{"id":712,"date":"2013-02-25T17:29:56","date_gmt":"2013-02-25T17:29:56","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2013\/02\/25\/a-framework-for-building-privacy-oriented-apps\/"},"modified":"2023-07-28T16:26:47","modified_gmt":"2023-07-28T20:26:47","slug":"a-framework-for-building-privacy-oriented-apps","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2013\/02\/25\/a-framework-for-building-privacy-oriented-apps\/","title":{"rendered":"A framework for building privacy-oriented apps"},"content":{"rendered":"<p><a href='http:\/\/www.net-security.org\/secworld.php?id=14471'>A framework for building privacy-oriented apps<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A framework for building privacy-oriented apps<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[280,319],"class_list":["post-712","post","type-post","status-publish","format-link","hentry","category-uncategorized","tag-privacy","tag-security","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1099,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/02\/13\/hashing-for-privacy-in-social-apps-matt-gemmell\/","url_meta":{"origin":712,"position":0},"title":"Hashing for privacy in social apps &#8211; Matt Gemmell","author":"aslam","date":"February 13, 2012","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesWhat hashing is, how it can protect your privacy and contact information in social media apps.Via mattgemmell.com","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":301,"url":"https:\/\/melange.dmaculate.me\/home\/2015\/01\/16\/which-apps-protect-against-verizon-and-turns\/","url_meta":{"origin":712,"position":1},"title":"Which Apps Protect Against Verizon and Turn&#8217;s Invasive User Tracking? | Electronic Frontier Foundation","author":"aslam","date":"January 16, 2015","format":"link","excerpt":"Which Apps Protect Against Verizon and Turn's Invasive User Tracking? | Electronic Frontier Foundation","rel":"","context":"In \"EFF\"","block_context":{"text":"EFF","link":"https:\/\/melange.dmaculate.me\/home\/tag\/eff\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":952,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/07\/13\/the-ftc-and-online-privacy\/","url_meta":{"origin":712,"position":2},"title":"The FTC and online privacy","author":"aslam","date":"July 13, 2012","format":"link","excerpt":"In the US, the FTC is resource strapped and fangless wrt policing for privacy violations. In contrast, the EU is vigilant and rigorous about privacy due their experience with the Nazis. The EU\u2019s stricter privacy laws benefit Internet users everywhere when Google, Facebook, etc. have to comply with them.The FTC\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1109,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/02\/08\/privacy-free-expression-and-the-facebook-standard\/","url_meta":{"origin":712,"position":3},"title":"Privacy, Free Expression And The Facebook Standard &#8211; Forbes","author":"aslam","date":"February 8, 2012","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesIf Facebook is serious about being the industry leader on privacy, it should use its mega-IPO to tell the world what that means by including an explicit human rights section in its written privacy policy. \u00a0Via forbes.com","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1239,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/22\/defending-privacy-at-the-us-border\/","url_meta":{"origin":712,"position":4},"title":"Defending Privacy at the U.S. Border","author":"aslam","date":"December 22, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesA Guide for Travelers Carrying Digital Devices | Electronic Frontier FoundationVia eff.org","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":624,"url":"https:\/\/melange.dmaculate.me\/home\/2013\/07\/20\/encryption-works-how-to-protect-your-privacy-in\/","url_meta":{"origin":712,"position":5},"title":"Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance","author":"aslam","date":"July 20, 2013","format":false,"excerpt":"See on Scoop.it - Rights & Liberties\u201c\u2026thanks to the dedicated work of civilian cryptographers and the free and open source software community, it\u2019s still possible to have privacy on the Internet, and the software to do it is freely available to everyone.\u201dSee on pressfreedomfoundation.org","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=712"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/712\/revisions"}],"predecessor-version":[{"id":2572,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/712\/revisions\/2572"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}