You are here: Home
2974 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Govt wants to monitor Facebook, Twitter
by Prasad Krishna published Aug 09, 2011 — filed under:
The Union home ministry has written to the department of telecom asking it to "ensure effective monitoring of Twitter and Facebook".
Located in News & Media
Re-thinking Key Escrow
by Natasha Vaz published Aug 09, 2011 last modified Aug 22, 2011 11:44 AM — filed under: ,
Would you make duplicates of your house keys and hand them over to the local police authority? And if so, would you feel safe? Naturally, one would protest this invasion of privacy. Similarly, would it be justified for the government to have a copy of the private key to intercept and decrypt communications? This is the idea behind key escrow; it enables government ‘wiretapping’.
Located in Internet Governance / Blog / Privacy
The Mirror in the Enigma: How Germany lost World War II to a Mathematical Theorem
by elonnai hickok published Aug 04, 2011 last modified Sep 22, 2011 07:53 AM — filed under: ,
Today we use encryption in pretty much everything — cellphones, Internet, banking, satellites, and spaceships. How far have we come since the days of the Enigma and how does it affect our daily lives? CIS invites you to attend a short lecture by Rohit Gupta on August 12, 2011.
Located in Internet Governance / Events
Internet Governance Blog
by kaeru published Aug 01, 2011 last modified Oct 18, 2011 06:40 AM — filed under:
Located in Internet Governance / Blog
July 2011 Bulletin
by Prasad Krishna published Jul 28, 2011 last modified Jul 30, 2012 07:00 AM — filed under: , , , , , ,
Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:
Located in About Us / Newsletters
Portal augurs well for transparency
by Prasad Krishna published Jul 25, 2011 last modified Jul 26, 2011 03:16 PM — filed under:
Data.gov.in will have meta-data, which will facilitate discovery of data and access from portals of ministries, says T Ramachandra. The article was published in the Hindu on 25 July 2011.
Located in News & Media
Blog Entry UID: Nothing to Hide, Nothing to Fear?
by Shilpa Narani published Jul 25, 2011 last modified Sep 28, 2011 11:44 AM — filed under: ,
Isn’t it interesting that authorities ask you about your identity and you end up showing your proof of existence! Isn’t this breaching into one’s personal life? Why so much transparency only from the public side? Why can’t the government be equally transparent to the public?, asks Shilpa Narani.
Located in Internet Governance / Blog / Privacy
Blog Entry An Overview of DNA Labs in India
by Shilpa Narani published Jul 24, 2011 last modified Feb 02, 2016 01:11 PM — filed under: ,
DNA fingerprinting has become the most precise and technologically advanced method for identifying crimes such as murder, kidnapping, robbery and rape. Police and judicial authorities and in some cases even private parties retain this in their records, writes Shilpa in this blog post.
Located in Internet Governance / Blog / Privacy
Facebook, my boyfriend is lousy
by Prasad Krishna published Jul 24, 2011 last modified Jul 25, 2011 10:07 AM — filed under:
While a sizeable chunk of users do not mind living their life in public, oversharing can have nasty repercussions in real life. This article by Sahana Saran was published in the Bangalore Mirror on 24 July 2011.
Located in News & Media
Blog Entry Consumer Privacy in e-Commerce
by Sahana Sarkar published Jul 23, 2011 last modified Mar 28, 2012 04:53 AM — filed under: ,
Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.
Located in Internet Governance / Blog / Privacy