Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data...
27 KB (3,259 words) - 12:52, 13 January 2025
service Privacy engineering Privacy-enhancing technologies Surveillance capitalism User interface design Hes, R. "Privacy Enhancing Technologies: the path...
38 KB (3,998 words) - 23:42, 23 May 2025
Retrieved 2025-04-02. "Privacy-enhancing technologies (PETs)" (PDF). Draft anonymisation, pseudonymisation and privacy-enhancing technologies guidance. Information...
46 KB (4,431 words) - 16:29, 2 April 2025
timely fashion. A privacy-enhancing technology (PET) is a method of protecting data. PETs allow online users to protect the privacy of their personally...
9 KB (951 words) - 20:25, 23 May 2025
Nym (mixnet) (category Internet privacy software)
USENIX, NDSS, and Privacy Enhancing Technologies Symposium (PETS). These projects contributed to advancements in mixnet technologies, leading to the foundations...
42 KB (3,810 words) - 13:22, 24 May 2025
Spy pixel (category Privacy of telecommunications)
Experiments on Ad Privacy Settings.” Proceedings on Privacy Enhancing Technologies 2015(1):92–112. Taylor, Curtis R. 2004. “Consumer Privacy and the Market...
25 KB (3,242 words) - 22:04, 2 December 2024
under the category of privacy-enhancing technologies. Hard privacy technologies allow online users to protect their privacy through different services and...
11 KB (1,178 words) - 07:28, 27 May 2025
Soft privacy technologies fall under the category of PETs, Privacy-enhancing technologies, as methods of protecting data. Soft privacy is a counterpart...
27 KB (3,541 words) - 18:32, 6 January 2025
if they impose implementation overhead". In 2018, a paper on privacy-enhancing technologies by Florentin Rochet and Olivier Pereira showed how to exploit...
6 KB (710 words) - 14:20, 6 May 2025
Pirate Party Privacy Privacy by design Privacy enhancing technologies Privacy law Privacy software Right to be forgotten Web literacy (privacy) Computer...
36 KB (4,116 words) - 12:30, 28 May 2025
Kagi (search engine) (section Privacy)
Valsorda, Filippo (2018). "Privacy Pass: Bypassing Internet Challenges Anonymously". Proceedings on Privacy Enhancing Technologies. doi:10.1515/popets-2018-0026...
10 KB (902 words) - 06:40, 11 May 2025
Information privacy Internet privacy Encryption Privacy Proxy server Metadata removal tool Privacy engineering Privacy-enhancing technologies GNU Privacy Guard...
5 KB (576 words) - 17:23, 3 May 2025
Trustworthy AI (category Information privacy)
transparent, robust and respectful of data privacy. Trustworthy AI makes use of a number of Privacy-enhancing technologies (PETs), including homomorphic encryption...
5 KB (537 words) - 07:20, 2 May 2025
Monero (category Privacy)
Abbreviation: XMR) is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility...
35 KB (2,984 words) - 10:24, 28 May 2025
Websites Using Traffic Analysis". Privacy Enhancing Technologies. International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science...
23 KB (3,307 words) - 14:54, 5 February 2025
communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies (pp. 36–58). Springer Berlin Heidelberg. S. Livingstone...
123 KB (14,075 words) - 23:22, 22 April 2025
Hal Finney (computer scientist) (category California Institute of Technology alumni)
demonstrated Finney's commitment to privacy and his significant contributions to the development of privacy-enhancing technologies. In 2004, Finney created the...
14 KB (1,239 words) - 19:57, 17 April 2025
Like Jelly Beans? An Investigation Into Search Privacy". Proceedings on Privacy Enhancing Technologies. 2022 (2): 426–446. doi:10.2478/popets-2022-0053...
31 KB (2,333 words) - 12:21, 24 May 2025
the new name Radialpoint though was no longer a developer of privacy-enhancing technologies. Most recently, it was acquired by AppDirect and rebranded as...
6 KB (504 words) - 03:31, 3 May 2025
Dark pattern (category Technology neologisms)
"Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns". Proceedings on Privacy Enhancing Technologies. 2016 (4): 237–254. doi:10...
35 KB (3,715 words) - 17:31, 19 May 2025
cypherspace.org. Salomon, David (2003). "Secure Programming with Perl". Data Privacy and Security. Springer. p. 200. ISBN 9781441918161. Judmayer, Aljosha;...
11 KB (842 words) - 23:53, 8 December 2024
In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. New York, NY:...
55 KB (6,098 words) - 08:48, 11 May 2025
Parisa Tabriz (category People in information technology)
university and did research in wireless security and attacks on privacy-enhancing technologies, co-authoring papers with her advisor Nikita Borisov. She was...
12 KB (1,043 words) - 05:25, 16 February 2025
Examining COPPA Compliance at Scale" (PDF). Proceedings on Privacy Enhancing Technologies. 2018 (3): 63–83. doi:10.1515/popets-2018-0021. S2CID 4935390...
52 KB (5,562 words) - 12:54, 28 May 2025
the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and...
11 KB (824 words) - 22:44, 4 October 2024
Evercookie (category Internet privacy software)
Tracking Data in the Online Advertising Ecosystem". Proceedings on Privacy Enhancing Technologies. 2018 (4): 85–103. doi:10.1515/popets-2018-0033. ISSN 2299-0984...
24 KB (2,792 words) - 17:48, 22 May 2025
Web browser (section Privacy)
Headers to Identify and Track Online Users". Proceedings on Privacy Enhancing Technologies. 2021 (2): 391–406. doi:10.2478/popets-2021-0033. hdl:20.500...
27 KB (2,516 words) - 12:06, 17 April 2025
the requested web page or resource. Some technology providers have made these privacy-enhancing technologies a particular focus of their operating system...
16 KB (1,978 words) - 15:58, 20 March 2025
service#Privacy issues Mass surveillance PRISM surveillance program Privacy-enhancing technologies Privacy in Australian law Privacy in English law Privacy laws...
133 KB (16,866 words) - 16:13, 23 May 2025
Christian; Kügler, Dennis (2003). Dingledine, Roger (ed.). Privacy Enhancing Technologies Third International Workshop (PET 2003). Springer-Verlag (Heidelberg)...
17 KB (1,483 words) - 01:00, 1 April 2025