To face this threat; privacy preserving technologies have been developed since the early eighties; providing anonymous communications and masquerading traffic patterns.
Are the privacy enhancing technologies ready to be used by the masses?
Is it legal to use such technologies in a world where strong encryption was banned for private use even some years ago? Where retention of communication data (for several years) is gaining ground in legislation?
Are we becoming safer or more of a suspect by using such technologies?
Inter: A European Cultural Studies : Conference in Sweden 11-13 June 2007
Al-Mutadi; Jalal; Karpadia Apu; Mickunas M. Tennis; Naldurg Prasad; Socializing in the mist: privacy in digital communities; Paper delivered at the Ubiquitous Computers Confer-ence 2002.
Bissias; G. D.; Liberatore; M.; Jensen; D.; Levine; B. N.; Privacy Vulnerabilities in Encrypted HTTP Streams; PET 2005; Cavtat; Croatia; May 30-June 1; 2005.
Kostakos Vassillis and Little Linda; ‚ÄúThe social implications of emerging technologies: edito-rial‚ÄĚ; Interacting with computers; vol. 17; 2005.
Liberatore; M.; B. N. Levine; Inferring the Source of Encrypted HTTP Connections; CCS2006; October 2006
Lyon David; ‚ÄúEveryday Surveillance: personal data and social classifications‚ÄĚ; Information; communication and society; vol.5; n.2; 2002.
Majtenyj Laszlo; ‚ÄúEnsuring data protection in East-ecentral Europe‚ÄĚ; Social Research; vol. 69; n.1; 2002.
Marx; Gary T.; ‚ÄúA tack in the shoe: neutralizing and resisting the new surveillance‚ÄĚ; Journal of Social Issues; vol. 59; n.2; 2003.
Marx; Gary T.; ‚ÄúMurky conceptual waters: the public and the private‚ÄĚ; Ethics and Information technology; vol.3; 2001.
Regan Priscilla M.; ‚ÄúSafe harbours or free frontiers? Privacy and Transborder Data Flow‚ÄĚ; Journal of Social Issues; vol. 59; n.2; 2003.
Turrow Joseph and Hennessy Michael; ‚ÄúInternet privacy and institutional trust: insights from a national survey‚ÄĚ; New media and Society; vol. 9; n. 900; 2007.