Jump to content

Literature wanted


brzydkibazyl3

Recommended Posts

Hi there.

I'm looking for bibliography, studies, literature to my engineering work - "Anonymity (in web)" & yeah - I do realize that about this topic tomes of books can be written. I'd like to focus on things which not directly do identify user such as biometry, behavoirism, data collected about him and so go on. I've arleady did some digging which allowed for me to specify some issues (list mentioned below). What would you suggest to eventually remove or add to this list.

Biometrics (fingerprints, hands' geometry, voice sound, iris, veins, teeth, ears, lips, DNA, blood vessels & other not mentioned methods(authorization systems))

behaviorism (characteristics of handwriting, behavoir trackin(CourseSmart Analytics), targeting & contextual targeting, statistics, profiling, web tracking, user UI)

cookies (flash Cookies(Local Shared Objects), standard HTTP, evercookies, supercookies)

web browsers (mails, plugins, encryption methods (PGP etc), proxies (Java Anon Proxy etc), browser fingerprinting overall,metadata (photos etc, cloud storing (data))

mobile devices (phones (triangulation) & cloning (in terms of double authentication system), web cam & microphones)

Social engineering (in terms of IT & psychology behind it, identity theft)

programs (Blarney, Fairview, Oakstar, Echelon, Indect, Prism, Clean IT, Stormbrew, Riot & surveillance overall)

alternatives (Fidonet, GNUnet, I2P, ToR, MUTE & others P2P, VPNs, Ghostery)

others* (wifi, voip, mail, google (overall), sniffing (etc), DNS**, communication)

 

I'd like to avoid topics like : OS (whonix etc)/People Search Engines/Computer forencis. They're way too huge. Maybe "programs" will be kicked also due their sizes.

 

* By "others" I meant those which are are difficult to somehow categorize.

** Due recent routers' vulnerabilities I thought to also include this but it is also an ocean topic.

 

Thanks.

Link to comment
Share on other sites

pretty much everything you do can be tracked. the rest can be found out by what you do not do.

think linux is safe?

think again...

the only way to trust your own OS is to go through the code and select your own OS components, compile your software from source upon severe scrutiny, and custom build your own rig knowing exactly what is in it.

everything has a chip now and has potential to exploit your system.

start by keeping a full record of events and learn where to find clues about the others you can't see.

you would be amazed at what an "empty" flash drive is capable of.

even more amazed at what is hiding within the partitions of your hard drive.

your router is not really yours to begin with.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.