"Datensicherheit" - Link- und Literaturverzeichnis
Dipl.-Inform. Carsten Eilers
"Datensicherheit" - Link- und Literaturverzeichnis
Kapitel 1: Was die angeblich harmlosen Metadaten alles über uns verraten
- [1] Kai Biermann; Zeit Online: "Was Vorratsdaten über uns verraten"
- [2] Malte Spitz: "Sechs Monate meines Lebens in 35.000 Datensätzen"
- [3] Lorenz Matzat; Zeit Online Data Blog: "Malte Spitz’ Vorratsdaten: Der Datensatz unter der Lupe"
- [4] Zeit Online: "Verräterisches Handy"
- [5] Lorenz Matzat; Zeit Online Data Blog: "Vorratsdaten: Der Funkmast als Wachturm"
- [6] Dimitri Tokmetzis; netzpolitik.org: "Metadaten: Wie dein unschuldiges Smartphone fast dein ganzes Leben an den Geheimdienst übermittelt"
- [7] Manuel Bühlmann, Oliver Wietlisbach; watson: "Wo war Herr Glättli die letzten sechs Monate? Minute für Minute, Ort für Ort? Swisscom oder Sunrise wissen es, Sie wissen es jetzt – und der Staat kann es jederzeit wissen"
- [8] Michael Heim; Schweiz am Sonntag: "Der gläserne Nationalrat"
- [9] OpenDataCity: "Vorratsdatenspeicherung in der Schweiz - Das überwachte Leben von Nationalrat Balthasar Glättli."
- [10] Lars Nørgaard Pedersen, Eva Jung; Berlingske Politiko: "Minister allows access to private data"
- [11] www.b.dk: #sporet
- [12] Jonathan Mayer; Stanford Law School, Center for Internet and Society: "What’s In Your Metadata?"
- [13] Clifton B. Parker; Stanford Report: "Stanford students show that phone record surveillance can yield vast amounts of information"
- [14] Jonathan Mayer, Patrick Mutchler; Web Policy: "MetaPhone: The Sensitivity of Telephone Metadata"
- [15] Jonathan Mayer, Patrick Mutchler; Web Policy: "MetaPhone: The NSA’s Got Your Number"
- [16] Jonathan Mayer, Patrick Mutchler; Web Policy: "MetaPhone: Seeing Someone?"
- [17] Jonathan Mayer, Patrick Mutchler; Web Policy: "MetaPhone: The NSA Three-Hop"
- [18] Deepak Jagdish, Daniel Smilkov, César Hidalgo: "Immersion"
- [19] Immersion: a people-centric view of your email life
- [20] Damian Schnyder; SRF Kultur: "Mein Leben in Metadaten: ein Selbstversuch"
- [21] Yves-Alexandre de Montjoye; MIT Media Lab: "Unique in the Shopping Mall: On the reidentifiability of credit card metadata"
- [22] Larry Hardesty; MIT News Office: "Privacy challenges"
- [23] Jonas Jansen; Frankfurter Allgemeine Zeitung: "Metadaten von Kreditkarten: Keiner bleibt anonym"
- [24] Judith Horchert; Spiegel Online: "Mutmaßlicher Dateneinbruch: E-Mail-Liste verrät Verbindungen von EU-Parlamentariern"
- [25] Matthew Cole; Black Hat USA 2013: "OPSEC failures of spies"
Kapitel 2: Was weiß das Netz über uns – und was verrät es davon?
- [1] Mascha Schnellbacher; entwickler.de: "CIA investiert in Big-Data-Firma Palantir"
- [2] Intelligence ¦ Palantir
- [3] ZEIT Online: "BND beauftragt CIA-Firmen"
- [4] Michael Arrington; TechCrunch: "AOL Proudly Releases Massive Amounts of Private Data"
- [5] Michael Arrington; Tech Crunch: "AOL: "This was a screw up""
- [6] Markus Friend; Plenty of fish blog: "AOL Search Data Shows Users Planning to commit Murder."
- [7] Lisa: "It’s in the movie ...", Kommentar unter [6]
- [8] Michael Barbaro, Tom Zeller jr.; The New York Times: "A Face Is Exposed for AOL Searcher No. 4417749"
- [9] AOL database scandal and keyword tool: AOL user #4417749: Thelma Arnold
- [10] AOL database scandal and keyword tool
- [11] AOL database scandal and keyword tool: AOL user #17556639: poop
- [12] Mark Stockley; Sophos Naked Security: "Why Jeb Bush's 250,000 email giveaway is a bigger gamble for us than him"
- [13] Jeb Bush Emails
- [14] T.C. Sottek; The Verge: "Jeb Bush dumps emails including social security numbers of Florida residents online"
- [15] Alessandro Acquisti; Black Hat USA 2011: "Faces Of Facebook-Or, How The Largest Real ID Database In The World Came To Be"
- [16] Aviva Rutkin; New Scientist: "Facebook can recognise you in photos even if you're not looking"
- [17] BBC News: "Download festival: Leicestershire Police defend facial recognition scans"
- [18] James Risen, Laura Poitras; New York Times: "N.S.A. Collecting Millions of Faces From Web Images"
- [19] Lauren Davidson; The Telegraph: "The vending machine of the future is here, and it knows who you are"
- [20] Max Veytsman; Include Security Blog: "As the ROT13 turns...: How I was able to track the location of any Tinder user."
- [21] Pili Hu, Wing Cheong Lau; Black Hat USA 2014: "How to Leak a 100-Million-Node Social Graph in Just One Week? - A Reflection on Oauth and API Design in Online Social Networks"
- [22] Candid Wuest; Black Hat Europe 2014: "Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare?"
- [23] Symantec Security Response; Symantec Connect: "How safe is your quantified self? Tracking, monitoring, and wearable tech"
- [24] Mario Ballano Barcena, Candid Wuest, Hon Lau; Symantec: "How safe is your quantified self?" (PDF)
- [25] Chris Sumner; Black Hat USA 2010: "Social Networking Special Ops: Extending data visualization tools for faster Pwnage"
- [26] Me & My Shadow
- [27] Trackography - Who tracks you online?
- [28] Maria Xynou, Claudio Agosti; 31C3: "Trackography - You never read alone"
- [29] Tom Keenan; Black Hat Asia 2014: "Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel"
- [30] Google History
- [31] Graham Cluley; The Mac Security Blog: "You’ll Shudder When You See What Google Knows About Your Web Searches"
Kapitel 3: Identitätsmissbrauch: Was kann passieren, und was kann man dagegen machen?
Zurück