1.
Ralf Bendrath: Dangerous Moves: OpenID and Government-Issued ID tokens Mar 11, 2008 ... Dangerous Moves: OpenID and Government-Issued ID tokens. As I wrote in my last post: "The identity management systems that are being ...
2.
Ralf Bendrath: Deep Packet Inspection: Technology vs Lawyers? May 13, 2008 ... Deep Packet Inspection: Technology vs Lawyers? Lots of interesting things have been happening in the last few weeks in the field of ...
3.
Ralf Bendrath: Privacy in Online Games - from ID Cards to Tinfoil Hats Jun 5, 2007 ... Privacy in Online Games - from ID Cards to Tinfoil Hats. As you will have read by now, Linden Labs is trying to introduce a ...
4.
Ralf Bendrath: Deep Packet Inspection: Technology vs Lawyers? May 13, 2008 ... The basic concept behind the Phorm architecture is that they wish to take a copy of the traffic that passes between an end-user and a ...
5.
Ralf Bendrath: Microsoft buys Privacy-Friendly Identity Technology Ben sarcastically reads it like "the Microsoft we all know and love", implying market domination based on proprietary technology. But the Microsoft we all ...
6.
Ralf Bendrath: Expect the Sarah Palin E-Mail Privacy Act of 2009 Sep 18, 2008 ... Thus, Judge Bork's video rental records begat the Video Privacy Protection Act and the murder of actress Rebecca Schaeffer by a stalker with ...
7.
Ralf Bendrath: Reputation Defender or: Privacy 2.0 as a business model A company called Reputation Defender is offering an interesting service:. We scour the Internet to dig up every possible piece of information about you and ...
8.
Ralf Bendrath: Reputation Defender or: Privacy 2.0 as a business model A company called Reputation Defender is offering an interesting service:. We scour the Internet to dig up every possible piece of information about you and ...
9.
Ralf Bendrath: EU Proposal puts Confidential Communications Data ... Jan 28, 2009 ... EU Proposal puts Confidential Communications Data at Risk. Here is an international press release I was involved in creating. ...
10.
Ralf Bendrath: You are what you do? Behavioural data and ... Behavioural data and identification technologies. Authentication or identification techniques are often divided into something you have (a key, a chipcard), ...
|