SuperHi FM

Lesson 02

Resources: PETs

These resources were shared during the video lesson.

Go deep with data privacy

Google’s 4,000-Word Privacy Policy Is a Secret History of the Internet

  • An examination of how Google’s privacy policy has evolved over the years, including after the introduction of GDPR

Understanding Privacy

  • First chapter of Daniel J. Solove’s book A Taxonomy of Privacy.

A Taxonomy of Privacy

  • Open Rights Group provide an overview of Daniel J. Solove’s taxonomy

Privacy Wiki

  • Extensive Wiki based on Solove’s Taxonomy of Privacy. Includes real-world example of each element in the taxonomy, as well as relevant laws and regulations

Privacy breaches shared in the video

Silicon Valley Is Listening to Your Most Intimate Moments

  • How the world's biggest companies got millions of people to let temps analyze some very sensitive recordings

10 Years After Snowden: Some Things Are Better, Some We’re Still Fighting For

  • EFF article assessing progress a decade after Edward Snowden exposed how security agencies were capturing and surveilling internet traffic

Surveillance, Snowden, and Big Data: Capacities, consequences, critique

  • Exploration of surveillance techniques exposed by Snowden, including information about the Co-Traveller programme

Rides of Glory

  • Controversial blog post written by Uber in 2014, and now deleted (but forever preserved on the WaybackMachine)

Have I Been Pwned

  • A free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach

The Amazon Panopticon

  • UNI Global Union’s report exploring the ways in which Amazon uses technology to surveil its own workers

Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset)

  • Demonstration of how people can be re-identified in a seemingly anonymous dataset

Estimating the success of re-identifications in incomplete datasets using generative models

  • Another example of researchers proving that anonymous datasets can be re-identified. In this case, they discovered that 99.98% of Americans would be correctly re-identified in any dataset using 15 demographic attributes.

Callisto

  • Callisto is a tool that aims to empower survivors of sexual violence, by helping students report campus sexual assaults online

Differential Privacy Press Kit

  • Press kit explaining how the US Census Bureau is modernizing privacy protections to defend against new threats using differential privacy (a Privacy Enhancing Technology)

Protecting Privacy with MATH (Collab with the Census)

  • Fantastic explanation of the Census project in this Minutephysics video

Understanding the 2020 Census Disclosure Avoidance System

  • Presentation of an internal project by the Cenuse Bureau, simulating a re-identification attack on the 2010 Census

The 2020 Census Suggests That People Live Underwater. There’s a Reason

  • New York Times article reporting some controversies with the US Census

Google’s Community Mobility Reports

  • Aggregated insights based on Google Maps data, designed to help public health officials see what was changing in responsive to different policies. This initiative used Differential Privacy to prevent reindentification

Statistics Canada: Trialling the use of synthetic data

  • Synthetic data used for a hackathon involving health data

Password Monitor: Safeguarding passwords in Microsoft Edge

  • Microsoft’s password monitor makes use of homomorphic encryption

Helping organizations do more without collecting more data

  • Google blogpost exploring practical uses of Private set intersection and homomorphic encryption

The Algorithmic Foundations of Differential Privacy

  • A thorough introduction to the problems and techniques of differential privacy

Privacy-enhancing technologies

  • PETs guidance published by the ICO (Information Commissioner’s Office)

Why PETs (privacy-enhancing technologies) may not always be our friends

  • Criticism of PETs from Elizabeth M. Renieris

Privacy Without Monopoly: Data Protection and Interoperability

  • Study for EFF bt Bennett Cyphers and Cory Doctorow. A useful reminder that there are other types of technical solution that may be required to protect privacy

Private notes

A place for you to post notes about anything on this page. Only you can view your notes.

SuperHi FM

Want some ambient music in the background? Play our radio station!

Feeling stuck?

Don’t worry, we are here to help you with:

  • Speedy help from one of our team members
  • Detailed, relevant solutions
  • Direct access to peer support through Discord!

Remember, there’s no such thing as a silly question, so don’t hesitate to reach out, we love hearing from you!