
Sexual Privacy (Citron, 2019)
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People… read more
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People… read more
The potential for addictive and compulsive behavior is inherent to the human condition. We all have times in which we… read more
Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen… read more
Some targets of stalking say that even when their abuser admitted to placing the device on them, it’s difficult to… read more
The plaintiffs called AirTag “the weapon of choice of stalkers and abusers.” Their lawsuit seeks unspecified damages for U.S. owners… read more
Tackling the rise in manipulated images, where a person’s face is put on someone else’s body, is part of a… read more
As experts in digital literacy, library workers are uniquely positioned to join the vast and growing community of people engaged… read more
The vulnerability in question is known as an insecure direct object reference, or IDOR, a class of bug that exposes… read more
What if your partner was monitoring your every move through your smartphone? Audio broadcast 18 mins. Listen at Stalkerware: Tech-enabled… read more
A stalkerware company that’s designed to let customers spy on their spouses’s, children’s, or employees’ devices is exposing victims’ data,… read more