Surveillance and Privacy

  1. Privacy Protection Technologies
    1. Cryptographic Solutions
      1. Symmetric Encryption
        1. Advanced Encryption Standard
          1. Data Encryption Standard
            1. Stream Ciphers
              1. Block Ciphers
              2. Asymmetric Encryption
                1. RSA Algorithm
                  1. Elliptic Curve Cryptography
                    1. Diffie-Hellman Key Exchange
                      1. Digital Signatures
                      2. Advanced Cryptographic Techniques
                        1. Homomorphic Encryption
                          1. Partially Homomorphic Encryption
                            1. Somewhat Homomorphic Encryption
                              1. Fully Homomorphic Encryption
                                1. Practical Applications
                                2. Zero-Knowledge Proofs
                                  1. Interactive Zero-Knowledge
                                    1. Non-Interactive Zero-Knowledge
                                      1. zk-SNARKs
                                        1. zk-STARKs
                                        2. Secure Multi-Party Computation
                                          1. Secret Sharing
                                            1. Garbled Circuits
                                              1. Oblivious Transfer
                                                1. Privacy-Preserving Analytics
                                              2. Key Management
                                                1. Key Generation
                                                  1. Key Distribution
                                                    1. Key Storage
                                                      1. Key Rotation
                                                    2. Anonymization and Privacy-Preserving Techniques
                                                      1. Statistical Disclosure Control
                                                        1. Data Masking
                                                          1. Substitution Methods
                                                            1. Shuffling Techniques
                                                              1. Noise Addition
                                                                1. Generalization
                                                                2. Suppression Techniques
                                                                  1. Cell Suppression
                                                                    1. Record Suppression
                                                                      1. Attribute Suppression
                                                                        1. Complementary Suppression
                                                                      2. Formal Privacy Models
                                                                        1. K-Anonymity
                                                                          1. Quasi-Identifier Generalization
                                                                            1. Suppression Strategies
                                                                              1. Limitations and Attacks
                                                                                1. Practical Implementation
                                                                                2. L-Diversity
                                                                                  1. Distinct L-Diversity
                                                                                    1. Entropy L-Diversity
                                                                                      1. Recursive L-Diversity
                                                                                        1. Homogeneity Attack Prevention
                                                                                        2. T-Closeness
                                                                                          1. Earth Mover's Distance
                                                                                            1. Attribute Disclosure Protection
                                                                                              1. Utility Preservation
                                                                                                1. Implementation Challenges
                                                                                                2. Differential Privacy
                                                                                                  1. Epsilon-Differential Privacy
                                                                                                    1. Local Differential Privacy
                                                                                                      1. Composition Theorems
                                                                                                        1. Practical Mechanisms
                                                                                                      2. Synthetic Data Generation
                                                                                                        1. Statistical Synthesis
                                                                                                          1. Machine Learning Approaches
                                                                                                            1. Generative Adversarial Networks
                                                                                                              1. Utility-Privacy Trade-offs
                                                                                                            2. Network Privacy Tools
                                                                                                              1. Virtual Private Networks
                                                                                                                1. VPN Protocols
                                                                                                                  1. OpenVPN
                                                                                                                    1. IPSec
                                                                                                                      1. WireGuard
                                                                                                                        1. PPTP and L2TP
                                                                                                                        2. VPN Architectures
                                                                                                                          1. Site-to-Site VPNs
                                                                                                                            1. Remote Access VPNs
                                                                                                                              1. Client-to-Site VPNs
                                                                                                                                1. Mesh VPNs
                                                                                                                                2. VPN Security Considerations
                                                                                                                                  1. Logging Policies
                                                                                                                                    1. Jurisdiction Issues
                                                                                                                                      1. DNS Leaks
                                                                                                                                        1. Kill Switches
                                                                                                                                      2. Anonymous Communication Networks
                                                                                                                                        1. The Onion Router
                                                                                                                                          1. Onion Routing Protocol
                                                                                                                                            1. Hidden Services
                                                                                                                                              1. Exit Node Vulnerabilities
                                                                                                                                                1. Traffic Analysis Attacks
                                                                                                                                                2. Alternative Anonymous Networks
                                                                                                                                                  1. I2P Network
                                                                                                                                                    1. Freenet
                                                                                                                                                      1. JAP/JonDonym
                                                                                                                                                        1. Mixnets
                                                                                                                                                      2. Proxy Services
                                                                                                                                                        1. HTTP Proxies
                                                                                                                                                          1. SOCKS Proxies
                                                                                                                                                            1. Transparent Proxies
                                                                                                                                                              1. Reverse Proxies
                                                                                                                                                            2. Application-Level Privacy Tools
                                                                                                                                                              1. Secure Communication Applications
                                                                                                                                                                1. End-to-End Encrypted Messaging
                                                                                                                                                                  1. Signal Protocol
                                                                                                                                                                    1. Double Ratchet Algorithm
                                                                                                                                                                      1. Perfect Forward Secrecy
                                                                                                                                                                        1. Metadata Protection
                                                                                                                                                                        2. Secure Email
                                                                                                                                                                          1. Pretty Good Privacy
                                                                                                                                                                            1. GNU Privacy Guard
                                                                                                                                                                              1. S/MIME
                                                                                                                                                                                1. ProtonMail and Tutanota
                                                                                                                                                                                2. Secure Voice and Video
                                                                                                                                                                                  1. Signal Calls
                                                                                                                                                                                    1. Jami
                                                                                                                                                                                      1. Briar
                                                                                                                                                                                        1. Session
                                                                                                                                                                                      2. Privacy-Enhanced Browsing
                                                                                                                                                                                        1. Privacy-Focused Browsers
                                                                                                                                                                                          1. Tor Browser
                                                                                                                                                                                            1. Brave Browser
                                                                                                                                                                                              1. Firefox with Privacy Settings
                                                                                                                                                                                                1. DuckDuckGo Browser
                                                                                                                                                                                                2. Browser Extensions
                                                                                                                                                                                                  1. uBlock Origin
                                                                                                                                                                                                    1. Privacy Badger
                                                                                                                                                                                                      1. Ghostery
                                                                                                                                                                                                        1. ClearURLs
                                                                                                                                                                                                        2. Search Engines
                                                                                                                                                                                                          1. DuckDuckGo
                                                                                                                                                                                                            1. Startpage
                                                                                                                                                                                                              1. Searx
                                                                                                                                                                                                            2. Mobile Privacy Tools
                                                                                                                                                                                                              1. Privacy-Focused Operating Systems
                                                                                                                                                                                                                1. GrapheneOS
                                                                                                                                                                                                                  1. CalyxOS
                                                                                                                                                                                                                    1. LineageOS
                                                                                                                                                                                                                      1. /e/ OS
                                                                                                                                                                                                                      2. Mobile Applications
                                                                                                                                                                                                                        1. Secure Messaging Apps
                                                                                                                                                                                                                          1. Privacy-Focused Keyboards
                                                                                                                                                                                                                            1. VPN Applications
                                                                                                                                                                                                                              1. Ad Blockers
                                                                                                                                                                                                                          2. Privacy Engineering Principles
                                                                                                                                                                                                                            1. Privacy by Design
                                                                                                                                                                                                                              1. Proactive not Reactive
                                                                                                                                                                                                                                1. Privacy as Default Setting
                                                                                                                                                                                                                                  1. Full Functionality
                                                                                                                                                                                                                                    1. End-to-End Security
                                                                                                                                                                                                                                      1. Visibility and Transparency
                                                                                                                                                                                                                                        1. Respect for User Privacy
                                                                                                                                                                                                                                        2. Data Minimization Strategies
                                                                                                                                                                                                                                          1. Collection Limitation
                                                                                                                                                                                                                                            1. Use Limitation
                                                                                                                                                                                                                                              1. Retention Limitation
                                                                                                                                                                                                                                                1. Disclosure Limitation
                                                                                                                                                                                                                                                2. Technical Privacy Controls
                                                                                                                                                                                                                                                  1. Access Controls
                                                                                                                                                                                                                                                    1. Audit Logging
                                                                                                                                                                                                                                                      1. Data Loss Prevention
                                                                                                                                                                                                                                                        1. Privacy Impact Assessments