Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Entwickler Magazin 5.2015 - Verräterische Datenberge
Im
Entwickler Magazin 5.15
ist ein Artikel über die Spuren, die wir im Internet hinterlassen,
und was man damit anstellen kann, erschienen.
Links
- [1] Mascha Schnellbacher; entwickler.de: "CIA investiert in Big-Data-Firma Palantir"
- [2] Intelligence ¦ Palantir
- [3] ZEIT Online: "BND beauftragt CIA-Firmen"
- [4] Michael Arrington; TechCrunch: "AOL Proudly Releases Massive Amounts of Private Data"
- [5] Michael Arrington; Tech Crunch: "AOL: "This was a screw up""
- [6] Markus Friend; Plenty of fish blog: "AOL Search Data Shows Users Planning to commit Murder."
- [7] Lisa: "It’s in the movie ...", Kommentar unter [6]
- [8] Michael Barbaro, Tom Zeller jr.; The New York Times: "A Face Is Exposed for AOL Searcher No. 4417749"
- [9] AOL database scandal and keyword tool: AOL user #4417749: Thelma Arnold
- [10] AOL database scandal and keyword tool
- [11] AOL database scandal and keyword tool: AOL user #17556639: poop
- [12] Mark Stockley; Sophos Naked Security: "Why Jeb Bush's 250,000 email giveaway is a bigger gamble for us than him"
- [13] Jeb Bush Emails
- [14] T.C. Sottek; The Verge: "Jeb Bush dumps emails including social security numbers of Florida residents online"
- [15] Alessandro Acquisti; Black Hat USA 2011: "Faces Of Facebook-Or, How The Largest Real ID Database In The World Came To Be"
- [16] Aviva Rutkin; New Scientist: "Facebook can recognise you in photos even if you're not looking"
- [17] BBC News: "Download festival: Leicestershire Police defend facial recognition scans"
- [18] James Risen, Laura Poitras; New York Times: "N.S.A. Collecting Millions of Faces From Web Images"
- [19] Lauren Davidson; The Telegraph: "The vending machine of the future is here, and it knows who you are"
- [20] Max Veytsman; Include Security Blog: "As the ROT13 turns...: How I was able to track the location of any Tinder user."
- [21] Pili Hu, Wing Cheong Lau; Black Hat USA 2014: "How to Leak a 100-Million-Node Social Graph in Just One Week? - A Reflection on Oauth and API Design in Online Social Networks"
- [22] Candid Wuest; Black Hat Europe 2014: "Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare?"
- [23] Symantec Security Response; Symantec Connect: "How safe is your quantified self? Tracking, monitoring, and wearable tech"
- [24] Mario Ballano Barcena, Candid Wuest, Hon Lau; Symantec: "How safe is your quantified self?" (PDF)
- [25] Chris Sumner; Black Hat USA 2010: "Social Networking Special Ops: Extending data visualization tools for faster Pwnage"
- [26] Me & My Shadow
- [27] Trackography - Who tracks you online?
- [28] Maria Xynou, Claudio Agosti; 31C3: "Trackography - You never read alone"
- [29] Tom Keenan; Black Hat Asia 2014: "Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel"
- [30] Google History
- [31] Graham Cluley; The Mac Security Blog: "You’ll Shudder When You See What Google Knows About Your Web Searches"