Archive for category Concepts

Date: December 3rd, 2012
Cate: Concepts, Frontpage

Lessons learned. Anonymity – Online and Offline – Part IV

In the last three installments of this series we looked at the Theory of Anonymity, and what to expect of anonymity both online and offline.

Several conclusion can be drawn and turned into lessons on how to protect anonymity more effectively. This we are going to explore in this part of the series.
more))

Date: December 1st, 2012
Cate: Concepts, Frontpage
Comments Off on No place to hide. Anonymity – Online and Offline – Part III

No place to hide. Anonymity – Online and Offline – Part III

In this article we are going to explore how anonymity in the physical world is eroded through technologies and conventions that have been introduced over the last 30 years. Most people assume that their physical behavior is mostly disconnected from the world of bits and bytes, databases and surveillance (see part I on the Theory of Anonymity, and part II about Online Anonymity). Sadly, this increasingly proves to be an illusion.

more))

Date: November 12th, 2012
Cate: Concepts, Frontpage
Comments Off on Anonymity – Online and Offline – Part II

Anonymity – Online and Offline – Part II

This article explores how much anonymity really exists online, and how anonymity is reduced by everyday technologies used in Internet communication (please check out Part I of this series for the theory behind anonymity).
Many people expect their actions online to be far removed from their physical identity which often leads them to behave in ways they would never dare when their name were connected to it. But how well founded is this belief in online anonymity?
more))

Date: November 8th, 2012
Cate: Concepts, Frontpage

Anonymity – Online and Offline – Part I

This series explains the theory of Anonymity and what factors influence anonymity in online communication and offline interaction. The goal is to provide necessary background information to make educated judgements on the effectiveness of methods to increase anonymity.

Let us start out with a definition of the term and then explore its implications:

Anonymity is the degree of uncertainty in relating a person to an event, action or property.

more))

Date: November 5th, 2012
Cate: Concepts, Opinion

The Treasure which is Privacy

The Philosophy of Privacy Extremism emphasizes that privacy should be maintained in all situations; that if in question, privacy should be given preference, unless sufficient arguments to the contrary apply to the specific  situation.
Privacy serves as a necessary condition for engaging in meaningful and truthful interpersonal relationships.
Furthermore privacy is a necessary condition under which a person can develop a self and embrace individual responsibility for decisions and actions that result from them.
A denial of privacy to the contrary establishes and maintains a lack and loss of esteem, respect and value in and for things and other persons.
Privacy should therefor be the strong standard for personal behavior, normative for those that thrive towards personal human positive development.
more))

Date: November 5th, 2012
Cate: Concepts, Frontpage

Encryption algorithms: a primer

Encryption algorithms are used to secure the content of communications and stored data.  An algorithm in general is a recipe for calculations which can be performed automatically by a computer. An encryption algorithm (also called a cipher) encrypts a readable plaintext into an unreadable ciphertext. A cipher can usually also perform the reverse operation of decrypting an unreadable ciphertext into a readable plaintext.  For encryption and decryption a cipher needs a key. The security of a cipher depends on the secrecy of the used key.  Two general categories of encryption algorithms exist:
more))

Date: November 5th, 2012
Cate: Concepts, Frontpage, Opinion

Global Spying: Realistic Probabilities In Modern Signals Intelligence

A paper on the probabilities of global internet surviellance, presented in 2010 at the Defcon conference in Las Vegas, proving to be close to what becomes common knowledge today.

In this article, we will present insight to the realistic possibilities of Internet mass surveillance. When talking about the threat of Internet surveillance, the common argument is that there is so much traffic that any one conversation or email won’t be picked up unless  there is reason to suspect those concerned; it is impossible that “they” can listen to us all.

more))

Date: November 5th, 2012
Cate: Concepts, Frontpage

Libertopia Conference – Theory & Practice of Black Market Business

Slides for Jonathan Logan’s talk at Libertopia 2012: Theory & Practice of Black Market Business.