Panopticon blueprint by Jeremy Bentham, 1791
(see also Athanasius Kircher's Phonurgia nova, 1673)
Law framework
- France
- ...
- supra-national
- office/work law
Actors involved
Means of enforcement
Legal and social ways to counter
Technical way to counter
- BitTorrent
- Seedfuck
- FreeNet
- HostileWRT
- strong encryption
- Computational Trust applied computational trust
- artificial noise
- traffic mixing
- understanding the topology and infrastructure of the network
- not limited to the Internet
- HTTPS Everywhere by The Tor Project and the Electronic Frontier Foundation
- Firefox extension that encrypts communications with a number of major websites
- VPN
- Surveillance Self-Defense (SSD) Project by the EFF
Note that such tools are useless unless properly understood by the user. It is riskier to falsely feel safe that to knowingly be unsafe.
Proposals
See also
- Censorship which differs from monitoring by blocking the information upstream
- notes on key books
- Seedea:Seedea/Licenses
- key concepts
- eventually Wikipedia:Differential privacy (very doubtful)
- vision software
- video monitoring
- software used not just monitoring but also for tracking over multiple cameras
- through CCTV in UK
- number plates in France
- human beings (Singapore?)
- secruity systems
- Wikipedia:Gait analysis
- Cory Doctorow's Little Brother
- Panopticlick the Electronic Frontier Foundation
- IRIS Online Behaviour Management for Schools
- "behaviour and rewards monitoring and statistical analysis tool."
- "a behaviour and achievement monitoring system used in over 60 secondary schools." by Schools Data Services Ltd (SDS)
- IRIS Parent Login via the YouTube channel of SchoolsDataServices
- We Re-Build decentralized cluster of net activists who have joined forces to collaborate on issues concerning access to a free Internet without intrusive surveillance.
- cryptography oriented communties
- http://www.cs.rutgers.edu/~decarlo/facetrack.html
- "I've Got Nothing to Hide" and Other Misunderstandings of Privacy by Daniel J. Solove, San Diego Law Review 2007
- IMSpector Instant Messenger proxy with monitoring, blocking and content-filtering capabilities.
- keyloggers
- Privacy is Dead – Get over it by Steven Rambam 2009
- Wikipedia:We Live in Public by Ondi Timoner, 2009
- INDECT Intelligent information system supporting observation, searching and detection for security of citizens in urban environment.
- Avoiding the Privacy Apocalypse with Simon Davies and Gus Hosei, Google Tech Talk October 2010
- Privacy Enhancing Technologies (PET) on Stanford CIS CyberWiki
- http://projects.wsj.com/surveillance-catalog/#/
- https://wiki.archlinux.org/index.php/Disk_Encryption#Comparison_table
- to help pick between dm-crypt, encfs, TrueCrypt, etc
- http://ahprojects.com/projects/stealth-wear
- OpenVPN install script https://github.com/angristan/openvpn-install
- makes the setup on a Linux server, e.g affordable VPN, and client, e.g Ubuntu, a matters of minutes
- used for remote social VR with no data leaking from headsets
- learned from that process
client-to-client
so that users can see each other
- one account, thus
.ovpn
file per user
- modifying
tun0
to eth0
of the firewall, iptables, disables external access for VPN users but no the machine
- webtop, desktop of the Web container https://docs.linuxserver.io/images/docker-webtop
- WebSSH2 to use ssh despite being unable to install a client https://github.com/billchurch/webssh2