Privacy#


Table of Contents#


Data Brokerage and People Searching#

  • [ y ] 10-23-2022. Shannon Morse. “My Personal Data Was EXPOSED! Abine DeleteMe Review”.

  • [ y ] 03-31-2023. Techlore. “How to CRUSH DATA BROKERS with Rob Shavell from DeleteMe”.

  • [ w ] Acxiom

  • [ w ] CoreLogic

  • [ w ] Datalogix

  • [ w ] Epsilon

  • [ w ] Equifax

  • [ w ] Exactis

  • [ w ] Experian

  • [ w ] Intelius

  • [ w ] LexisNexis

  • [ w ] PeekYou

  • [ w ] Recorded Future

  • [ w ] TransUnion

  • [ h ][ w ] Venntel

  • [ w ] Data Broker


Resources#

[ h ] haveibeenpwned

  • [ y ] 04-03-2024. Rob Braxman Tech. “Why Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!”.


Texts#

2024 Cowan, Ethan; Michael Shoemate; & Mayana Pereira. Hands-On Differential Privacy: Introduction to the Theory and Practice Using OpenDP. O’Reilly.

[ h ] Near, Joseph P. & Chiké Abuah. Programming Differential Privacy: A book about differential privacy, for programmers.

  • [ a ] Balle, Borja & Yu-Xiang Wang. (2018). “Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising”.

  • [ a ] Bun, Mark & Thomas Steinke. (2016). “Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds”.

  • [ a ] Cormode, Graham, Tejas Kulkarni, & Divesh Srivastava. (2018). “Answering Range Queries Under Local Differential Privacy”.

  • [ a ] Ding, Bolin, Janardhan Kulkarni, & Sergey Yekhanin. (2017). “Collecting Telemetry Data Privately”.

  • [ a ] Erlingsson, Ulfar, Vasyl Pihur, & Aleksandra Korolova. (2014). “RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response”.

  • [ a ] Hardt, Moritz, Katrina Ligett, & Frank McSherry. (2012). “A Simple and Practical Algorithm for Differentially Private Data Release”.

  • [ a ] Hay, Michael et al. (2010). “Boosting the Accuracy of Differentially Private Histograms Through Consistency”.

  • [ a ] Mironov, Ilya. (2017). “Renyi Differential Privacy”.

  • [ a ] Qardaji, Wahbeh, Weining Yang, & Ninghui Li. (2013). “Understanding Hierarchical Methods for Differentially Private Histograms”.

  • [ a ] Wang, Tianhao et al. (2017). “Optimizing Locally Differentially Private Protocols”.

  • [ a ] Warner, Stanley L. (1965). “Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias”.


Terms#

  • [ w ] Differential Privacy

  • [ w ] Personally Identifiable Information (PII)

  • [ w ] Privacy [ reddit ]