Christopher Soghoian

Results: 23



#Item
1THE SPIES WE TRUST: THIRD PARTY SERVICE PROVIDERS AND LAW ENFORCEMENT SURVEILLANCE Christopher Soghoian  Submitted to the faculty of the Graduate School

THE SPIES WE TRUST: THIRD PARTY SERVICE PROVIDERS AND LAW ENFORCEMENT SURVEILLANCE Christopher Soghoian Submitted to the faculty of the Graduate School

Add to Reading List

Source URL: files.dubfire.net

Language: English - Date: 2012-07-31 19:20:13
    2Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User PrivacyApril 2011, Princ

    Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User PrivacyApril 2011, Princ

    Add to Reading List

    Source URL: www.w3.org

    Language: English - Date: 2011-03-27 07:17:46
      3Tells the Facts and Names the Names  April 1-15, 2010 Alexander Cockburn and Jeffrey St. Clair

      Tells the Facts and Names the Names April 1-15, 2010 Alexander Cockburn and Jeffrey St. Clair

      Add to Reading List

      Source URL: www.traviskelly.com

      Language: English - Date: 2011-03-28 10:57:05
      4http://www.washingtonpost.com/world/national-security/little-kn

      http://www.washingtonpost.com/world/national-security/little-kn

      Add to Reading List

      Source URL: epic.org

      Language: English - Date: 2014-01-17 16:36:24
      5http://www.washingtonpost.com/world/national-security/little-kn

      http://www.washingtonpost.com/world/national-security/little-kn

      Add to Reading List

      Source URL: www.epic.org

      Language: English - Date: 2014-01-17 16:36:24
      6Microsoft Word - dropbox ftc complaint - draft v3

      Microsoft Word - dropbox ftc complaint - draft v3

      Add to Reading List

      Source URL: www.wired.com

      Language: English - Date: 2011-05-13 16:17:26
      7Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL∗ Christopher Soghoian and Sid Stamm† “Cryptography is typically bypassed, not penetrated.”

      Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL∗ Christopher Soghoian and Sid Stamm† “Cryptography is typically bypassed, not penetrated.”

      Add to Reading List

      Source URL: cryptome.org

      Language: English - Date: 2010-03-24 15:24:37
      8Case 1:11-cv[removed]ABJ Document[removed]Filed[removed]Page 1 of 7 Exhibit 1 Vaughn Index

      Case 1:11-cv[removed]ABJ Document[removed]Filed[removed]Page 1 of 7 Exhibit 1 Vaughn Index

      Add to Reading List

      Source URL: blogs.law.harvard.edu

      Language: English - Date: 2012-07-20 14:58:22
      9UNITED	
  STATES	
  DISTRICT	
  COURT	
  	
   FOR	
  THE	
  DISTRICT	
  OF	
  COLUMBIA ____________________________________ CHRISTOPHER SOGHOIAN Plaintiff, v.

      UNITED  STATES  DISTRICT  COURT     FOR  THE  DISTRICT  OF  COLUMBIA ____________________________________ CHRISTOPHER SOGHOIAN Plaintiff, v.

      Add to Reading List

      Source URL: blogs.law.harvard.edu

      Language: English - Date: 2012-08-14 12:50:27
      10Case 1:11-cv[removed]ABJ Document 17 Filed[removed]Page 1 of 27  UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ CHRISTOPHER SOGHOIAN

      Case 1:11-cv[removed]ABJ Document 17 Filed[removed]Page 1 of 27 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ CHRISTOPHER SOGHOIAN

      Add to Reading List

      Source URL: blogs.law.harvard.edu

      Language: English - Date: 2012-07-20 23:14:01