Skip to content

Commit

Permalink
Mention .SE report with surveillance worry numbers
Browse files Browse the repository at this point in the history
  • Loading branch information
joelpurra committed Oct 19, 2014
1 parent 936fb5d commit ec8a919
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 9 deletions.
8 changes: 8 additions & 0 deletions references/thesis.bib
@@ -1,5 +1,13 @@


@techreport{Ahlgren:2014aa,
Author = {Ahlgren, Marianne and Davidsson, Pamela},
Date-Added = {2014-10-19 08:12:58 +0000},
Date-Modified = {2014-10-19 08:14:42 +0000},
Institution = {.SE The Internet Infrastructure Foundation},
Title = {Svenskarna och politiken p{\aa} internet -- delaktighet, p{\aa}verkan och {\"o}vervakning},
Year = {2014}}

@inproceedings{Smith:2011aa,
Author = {Smith, H. Jeff and Dinev, Tamara and Xu, Heng},
Booktitle = {MIS Quarterly},
Expand Down
29 changes: 20 additions & 9 deletions report/report.lyx
Expand Up @@ -468,17 +468,27 @@ Trackers are a commercial choice
While online privacy has been in the spotlight due to recently uncovered
mass surveillance operations, the focus has been on national government
intelligence agencies collecting information around the globe.
They have been able to intercept traffic data and metadata by, among several
techniques, covertly hooking into the internet infrastructure and passively
listening.
Public worry regarding surveillance in Sweden is low.
Only 9% of Swedes say they worry to some degree about government surveillance,
but at 18% twice as many worry about companies' surveillance
\begin_inset CommandInset citation
LatexCommand cite
key "Ahlgren:2014aa"

\end_inset

.
Governments are able to intercept traffic data and metadata by, among several
techniques,
\emph on
covertly
\emph default
hooking into the internet infrastructure and passively listening.
Basic connection metadata can always be collected, but without secure connectio
ns between client and server, any detail in the contents of each request
can be extracted.
\end_layout

\begin_layout Standard
In contrast, external resources are approved by and actively installed by
site and service owners, and presented openly to users with basic technical
In contrast, external resources are approved by and actively installed
by site and service owners, and presented openly to users with basic technical
skills and tools.
Reasons can be technical, for example because distributing resources among
systems improves performance
Expand All @@ -499,7 +509,7 @@ key "Krishnamurthy:2006:CMC:1135777.1135829,Krishnamurthy:2000:AFI:347319.346248
Because these external resources are used on behalf of the service, they
are also loaded when end-to-end encryption with HTTPS is enabled for enhanced
privacy and security.
This encryption by-pass gives these private trackers more information than
This encryption bypass gives these private trackers more information than
possible with large-scale passive traffic interception, even when there
is a security nullifying mixture of encrypted and unencrypted connections.
\end_layout
Expand Down Expand Up @@ -564,6 +574,7 @@ key "Kontaxis:2012:PSP:2362793.2362823,Krishnamurthy:2008:CPO:1397735.1397744"
.
This direct association, as opposed to inferred, to the person also allows
for tracking across devices where there is an overlap of services used.

\begin_inset Note Greyedout
status open

Expand Down

0 comments on commit ec8a919

Please sign in to comment.