Privacy Related Content Page 2 [videos, links, tools]

At this section we gather privacy related content including privacy related initiatives, tools or any other  related content (videos, links etc) that has been published around the world. The CAPrice website is not responsible for the content of external websites. Don’t hesitate to contact us via e-mail if you have noticed similar cases in order to present them.

  • Online Privacy: It does not exist: Privacy and what we can do about it ?
    ONLINE PRIVACY: IT DOESN’T EXIST: Privacy and what we can do about it | Denelle Dixon | TEDxMarin

    A TEDx talk by Denelle Dixon  (Chief Operating Officer at Mozilla)

  • How long does it take to read Amazon Kindle’s terms and conditions?
    How long does it take to read Amazon Kindle's terms and conditions?

    This man reads 73,198 words of Amazon Kindle’s terms and conditions..

  • A Cyber Privacy Parable
    Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands.

    Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands.

  • Data to go
    https://www.youtube.com/watch?v=sq-0tjv4_BA

    You’re more at risk of identity fraud than you think. Sharing personal details like your date of birth, address and phone number can make you vulnerable.

  • The power of privacy – documentary
    In this documentary, journalist Aleks Krotoski travels the world to explore the challenges of digital privacy in the 21st century and to discover how we can take back control of our personal and professional lives

    The journalist Aleks Krotoski travels the world to explore the challenges of digital privacy in the 21st century and to discover how we can take back control of our personal and professional lives. For more click here.

  • The Freedom Files 
    The Freedom files: A video dedicated to privacy awareness
  • The ReCon Approach (https://recon.meddle.mobi)
    A way to see how your personal information is transmitted to other parties, and allow you to block or modify it with fine granularity

    ReCon give you a way to see how your personal information is transmitted to other parties, and allow you to block or modify it with fine granularity.

  • Stingray
    They're used by police, federal officials and hackers. They can read your text messages, see where you are and more. They go by many names but some know them as Stingrays. But what is a Stingray? Dive into the world of surveillance technology.

    An surveillance technology documentary that worths watching it.

  • Cybersecurity 101
    The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA’s Cybersecurity Lab.

    This is a typical and classical video about cybersecurity and eprivacy. Learn  simple things you can do to protect yourself and your information