Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar    



Intelligent Search

  1. How Apple is Paving the Way to a 'Cloud Dictatorship' in China (February 10, 2018)
    Apple Inc. is set to hand over the operation of its iCloud data center in mainland China to a local corporation, but Apple has not explained the real issue. With the move a state-owned big data company controlled by the Chinese government will have access to all the data of its service users in China; this will allow the state apparatus to jump into the cloud and look into the data of Apple's Chinese users.
  2. Keep seeing Mondoweiss in your news feed following changes at Facebook (February 9, 2018)
    As most of you by now know, Facebook has recently made big changes to how users see content from publishers like Mondoweiss.
  3. Propaganda! Pardon me, is mine really bigger than yours? (February 8, 2018)
    They say Propaganda! In the West, both the mainstream media and even some of the so-called progressive outlets are shouting: "Those Russians and Chinese and the others like them, they are at it again! Their vicious propaganda is infiltrating our democratic, freedom-loving countries, spreading confusion and chaos!"

    Yes, ban or at least curb RT, contain TeleSur, and if at all possible, throw Press TV to the dogs. And put the writers of NEO, Sputnik, Global Times and other foreign outlets on that proverbial Western mass media 'no fly list'.
  4. Facebook announces latest step in censorship campaign, prioritizing "local news" (February 6, 2018)
    Facebook CEO Mark Zuckerberg announced that the social media giant will prioritize news from 'local sources' in the News Feed displayed to users. This is the third move this year in a roll-out of updates by Facebook aimed at censoring online information.
  5. Is political pressure behind YouTube’s video labeling? (February 6, 2018)
    YouTube has started labeling videos by government-funded media after their recommendation program was the subject of a Guardian investigation and a letter from the Senate Intelligence Committee's ranking Democrat.
  6. How the internet 'punishes' Palestinians (February 2, 2018)
    Multinational tech companies, including Google, Facebook and PayPal are being accused of complicity in rights violations and in shaping false narratives with regard to policies in Palestinian territories.
  7. If you're going to blame a cyberattack on North Korea, you'd better show your work (January 24, 2018)
    Transit operator Metrolinx says it was hit by North Korean hackers. Experts want evidence
  8. An Inside Look At The Accounts Twitter Has Censored In Countries Around The World (January 24, 2018)
    BuzzFeed News has identified more than 1,700 Twitter accounts that have been blocked in at least one country. The list provides an unprecedented glimpse into Twitter's collaboration with national groups and governments -- democratic and authoritarian alike -- and provides new details about a surge in blocked accounts in Germany, France, and Turkey.
  9. For an international coalition to fight Internet censorship (January 23, 2018)
    In this open letter from the International Editorial Board of the World Socialist Web Site, the threat and consequences of internet censorship and reduction in access to information is highlighted.
  10. The War Against "Fake News" is a War on Us (January 23, 2018)
    Barely a day passes without a new development in the war on social media -- that is, the war on us. Today, it is a report that Twitter has emailed hundreds of thousands of its users, warning them that they shared "Russian propaganda".
  11. Facebook will soon filter out RT news, so this is how you fix it… probably (January 16, 2018)
    In light of recent changes to Facebook's news feed, this RT article demonstrates what is needed to secure access to RT content.
  12. Apple sued for deliberately slowing down older iPhones (December 22, 2017)
    A lawsuit was filed in California against technology giant Apple after the company admitted to slowing down their older iPhone models.
  13. The Internet is Already Broken (December 20, 2017)
    Nick Pemberton's article on the already broken internet.
  14. Broadband monopolies to censor Internet content (December 5, 2017)
    The recently released plan by the American Federal Communications Commission to abolish net neutrality has evoked mass opposition across the US and around the world.
  15. Cutting Cords to Kurds: Facebook's Foreign Policy (November 28, 2017)
    The recent deletion and suspension of Facebook accounts of Kurdish supporters provides further troubling evidence that the popular social media company has been censoring the Kurdish resistance for the past five years.
  16. Google's Eric Schmidt admits political censorship of search results (November 22, 2017)
    Recent remarks by the Executive Chairman of Google's parent company confirm charges that the company has been deliberately altering its search algorithms and taking other measures to prevent the public from accessing information that is critical of the US government.
  17. Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt (November 20, 2017)
    The Executive Chairman of Google's parent company Alphabet states that the company will engineer specific algorithms for news services RT and Sputnik to make their content less prominent on the search engine's news delivery services.
  18. The Motherboard Guide to Not Getting Hacked (November 15, 2017)
    Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces some of our old guides. This guide is also available as a printable PDF.
  19. Warning to Spanish (and Other) Whistleblowers: Anonymous Boxes which ARE NOT ANONYMOUS (November 13, 2017)
    Citizens' victories in the struggle against corruption, sometimes requiring information to be provided through safe anonymous channels like Xnet's Mailbox for reporting corruption, have catalysed a proliferation of similar initiatives within governments and institutions.
  20. Kaspersky Lab in crosshairs since exposing US & Israeli spies behind Stuxnet (November 10, 2017)
    The campaign to discredit Kaspersky Lab dates back to 2010, when the Russian-based cybersecurity firm uncovered the origin of the Stuxnet malicious computer worm which ruined Iran's nuclear centrifuges.
  21. CIA wrote code 'to impersonate' Russia's Kaspersky Lab anti-virus company, WikiLeaks says (November 9, 2017)
    WikiLeaks published documents exposing the elaborated malware suite used by the CIA to hack, record and control modern hi-tech appliances worldwide.
  22. The FBI Blindly Hacked Computers in Russia, China, and Iran (November 8, 2017)
    Recent court papers indicate that the FBI repeatedly broke into devices overseas as part of ordinary criminal investigations; in countries hostile to the U.S. this could have significant geopolitical fallout.
  23. Who’s Afraid of Corporate COINTELPRO? (November 3, 2017)
    On November 30, 2016, presumably right at the stroke of midnight, Google Inc. unpersoned CounterPunch. They didn't send out a press release or anything. They just quietly removed it from the Google News aggregator. Not very many people noticed.
  24. Confessions of a (verified) Russia-linked Twitter Bot (November 2, 2017)
    Twitter's defines any user who has "ever logged in, at any time, from Russia" as being "Russia-linked." This is taking the new McCarthyism to ridiculous levels.
  25. Pay to play: Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Proposed changes to the way Facebook handles posts from publishers and businesses may result in publishers having to pay Facebook to promote their stories so that people can see them.
  26. 'Pay to play': Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Facebook is testing out a change to their network in six markets. As a result, posts from some publishers and businesses will be removed from the site's News Feed section. The change has caused a dramatic drop in referral traffic to news outlets.
  27. The conspiracy to censor the Internet (October 18, 2017)
    The political representatives of the American ruling class are engaged in a conspiracy to suppress free speech. Under the guise of combating "trolls" and "fake news" supposedly controlled by Russia, the most basic constitutional rights enumerated in the First Amendment are under direct attack.
  28. Germany's Network Enforcement Act: Legal framework for censorship of the Internet (October 5, 2017)
    On October 1, 2017, the Network Enforcement Act took effect in Germany. Under the cover of a fight against "fake news" and "hate speech," it creates a legal framework for censorship of the Internet.
  29. Sources News Releases (September 11, 2017)
    News releases from organizations and companies on a wide range of topics. Includes an extensive topic index, an archive of releases going back to the 1970s, and links to experts and organizations knowledgeable about the issues covered in the releases. Available via RSS feed as well as on the website.
  30. CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks (September 1, 2017)
    Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create undetectable libraries.
  31. NSA's Cyberwarfare Blowback (September 1, 2017)
    In May and June 2017, hackers took over thousands of computers around the world, encrypted their contents, and demanded ransom to decrypt them. They used tools developed by the National Security Agency (NSA) to exploit vulnerabilities in the Microsoft Windows operating system.
  32. Car remotely deactivated after Quebec teen refuses to pay for removal of GPS device (August 28, 2017)
    A Quebec teenager's car was remotely deactivated by a dealership after he refused to pay to remove a GPS tracking device -- one that he never wanted installed in the first place.
  33. Google's new advertising program tracks offline line shoppers, violates privacy (August 2, 2017)
    The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
  34. Google's new search protocol is restricting access to 13 leading socialist, progressive and anti-war web sites (August 2, 2017)
    New data suggests that the implementation of changes in Google's search evaluation protocols resulted in a massive loss of readership of socialist, anti-war and progressive web sites.
  35. How Threats Against Domain Names Are Used to Censor Content (July 27, 2017)
    A summary of a whitepaper released by EFF titled "Which Internet registries offer the best protection for domain owners?", outlining important points to consider, such as the policies of the registry that operates the domain.
  36. HMS Queen Elizabeth aircraft carrier runs on Windows XP, vulnerable to cyberattack (June 27, 2017)
    The first of Britain's two brand new aircraft carriers runs on outdated Windows XP software that may be vulnerable to cyberattack.
  37. The World Center of Hacking is in Washington, Not Moscow or Beijing (June 9, 2017)
    Documents from the U.S. NSA (National Security Agency) unveiled by Edward Snowden show that whole countries, not just a number of sensitive computers, have been hacked by the NSA.
  38. Digital Privacy at the U.S Border: A New How-To Guide from EFF (March 27, 2017)
    A new guide released by the Electronic Frontier Foundation (EFF) gives travelers the facts they need in order to prepare for border crossings while protecting their digital information.
  39. Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines (March 22, 2017)
    For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend these technical barriers, they are also outpacing the development of policies to constrain them. Civil liberties advocates fear that the rise of real-time face recognition alongside the growing number of police body cameras creates the conditions for a perfect storm of mass surveillance.
  40. WikiLeaks Vault 7 Reveals CIA Cyberwar and the Battleground of Democracy (March 17, 2017)
    WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents that have come from the top secret security network at the Cyber Intelligence Center.
  41. Connexions Quotations (2017)
    A selection of quotations about social change, resistance, solidarity, and many other topics. Compiled by Ulli Diemer. Each quote has been turned into an image file.
  42. EFF To Canadian Court: Order Allowing Worldwide Censorship of Google Search Results Violates Users' Free Speech Rights (December 15, 2016)
    On Dec. 6, 2016, the Electronic Frontier Foundation will tell Canada's highest court that an overbroad court order that censors Google search results for users everywhere violates our rights to freely search the web without government interference.
  43. Internet Archive Received National Security Letter with FBI Misinformation about Challenging Gag Order (December 15, 2016)
    The Internet Archive published a formerly secret National Security Letter (NSL), highlighting misinformation in the letter about the process for challenging the contents of the NSL, impacting many communications providers who have received such NSLs.
  44. New Privacy Badger Upgrades Help Protect Your Online Holiday Shopping from Sneaky Data Collection (December 15, 2016)
    The Electronic Frontier Foundation (EFF) today released Privacy Badger 2.0 - a free browser extension for Chrome, Firefox, and Opera with new upgrades to help protect shoppers from online tracking.
  45. Facebook, Twitter, Google and Microsoft team up to tackle extremist content (December 6, 2016)
    Tech companies plan to create a shared database of 'unique digital fingerprints' that will able to identify images and videos promoting terrorism and extremist content.
  46. Apple Logs Your iMessage Contacts - and May Share Them With Police (September 28, 2016)
    Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.
  47. New Film Tells the Story of Edward Snowden; Here Are the Surveillance Programs He Helped Expose (September 16, 2016)
    Oliver Stone's latest film, "Snowden," bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.
  48. Delta says 740 flights cancelled after worldwide system outage (August 8, 2016)
    Delta Air Lines says it has cancelled 740 flights after a power outage that began overnight knocked out its computer systems and operations worldwide.
  49. Hackers can record everything you type on certain wireless keyboards (July 27, 2016)
    A computer security research team has identified a weakness in several brands of low-cost wireless keyboards that could allow hackers to view and record every word, number and password typed by a user from up to about 75 metres away. According to Bastille, an Atlanta-based research team, eight wireless keyboards made by companies such as Hewlett-Packard, Radio Shack and Toshiba send keystroke data from the board to the USB dongle that connects to your computer without the encryption needed to mask what someone is typing.
  50. Open Source Software: a necessary tool to build our movements | What's Left (July 25, 2016)
    Software companies are exploitative and other companies should invest in unionized products, condem work to lower wages and act in solidarity with other workers in the software industry.
  51. Snowden leak: MI5 has gathered so much data it may actually be missing 'life-saving intelligence' (June 8, 2016)
    British spies may have missed potentially "life-saving intelligence" because their surveillance systems were sweeping up more data than could be analyzed, a leaked classified report reveals. The document, given to The Intercept by NSA whistleblower Edward Snowden, was sent to top British government officials, outlining methods being developed by the UK’s domestic intelligence agency, MI5, to covertly monitor internet communications.
  52. Google voice search records and keeps conversations people have around their phones - but the files can be deleted (June 1, 2016)
    How google search can record and store conversations picked up by a phone's microphone, as well as how to prevent this and delete the stored files.
  53. OCCRP Launches New Search Engine for Investigative Journalists (May 30, 2016)
    The Organized Crime and Corruption Reporting Project (OCCRP), a non-profit network of investigative journalism centers in Europe and Eurasia, has launched a new data platform to enable journalists and researchers to sift more than 2 million documents and use the findings in their investigations. People using the new data platform, called ID Search, will be able to set up email alerts notifying them when new results appear for their searches or for persons tracked on official watchlists. They can also create their own private watchlists.
  54. Dear "Skeptics," Bash Homeopathy and Bigfoot Less, Mammograms and War More (May 16, 2016)
    So I'm a skeptic, but with a small S, not capital S. I don’t belong to skeptical societies. I don’t hang out with people who self-identify as capital-S Skeptics. Or Atheists. Or Rationalists. When people like this get together, they become tribal. They pat each other on the back and tell each other how smart they are compared to those outside the tribe. But belonging to a tribe often makes you dumber.
  55. New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship (April 28, 2016)
    A newly published study from Oxford's Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: "If we think that authorities are watching our online actions, we might stop visiting certain websites or not say certain things just to avoid seeming suspicious."
  56. Who's downloading pirated papers? Everyone (April 28, 2016)
    Researchers are increasingly turning to Sci-Hub, the world's largest largest 'pirate' website for scholarly literature. Sci-Hub is becoming the world's de facto open-access research library.
  57. UC Davis spent $175,000 to scrub online pepper spray references (April 13, 2016)
    The University of California, Davis, contracted with consultants for at least $175,000 to scrub the Internet of negative online postings following the November 2011 pepper spraying of students and to improve the reputations of both the university and Chancellor Linda P.B. Katehi, newly released documents show.
  58. EFF to Copyright Office: Improper Content Takedowns Hurt Online Free Expression (April 10, 2016)
    Safe Harbors Work for Rightsholders and Service Providers. Content takedowns based on unfounded copyright claims are hurting online free expression, says Electronic Frontier Foundation (EFF).
  59. Nest's move to stop supporting Revolv smart hub leaves customers with costly 'brick' (April 6, 2016)
    Here's a major downside to the so-called Internet of Things -- companies can potentially disconnect your smart devices and leave them essentially useless at any time.
  60. The cyber arms race (April 1, 2016)
    A look at cyber warfare between nations, a militarisation of cyberspace that is advancing far faster than the creation of positive peace keeping mechanisms.
  61. The security - digital complex (April 1, 2016)
    With the rise of the Internet and the globalisation of electronic data, there has been a shift in the university-military-industrial complex to a new security-digital complex -- a public-private hybrid that is both narrower and more far-reaching.
  62. EFF and Partners Support Media Monitoring Service in Fight for Fair Use (March 27, 2016)
    A media monitoring service that creates a text-searchable database of television and radio content is defending its fair use rights before a federal appeals court.
  63. Revealed: how facial recognition has invaded shops – and your privacy (March 25, 2016)
    Retailers are using ever more sophisticated software to watch how consumers shop.
  64. The hubris of investigators (March 24, 2016)
    A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardino may never rule on the flood of arguments supporting Apple's defense of user security, observers-- especially members of Congress-- should pay close attention to a few themes that have emerged in the public debate.
  65. Meet the Robin Hood of Science (February 14, 2016)
    The tale of how one researcher has made nearly every scientific paper ever published available for free to anyone, anywhere in the world. On September 5th, 2011, Alexandra Elbakyan, a researcher from Kazakhstan, created Sci-Hub, a website that bypasses journal paywalls, providing access to nearly every scientific paper ever published immediately to anyone who wants it.
  66. Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg (December 28, 2015)
    Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software.
  67. The Digital Dark Ages: Movies and Books Get Deleted as Selfies Pile Up (December 22, 2015)
    Historians and archivists call our times the "digital dark ages." The name evokes the medieval period that followed the collapse of the Roman Empire, which led to a radical decline in the recorded history of the West for 1000 years. But don't blame the Visigoths or the Vandals. The culprit is the ephemeral nature of digital recording devices. Remember all the stuff you stored on floppy discs, now lost forever? Over the last 25 years, we've seen big 8" floppies replaced by 5.25" medium replaced by little 3.5" floppies, Zip discs and CD-ROMs, external hard drives and now the Cloud -- and let's not forget memory sticks and also-rans like the DAT and Minidisc.
  68. Tracks Content Takedowns by Facebook, Twitter, and Other Social Media Sites (November 27, 2015)
    The Electronic Frontier Foundation (EFF) and Visualizing Impact launched on November 19, 2015, a new platform to document the who, what, and why of content takedowns on social media sites.
  69. 'Worse Than We Thought': TPP A Total Corporate Power Grab Nightmare (November 5, 2015)
    On issues ranging from climate change to food safety, from open Internet to access to medicines, the TransPacific Partnership (TPP) is a disaster.
  70. Insurance and the orgin of big data (November 1, 2015)
    A historical look at the origins of 'Big Data' and the collection of personal information by corporate America in the early 20th century.
  71. Towards a two-tiered knowledge society (August 27, 2015)
    On the Conservative government's actions to reduce Internet access and library access to a large portion of the population.
  72. Medical Privacy Under Threat in the Age of Big Data (August 6, 2015)
    Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
  73. Why Facebook Failed Our Censorship Test (June 18, 2015)
    If you click around Facebook's "Government Request Report," you'll notice that, for many countries, Facebook enumerates the number of "content restrictions" the company has fulfilled. This is a sanitized term for censorship.
  74. Improbable libraries: unusual places to bury your head in a book (April 12, 2015)
    Alex Johnson looks at the imaginative forms the modern library takes.
  75. Documents Reveal Canada's Secret Hacking Tactics (March 23, 2015)
    Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
  76. Snowden's NSA Leaks Catalogued In First Searchable Database Of The Surveillance Documents (March 12, 2015)
    Canadian journalists and researchers have teamed up to create the world's first fully-searchable index of the classified documents revealing NSA surveillance leaked by whistleblower Edward Snowden.
  77. Edward Snowden's Warning to Canada (March 4, 2015)
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  78. The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (February 19, 2015)
    American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
  79. Secret 'BADASS' Intelligence Program Spied on Smartphones (January 26, 2015)
    British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
  80. Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere (January 21, 2015)
    Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies that threaten users' security and privacy.
  81. How Verizon and Turn Defeat Browser Privacy Protections (January 14, 2015)
    Verizon advertising partner Turn is using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them, forming a vast web of non-consensual online tracking. The tehcnology makes it impossible for customers to control their online privacy.
  82. The Turn-Verizon Zombie Cookie (January 14, 2015)
    Discussion of Verizon's "supercookie," a header that tracks mobile subscribers, even if they have opted out, cleared their cookies, or entered private browsing mode.
  83. New copyright law is already being abused to threaten Canadian Internet users with ridiculous penalties for downloading (January 8, 2015)
    Less than a week after new copyright rules went into effect in Canada, ISPs are already receiving notices from Big Media giants that contain misleading and threatening statements, according to top copyright expert Professor Michael Geist.
  84. What Is the Trans-Pacific Partnership Agreement (TPP)? (2015)
    The Trans-Pacific Partnership (TPP) is a secretive, multinational agreement that, among other things, threatens to extend restrictive intellectual property (IP) laws across the globe and rewrite international rules on its enforcement.
  85. We've got our eye on you (November 1, 2014)
    Edward Snowden not only told the world about US state surveillance of national and personal secrets, he reminded us that almost all the companies surveying us for commercial gain are American.
  86. Fake cell phone 'towers' may be spying on Americans' calls, texts (September 3, 2014)
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  87. An alternative media list (September 1, 2014)
    A selective list of English-language alternative media.
  88. Police State: US Government-Funded Database Created to Track "Subversive Propaganda" Online (August 30, 2014)
    The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.
  89. Corporations Spy on Nonprofits with Impunity (August 25, 2014)
    Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
  90. An Online Tracking Device That’s Virtually Impossible to Block (August 15, 2014)
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from to YouPorn.
  91. The Price of Books, The Value of Civilization (August 1, 2014)
    I have come to think that books occupy this valuable position in our civilisation because they are the only medium for thick descriptions of the world that human beings possess. By ‘thick’ description, I mean an extended, detailed, evidence-based, written interpretation of a subject. If you want to write a feature or blog or wikipedia entry, be it about the origins of the first world war; the authoritarian turn in Russia; or the causes and effects of the 2008 financial crisis, in the end you will have to refer to a book. Or at least refer to other people who have referred to books. Even the best magazine pieces and TV documentaries – and the best of these are very good indeed – are only puddle-deep compared with the thick descriptions laid out in books. They are ‘thin’ descriptions and the creators and authors of them will have referred extensively to books to produce their work.
  92. Google doesn't want you to limit its ability to follow you around the internet (July 26, 2014)
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  93. Forward Secrecy Brings Better Long-Term Privacy to Wikipedia (July 9, 2014)
    Wikipedia readers and editors can now enjoy a higher level of long-term privacy, thanks to the Wikimedia Foundation's rollout last week of forward secrecy on its encrypted connections.
  94. Canadian Court to the Entire World: No Links For You! (June 20, 2014)
    The Supreme Court of British Columbia has ordered Google to remove entire domains from its search results — a decision that could have enormous global implications on free expression. This is the latest of several instances of courts claiming dangerous jurisdictional overreach, where they have applied local laws to remove content on the Internet.
  95. The Loneliest Library in the World (June 13, 2014)
    At 73, P.V. Chinnathambi runs one of the loneliest libraries anywhere. In the middle of the forested wilderness of Kerala’s Idukki district, the library’s 160-books — all classics — are regularly borrowed, read, and returned by poor, Muthavan adivasis.
  96. Tor is for Everyone (June 13, 2014)
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  97. Marx and Engels Belong to the Workers of the World (May 30, 2014)
    Lawrence & Wishart, the British publisher of the Collected Works of Karl Marx and Friedrich Engels (MECW), has compelled the Marxists Internet Archive to remove free digital versions of this 50-volume treasure from its Web site. This step is meant to further the publisher’s pursuit of private, profitable licenses with paying customers.
  98. 2013-14 Review of Free Expression in Canada (May 3, 2014)
    Evaluates people, policies and institutions that help and hinder freedom of expression. The 2013-14 Review of Free Expression in Canada contains feature articles about some of the most pressing areas of free expression, such as access to information, digital surveillance, and the failure to protectwhistleblowers. Also: a Report Card and Cross-Canada Reports.
  99. FCC Wants to Give Corporations Their Own Internet (April 29, 2014)
    When a federal court trashed its “net neutrality” compromise policy in January, the Federal Communications Commission assured us that the Internet we knew and depended on was safe. Most activists didn’t believe federal officials and this past week the FCC demonstrated how realistic our cynicism was.
  100. Without Intellectual Property Day (April 26, 2014)
    As the saying goes, though: when you're a hammer, everything looks like a nail. For the World Intellectual Property Organization, it may seem like creativity and "intellectual property" are inextricably linked. That's not the case. In the spirit of adding to the conversation, we'd like to honor all the creativity and industry that is happening without a dependence on a system intellectual property.

Related topics in the Sources Subject Index

Expert Sources  –  Internet  –  Internet Privacy  –  Research  –  Search Engine Optimization  –  Surveillance

Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2017. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.