On 22nd October, the Bulletin of the Atomic Scientists published an article which sets out to provide a quick technical rundown of some of the most prevalent and most nasty ones, and how they infringe on human rights. There are 4 major categories:
- commonplace tactics for censorship and surveillance;
- widely available surveillance tools in the commercial marketplace;
- tactics influenced by the rise of the sovereign internet; and
- technologies based upon the model of the Trojan horse.
This blog is primarily for my own use, to keep informed and up to date. However, if you would like to say thank you (and perhaps help me get a new, better laptop when I am away…) you can “buy me a coffee” at https://www.buymeacoffee.com/KoIvM842y