Technologies for Legal Privacy Invasion
Individuals, businesses, and governments are the main culprits when it comes to legal threats to privacy. But the technology advancements we have seen over the past five years have led us to this current state of affairs. Many things are out of our control, such as direct access to passing laws and developing our own technology, but we can control how we use the technology and reduce some of the risk we face through legal means.
File Sharing
Anyone who has used the Internet is familiar with the concept of file sharing. Application technologies such as Napster have made the concept of file sharing commonplace. Although this technology is perfectly legal, it exposes your computer to other people on the Internet ...
Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.