This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates.
Filtered results
Content regulation
Using copyright to fight revenge porn
Revenge porn is an increasingly pervasive and troubling abuse of privacy in the networked information society. Some victims are fighting back using copyright law. But does it work?
Privacy enhancing technologies
Addressing the right to privacy in 2015
Don’t let the legal and legitimate pursuit of privacy be marginalised or criminalised, argues Becky Kazansky of the Tactical Technology Collective.