This page contains some random thoughts and a mind map that might be relevant to research.

Mind map

Privacy Coach (in a mobile device)
  `-- Mobile phone
      `-- NFC
      `-- Bluetooth
      `-- Wireless (WiFi)
      `-- GPS
      `-- Internet
      `-- Google / Apple
          `-- Data hoarder
          `-- Data provider (weather, etc.)
      `-- Contains a lot of personal data
          `-- Instant messages
          `-- Email
          `-- Photos
      `-- Detector of Bluetooth or WiFi trackers?
      `-- Smart watch
          `-- Notifications on privacy 'breaches'
          `-- Vibration patterns
          `-- Desensitation of notifications (when is it too much?)

  `-- "Way of life advisor"
      `-- Be aware of security cameras
      `-- Wireless hotspot with "Social login"
      `-- Awareness
      `-- 10--15 general tips
          `-- n times per day/week: "Tip of the day"

  `-- "Use Tor, Use Signal"
      `-- Metadata?
      `-- "Birthday Etherpad"[birthday paradox]

  `-- Contradicting concepts
      `-- Data hoarder
      `-- Privacy trainer

  `-- Privacy levels
      `-- "off-the-grid"
      `-- ...
      `-- Instagram bloggers

  `-- Physical privacy
      `-- OV chipcard
      `-- ANPR (Automatic Number Plate Recognition)
      `-- (data retention)
      `-- Airplane data
      `-- Payments by debit / credit cards
      `-- Fingerprints on glass

  `-- Virtual privacy
      `-- Trackers / cookies
      `-- Facebook / Twitter connect buttons
      `-- [Privacy Badger]
      `-- Tracking links / URL shorteners
      `-- GeoIP [Vodafone case]

References

  • [birthday paradox] A friend of mine setup a birthday “Etherpad”, with a list of what presents he would like to have. Everyone could edit this document, online. In order to preserve anonimity, one would use some sort of proxy system, such as Tor. That friend then could not (before his birthday party) determine who would buy which present. The following problem arises: he is tech-savvy, knows about these anonimysing systems and who of his peers would go through such effort to hide their tracks. Although this might be a far-fetched situation, it shows that a slogan such as “Use X, use Y”, with X and Y arbitrary tools that protect online privacy, may not be suitable in every situation.
  • [Privacy Badger] Privacy Badger
  • [Vodafone case] In 2015, a Dutch entrepreneur had trouble passing the US border because the IP address from his home computer seem to come from Jordan. After he was questioned about his whereabouts in the Middle East, we was initially let go, but after he settled in his hotel room, he was questioned by local police again. In a news article, it became clear that the IP address range Vodafone owned was (formerly) located in Jordan. De Correspondent has a nice article about it (in Dutch).