Bibliography (199):

  1. Death Note’s Ending

  2. Rules of the Death Note

  3. Simulation Inferences

  4. The 3 Grenades and the 4 Noble Truths

  5. DNM-related arrests, 2011–2015

  6. terrorism-is-not-effective#competent-murders

    [Transclude the forward-link's context]

  7. Rule of Cool

  8. Rule of Sexy

  9. Metamagical Themas: Sanity and Survival

  10. Good and Real: Demystifying Paradoxes from Physics to Ethics

  11. https://www.lesswrong.com/

  12. https://www.lesswrong.com/posts/LaM5aTcXvXzwQSC2Q/universal-fire

  13. The Sociopath

  14. Sociopathic Hero

  15. Miscellaneous § The Tragedy of Grand Admiral Thrawn

  16. Twitter Knows When You Sleep, and More

  17. Google Web History (Original Http://blog.muflax.com/personal/google-Web-History/)

  18. Circadian patterns of Wikipedia editorial activity: A demographic analysis

  19. Everything Is Correlated

  20. Privacy Technologies: An Annotated Syllabus

  21. Privacy, Economics, and Price Discrimination on the Internet

  22. Remote Physical Device Fingerprinting

  23. https://murdoch.is/papers/usenix08clockskew.pdf

  24. Feasibility and Real-World Implications of Web Browser History Detection

  25. Jeremiah Grossman: I Know Where You'Ve Been

  26. Plugging the CSS History Leak

  27. Using Your Browser URL History to Estimate Gender

  28. https://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220070073681%22.PGNR.&OS=DN/20070073681&RS=DN/20070073681

  29. How Unique Is Your Web Browser?

  30. Cover Your Tracks

  31. Yet Another Identity Stealing Bug. Will Creeping Normalcy Be the Result?

  32. How Google Docs Leaks Your Identity

  33. Facebook's Instant Personalization: An Analysis of Fundamental Privacy Flaws

  34. Timing attacks on web privacy

  35. Exposing Private Information by Timing Web Applications

  36. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.155.820&rep=rep1&type=pdf

  37. https://web.archive.org/web/20130926165125/http://honeyblog.org/archives/51-A-Practical-Attack-to-De-Anonymize-Social-Network-Users.html

  38. How To Break Anonymity of the Netflix Prize Dataset

  39. De-anonymizing Social Networks

  40. Graph Isomorphism: Deceptively Hard

  41. Link Prediction by De-Anonymization: How We Won the Kaggle Social Network Challenge

  42. Lendingclub.com: A De-Anonymization Walkthrough

  43. https://www.cs.utexas.edu/~shmat/shmat_oak09.pdf

  44. ‘You Might Also Like’: Privacy Risks of Collaborative Filtering [Blog]

  45. ‘You Might Also Like’: Privacy Risks of Collaborative Filtering

  46. Privacy Risks of Collaborative Filtering

  47. https://www.juliansanchez.com/2009/12/08/the-redactors-dilemma/

  48. The Linkability of Usernames: a Step Towards ‘Uber-Profiles’

  49. Sharing Medical Data

  50. Latanya Sweeney's Accomplishments

  51. Dr. Latanya Sweeney, Curriculum Vitae

  52. Identifiability

  53. Dr. Latanya Sweeney, Curriculum Vitae

  54. Genomic Privacy Project

  55. Genomic Privacy Project

  56. Genomic Privacy Project

  57. Dr. Latanya Sweeney, Curriculum Vitae

  58. SOS Social Security Number Watch Project

  59. Deep-Spying: Spying using Smartwatch and Deep Learning

  60. Your Morning Commute Is Unique: On the Anonymity of Home/Work Location Pairs

  61. On the Anonymity of Home/Work Location Pairs

  62. https://static.usenix.org/event/sec11/tech/full_papers/Calandrino.pdf

  63. https://web.archive.org/web/20170702141754/https://freedom-to-tinker.com/2011/06/07/new-research-result-bubble-forms-not-so-anonymous/

  64. https://www.nytimes.com/2011/07/24/opinion/sunday/24gray.html

  65. Mining Writeprints from Anonymous E-Mails for Forensic Investigation

  66. https://www.cs.princeton.edu/~arvindn/publications/author-identification-draft.pdf

  67. The Hum That Helps to Fight Crime

  68. SonarSnoop: Active Acoustic Side-Channel Attacks

  69. Hearing your touch: A new acoustic side channel on smartphones

  70. Listen to Your Key: Towards Acoustics-based Physical Key Inference

  71. The Visual Microphone: Passive Recovery of Sound from Video

  72. Your Candy Wrappers Are Listening

  73. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations

  74. Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED

  75. Extracting Audio from Visual Information

  76. Gyrophone: Recognizing Speech From Gyroscope Signals

  77. The Pentagon Has a Laser That Can Identify People from a Distance—By Their Heartbeat: The Jetson Prototype Can Pick up on a Unique Cardiac Signature from 200 Meters Away, Even through Clothes.

  78. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone

  79. Seeing the World in a Bag of Chips

  80. Driver Identification Using Automobile Sensor Data from a Single Turn

  81. 2017-mosenia.pdf

  82. Privacy implications of accelerometer data: a review of possible inferences

  83. https://scholar.google.com/scholar?as_sdt=0%2C21&q=identification+sensor+noise+anonymity+OR+forensics&btnG=

  84. US20150124107A1: Associating Cameras With Users and Objects in a Social Networking System

  85. Digital Biomarkers for Alzheimer’s Disease: the Mobile/wearable Devices Opportunity

  86. Behavioral Patterns in Smartphone Usage Predict Big Five Personality Traits

  87. Inferring Human Traits From Facebook Statuses

  88. Predicting individual-level income from Facebook profiles

  89. Social media-predicted personality traits and values can help match people to their ideal jobs

  90. Predicting Mental Health From Followed Accounts on Twitter

  91. Personality computing: New frontiers in personality assessment

  92. What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking

  93. Speech2Face: Learning the Face Behind a Voice

  94. Search of DNA Sequences Reveals Full Identities

  95. Why You Can't Really Anonymize Your Data

  96. https://web.archive.org/web/20090331074813/https://www.cs.utexas.edu/~shmat/socialnetworks-faq.html

  97. New Developments in Deanonymization

  98. De-Anonymization Is Not X: The Need for Re-Identification Science

  99. Joe Davidson's Federal Diary: Whistleblowers May Have Friend in Oval Office

  100. Obama Undercuts Whistle-Blowers, Senator Says

  101. Administration Hardens Stance Against Leaks to Press

  102. War on Whistle-Blowers Intensifies

  103. Obama's War on Whistleblowers

  104. War on Whistleblowers Escalating

  105. https://www.uclalawreview.org/pdf/57-6-3.pdf

  106. How Might the Real World React to a Real Kira (Death Note)

  107. 2012-terencetao-anonymity.html

  108. https://www.amazon.com/Uncontrolled-Surprising-Trial---Error-Business/dp/046502324X/

  109. Who Wrote The Death Note Script?

  110. Death Note, Anonymity, and Information Theory

  111. https://news.ycombinator.com/item?id=3634320

  112. https://news.ycombinator.com/item?id=9553494

  113. https://news.ycombinator.com/item?id=20617325

  114. https://www.reddit.com/r/rational/comments/6vnj2g/is_death_note_a_rationalist_fic/

  115. https://www.reddit.com/r/anime/comments/cmiijr/using_computer_security_cryptography_and/

  116. マンガ「DEATH NOTE」の殺人鬼・キラが犯した最大のミスは何なのか、Lの推理を情報科学的に分析するとこうなる

  117. https://habr.com/ru/articles/516190/

  118. Stakeout: How the FBI Tracked and Busted a Chicago Anon

  119. When Anonymous Isn’t Really Anonymous

  120. Why I’m Not an Entropist

  121. Toxic Pairs PII Re-Identification

  122. https://web.archive.org/web/20200215144602/https://twicsy-blog.tumblr.com/post/174063770074/how-i-targeted-the-reddit-ceo-with-facebook-ads-to

  123. https://news.ycombinator.com/item?id=17110385

  124. ‘Shattered’: Inside the secret battle to save America’s undercover spies in the digital age

  125. The signal quality of earnings announcements: evidence from an informed trading cartel

  126. T-Rex As: ‘The Computer Scientist’

  127. International Classification of Diseases (ICD)

  128. Probability Theory: The Logic Of Science

  129. https://omega0.xyz/omega8008/ETJ-PS/cc5d.ps

  130. Bayesian Justice

  131. https://www.amazon.com/Interpreting-Evidence-Evaluating-Forensic-Courtroom/dp/0471960268/

  132. Wikipedia Bibliography:

    1. Death Note

    2. Light Yagami

    3. Death Note § Plot  :

    4. List of Death Note characters § Yotsuba Group  :

    5. Information theory

    6. List of rampage killers

    7. Misa Amane  :

    8. Superrationality

    9. Decision theory

    10. Douglas Hofstadter

    11. Gary Drescher

    12. Ultra (cryptography) § Safeguarding of sources  :

    13. Double-Cross System  :

    14. Coventry Blitz § Coventry and Ultra  :

    15. Degree of anonymity  :

    16. Dennis Rader  :

    17. Hamartia

    18. Hubris

    19. Wikipedia:WikiProject edit counters  :

    20. Price discrimination

    21. Electronic Frontier Foundation

    22. Timing attack

    23. Cache (computing) § Operation  :

    24. XING  :

    25. IMDb

    26. Netflix

    27. Netflix Prize

    28. AOL search log release  :

    29. NP-completeness

    30. Graph isomorphism problem  :

    31. Integer factorization

    32. Flickr

    33. Twitter

    34. Julian Sanchez (writer)  :

    35. Keystroke dynamics § References  :

    36. Laser microphone  :

    37. Differential privacy

    38. Transparency (behavior)  :

    39. David Brin

    40. The Transparent Society

    41. Whistleblowing  :

    42. Canary trap  :

    43. Kantō region

    44. University of Tokyo

    45. Hartley (unit)  :

    46. Mafia (party game)

    47. Terence Tao

    48. Disinformation  :

    49. Satisfiability  :

    50. Compressed sensing

    51. Hindsight bias

    52. Randomization  :

    53. Confounding

    54. Jim Manzi (software entrepreneur)  :

    55. Assassination market

    56. On Murder Considered as one of the Fine Arts

    57. Thomas De Quincey  :

    58. Jeremy Hammond  :

    59. Terry Pratchett

    60. Mort  :

    61. IP over Avian Carriers  :

    62. Dinosaur Comics

    63. Stand on Zanzibar

    64. Edwin Thompson Jaynes

    65. Bayesian statistics

    66. Cognitive bias

    67. Discovery of Neptune

    68. George Pólya  :