Your Digital Trail, And How It Can Be Used Against You (Daniel Zwerdling, All Tech Considered, NPR, 9-30-13) NPR and the Center for Investigative Reporting are documenting just how vivid the typical person's digital picture has become and how easy it can be to access it. This is first part of a four-part series examining your digital trail and who potentially has access to it.
Your Digital Trail: Private Company Access (Daniel Zwerdling, NPR, 10-1-13) Data we voluntarily provide online such as on dating websites may not stay with that site.
(Daniel Zwerdling, All Tech Considered, NPR, 10-2-13) Could government agents really get access to all your private data in less than a minute?
Experts say no but warn we are moving in that direction.
VPN Benefits Explained (Claudio R., Anonymster, 1-18-17) A Virtual Private Network (VPN) is basically a series of computers networked together over the Internet, so you bypass the server of your ISP (internet service provider), so that nobody can snoop into your personal affairs.
Privacy Journal (Robert Ellis Smith's newsletter on personal privacy, online and elsewhere)Privacy.
Tanya Rivero interviews Georgia Wells, WSJ video, 12-7-16) Advocacy groups allege that Internet-connected toys, including several children's dolls, pose a privacy risk to consumers.
Is Genesis Toys recording children's voices and what they say, without parental knowledge or consent?Edward Snowden Explains How To Reclaim Your Privacy (Michah Lee, The Intercept, 11-12-15) A simple step to make news sites more secure (Susan Mc Gregor, CJR, 12-5-16) "The vast majority of mainstream news organizations still publish to HTTP domains, making it impossible to guarantee either their readers privacy or the authenticity and accuracy of what those readers are seeing.News sites that publish on HTTPS domains, however, can guarantee all of thiswithout additional effort from users." A good explanation of information I didn't realize I needed!Axis Pro's Loss Prevention Guide (this PDF booklet provides basic info on defamation, defamation, invasion of privacy (more complex than you might expect), trademark infringement, and copyright infringement).Online privacy for journalists by Michael Dagan (PDF) How to safeguard your communications, browsing, and data, from any unwanted "big brother" or intruder--indirectly how to protect a source. Schulz from the Center for Investigative Reporting.Scroogle, an ad-free Google search proxy that prevents the searcher's data being stored by Google (as explained on Technically Speaking Radio).