Privacy-Handbuch Windows (PDF)

Total Page:16

File Type:pdf, Size:1020Kb

Privacy-Handbuch Windows (PDF) Privacy-Handbuch Spurenarm Surfen mit Mozilla Firefox, E-Mails mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS 2. Oktober 2021 Inhaltsverzeichnis 1 Scroogled 6 2 Angriffe auf die Privatsphäre 16 2.1 Big Data - Kunde ist der, der bezahlt........................ 17 2.1.1 Google..................................... 17 2.1.2 Weitere Datensammler............................ 23 2.2 Techniken der Datensammler............................ 25 2.3 Tendenzen auf dem Gebiet des Tracking...................... 30 2.4 Crypto War 3.0..................................... 33 2.5 Fake News Debatte.................................. 36 2.5.1 Der Kampf gegen Fake News........................ 37 2.5.2 Fake News Beispiele............................. 38 2.5.3 Medienkompetenztraining......................... 42 2.5.4 Fake News oder Propaganda - was ist der Unterschied?........ 43 2.6 Geotagging....................................... 43 2.7 Kommunikationsanalyse............................... 46 2.8 Überwachungen im Internet............................. 48 2.9 Terrorismus und der Ausbau der Überwachung................. 54 2.10 Ich habe doch nichts zu verbergen......................... 58 3 Digitales Aikido 62 3.1 Nachdenken...................................... 63 3.2 Ein Beispiel...................................... 66 3.3 Schattenseiten der Anonymität........................... 67 3.4 Wirkungsvoller Einsatz von Kryptografie..................... 68 4 Spurenarm Surfen 71 4.1 Auswahl des Webbrowsers............................. 72 4.2 Datensparsame Suchmaschinen........................... 73 4.3 Cookies und EverCookies.............................. 78 4.4 Surf-Container..................................... 82 4.5 JavaScript....................................... 83 4.5.1 NoScript für Mozilla Firefox........................ 84 4.6 iFrames......................................... 86 4.7 Werbung, HTML-Wanzen und Social Media.................... 88 4.7.1 Tracking-Filter für Firefox.......................... 89 4.7.2 Tracking Protection in Firefox........................ 90 4.7.3 uBlock Origin für Firefox.......................... 91 4.8 Firefox activity-stream................................ 93 4.9 Contextual Feature Recommender (CFR)..................... 96 4.10 Browsercache und Surf-Chronik.......................... 97 4.11 Referer......................................... 99 4.12 URL-Parameter.................................... 100 4.13 Risiko Plugins..................................... 101 4.13.1 Media Plug-ins für Video und Audio................... 102 4.13.2 Anzeige von PDF Dokumenten....................... 103 2 INHALTSVERZEICHNIS 3 4.14 HTTPS-Verschlüsselung erzwingen und härten.................. 103 4.14.1 Anzeige der HTTPS Verschlüsselung................... 106 4.14.2 Vertrauenswürdigkeit von HTTPS..................... 107 4.14.3 SSL-Zertifikate via OCSP validieren.................... 108 4.14.4 Tracking via TLS Session........................... 109 4.14.5 Tracking via HTTP Strict Transport Security (HSTS)........... 110 4.14.6 SSL/TLS Konfiguration........................... 110 4.15 Installierte Schriftarten verstecken......................... 111 4.16 HTML5 Canvas Elemente.............................. 114 4.17 Zugriff auf lokale URLs blockieren......................... 116 4.18 Der Unsinn vom Spoofen der User-Agent Kennung............... 116 4.19 Hardware Fingerprinting.............................. 119 4.20 WebRTC mit Firefox................................. 121 4.21 DNS-over-HTTPS mit Firefox............................ 124 4.22 Sonstige Maßnahmen................................. 127 4.23 Zusammenfassung der Einstellungen....................... 133 4.24 Snakeoil für Firefox (überflüssiges)......................... 134 5 Passwörter und 2-Faktor-Authentifizierung 137 5.1 Hinweise für Passwörter............................... 138 5.1.1 Firefox build-in Passwortspeicher..................... 140 5.1.2 Passwortspeicher............................... 141 5.2 Zwei-Faktor-Authentifizierung........................... 143 5.3 Phishing Angriffe................................... 148 6 Bezahlen im Netz 150 6.1 Anonyme Online-Zahlungen vor dem Aus?.................... 153 6.2 Bargeld......................................... 154 6.3 Bitcoin......................................... 156 7 Allgemeine Hinweise zur E-Mail Nutzung 158 7.1 E-Mail Provider.................................... 158 7.2 ProtonMail und Tutanota.............................. 160 7.3 Mozilla Thunderbird................................. 162 7.3.1 Account erstellen............................... 163 7.3.2 Sichere Optionen für TLS-Verschlüsselung................ 166 7.3.3 Sichere Konfiguration des E-Mail Client.................. 168 7.3.4 Datenverluste vermeiden.......................... 172 7.3.5 Wörterbücher installieren.......................... 172 7.3.6 Spam-Filter aktivieren............................ 173 7.3.7 Spam vermeiden............................... 173 7.3.8 RSS-Feeds................................... 177 7.3.9 Filelink..................................... 178 7.4 Private Note...................................... 179 8 E-Mails verschlüsseln 181 8.1 E-Mails verschlüsseln mit Thunderbird...................... 183 8.1.1 Eigenen OpenPGP Schlüssel erstellen oder importieren......... 184 8.1.2 Eigenen OpenPGP Schlüssel mit GnuPG verwenden.......... 184 8.1.3 Den eigenen öffentlichen Schlüssel verteilen............... 185 8.1.4 Fremde Schlüssel importieren........................ 186 8.1.5 Fremde Schlüssel akzeptieren bzw. verifizieren.............. 187 8.2 Gedanken zum Mailvelope Browser Add-on................... 187 8.2.1 Mailvelope mit GnuPG nutzen....................... 189 8.2.2 Mailvelope und Autocrypt......................... 189 8.3 Einige Ergänzungen zum Thema GnuPG..................... 190 8.3.1 Gedanken zur Auswahl und Stärke von Schlüsseln........... 192 8.3.2 GnuPG Smartcards nutzen......................... 192 4 INHALTSVERZEICHNIS 8.3.3 Adele - der freundliche OpenPGP E-Mail-Roboter............ 195 8.3.4 Memory Hole Project............................. 196 8.3.5 Autocrypt................................... 197 8.3.6 Verschlüsselung in Webformularen..................... 198 8.3.7 OpenPGP-Verschlüsselung für Kontaktformulare............ 199 8.3.8 OpenPGP Keyserver............................. 202 8.3.9 Web des Vertrauens (WoT).......................... 203 8.4 Verschlüsselte Dokumente per E-Mail senden................... 206 9 Instant Messaging und Telefonie 207 9.1 Verschlüsselte Telefonie............................... 210 9.1.1 SRTP/ZRTP Verschlüsselung........................ 211 9.1.2 Verschlüsselt chatten und telefonieren mit qTox............. 211 9.1.3 Skype???.................................... 215 9.2 Instant Messaging................................... 216 9.2.1 Messenger Threema............................. 222 9.2.2 Messenger Signal App............................ 224 9.2.3 Messenger Telegram............................. 227 9.2.4 Chatten mit Jabber/XMPP.......................... 233 9.2.5 Messenger basierend auf [matrix]..................... 235 9.2.6 Messenger Wire................................ 237 9.2.7 Einige weitere Messenger (unvollständig)................. 238 9.3 Videokonferenzen mit Jitsi Meet.......................... 240 10 Anonymisierungsdienste 242 10.1 Warum sollte man diese Dienste nutzen?..................... 242 10.2 Tor Onion Router................................... 244 10.2.1 Security Notes................................. 247 10.2.2 Anonym Surfen mit dem TorBrowserBundle............... 248 10.2.3 Sicherheitskonzept für hohe Ansprüche.................. 254 10.2.4 Anonyme E-Mail Accounts......................... 256 10.2.5 Anonym Bloggen............................... 259 10.2.6 Anonymes Instant-Messaging........................ 260 10.2.7 Gajim (Linux) und Tor Onion Router................... 262 10.2.8 Dateien anonym tauschen via Tor..................... 263 10.2.9 Tor Onion Services.............................. 265 10.2.10 Tor Bad Exit Nodes.............................. 270 10.2.11 Tor Good Exit Nodes............................. 272 10.3 Finger weg von unseriösen Angeboten....................... 274 11 Anonyme Peer-2-Peer Netzwerke 276 11.1 Invisible Internet Project............................... 278 11.1.1 Installation des I2P-Routers......................... 278 11.1.2 Konfiguration des I2P-Router........................ 279 11.1.3 Anonym Surfen mit I2P........................... 280 11.1.4 I2P Mail 1 (Susimail)............................. 282 11.1.5 I2P Mail 2 (Bote)............................... 284 11.1.6 I2P IRC..................................... 287 11.1.7 I2P BitTorrent................................. 288 11.2 DSL-Router und Computer vorbereiten...................... 290 12 Virtual Private Networks (VPNs) 291 12.1 VPN Dienste als Billig-Anonymisierer....................... 293 12.2 Empfehlenswerte VPN-Provider.......................... 294 12.3 IPsec/IKEv2 VPN Client mit Windows 10..................... 295 12.4 Das VPN Exploitation Team der NSA....................... 296 INHALTSVERZEICHNIS 5 13 Daten verschlüsseln 299 13.1 Konzepte der vorgestellten Tools.......................... 300 13.2 Gedanken zur Passphrase.............................. 301 13.3 Dokumente verschlüsselt speichern........................ 305 13.4 Quick and Dirty mit GnuPG............................. 306 13.5 Backups verschlüsseln................................ 307 13.5.1 Schnell mal auf den USB-Stick......................
Recommended publications
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
    The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Gunes Acar1, Christian Eubank2, Steven Englehardt2, Marc Juarez1 Arvind Narayanan2, Claudia Diaz1 1KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium {name.surname}@esat.kuleuven.be 2Princeton University {cge,ste,arvindn}@cs.princeton.edu ABSTRACT 1. INTRODUCTION We present the first large-scale studies of three advanced web tracking mechanisms — canvas fingerprinting, evercookies A 1999 New York Times article called cookies compre­ and use of “cookie syncing” in conjunction with evercookies. hensive privacy invaders and described them as “surveillance Canvas fingerprinting, a recently developed form of browser files that many marketers implant in the personal computers fingerprinting, has not previously been reported in the wild; of people.” Ten years later, the stealth and sophistication of our results show that over 5% of the top 100,000 websites tracking techniques had advanced to the point that Edward employ it. We then present the first automated study of Felten wrote “If You’re Going to Track Me, Please Use Cook­ evercookies and respawning and the discovery of a new ev­ ies” [18]. Indeed, online tracking has often been described ercookie vector, IndexedDB. Turning to cookie syncing, we as an “arms race” [47], and in this work we study the latest present novel techniques for detection and analysing ID flows advances in that race. and we quantify the amplification of privacy-intrusive track­ The tracking mechanisms we study are advanced in that ing practices due to cookie syncing. they are hard to control, hard to detect and resilient Our evaluation of the defensive techniques used by to blocking or removing.
    [Show full text]
  • TR-SBA-Research-0512-01: Fast and Efficient Browser Identification With
    Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting Technical Report TR-SBA-Research-0512-01 Martin Mulazzani∗, Philipp Reschl; Markus Huber∗, Manuel Leithner∗, Edgar Weippl∗ *SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria [email protected] Abstract. While web browsers are becoming more and more important in everyday life, the reliable detection of whether a client is using a specific browser is still a hard problem. So far, the UserAgent string is used, which is a self-reported string provided by the client. It is, however, not a security feature, and can be changed arbitrarily. In this paper, we propose a new method for identifying Web browsers, based on the underlying Javascript engine. We set up a Javascript confor- mance test and calculate a fingerprint that can reliably identify a given browser, and can be executed on the client within a fraction of a sec- ond. Our method is three orders of magnitude faster than previous work on browser fingerprinting, and can be implemented in just a few hun- dred lines of Javascript. Furthermore, we collected data for more than 150 browser and operating system combinations, and present algorithms to calculate minimal fingerprints for each of a given set of browsers to make fingerprinting as fast as possible. We evaluate the feasibility of our method with a survey and discuss the consequences for user privacy and security. This technique can be used to enhance state-of-the-art session management (with or without SSL), as it can make session hijacking considerably more difficult. 1 Introduction Today, the Web browser is a central component of almost every operating sys- tem.
    [Show full text]
  • Schluss Mit Facebook: Fünf Whatsapp-Alternativen Im Überblick
    https://futurezone.at/apps/schluss-mit-facebook-fuenf-whatsapp-alternativen-im-ueberblick/400529764 Apps 23.06.2019 Schluss mit Facebook: Fünf WhatsApp-Alternativen im Überblick Es gibt viele Gründe, WhatsApp abzulehen. Die richtige Messaging-Alternative zu finden, ist aber alles andere als leicht. Es gibt kaum eine App, die im Leben so vieler Menschen eine Rolle spielt wie Whatsapp. 2009 von Jan Koum und Brian Acton gegründet, entwickelte sich der Dienst rasant zu einer Konkurrenz für SMS und andere Messenger, die auf veraltete Protokolle setzten. Zu Beginn war die Anwendung nicht mehr als eine Art schwarzes Brett für Statusmeldungen. Nutzer konnten ihre Gedanken posten, Freunde hatten die Möglichkeit, diese Meldungen zu lesen. Mit der Zeit verwandelten die Entwickler ihre Erfindung in einen Kurznachrichtendienst. Die Vorteile von Whatsapp damals lagen auf der Hand: plattformübergreifende Kommunikation mit dem Smartphone und das auch noch kostenlos. Eine einfache Registrierung und der ebenfalls mögliche Austausch von Fotos und Videos taten das Übrige dazu. Seitdem ist viel Zeit vergangen und in der Welt von WhatsApp hat sich einiges getan. Nach der Übernahme durch Facebook für 19 Milliarden US-Dollar entstanden bei so manchem Nutzer Sorgenfalten. Der Umgang mit Nutzerdaten durch das soziale Netzwerk wurde schon damals kritisch beäugt. Befürchtungen, dass WhatsApp ein ähnliches Schicksal droht, waren alles andere als unbegründet. Zusicherungen, dass sich nichts verändert und die beiden Erfinder das Ruder in der Hand behalten würden, sollten besorgte Nutzer beruhigen. Auch die Implementierung von End-to-End-Verschlüsselung brachte etwas Ruhe. Mittlerweile sind die Gründer aus Unzufriedenheit nicht mehr bei Facebook am Werk, der Zuckerberg-Konzern hat mit der Verschmelzung seiner Plattformen begonnen und bald soll auch Werbung in der App erscheinen.
    [Show full text]
  • Evaluating Exploratory Search Engines : Designing a Set of User-Centered Methods Based on a Modeling of the Exploratory Search Process Emilie Palagi
    Evaluating exploratory search engines : designing a set of user-centered methods based on a modeling of the exploratory search process Emilie Palagi To cite this version: Emilie Palagi. Evaluating exploratory search engines : designing a set of user-centered methods based on a modeling of the exploratory search process. Human-Computer Interaction [cs.HC]. Université Côte d’Azur, 2018. English. NNT : 2018AZUR4116. tel-01976017v3 HAL Id: tel-01976017 https://tel.archives-ouvertes.fr/tel-01976017v3 Submitted on 20 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT Evaluation des moteurs de recherche exploratoire : Elaboration d'un corps de méthodes centrées utilisateurs, basées sur une modélisation du processus de recherche exploratoire Emilie PALAGI Wimmics (Inria, I3S) et Data Science (EURECOM) Présentée en vue de l’obtention Devant le jury, composé de : du grade de docteur en Informatique Christian Bastien, Professeur, Université de Loraine d’Université Côte d’Azur Pierre De Loor, Professeur, ENIB Dirigée par : Fabien Gandon
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Zeszyty T 13 2018 Tytulowa I Redakcyjna
    POLITECHNIKA KOSZALIŃSKA Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 KOSZALIN 2018 Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 ISSN 1897-7421 ISBN 978-83-7365-501-0 Przewodniczący Uczelnianej Rady Wydawniczej Zbigniew Danielewicz Przewodniczący Komitetu Redakcyjnego Aleksy Patryn Komitet Redakcyjny Krzysztof Bzdyra Walery Susłow Wiesław Madej Józef Drabarek Adam Słowik Strona internetowa https://weii.tu.koszalin.pl/nauka/zeszyty-naukowe Projekt okładki Tadeusz Walczak Skład, łamanie Maciej Bączek © Copyright by Wydawnictwo Uczelniane Politechniki Koszalińskiej Koszalin 2018 Wydawnictwo Uczelniane Politechniki Koszalińskiej 75-620 Koszalin, ul. Racławicka 15-17 Koszalin 2018, wyd. I, ark. wyd. 5,72, format B-5, nakład 100 egz. Druk: INTRO-DRUK, Koszalin Spis treści Damian Giebas, Rafał Wojszczyk ..................................................................................................................................................... 5 Zastosowanie wybranych reprezentacji graficznych do analizy aplikacji wielowątkowych Grzegorz Górski, Paweł Koziołko ...................................................................................................................................................... 27 Semantyczne ataki na aplikacje internetowe wykorzystujące język HTML i arkusze CSS Grzegorz Górski, Paweł Koziołko ..................................................................................................................................................... 37 Analiza skuteczności wybranych metod
    [Show full text]
  • Copyrighted Material
    Stichwortverzeichnis A B Abstreitbarkeit 167 Bequemlichkeit 30 Adblocker 96 Bitcoin 110 – Adblock Plus 96 Blackberry 215 – Disconnect 96 Bookmarks siehe Favoriten – Ghostery 96 Browser 68, 75 – Privacy Badger 96 – Add-on 87, 90 – uBlock 97 – Apple Safari 77 Add-on – Cache 88 – Browser 87, 90 – Chromium 78 – E-Mail-Client 126 – Chronik 87 – Enigmail siehe Enigmail – Fingerprinting 85, 98 – GpgOL 137 – Google Chrome 77 – Mailvelope 130, 132 – HTML-Engine 80 – Thunderbird 139 – Hygiene 88 Adium 170 – Iceweasel 78 Advanced Programming Interface (API) 90, – Inkognito-Modus 86 182 – integrierte Suche 84 Android – Internet Explorer 77 – Android Privacy Guard (App) 156 – Konqueror 78 – K9 Mail (E-Mail-Client) 156 – Microsoft Edge 92 – OpenKeychain (App) 156 – Midori 78 – PGP 156 – Mosaic 68 – R2Mail2 (E-Mail-Client) 158 – Mozilla Firefox 68, 76 – S/MIME 156 – Netscape Navigator 68 Anonymität 206 COPYRIGHTED– Opera 77MATERIAL AOL Instant Messenger (AIM) 164 – Plug-in 87 Apple Mail – Prole (Identitäten) 87 – PGP 145 – Synchronisation von Einstellungen – S/MIME 155 86 Authentizierung 167, 169, 176, 179 – Web (Epiphany) 78 – Adium 172 Buffer Overow 82 – Multifaktor- 201 Bugs 82 – Pidgin 169 Bundesamt für Sicherheit in der Informations- Authentizität 29, 54, 56 technik (BSI) 215 233 Stichwortverzeichnis C – E-Mail-Adresse 119 Caesar-Chiffre 36 – Header 121 Certicate Authority siehe Zertizierungsstelle – Provider 129, 131, 139 Chain of Trust siehe Web of Trust – Server 122 Chaos Computer Club (CCC) 133 Eingangsverschüsselung 125 Chat 161 Electronic
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • Latest Release file from the Application Is Conveniently Packaged As an Executable Self-Contained JAR file
    JAMI Supplemental Material Release 1.0 Andrea Hornakova, Markus List, Jilles Vreeken, Marcel Schulz Jul 01, 2020 Contents 1 General Description 1 1.1 Conditional Mutual Information.....................................1 2 Installation 3 3 Usage 4 4 Input 6 4.1 Expression data..............................................6 5 Output 8 6 Usage Examples 9 6.1 Downloading example data.......................................9 6.2 Using JAMI with the triplet format...................................9 6.3 Using JAMI with the set format.....................................9 6.4 Using JAMI for a subset of genes or a single gene........................... 10 7 Use case: A ceRNA network constructed from TCGA breast cancer data 11 8 Using JAMI in R 15 9 Performance and Advantages over CUPID 16 10 Dealing with zero expression values 19 11 References 24 Bibliography 25 i CHAPTER 1 General Description This document describes the usage of the JAMI software. Source code and executables are available on github. The goal of JAMI is to infer ceRNA networks from paired gene and miRNA expression data. The ceRNA hypothesis proposed by Salmena et al. [Salmena2011] suggests that mRNA transcript are in competition over a limited pool of miRNAs they share binding sites for. A competing endogenous RNA is thus a mRNA that excerts regulatory control over the expression of other mRNAs (coding or non-coding genes) via draining them of repressive miRNAs. To quantify the regulatory effect of one gene (the modulator) over another gene (the target) via a specific miRNA, Sumazin et al. [Sumazin2011] proposed the use of conditional mutual information, which was implemented as part of the CUPID software [Chiu2015] implemented in Matlab.
    [Show full text]
  • Final Study Report on CEF Automated Translation Value Proposition in the Context of the European LT Market/Ecosystem
    Final study report on CEF Automated Translation value proposition in the context of the European LT market/ecosystem FINAL REPORT A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Single Market CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report This study was carried out for the European Commission by Luc MEERTENS 2 Khalid CHOUKRI Stefania AGUZZI Andrejs VASILJEVS Internal identification Contract number: 2017/S 108-216374 SMART number: 2016/0103 DISCLAIMER By the European Commission, Directorate-General of Communications Networks, Content & Technology. The information and views set out in this publication are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. ISBN 978-92-76-00783-8 doi: 10.2759/142151 © European Union, 2019. All rights reserved. Certain parts are licensed under conditions to the EU. Reproduction is authorised provided the source is acknowledged. 2 CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report CONTENTS Table of figures ................................................................................................................................................ 7 List of tables ..................................................................................................................................................
    [Show full text]
  • The Artist's Emergent Journey the Metaphysics of Henri Bergson, and Also Those by Eric Voegelin Against Gnosticism2
    Vol 1 No 2 (Autumn 2020) Online: jps.library.utoronto.ca/index.php/nexj Visit our WebBlog: newexplorations.net The Artist’s Emergent Journey Clinton Ignatov—The McLuhan Institute—[email protected] To examine computers as a medium in the style of Marshall McLuhan, we must understand the origins of his own perceptions on the nature of media and his deep-seated religious impetus for their development. First we will uncover McLuhan’s reasoning in his description of the artist and the occult origins of his categories of hot and cool media. This will prepare us to recognize these categories when they are reformulated by cyberneticist Norbert Wiener and ethnographer Sherry Turkle. Then, as we consider the roles “black boxes” play in contemporary art and theory, many ways of bringing McLuhan’s insights on space perception and the role of the artist up to date for the work of defining and explaining cyberspace will be demonstrated. Through this work the paradoxical morality of McLuhan’s decision to not make moral value judgments will have been made clear. Introduction In order to bring Marshall McLuhan into the 21st century it is insufficient to retrieve his public persona. This particular character, performed in the ‘60s and ‘70s on the global theater’s world stage, was tailored to the audiences of its time. For our purposes today, we’ve no option but an audacious attempt to retrieve, as best we can, the whole man. To these ends, while examining the media of our time, we will strive to delicately reconstruct the human-scale McLuhan from what has been left in both his public and private written corpus.
    [Show full text]