1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
|
@online{panopti:about,
author = {Electric Frontier Foundation},
title = {Panopticlick | About},
url = {https://panopticlick.eff.org/about},
urldate = {2017-03-08},
}
@online{whonix:donot,
author = {Whonix},
title = {DoNot},
url = {https://www.whonix.org/wiki/DoNot},
urldate = {2017-03-05}
}
@online{tor,
author = {Tor Project},
title = {Tor Project: Anonymity Online},
url = {http://torproject.org/},
urldate = {2017-03-09},
}
@online{eff:nsa:timeline,
author = {Electronic Frontier Foundation},
title = {Timeline of NSA Domestic Spying},
url = {https://www.eff.org/nsa-spying/timeline},
urldate = {2017-03-09},
}
@online{mtg:uproar,
author = {Mike Gerwitz},
title = {National Uproar: A Comprehensive Overview of the
NSA Leaks and Revelations},
url = {https://mikegerwitz.com/2013/06/National-Uproar-A-Comprehensive-Overview-of-the-NSA-Leaks-and-Revelations},
month = 06,
year = 2013,
urldate = {2017-03-09},
}
@online{eff:bernstein:doj,
author = {Electronic Frontier Foundation},
title = {Bernstein v. US Department of Justice},
url = {https://www.eff.org/cases/bernstein-v-us-dept-justice},
urldate = {2017-03-09},
}
% TODO: figure out how to render the URL
@techreport{poodle:paper,
author = {Möller, Brodo and Duong, Thai and Kotowicz, Krzysztof},
title = {This POODLE Bites: Exploiting the SSL 3.0 Fallback},
institution = {Google},
year = 2014,
month = Sep,
url = {https://www.openssl.org/~bodo/ssl-poodle.pdf},
}
@online{w:crypto-wars,
author = {Wikipedia},
title = {Crypto Wars},
url = {https://en.wikipedia.org/wiki/Crypto_wars},
urldate = {2017-03-10},
}
@online{fedr:export-controls,
author = {Executive Office of the President},
title = {Administration of Export Controls on Encryption Products},
url = {https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf},
urldate = {2017-03-10},
month = 11,
year = 1996,
note = {Federal Register, Vol. 61, No. 224, Executive Order 58767},
}
@online{doc:rev-export-reg,
author = {United States Department of Commerce},
title = {Revised U.S. Encryption Export Regulations},
url = {https://epic.org/crypto/export_controls/regs_1_00.html},
month = 01,
year = 2000,
urldate = {2017-03-10},
}
@online{arxiv:mac,
author = {Martin, Jeremy
and Mayberry, Travis
and Donahue, Collin
and Foppe, Lucas,
and Brown, Lamont
and Riggins, Chadwick
and Rye, Erik C.
and Brown, Dane},
title = {A Study of MAC Address Randomization in Mobile Devices and When it Fails},
year = 2017,
month = 03,
archivePrefix= {arXiv},
eprint = {1703.02874},
primaryClass = {cs.CR},
}
@online{aimsid,
author = {CellularPrivacy},
title = {Android IMSI-Catcher Detector},
url = {https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/},
urldate = {2017-03-11},
}
@online{osmand,
title = {OsmAnd - Offline Mobile Maps and Navigation},
url = {http://osmand.net/},
urldate = {2017-03-11},
}
@online{mozilla:loc-services,
author = {MozillaWiki},
title = {CloudServices/Location - MozillaWiki},
url = {https://wiki.mozilla.org/CloudServices/Location},
urldate = {2017-03-11},
}
@online{openmobilenetwork,
title = {OpenMobileNetwork},
url = {http://www.openmobilenetwork.org/},
urldate = {2017-03-11},
}
@online{w:wps,
author = {Wikipedia},
title = {Wi-Fi positioning system},
url = {https://en.wikipedia.org/wiki/Wi-Fi_positioning_system},
urldate = {2017-03-11},
}
@online{w:trilateration,
author = {Wikipedia},
title = {Trilateration},
url = {https://en.wikipedia.org/wiki/Trilateration},
urldate = {2017-03-11},
}
@article{acm:spotfi,
author = {Kotaru, Manikanta
and Joshi, Kiran
and Bharadia, Dinesh
and Katti, Sachin},
title = {{SpotFi}: Decimeter Level Localization Using {WiFi}},
journal = {{ACM} {SIGCOMM} Computer Communication Review - {SIGCOMM'15}},
doi = {10.1145/2785956.2787487},
volume = 45,
pages = {269-282},
year = 2015,
}
@article{acm:lteye,
author = {Kumar, Swarun
and Hamed, Ezzeldin
and Katabi, Dina
and Li, Li Erran},
title = {{LTE} radio analytics made easy and accessible},
journal = {{S3 '14} Proceedings of the 6th annual workshop on Wireless of
the students, by the students, for the students},
doi = {10.1145/2645884.2645891},
pages = {29-30},
year = 2014,
}
@online{replicant,
author = {Replicant},
title = {Replicant},
url = {http://www.replicant.us},
urldate = {2017-03-11},
annotation = {A fully free Android distribution}
}
@online{replicant:sec,
author = {Replicant},
title = {Freedom and privacy/security issues},
url = {http://www.replicant.us/freedom-privacy-security-issues.php},
urldate = {2017-03-11},
}
@online{replicant:samsung-bd,
author = {Replicant},
title = {Samsung Galaxy back-door},
url = {http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor},
urldate = {2017-03-11},
annotation = {Backdoor in Samsung Galaxy phones closed by Replicant},
}
@online{gnu:malware-mobile,
author = {GNU Project},
title = {Malware in Mobile Devices},
url = {https://www.gnu.org/philosophy/malware-mobiles.html},
urldate = {2017-03-11},
annotation = {Numerous resources on privacy/security issues with mobile
devices}
}
@online{jots:mobile,
author = {Jinyan Zang
and Krysta Dummit
and James Graves
and Paul Lisker
and Latanya Sweeney},
title = {Who Knows What About Me? A Survey of Behind the Scenes Personal
Data Sharing to Third Parties by Mobile Apps},
url = {http://jots.pub/a/2015103001/index.php},
urldate = {2017-03-11},
}
@online{kryptowire:adups,
author = {Kryptowire},
title = {KRYPTOWIRE DISCOVERS MOBILE PHONE FIRMWARE THAT TRANSMITTED
PERSONALLY IDENTIFIABLE INFORMATION (PII) WITHOUT USER
CONSENT OR DISCLOSURE},
url = {http://www.kryptowire.com/adups_security_analysis.html},
urldate = {2017-03-11},
annotation = {BLU mobile phones transmitting SMS content, contacts, call
history, telephone numbers, IMEIs, etc to third-party
servers without users' knolwedge or censent}
}
|