Death Note’s Ending
Rules of the Death Note
Simulation Inferences
The 3 Grenades and the 4 Noble Truths
DNM-related arrests, 2011–2015
terrorism-is-not-effective#competent-murders
[Transclude the forward-link's
context]
Rule of Cool
Rule of Sexy
Metamagical Themas: Sanity and Survival
Good and Real: Demystifying Paradoxes from Physics to Ethics
https://www.lesswrong.com/
https://www.lesswrong.com/posts/LaM5aTcXvXzwQSC2Q/universal-fire
The Sociopath
Sociopathic Hero
Miscellaneous § The Tragedy of Grand Admiral Thrawn
Twitter Knows When You Sleep, and More
Google Web History (Original Http://blog.muflax.com/personal/google-Web-History/)
Circadian patterns of Wikipedia editorial activity: A demographic analysis
Everything Is Correlated
Privacy Technologies: An Annotated Syllabus
Privacy, Economics, and Price Discrimination on the Internet
Remote Physical Device Fingerprinting
https://murdoch.is/papers/usenix08clockskew.pdf
Feasibility and Real-World Implications of Web Browser History Detection
Jeremiah Grossman: I Know Where You'Ve Been
Plugging the CSS History Leak
Using Your Browser URL History to Estimate Gender
https://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070073681%22.PGNR.&OS=DN/20070073681&RS=DN/20070073681
How Unique Is Your Web Browser?
Cover Your Tracks
Yet Another Identity Stealing Bug. Will Creeping Normalcy Be the Result?
How Google Docs Leaks Your Identity
Facebook's Instant Personalization: An Analysis of Fundamental Privacy Flaws
Timing attacks on web privacy
Exposing Private Information by Timing Web Applications
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.155.820&rep=rep1&type=pdf
https://web.archive.org/web/20130926165125/http://honeyblog.org/archives/51-A-Practical-Attack-to-De-Anonymize-Social-Network-Users.html
How To Break Anonymity of the Netflix Prize Dataset
De-anonymizing Social Networks
Graph Isomorphism: Deceptively Hard
Link Prediction by De-Anonymization: How We Won the Kaggle Social Network Challenge
Lendingclub.com: A De-Anonymization Walkthrough
https://www.cs.utexas.edu/~shmat/shmat_oak09.pdf
‘You Might Also Like’: Privacy Risks of Collaborative Filtering [Blog]
‘You Might Also Like’: Privacy Risks of Collaborative Filtering
Privacy Risks of Collaborative Filtering
https://www.juliansanchez.com/2009/12/08/the-redactors-dilemma/
The Linkability of Usernames: a Step Towards ‘Uber-Profiles’
Sharing Medical Data
Latanya Sweeney's Accomplishments
Dr. Latanya Sweeney, Curriculum Vitae
Identifiability
Dr. Latanya Sweeney, Curriculum Vitae
Genomic Privacy Project
Genomic Privacy Project
Genomic Privacy Project
Dr. Latanya Sweeney, Curriculum Vitae
SOS Social Security Number Watch Project
Deep-Spying: Spying using Smartwatch and Deep Learning
Your Morning Commute Is Unique: On the Anonymity of Home/Work Location Pairs
On the Anonymity of Home/Work Location Pairs
https://static.usenix.org/event/sec11/tech/full_papers/Calandrino.pdf
https://web.archive.org/web/20170702141754/https://freedom-to-tinker.com/2011/06/07/new-research-result-bubble-forms-not-so-anonymous/
https://www.nytimes.com/2011/07/24/opinion/sunday/24gray.html
Mining Writeprints from Anonymous E-Mails for Forensic Investigation
https://www.cs.princeton.edu/~arvindn/publications/author-identification-draft.pdf
The Hum That Helps to Fight Crime
SonarSnoop: Active Acoustic Side-Channel Attacks
Hearing your touch: A new acoustic side channel on smartphones
Listen to Your Key: Towards Acoustics-based Physical Key Inference
The Visual Microphone: Passive Recovery of Sound from Video
Your Candy Wrappers Are Listening
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
Extracting Audio from Visual Information
Gyrophone: Recognizing Speech From Gyroscope Signals
The Pentagon Has a Laser That Can Identify People from a Distance—By Their Heartbeat: The Jetson Prototype Can Pick up on a Unique Cardiac Signature from 200 Meters Away, Even through Clothes.
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
Seeing the World in a Bag of Chips
Driver Identification Using Automobile Sensor Data from a Single Turn
2017-mosenia.pdf
Privacy implications of accelerometer data: a review of possible inferences
https://scholar.google.com/scholar?as_sdt=0%2C21&q=identification+sensor+noise+anonymity+OR+forensics&btnG=
US20150124107A1: Associating Cameras With Users and Objects in a Social Networking System
Digital Biomarkers for Alzheimer’s Disease: the Mobile/wearable Devices Opportunity
Behavioral Patterns in Smartphone Usage Predict Big Five Personality Traits
Inferring Human Traits From Facebook Statuses
Predicting individual-level income from Facebook profiles
Social media-predicted personality traits and values can help match people to their ideal jobs
Predicting Mental Health From Followed Accounts on Twitter
Personality computing: New frontiers in personality assessment
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking
Speech2Face: Learning the Face Behind a Voice
Search of DNA Sequences Reveals Full Identities
Why You Can't Really Anonymize Your Data
https://web.archive.org/web/20090331074813/https://www.cs.utexas.edu/~shmat/socialnetworks-faq.html
New Developments in Deanonymization
De-Anonymization Is Not X: The Need for Re-Identification Science
Joe Davidson’s Federal Diary: Whistleblowers May Have Friend in Oval Office
Obama Undercuts Whistle-Blowers, Senator Says
Administration Hardens Stance Against Leaks to Press
War on Whistle-Blowers Intensifies
Obama's War on Whistleblowers
War on Whistleblowers Escalating
https://www.uclalawreview.org/pdf/57-6-3.pdf
How Might the Real World React to a Real Kira (Death Note)
2012-terencetao-anonymity.html
https://www.amazon.com/Uncontrolled-Surprising-Trial---Error-Business/dp/046502324X/
Who Wrote The Death Note Script?
Death Note, Anonymity, and Information Theory
https://news.ycombinator.com/item?id=3634320
https://news.ycombinator.com/item?id=9553494
https://news.ycombinator.com/item?id=20617325
https://www.reddit.com/r/rational/comments/6vnj2g/is_death_note_a_rationalist_fic/
https://www.reddit.com/r/anime/comments/cmiijr/using_computer_security_cryptography_and/
マンガ「DEATH NOTE」の殺人鬼・キラが犯した最大のミスは何なのか、Lの推理を情報科学的に分析するとこうなる
https://habr.com/ru/articles/516190/
Stakeout: How the FBI Tracked and Busted a Chicago Anon
When Anonymous Isn’t Really Anonymous
Why I’m Not an Entropist
Toxic Pairs PII Re-Identification
https://web.archive.org/web/20200215144602/https://twicsy-blog.tumblr.com/post/174063770074/how-i-targeted-the-reddit-ceo-with-facebook-ads-to
https://news.ycombinator.com/item?id=17110385
‘Shattered’: Inside the secret battle to save America’s undercover spies in the digital age
The signal quality of earnings announcements: evidence from an informed trading cartel
T-Rex As: ‘The Computer Scientist’
International Classification of Diseases (ICD)
Probability Theory: The Logic Of Science
https://omega0.xyz/omega8008/ETJ-PS/cc5d.ps
Bayesian Justice
https://www.amazon.com/Interpreting-Evidence-Evaluating-Forensic-Courtroom/dp/0471960268/