Date: December 01, 2012
Filed in: concepts, frontpage

No place to hide. Anonymity - Online and Offline - Part III

In this article we are going to explore how anonymity in the physical world is eroded through technologies and conventions that have been introduced over the last 30 years. Most people assume that their physical behavior is mostly disconnected from the world of bits and bytes, databases and surveillance (see part I on the Theory of Anonymity, and part II about Online Anonymity). Sadly, this increasingly proves to be an illusion.

continue reading…

Date: November 12, 2012
Filed in: concepts, frontpage

Anonymity – Online and Offline – Part II

This article explores how much anonymity really exists online, and how anonymity is reduced by everyday technologies used in Internet communication (please check out Part I of this series for the theory behind anonymity).

Many people expect their actions online to be far removed from their physical identity which often leads them to behave in ways they would never dare when their name were connected to it. But how well founded is this belief in online anonymity?

continue reading…

Date: November 08, 2012
Filed in: concepts, frontpage

Anonymity - Online and Offline - Part I

This series explains the theory of Anonymity and what factors influence anonymity in online communication and offline interaction. The goal is to provide necessary background information to make educated judgements on the effectiveness of methods to increase anonymity.

Let us start out with a definition of the term and then explore its implications:

Anonymity is the degree of uncertainty in relating a person to an event, action or property.

continue reading…

Date: November 05, 2012
Filed in: concepts, opinion

The Treasure which is Privacy

The Philosophy of Privacy Extremism emphasizes that privacy should be maintained in all situations; that if in question, privacy should be given preference, unless sufficient arguments to the contrary apply to the specific  situation.

Privacy serves as a necessary condition for engaging in meaningful and truthful interpersonal relationships.

Furthermore privacy is a necessary condition under which a person can develop a self and embrace individual responsibility for decisions and actions that result from them.

A denial of privacy to the contrary establishes and maintains a lack and loss of esteem, respect and value in and for things and other persons.

Privacy should therefor be the strong standard for personal behavior, normative for those that thrive towards personal human positive development.

continue reading…

Date: November 05, 2012
Filed in: concepts, frontpage

Encryption algorithms: a primer

Encryption algorithms are used to secure the content of communications and stored data.  An algorithm in general is a recipe for calculations which can be performed automatically by a computer. An encryption algorithm (also called a cipher) encrypts a readable plaintext into an unreadable ciphertext. A cipher can usually also perform the reverse operation of decrypting an unreadable ciphertext into a readable plaintext.  For encryption and decryption a cipher needs a key. The security of a cipher depends on the secrecy of the used key.  Two general categories of encryption algorithms exist:

continue reading…

Date: November 05, 2012
Filed in: concepts, frontpage, opinion

Global Spying: Realistic Probabilities In Modern Signals Intelligence

A paper on the probabilities of global internet surviellance, presented in 2010 at the Defcon conference in Las Vegas, proving to be close to what becomes common knowledge today.

In this article, we will present insight to the realistic possibilities of Internet mass surveillance. When talking about the threat of Internet surveillance, the common argument is that there is so much traffic that any one conversation or email won’t be picked up unless  there is reason to suspect those concerned; it is impossible that “they” can listen to us all.

continue reading…