blob: 5cc8b6e93685e1adb4fb85900133cbbb9ae91d8e (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
|
%T Stasiland
%A Anna Funder
%D 2003
%I Granta Books
%G ISBN 9781783787340
%O https://granta.com/products/stasiland/"
%T Global digital population as of January 2021
%A Joseph Johnson
%D 2021
%J Statista
%O https://www.statista.com/statistics/617136/digital-population-worldwide/"
%T Americans’ Internet Access: 2000-2015
%A Andrew Perrin
%A Maeve Duggan
%J Pew Research Center
%D 2015
%O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015
%A van Mill, David
%T Freedom of Speech
%J The Stanford Encyclopedia of Philosophy
%E Edward N. Zalta
%O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/
%D 2021
%C Metaphysics Research Lab, Stanford University
%T Why Twitter’s Mission Statement Matters
%A Justin Fox
%D 2014
%J Harvard Business Review
%O https://hbr.org/2014/11/why-twitters-mission-statement-matters
%T The great firewall of China: Xi Jinping’s internet shutdown
%A Elizabeth C. Economy
%D 2018
%J The Guardian
%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown
%T Intel's Management Engine is a security hazard, and users need a way to disable it
%A Erica Portnoy
%A Peter Eckersley
%D May 2017
%J Electronic Frontier Foundation
%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)
%T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
%A Roberto Musotto
%A David S. Wall
%D December 2019
%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022)
%T How Terrorists Use Encryption
%V Volume 9, Issue 6
%A Robert Graham
%D June 2016
%J CTC Sentinel
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)
%T International statement: End-to-end encryption and public safety
%A Home_Office
%D Oct 2020
%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety
(Accessed 29 January 2021)
%T Between Myth and Reality: The Stasi Legacy in German History
%A Konrad Jarausch
%D 2014
%J Bulletin of the German Historical Institute
%C "German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C "German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
|