-
Death Note’s Ending
-
Rules of the Death Note
-
Simulation Inferences
-
The 3 Grenades and the 4 Noble Truths
-
DNM-related arrests, 2011–2015
-
terrorism-is-not-effective#competent-murders
[Transclude the forward-link's context]
-
Rule of Cool
-
Rule of Sexy
-
Metamagical Themas: Sanity and Survival
-
Good and Real: Demystifying Paradoxes from Physics to Ethics
-
https://www.lesswrong.com/
-
https://www.lesswrong.com/posts/LaM5aTcXvXzwQSC2Q/universal-fire
-
The Sociopath
-
Sociopathic Hero
-
Miscellaneous § The Tragedy of Grand Admiral Thrawn
-
Twitter Knows When You Sleep, and More
-
Google Web History (Original Http://blog.muflax.com/personal/google-Web-History/)
-
Circadian patterns of Wikipedia editorial activity: A demographic analysis
-
Everything Is Correlated
-
Privacy Technologies: An Annotated Syllabus
-
Privacy, Economics, and Price Discrimination on the Internet
-
Remote Physical Device Fingerprinting
-
https://murdoch.is/papers/usenix08clockskew.pdf
-
Feasibility and Real-World Implications of Web Browser History Detection
-
Jeremiah Grossman: I Know Where You'Ve Been
-
Plugging the CSS History Leak
-
Using Your Browser URL History to Estimate Gender
-
https://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070073681%22.PGNR.&OS=DN/20070073681&RS=DN/20070073681
-
How Unique Is Your Web Browser?
-
Cover Your Tracks
-
Yet Another Identity Stealing Bug. Will Creeping Normalcy Be the Result?
-
How Google Docs Leaks Your Identity
-
Facebook's Instant Personalization: An Analysis of Fundamental Privacy Flaws
-
Timing attacks on web privacy
-
Exposing Private Information by Timing Web Applications
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.155.820&rep=rep1&type=pdf
-
https://web.archive.org/web/20130926165125/http://honeyblog.org/archives/51-A-Practical-Attack-to-De-Anonymize-Social-Network-Users.html
-
How To Break Anonymity of the Netflix Prize Dataset
-
De-anonymizing Social Networks
-
Graph Isomorphism: Deceptively Hard
-
Link Prediction by De-Anonymization: How We Won the Kaggle Social Network Challenge
-
Lendingclub.com: A De-Anonymization Walkthrough
-
https://www.cs.utexas.edu/~shmat/shmat_oak09.pdf
-
‘You Might Also Like’: Privacy Risks of Collaborative Filtering [Blog]
-
‘You Might Also Like’: Privacy Risks of Collaborative Filtering
-
Privacy Risks of Collaborative Filtering
-
https://www.juliansanchez.com/2009/12/08/the-redactors-dilemma/
-
The Linkability of Usernames: a Step Towards ‘Uber-Profiles’
-
Sharing Medical Data
-
Latanya Sweeney's Accomplishments
-
Dr. Latanya Sweeney, Curriculum Vitae
-
Identifiability
-
Dr. Latanya Sweeney, Curriculum Vitae
-
Genomic Privacy Project
-
Genomic Privacy Project
-
Genomic Privacy Project
-
Dr. Latanya Sweeney, Curriculum Vitae
-
SOS Social Security Number Watch Project
-
Deep-Spying: Spying using Smartwatch and Deep Learning
-
Your Morning Commute Is Unique: On the Anonymity of Home/Work Location Pairs
-
On the Anonymity of Home/Work Location Pairs
-
https://static.usenix.org/event/sec11/tech/full_papers/Calandrino.pdf
-
https://web.archive.org/web/20170702141754/https://freedom-to-tinker.com/2011/06/07/new-research-result-bubble-forms-not-so-anonymous/
-
https://www.nytimes.com/2011/07/24/opinion/sunday/24gray.html
-
Mining Writeprints from Anonymous E-Mails for Forensic Investigation
-
https://www.cs.princeton.edu/~arvindn/publications/author-identification-draft.pdf
-
The Hum That Helps to Fight Crime
-
SonarSnoop: Active Acoustic Side-Channel Attacks
-
Hearing your touch: A new acoustic side channel on smartphones
-
Listen to Your Key: Towards Acoustics-based Physical Key Inference
-
The Visual Microphone: Passive Recovery of Sound from Video
-
Your Candy Wrappers Are Listening
-
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
-
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
-
Extracting Audio from Visual Information
-
Gyrophone: Recognizing Speech From Gyroscope Signals
-
The Pentagon Has a Laser That Can Identify People from a Distance—By Their Heartbeat: The Jetson Prototype Can Pick up on a Unique Cardiac Signature from 200 Meters Away, Even through Clothes.
-
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
-
Seeing the World in a Bag of Chips
-
Driver Identification Using Automobile Sensor Data from a Single Turn
-
2017-mosenia.pdf
-
Privacy implications of accelerometer data: a review of possible inferences
-
https://scholar.google.com/scholar?as_sdt=0%2C21&q=identification+sensor+noise+anonymity+OR+forensics&btnG=
-
US20150124107A1: Associating Cameras With Users and Objects in a Social Networking System
-
Digital Biomarkers for Alzheimer’s Disease: the Mobile/wearable Devices Opportunity
-
Behavioral Patterns in Smartphone Usage Predict Big Five Personality Traits
-
Inferring Human Traits From Facebook Statuses
-
Predicting individual-level income from Facebook profiles
-
Social media-predicted personality traits and values can help match people to their ideal jobs
-
Predicting Mental Health From Followed Accounts on Twitter
-
Personality computing: New frontiers in personality assessment
-
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking
-
Speech2Face: Learning the Face Behind a Voice
-
Search of DNA Sequences Reveals Full Identities
-
Why You Can't Really Anonymize Your Data
-
https://web.archive.org/web/20090331074813/https://www.cs.utexas.edu/~shmat/socialnetworks-faq.html
-
New Developments in Deanonymization
-
De-Anonymization Is Not X: The Need for Re-Identification Science
-
Joe Davidson's Federal Diary: Whistleblowers May Have Friend in Oval Office
-
Obama Undercuts Whistle-Blowers, Senator Says
-
Administration Hardens Stance Against Leaks to Press
-
War on Whistle-Blowers Intensifies
-
Obama's War on Whistleblowers
-
War on Whistleblowers Escalating
-
https://www.uclalawreview.org/pdf/57-6-3.pdf
-
How Might the Real World React to a Real Kira (Death Note)
-
2012-terencetao-anonymity.html
-
https://www.amazon.com/Uncontrolled-Surprising-Trial---Error-Business/dp/046502324X/
-
Who Wrote The Death Note Script?
-
Death Note, Anonymity, and Information Theory
-
https://news.ycombinator.com/item?id=3634320
-
https://news.ycombinator.com/item?id=9553494
-
https://news.ycombinator.com/item?id=20617325
-
https://www.reddit.com/r/rational/comments/6vnj2g/is_death_note_a_rationalist_fic/
-
https://www.reddit.com/r/anime/comments/cmiijr/using_computer_security_cryptography_and/
-
マンガ「DEATH NOTE」の殺人鬼・キラが犯した最大のミスは何なのか、Lの推理を情報科学的に分析するとこうなる
-
https://habr.com/ru/articles/516190/
-
Stakeout: How the FBI Tracked and Busted a Chicago Anon
-
When Anonymous Isn’t Really Anonymous
-
Why I’m Not an Entropist
-
Toxic Pairs PII Re-Identification
-
https://web.archive.org/web/20200215144602/https://twicsy-blog.tumblr.com/post/174063770074/how-i-targeted-the-reddit-ceo-with-facebook-ads-to
-
https://news.ycombinator.com/item?id=17110385
-
‘Shattered’: Inside the secret battle to save America’s undercover spies in the digital age
-
The signal quality of earnings announcements: evidence from an informed trading cartel
-
T-Rex As: ‘The Computer Scientist’
-
International Classification of Diseases (ICD)
-
Probability Theory: The Logic Of Science
-
https://omega0.xyz/omega8008/ETJ-PS/cc5d.ps
-
Bayesian Justice
-
https://www.amazon.com/Interpreting-Evidence-Evaluating-Forensic-Courtroom/dp/0471960268/
-