Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Advanced Search
Content Type:
Long Read
The looming disaster of immunity passports and digital identity
Tuesday, July 21, 2020
Content Type:
Video
Podcast: Immunity Passports
Friday, July 24, 2020
Content Type:
Video
Podcast: The trouble with Identity in Kenya
Thursday, June 11, 2020
Content Type:
News & Analysis
Zoom is not the worst, just getting the attention software deserves
Tuesday, April 21, 2020
Content Type:
News & Analysis
International Health Day during a pandemic: an opportunity to reflect
Friday, April 10, 2020
Content Type:
Examples
Researchers scraped videos of transgender vloggers off YouTube without their knowledge to train facial recognition software
Friday, May 3, 2019
Content Type:
Examples
Design flaw leaves Bluetooth devices vulnerable
Wednesday, April 1, 2020
Content Type:
Examples
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
Wednesday, April 1, 2020
Content Type:
Examples
Key Negotiation of Bluetooth attack
Wednesday, April 1, 2020
Content Type:
Case Study
…it protects our property
Monday, March 30, 2020
Content Type:
Case Study
...it helps to protect our nationality
Wednesday, March 25, 2020
Content Type:
News & Analysis
The UN’s Legal Identity Task Force: Opportunities and Risks
Wednesday, March 11, 2020
Content Type:
Long Read
Kenyan Court Ruling on Huduma Namba Identity System: the Good, the Bad and the Lessons
Monday, February 24, 2020
Content Type:
Examples
Pregnancy persists on the internet despite miscarriage in real life
Saturday, May 5, 2018
Content Type:
Examples
Bricks-and-mortar retailers adapt online tracking techniques for the physical world
Saturday, May 5, 2018
Content Type:
Examples
Big data intelligence company builds advertising audiences from mobile tracking at Iowa caucuses
Saturday, May 5, 2018
Content Type:
Examples
Royal Parks covertly tracks visitors via mobile phone data
Friday, May 4, 2018
Content Type:
Examples
Research shows that users can be uniquely identified from just four apps
Friday, May 4, 2018
Content Type:
Examples
New police technologies assign individual "threat scores"
Thursday, May 3, 2018
Content Type:
Examples
Affective computing provides new frontier in user manipulation
Thursday, May 3, 2018
Content Type:
Examples
Banks turn to smartphone metadata to assess lending risk
Thursday, May 3, 2018
Content Type:
Examples
Anti-Choice Groups Use Smartphone Surveillance to Target ‘Abortion-Minded Women’ During Clinic Visits
Thursday, May 3, 2018
Content Type:
Examples
MIT device uses wireless signals to identify emotions
Thursday, May 3, 2018
Content Type:
Examples
Baidu aggregates map search data to predict crowd formation
Wednesday, May 2, 2018
Content Type:
Impact Case Study
Fighting data-exploitative business models
Wednesday, May 2, 2018
Content Type:
Impact Case Study
Fighting disproportionate identity systems and policies
Wednesday, May 2, 2018
Content Type:
Video
Digital stop and search - public concern about the police secretly downloading content from smartphones
Tuesday, March 27, 2018
Content Type:
Examples
Austria proposes to seize asylum seekers' devices to check their identities and travel routes
Saturday, December 8, 2018
Content Type:
Examples
Before Cambridge Analytica 'research' was 'gay' face and 'personality' studies
Tuesday, December 4, 2018
Content Type:
Examples
Mined behavioural computing data shows early signs of Parkinson's Disease
Tuesday, December 4, 2018
Pagination
First page
« First
Previous page
‹‹
Page
1
Current page
2
Page
3
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join