................... 103 Understand the Privacy Risks of Social Media .................... 103 Check Your Privacy Settings .......................................... 105 Use Other Social Media Precautions ................................ 106 Share Files Privately ............................................... 109 Understand the Privacy Risks of File Sharing .................... 109 Encrypt Transfers, Files, or Both .................................... 110 Use Peer-to-Peer File Sharing ........................................ 113 Create a Personal Cloud ............................................... 115 Maintain Privacy for Your Kids ................................ 117 5 Teach This Book ...................................................... 120 About This Book ...................................................... 121 Ebook Extras ............................................................. 121 About the Author ........................................................ 122 About the Publisher ..................................................... 123 Copyright and Fine Print ......................................... 124 Featured Titles ........................................................ 125 6 Read Me First Welcome to Take Control of Your Online Privacy, version 1.1, published in March 2014 by TidBITS Publishing Inc. This book was written by Joe Kissell and edited by Geoff Duncan. This book explains potential privacy risks in everyday online activities like Web browsing and sending email, and suggests strategies for avoiding common pitfalls and improving online privacy. If you want to share this ebook with a friend, we ask that you do so as you would with a physical book: “lend” it for a quick look, but ask your friend to buy a copy for careful reading or reference. Also, you can Teach This Book. Copyright © 2014, alt concepts inc. All rights reserved. Updates and More You can access extras related to this book on the Web (use the link in Ebook Extras, near the end; it’s available only to purchasers). On the ebook’s Take Control Extras page, you can: • Download any available new version of the ebook for free, or buy any subsequent edition at a discount. • Download various formats, including PDF, EPUB, and Mobipocket. (Learn about reading on mobile devices on our Device Advice page.) • Read the ebook’s blog. You may find new tips or information, links to author interviews, and update plans for the ebook. If you bought this ebook from the Take Control Web site, it has been added to your account, where you can download it in other formats and access any future updates. However, if you bought this ebook elsewhere, you can add it to your account manually; see Ebook Extras. 7 Basics Here are a few “rules of the road” that will help you read this book: • Links: All blue text in this ebook is hot, meaning you can click (or tap) it, just like a link on the Web. If you click a link that takes you to a different part of the ebook, you can return quickly to where you were if your ebook reader offers a “back” feature. For example, if you use iBooks to read the EPUB version of this ebook, you can click the “Back to” link at the lower left. Or, if you use Preview on the Mac to read the PDF version of this ebook, you can choose Go > Back or press Command-[. • Menus: Where I describe choosing a command from a menu in the menu bar, I use an abbreviated description. For example, the abbreviated description for the menu command that creates a new folder in the Finder is “File > New Folder.” • Mobile devices: In this book I distinguish between conventional (desktop or laptop) computers and mobile devices, by which I mean smartphones, tablets, e-readers, and other handheld computer-like devices. The iPhone, iPad, iPod touch, Kindle, and BlackBerry (among many others) would all be considered mobile devices. What’s New in Version 1.1 Version 1.1 of this book, released about eight months after the original publication date, updates the book with the latest privacy-related information and adds numerous details. The most significant changes are as follows: • Added a note in Hackers about how to search for information on recent privacy breaches. • Included a tip in Big Brother with links to resources detailing government surveillance revelations. 8 • Updated Fix the Easy Things to emphasize the importance of keeping one’s operating systems up to date with security fixes. • Replaced numerous graphics (see, for example, Encrypt Your Wi-Fi Connection) with spiffier versions. • Made several clarifications about speed and reliability in Use a VPN. • Added a sidebar, SSL Implementation Bugs, covering the serious SSL vulnerability Apple disclosed and fixed in February 2014. • Updated the sidebar Set-top Boxes and the Like to further discuss the Internet of Things (“smart” connected objects like light bulbs and thermostats). • Mentioned how a password manager can ensure that you Go to the Right Site. • Noted the improved Private Browsing option in Safari for iOS 7 in Private Browsing Modes. • Included information on iCloud Keychain in Protect Passwords and Credit Card Info. • In Browse Anonymously, added a note distinguishing between anonymity and untraceability, and mentioned a further Tor vulnerability. • Mentioned cryptocurrencies such as Bitcoin in Shop Online Privately. • In Understand the Privacy Risks of Real-Time Communication,
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Reporters Without Borders TV5 Monde Prize 2015 Nominees
    Reporters Without Borders ­ TV5 Monde Prize 2015 Nominees Journalist Category Mahmoud Abou Zeid, aka Shawkan (Egypt) “I am a photojournalist, not a criminal,” Shawkan wrote from Tora prison in February. “My ​ ​ ​ indefinite detention is psychologically unbearable. Not even animals would survive in these conditions." ​ Shawkan is an Egyptian freelance photojournalist who has been in pre­trial detention for more than 760 days. He was arrested on 14 August 2013 while providing the US photojournalism agency Demotix and the US digital media company Corbis with coverage of ​ ​ ​ ​ the violence used to disperse demonstrations by deposed President Mohamed Morsi’s supporters in Rabiaa Al­Awadiya Square. Three journalists were killed that day in connection with their work Aged 28, Shawkan covered developments in Egypt closely from Mubarak’s fall to Morsi’s overthrow and on several occasions obtained striking shots of the popular unrest. His detention became illegal in August of this year because, under Egyptian law, pre­trial detention may surpass two years only in exceptional cases. Few people in Egypt have ever been held pending trial as long as him. A date has finally been set for the start of his trial, 12 December 2015, when he will be prosecuted before a Cairo criminal court along with more than 700 other defendants including members of the Muslim Brotherhood, which was declared a terrorist organization in December 2013. Many charges have been brought against him without any evidence, according to his lawyer, Karim Abdelrady. The most serious include joining a banned organization [the Muslim Brotherhood], murder, attacking the security forces and possession of weapons.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • A Generic Data Exchange System for F2F Networks
    The Retroshare project The GXS system Decentralize your app! A Generic Data Exchange System for F2F Networks Cyril Soler C.Soler The GXS System 03 Feb. 2018 1 / 19 The Retroshare project The GXS system Decentralize your app! Outline I Overview of Retroshare I The GXS system I Decentralize your app! C.Soler The GXS System 03 Feb. 2018 2 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows, (+ Android). C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows.
    [Show full text]
  • Copyrighted Material
    Anonymizing 1 Your Activities In our daily lives we like to have a certain level of privacy. We have curtains on our win- dows, doors for our offices, and even special screen protectors for computers to keep out prying eyes. This idea of wanting privacy also extends to the use of the Internet. We do not want people knowing what we typed in Google, what we said in our Instant Message conversations, or what websites we visited. Unfortunately, your private information is largely available if someone is watching. When doing any number of things on the Internet, there are plenty of reasons you might want to go incognito. However, that does not mean you’re doing anything wrong or illegal. he justification for anonymity when researching malware and bad guys is pretty Tstraightforward. You do not want information to show up in logs and other records that might tie back to you or your organization. For example, let’s say you work at a finan- cial firm and you recently detected that a banking trojan infected several of your systems. You collected malicious domain names, IP addresses, and other data related to the malware. The next steps you take in your research may lead you to websites owned by the criminals. As a result, if you are not taking precautions to stay anonymous, your IP address will show up in various logs and be visible to miscreants. If the criminals can identify you or the organization from which you conduct your research, they may COPYRIGHTEDchange tactics or go into hiding, MATERIAL thus spoiling your investigation.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • A Tool for Protecting Children's Privacy Online☆
    Decision Support Systems 54 (2013) 1161–1173 Contents lists available at SciVerse ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss POCKET: A tool for protecting children's privacy online☆ France Bélanger a, Robert E. Crossler b,⁎, Janine S. Hiller c, Jung-Min Park d, Michael S. Hsiao d a 850 Drillfield Drive, Suite 3007, Blacksburg, VA 24061–0101, USA b PO Box 9581, Mississippi State University, Mississippi State, MS 39762, USA c 850 Drillfield Drive, Suite 2120, Blacksburg, VA 24061–0221, USA d 1185 Perry St. Room 302, Blacksburg, VA 24061–0111, USA article info abstract Article history: Children's privacy in the online environment has become critical. Use of the Internet is increasing for com- Received 3 August 2011 mercial purposes, in requests for information, and in the number of children who use the Internet for casual Received in revised form 12 September 2012 web surfing, chatting, games, schoolwork, e-mail, interactive learning, and other applications. Often, websites Accepted 11 November 2012 hosting these activities ask for personal information such as name, e-mail, street address, and phone number. Available online 19 November 2012 In the United States, the children's online privacy protection act (COPPA) of 1998 was enacted in reaction to widespread collection of information from children and subsequent abuses identified by the Federal Trade Keywords: Information privacy Commission (FTC). COPPA is aimed at protecting a child's privacy by requiring parental consent before Privacy collecting information from children under the age of 13. To date, however, the business practices used COPPA and the technical approaches employed to comply with COPPA fail to protect children's online privacy effec- Children tively.
    [Show full text]
  • Karaoke Songs by Title
    Songs by Title Title Artist Title Artist #9 Dream Lennon, John 1985 Bowling For Soup (Day Oh) The Banana Belefonte, Harry 1994 Aldean, Jason Boat Song 1999 Prince (I Would Do) Anything Meat Loaf 19th Nervous Rolling Stones, The For Love Breakdown (Kissed You) Gloriana 2 Become 1 Jewel Goodnight 2 Become 1 Spice Girls (Meet) The Flintstones B52's, The 2 Become 1 Spice Girls, The (Reach Up For The) Duran Duran 2 Faced Louise Sunrise 2 For The Show Trooper (Sitting On The) Dock Redding, Otis 2 Hearts Minogue, Kylie Of The Bay 2 In The Morning New Kids On The (There's Gotta Be) Orrico, Stacie Block More To Life 2 Step Dj Unk (Your Love Has Lifted Shelton, Ricky Van Me) Higher And 20 Good Reasons Thirsty Merc Higher 2001 Space Odyssey Presley, Elvis 03 Bonnie & Clyde Jay-Z & Beyonce 21 Questions 50 Cent & Nate Dogg 03 Bonnie And Clyde Jay-Z & Beyonce 24 Jem (M-F Mix) 24 7 Edmonds, Kevon 1 Thing Amerie 24 Hours At A Time Tucker, Marshall, 1, 2, 3, 4 (I Love You) Plain White T's Band 1,000 Faces Montana, Randy 24's Richgirl & Bun B 10,000 Promises Backstreet Boys 25 Miles Starr, Edwin 100 Years Five For Fighting 25 Or 6 To 4 Chicago 100% Pure Love Crystal Waters 26 Cents Wilkinsons, The 10th Ave Freeze Out Springsteen, Bruce 26 Miles Four Preps, The 123 Estefan, Gloria 3 Spears, Britney 1-2-3 Berry, Len 3 Dressed Up As A 9 Trooper 1-2-3 Estefan, Gloria 3 Libras Perfect Circle, A 1234 Feist 300 Am Matchbox 20 1251 Strokes, The 37 Stitches Drowning Pool 13 Is Uninvited Morissette, Alanis 4 Minutes Avant 15 Minutes Atkins, Rodney 4 Minutes Madonna & Justin 15 Minutes Of Shame Cook, Kristy Lee Timberlake 16 @ War Karina 4 Minutes Madonna & Justin Timberlake & 16th Avenue Dalton, Lacy J.
    [Show full text]
  • Shedding Light on Mobile App Store Censorship
    Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China.
    [Show full text]
  • Prosoft Software of 116Th St
    May 2013 ApplePickers Main Meeting MAY Program We meet the second Wednesday of each month, 6:30-7:00 p.m. social time, main meeting 7:00-8:45 p.m. at the Fishers Library, 5 Municipal Dr. just north Prosoft Software of 116th St. in Fishers. Visitors are always welcome to This month Gordon Bell, President of come and join us. Prosoft Engineering, will be here live and in person to show us several of their Mac products. Upcoming Meetings Main Meetings May 8th May ApplePicker’s Business Meeting Wednesday Business Meetings are now Mac The business meeting is held via the ApplePickers 8th Virtual (See Website Forums) “Virtual Business Meeting” forum topic. Any member is welcome to post in that topic stating their opinions on what the club should be doing. Quick Find Index Mac ProSIG General club information Page 2 Garmin GPS Page 3 The third Monday of each month, Apple Represen- Garmin continued Page 4 tative Greg Willmore hosts the Mac Programmer’s Cloud Mate Page 5 SIG. You should email Greg for specific information. Cloud Mate continued Page 6 [email protected] Location varies. Cloud Mate continued Page 7 VirtualChrome Page 8 Final Cut Pro User Group Big Brother Camera Security Page 9 Apotop Wi-Reader Page 10 The INDYFCPUG meets the fourth Tuesday of each Joy of Tech Page 11 month from 7:00-9:30 p.m. Since the location may Member App Page 12 vary, please be sure to check their website. Page 1 ApplePickers Officers President Bob van Lier [email protected] Vice President Dan Oblak [email protected] Past President Bob Carpenter [email protected] Secretary Herb Hillenmyer [email protected] Treasurer Ron Beechler [email protected] Web Developer Steve Johnson [email protected] Newsletter Production Editor this month Randy Marcy [email protected] Editor next month Bob van Lier [email protected] Public Relations Gareth Souders [email protected] About the ApplePickers Newsletter Information ApplePickers is a not-for-profit educational organiza- We welcome members’ contributions to the newslet- tion.
    [Show full text]
  • Henry Jenkins Convergence Culture Where Old and New Media
    Henry Jenkins Convergence Culture Where Old and New Media Collide n New York University Press • NewYork and London Skenovano pro studijni ucely NEW YORK UNIVERSITY PRESS New York and London www.nyupress. org © 2006 by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Jenkins, Henry, 1958- Convergence culture : where old and new media collide / Henry Jenkins, p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8147-4281-5 (cloth : alk. paper) ISBN-10: 0-8147-4281-5 (cloth : alk. paper) 1. Mass media and culture—United States. 2. Popular culture—United States. I. Title. P94.65.U6J46 2006 302.230973—dc22 2006007358 New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. Manufactured in the United States of America c 15 14 13 12 11 p 10 987654321 Skenovano pro studijni ucely Contents Acknowledgments vii Introduction: "Worship at the Altar of Convergence": A New Paradigm for Understanding Media Change 1 1 Spoiling Survivor: The Anatomy of a Knowledge Community 25 2 Buying into American Idol: How We are Being Sold on Reality TV 59 3 Searching for the Origami Unicorn: The Matrix and Transmedia Storytelling 93 4 Quentin Tarantino's Star Wars? Grassroots Creativity Meets the Media Industry 131 5 Why Heather Can Write: Media Literacy and the Harry Potter Wars 169 6 Photoshop for Democracy: The New Relationship between Politics and Popular Culture 206 Conclusion: Democratizing Television? The Politics of Participation 240 Notes 261 Glossary 279 Index 295 About the Author 308 V Skenovano pro studijni ucely Acknowledgments Writing this book has been an epic journey, helped along by many hands.
    [Show full text]
  • Privacy-Enhancing Technologies for the Internet
    Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley iang,daw,brewer ¡ @cs.berkeley.edu Abstract ing privacy issues on the Internet, and Section 3 provides some relevant background. We then discuss Internet pri- The increased use of the Internet for everyday activi- vacy technology chronologically, in three parts: Section 4 ties is bringing new threats to personal privacy. This pa- describes the technology of yesterday, Section 5 explains per gives an overview of existing and potential privacy- today’s technology, and Section 6 explores the technology enhancing technologies for the Internet, as well as moti- of tomorrow. Finally, we conclude in Section 7. vation and challenges for future work in this field. 2. Motivation 1. Introduction The threats to one’s privacy on the Internet are two-fold: your online actions could be (1) monitored by unauthorized Recently the Internet has seen tremendous growth, with parties and (2) logged and preserved for future access many the ranks of new users swelling at ever-increasing rates. years later. You might not realize that your personal infor- This expansion has catapulted it from the realm of academic mation has been monitored, logged, and subsequently dis- research towards new-found mainstream acceptance and in- closed; those who would compromise your privacy have no creased social relevance for the everyday individual. Yet incentive to warn you. this suddenly increased reliance on the Internet has the po- The threat of long-term storage and eventual disclosure tential to erode personal privacies we once took for granted. of personal information is especially acute on the Internet.
    [Show full text]