2024
Yael Writes
Big Ass Data Broker Opt-Out List
2024
Privacy Guides
VPN Overview
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
https://www.privacyguides.org/en/basics/vpn-overview/
2024
Fascinating
Frank Lucas' Opsec Fail
Frank Lucas, the drug lord who ruled Harlem in the 1970s, was so discreet that the police didn't know who he was in 1971 when he decided to wear a $100,000 full-length chinchilla coat — to a Muhammad Ali boxing match.
https://x.com/fasc1nate/status/1780671693448737030
2024
Rest Of World
The Changing Face Of Protest
2024
EFF
Choosing The VPN That's Right For You
There is no one-size-fits-all solution when it comes to VPNs. Just like email, there are many VPN services out there and you should choose the service that works best for you. Depending on which one you choose, you can benefit from an increased level of security when connected to networks you wouldn’t ordinarily trust. But this means you're placing your trust in the VPN.
https://ssd.eff.org/module/choosing-vpn-thats-right-you
2024
Tales From The Crypt
Major U.S. Carriers Fined $196 Million by FCC for Selling Customer Location Data
2023
WIRED
Germany Raises Red Flags About Palantir’s Big Data Dragnet
2024
The Guardian
Australian man says border force made him hand over phone passcode
2024
Forbes
New Police Tech Can Detect Phones, Pet Trackers And Library Books In A Moving Car
2024
Threema
Delete WhatsApp Day
Like Facebook and Instagram, WhatsApp requires users to disclose personally identifiable information, such as their phone number. For this reason, Meta is able to identify users across different services and combine their data from various platforms into comprehensive user profiles.
https://x.com/ThreemaApp/status/1790674229727265037
2024
Ars Technica
Connected cars’ illegal data collection and use now on FTC’s “radar”
2024
Bisq Network
BISQ
Buy and sell bitcoin for fiat (or other cryptocurrencies) privately and securely using Bisq's peer-to-peer network and open-source desktop software. No registration required.
https://bisq.network/
2023
Athena Aplpha
How To Buy Bitcoin On Bisq: Buy Bitcoin KYC Free
Buying Bitcoin is a top priority for most beginners, however doing so without having to bend at the knee of the all seeing KYC exchanges that force you to hand over all your private information is a huge concern for privacy and security reasons.
https://www.athena-alpha.com/how-to-buy-bitcoin-on-bisq/
2024
What Bitcoin Did
The Bitcoin Scammer Uncensored
2024
Linus Tech Tips
De-Googling Your Life
Google owns or has access to almost everything - search, email, even your web browser! Unless you like being the product, how can you opt out and still live a connected life?
https://www.youtube.com/watch?v=YnSv8ylLfPw
2024
The Guardian
Katie Britt proposes federal database to collect data on pregnant people
2023
State Scoop
Why federal LGBTQI+ data collection should concern state, local officials
2024
F-Secure
LGBTQ+ People Deserve Privacy
2024
Opsec Failures
Opsec Failures
2020
EFF
Atlas Of Surveillance
2024
The Register
Stalkerware Usage Surging, Despite Data Privacy Concerns
2024
Tech Crunch
Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps
2024
EFF
A Wider View On TunnelVision And VPN Advice
If you listen to any podcast long enough, you will almost certainly hear an advertisement for a Virtual Private Network (VPN). These advertisements usually assert that a VPN is the only tool you need to stop cyber criminals, malware, government surveillance, and online tracking. But these advertisements vastly oversell the benefits of VPNs. The reality is that VPNs are mainly useful for one thing: routing your network connection through a different network.
Read the article: https://www.eff.org/deeplinks/2024/05/wider-view-tunnelvision-and-vpn-advice
2023
New York Times
In A Post-Roe World, The Future Of Digital Privacy Looks Even Grimmer
2024
Euro News
Female Health Apps Aren't Doing Enough To Protect Sensitive Data, Study Says
A team of researchers in the UK found “problematic practices, including inconsistencies” regarding data privacy in several female health apps. They presented the research at the Conference on Human Factors in Computing Systems in Honolulu, Hawaii in the US this month. The researchers analysed 20 popular female health apps available on the US and UK Google Play Stores providing a service related to female reproductive health. They looked at the applications’ data privacy policies and practices.
Read the article: https://www.euronews.com/next/2024/05/31/female-health-apps-arent-doing-enough-to-protect-sensitive-data-study-says
2024
Tech Xplore
Privacy In The Post-Roe Era
In 2022, when the U.S. Supreme Court overturned Roe v. Wade—ending the constitutional right to an abortion—privacy advocates warned women against using smartphone apps to track their periods. The calls came out of concerns that the data collected by these apps could put women at risk of prosecution in states where abortion became illegal.
Read the article: https://techxplore.com/news/2024-05-privacy-roe-era.html
2024
Intel Techniques
Extreme Privacy: What It Takes To Disappear
This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.
Get the book here: https://inteltechniques.com/book7.html
2023
Privacy Guides
Threat Modeling
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
Read the guide: https://www.privacyguides.org/en/basics/threat-modeling/
2023
Opsec 101
Opsec 101
This guide covers the basics of Opsec in a way that most anyone should be able to understand. This guide is split up into topics designed to be linked to directly for the purpose of convenient educational discussion. As this is intended for all audiences, it will be rich in easily destroyable strawmen examples that do not necessarily reflect complex realistic threats and risks.
This guide is not a "how to be anonymous on the internet", "how to protect yourself online", or "best practices" guide. Those are all countermeasure-first approaches that assume a threat model that applies to you (when it often doesn't). Instead, this guide teaches you how to understand that for yourself through the opsec process. While many guides can be useful to learn about potential threats and countermeasures, the countermeasure-first approach of the "best practices" fallacy has no place in opsec and ultimately leads to baseless paranoia.
Read the guide here.
2019
Bitcoin Wiki
Privacy Best Practices
While Bitcoin can support strong privacy, many ways of using it are usually not very private. With a proper understanding of the technology, bitcoin can indeed be used in a very private and anonymous way. As of 2019 most casual enthusiasts of bitcoin believe it is perfectly traceable; this is completely false. Around 2011 most casual enthusiasts believed it is totally private; which is also false. There is some nuance - in certain situations, bitcoin can be very private. But it is not simple to understand, and it takes some time and reading.
Read the full guide here.
2024
Haaretz
Israel Tried to Keep Sensitive Spy Tech Under Wraps. It Leaked Abroad
Documents reveal that Intellexa, which is run by Israelis but operates outside of Israel's exports regime, presented an ad-based spyware – considered the cutting edge of Israeli offensive cyber. [...] The documents include a demonstration of the Aladdin system, technical explanations on how it infects target devices, and even examples of potential malicious ads – seemingly targeting graphic designers and activists with job offers, through which the spyware will be introduced to their device. Text:
https://archive.ph/IGrTw#selection-1255.347-1255.643
2024
Snowstorm
A Decentralized, Censorship Resistant VPN
Snowstorm is a decentralized, censorship resistant VPN based on the Tor Project's Snowflake protocol. Instead of connecting to a commercial VPN provider, whose IPs can easily be blocked in times of censorship, Snowstorm connects users to the computers of other people. In Snowflake, peers, who act as proxies, connect to the Internet via a Tor entry node. Snowstorm removes the need for the Tor network letting peers connect directly, making the connection much faster. Learn more:
https://mashable.com/article/snowstorm-beta-launch-anti-censorship-vpn-snowflake-torDownload:
https://snowstorm.net/
2024
EFF
Section 702
We all deserve privacy in our communications, and part of that is trusting that the government will only access them within the limits of the law. But it's now clear that the government hasn’t respected any limits on the intelligence community or law enforcement. When it comes to Section 702, a law that continues to allow spying on Americans, they've ignored our rights. Text:
https://act.eff.org/action/tell-congress-absent-major-changes-702-should-not-be-renewed
2023
EFF
Surveillance Self Defense
Surveillance Self-Defense is a digital security guide that teaches you how to assess your personal risk from online spying. It can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states. We offer guides to the best privacy-enhancing tools and explain how to incorporate protecting yourself against surveillance into your daily routine. This guide will teach you how to make a security plan for your digital information and how to determine what solutions are best for you. Text:
https://ssd.eff.org/
2023
Forbes
Nebraska Mom Sentenced to Two Years in Prison over Abortion Pills
A Nebraska mother who helped her teenage daughter obtain abortion pills to end her pregnancy and later disposed of the fetus’ remains was sentenced to two years in prison on Friday, according to multiple reports, after breaking a state law that banned abortion after 20 weeks of pregnancy. Police said that while executing a search warrant they discovered evidence of internet searches related to medications “which could be used for the purpose of causing a miscarriage,” or abortion pills. Officers also said they found messages discussing the use of that medication after obtaining Facebook messages from Meta. Text:
https://www.forbes.com/sites/anafaguy/2023/09/22/nebraska-mom-who-gave-teen-daughter-abortion-pills-sentenced-to-two-years-in-prison/?sh=1518bdf7b1db
2023
Middle East Eye
School Girl Sentenced to 18 Years in Prison over Tweets
Saudi Arabia has sentenced a secondary schoolgirl to 18 years in jail and a travel ban for posting tweets in support of political prisoners, according to a rights group. Saudi human rights defenders and lawyers, however, disputed Mohammed bin Salman's allegations and said the crackdown on social media users is correlated with his ascent to power and the introduction of new judicial bodies that have since overseen a crackdown on his critics. "He is able, with one word or the stroke of a pen, in seconds, to change the laws if he wants," Taha al-Hajji, a Saudi lawyer and legal consultant with the European Saudi Organisation for Human Rights, told Middle East Eye this week. Text:
https://www.middleeasteye.net/news/saudi-arabia-sentences-schoolgirl-18-years-tweets
2023
Citizen Lab
Egyptian Presidential Candidate Targeted with Predator Spyware
In August and September 2023, Eltantawy’s Vodafone Egypt mobile connection was persistently selected for targeting via network injection; when Eltantawy visited certain websites not using HTTPS, a device installed at the border of Vodafone Egypt’s network automatically redirected him to a malicious website to infect his phone with Cytrox’s Predator spyware. Given that Egypt is a known customer of Cytrox’s Predator spyware, and the spyware was delivered via network injection from a device located physically inside Egypt, we attribute the network injection attack to the Egyptian government with high confidence. Text:
https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/
2023
Rachel Tobac
Remove Yourself From Google
Google your name plus the words “phone number”, “email address”, or “address”. Do you see your sensitive personal info on data brokerage sites?
Google has a tool to request a takedown of that info from Google itself (but doesn’t remove it from the other sites).
Steps for Google removal request:
- click the three vertical dots next to the Google results you want removed
- click "remove result"
- click “it shows my personal contact info”, following remaining steps. Text:
https://twitter.com/RachelTobac/status/1719781908291436800
2023
Delete Me
Delete Me
DeleteMe is a tool to help you remove your personal information from data brokerage sites. The service is paid, but the site offers many diy-opt-out guides helpful to remove your data from online brokerage services. See the Guides:
https://joindeleteme.com/blog/opt-out-guides/
2023
Danielle Citron
The Fight for Privacy
2023
Tech Crunch
Telegram Leaks User IP Addresses To Contacts
The popular messaging app Telegram can leak your IP address if you simply add a hacker to your contacts and accept a phone call from them. TechCrunch verified the researcher’s findings by adding Simonov to the contacts of a newly created Telegram account. Simonov then called the account, and shortly after provided TechCrunch with the IP address of the computer where the experiment was being carried out. Telegram boasts 700 million users all over the world, and has always marketed itself as a “secure” and “private” messaging app, even though experts have repeatedly warned that Telegram is not secure. Text:
https://techcrunch.com/2023/10/19/telegram-is-still-leaking-user-ip-addresses-to-contacts
2023
Amagicom, Tor Project
Mullvad Browser
When you visit a website, you can be identified and tracked through your IP address, third-party cookies, all kinds of tracking scripts, and through so called browser fingerprints. That’s why masking your IP address is not enough to stop the data collection. However, by using a trustworthy VPN in combination with a privacy-focused browser, you can put up a better resistance against the mass surveillance of today. That's why we partnered with the Tor Project to develop Mullvad Browser – a browser designed to minimize tracking and fingerprints. Text:
https://mullvad.net/en/browserDownload:
https://mullvad.net/en/download/browser/
2022
Boston Law Review
Privacy Harms
The requirement of harm has significantly impeded the enforcement of privacy law. In most tort and contract cases, plaintiffs must establish that they have suffered harm. Even when legislation does not require it, courts have taken it upon themselves to add a harm element. Harm is also a requirement to establish standing in federal court. In Spokeo v. Robins and TransUnion v. Ramirez, the U.S. Supreme Court ruled that courts can override congressional judgment about cognizable harm and dismiss privacy claims. This article makes two central contributions. The first is the construction of a typology for courts to understand harm so that privacy violations can be tackled and remedied in a meaningful way. Privacy harms consist of various different types, which to date have been recognized by courts in inconsistent ways. Our typology of privacy harms elucidates why certain types of privacy harms should be recognized as cognizable. The second contribution is providing an approach to when privacy harm should be required. In many cases, harm should not be required because it is irrelevant to the purpose of the lawsuit. Currently, much privacy litigation suffers from a misalignment of enforcement goals and remedies. We contend that the law should be guided by the essential question: When and how should privacy regulation be enforced? We offer an approach that aligns enforcement goals with appropriate remedies. Text:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3782222#
2022
LNVPN
LNVPN
With LNVPN we've build a very simple VPN pay-as-you-go service paid via Bitcoin Lightning. Instead of paying around 5$ every month with your credit card for the privilege of being able to use a VPN service every now and then we provide you with a VPN connection on servers in different countries for one hour for only 10 cents in US$ -- paid via ⚡! Text:
https://lnvpn.net/faqGet LNVPN:
https://lnvpn.net/Get LNVPN phone numbers:
https://lnvpn.net/phone-numbers
2022
Tor Project
Onion Share
2022
JMP
JMP
JMP gives you a real phone number that is yours for calling and texting, including group and picture messages, that works from all your devices at once. Because we use the Jabber network, you can use any existing client even if we don't have an official recommendation for your device yet! Get different numbers to give out to friends, to dates, to professional contacts: whatever your needs, JMP helps you protect your privacy by keeping separate parts of your life, separate. Text & get:
https://jmp.chat/
2021
Hacker Noon
Seven Reasons to Question Telegram's Privacy Claims
2019
Refraction Network
Solving Domain Censorship at ISP Level
Refraction Network aims to solve domain censorship at the ISP Level. Rather than trying to hide individual proxies from censors, refraction brings proxy functionality to the core of the network, through partnership with ISPs and other network operators. This makes censorship much more costly, because it prevents censors from selectively blocking only those servers used to provide Internet freedom. Instead, whole networks outside the censored country provide Internet freedom to users—and any encrypted data exchange between a censored nation’s Internet and a participating friendly network can become a conduit for the free flow of information.Text:
https://refraction.network/
2019
Yasha Levine
Surveillance Valley
In Surveillance Valley: The Secret Military History of the Internet, Yasha Levine traces the history of the internet back to its beginnings as a Vietnam-era tool for spying on guerrilla fighters and antiwar protesters–a military computer networking project that ultimately envisioned the creation of a global system of surveillance and prediction. Levine shows how the same military objectives that drove the development of early internet technology are still at the heart of Silicon Valley today. Spies, counterinsurgency campaigns, hippie entrepreneurs, privacy apps funded by the CIA. From the 1960s to the 2010s — this revelatory and sweeping story will make you reconsider what you know about the most powerful, ubiquitous tool ever created.Text:
http://surveillancevalley.com/
2018
WIRED
Encrypted Messaging Isn't Magic
As the adage goes, there's no such thing as perfect security. And feeling invincible could get you in trouble. End-to-end encryption transforms messages into unintelligible chunks of data as soon as a user presses send. From there, the message isn't reconstituted into something understandable until it reaches the receiver's device. Along the way, the message is unreadable, protected from prying eyes. It essentially amounts to a bodyguard who picks you up at your house, rides around with you in your car, and walks you to the door of wherever you're going. You're safe during the transport, but your vigilance shouldn't end there. [...] It's easy to forget in practice that people you message with could show the chat to someone else, take screenshots, or retain the conversation on their device indefinitely. You also need to keep track of how many devices you've stored your encrypted messages on. If you sync chats between, say, your smartphone and your laptop, or back them up in the cloud, there are potentially more opportunities for the data to be exposed. Your chats may be encrypted, but your backups may not. Text:
https://joindeleteme.com/blog/opt-out-guides/
2018
Meta
Facebook Connect
Facebook Connect, also called Log in with Facebook, is a set of authentication APIs from Facebook that developers can use to help their users connect and share with such users' Facebook friends (on and off Facebook) and increase engagement for their website or application. When so used, Facebook members can log on to third-party websites, applications, mobile devices and gaming systems with their Facebook identity and, while logged in, can connect with friends via these media and post information and updates to their Facebook profile. But sometimes, especially on lesser known websites, using Facebook's universal login feature may carry security risks, according to research from Princeton University. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge. Facebook says the ability to scrape data through Facebook Connect has been patched. Text:
https://www.wired.com/story/security-risks-of-logging-in-with-facebook/
2016
Tor Project
Snowflake
Snowflake is a system that allows people from all over the world to access censored websites and applications. Similar to how VPNs assist users in getting around Internet censorship, Snowflake helps you avoid being noticed by Internet censors by making your Internet activity appear as though you're using the Internet for a regular video or voice call. [...] Snowflake is available inside Tor Browser on Desktop and Android, Onion Browser on iOS, and Orbot on Android and iOS. If you have downloaded and installed any of these apps, and they are censored in your country, you can bypass the censorship by activating Snowflake through the apps' settings page. [..] If you want to help people bypass censorship, consider installing and running a Snowflake proxy. The only prerequisite is that the Internet in your country is not heavily censored already. Text:
https://snowflake.torproject.org/?lang=en_USRun a proxy on Firefox:
https://addons.mozilla.org/en-US/firefox/addon/torproject-snowflake/Run a proxy on Chrome:
https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie
2014
New Vector
Element Messenger
Element brings enterprise-grade functionality to the secure Matrix protocol. It offers the oversight and control you’d expect of a corporate application across an end-to-end encrypted environment that includes messaging, attachments, voice and video. Matrix has an exploding, vibrant ecosystem enabling you to benefit from both the openness of FOSS and the convenience of enterprise-ready solutions to help you unlock and secure your communications. Text:
https://element.io/matrix-benefitsDownload:
https://element.io/download
2009
W3C
Do Not Track HTPP Header & Global Privacy Controls
Do Not Track (DNT) is a formerly official HTTP header field, designed to allow internet users to opt-out of tracking by websites—which includes the collection of data regarding a user's activity across multiple distinct contexts, and the retention, use, or sharing of data derived from that activity outside the context in which it occurred. The Do Not Track header was originally proposed in 2009. In 2020, a coalition of US-based internet companies announced the Global Privacy Control header that spiritually succeeds Do Not Track header. GPC is a valid do-not-sell-my-personal-information signal according to the California Consumer Privacy Act (CCPA), which stipulates that websites are legally required to respect a signal sent by users who want to opt-out of having their personal data sold. In July 2021, the California Attorney General clarified through an FAQ that under law, the Global Privacy Control signal must be honored.Text:
https://en.wikipedia.org/wiki/Do_Not_Track
2009
Amagicom
Mullvad VPN
We don’t ask for any personal info – not even your email – and we encourage anonymous payments with cash or cryptocurrency. Your privacy is your privacy which is why we don’t log your activity. Our long-term goal is to not even store payment details. We request independent audits of our app and infrastructure to provide transparency and improve our security practices. Text:
https://mullvad.net/en/why-mullvad-vpnDownload:
https://mullvad.net/en/download/vpn/
2002
Tor Project
The Onion Router
The goal of onion routing was to have a way to use the internet with as much privacy as possible, and the idea was to route traffic through multiple servers and encrypt it each step of the way. This is still a simple explanation for how Tor works today. [...] Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you're using Tor. Tor Browser isolates each website you visit so third-party trackers and ads can't follow you. Any cookies automatically clear when you're done browsing. So will your browsing history. Tor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. With Tor Browser, you are free to access sites your home network may have blocked. Text:
https://www.torproject.org/Download:
https://www.torproject.org/download/
2001
Barry Brown
Studying the Internet Experience
In a number of areas – privacy, personalisation and community – there are opportunities to improve user experience of the Internet. Users are often concerned about giving there personal details over the internet because of problems related to privacy and misuse of information. These concerns go beyond hacking and fraud and include the tracking of browsing habits and personal information without individuals’ knowledge. In the US double -click ran into considerable bad publicity over their plans to misuse their user data. Along with these problems, there are a number of new internet technologies with offer the opportunity to improve the internet user experience. Two examples of this are new personalisation technology, and new peer-to-peer sharing systems. New personalisation technologies offer the possibility of presenting timely personalised information. By tracking individuals purchases and tastes it is possible that these systems could begin to manage more of the internet user experience. This uncovered something of a “privacy paradox” between users complaints regarding privacy.Text:
https://www.hpl.hp.com/techreports/2001/HPL-2001-49.pdf
2001
Daniel J. Solove
The Myth of the Privacy Paradox
The “privacy paradox” is the phenomenon where people say that they value privacy highly, yet in their behavior relinquish their personal data for very little in exchange or fail to use measures to protect their privacy. Managing one’s privacy is a vast, complex, and never-ending project that does not scale; it becomes virtually impossible to do comprehensively. Privacy regulation often seeks to give people more privacy self-management, such as the recent California Consumer Privacy Act. Professor Solove argues that giving individuals more tasks for managing their privacy will not provide effective privacy protection. Instead, regulation should employ a different strategy — focus on regulating the architecture that structures the way information is used, maintained, and transferred.Text:
https://scholarship.law.gwu.edu/faculty_publications/1482/
1988
US Supreme Court
Video Privacy Protection Act
The Video Privacy Protection Act of 1988 (codified at 18 U.S.C. § 2710 (2002)) was passed in reaction to the disclosure of Supreme Court nominee Robert Bork's video rental records in a newspaper. The Act is not often invoked, but stands as one of the strongest protections of consumer privacy against a specific form of data collection. Generally, it prevents disclosure of personally identifiable rental records of "prerecorded video cassette tapes or similar audio visual material." The act was envoked in 2008 in a class action law suit against Blockbuster Inc. over participation in Facebook's discontinued Beacon Program , which formed part of Facebook's advertisement system that sent data from external websites to Facebook for the purpose of allowing targeted advertisements and allowing users to share their activities with their friends. Beacon reported to Facebook on Facebook's members' activities on third-party sites that also participated with Beacon even when users were not connected to Facebook, and happened without the knowledge of the Facebook user. A similar lawsuit was brought against Netflix in 2009, when it disclosed insufficiently anonymous information about nearly half-a-million customers as part of its $1 million contest to improve its recommendation system leading to the alleged outing of a lesbian mother. Text:
https://archive.epic.org/privacy/vppa/
1982
James Bamford
The Puzzle Palace
The Video Privacy Protection Act of 1988 (codified at 18 U.S.C. § 2710 (2002)) was passed in reaction to the disclosure of Supreme Court nominee Robert Bork's video rental records in a newspaper. The Act is not often invoked, but stands as one of the strongest protections of consumer privacy against a specific form of data collection. Generally, it prevents disclosure of personally identifiable rental records of "prerecorded video cassette tapes or similar audio visual material." The act was envoked in 2008 in a class action law suit against Blockbuster Inc. over participation in Facebook's discontinued Beacon Program , which formed part of Facebook's advertisement system that sent data from external websites to Facebook for the purpose of allowing targeted advertisements and allowing users to share their activities with their friends. Beacon reported to Facebook on Facebook's members' activities on third-party sites that also participated with Beacon even when users were not connected to Facebook, and happened without the knowledge of the Facebook user. A similar lawsuit was brought against Netflix in 2009, when it disclosed insufficiently anonymous information about nearly half-a-million customers as part of its $1 million contest to improve its recommendation system leading to the alleged outing of a lesbian mother. Text:
https://archive.epic.org/privacy/vppa/