Thomas Maus, kurz und bündig http://www.busch-telefon.de/artikel/1152595671t85.pdf längeres Gespräch: http://chaosradio.ccc.de/cr115.html und: http://chaosradio.ccc.de/22c3_m4v_546.html
Die Datenschutzrisiken seien bei den Sicherheitsbehörden "gravierend", insbesondere bei den Nachrichtendiensten, da diese auch Informationen zu legalem Verhalten und Erkenntnisse mit noch unklarer Relevanz sammeln dürfen. Eine systemweite Suche könnte auch für Unverdächtige möglicherweise schwere Konsequenzen haben.
Web search engines have changed our lives - enabling instant access to information about subjects that are both deeply important to us, as well as passing whims. The search engines that provide answers to our search queries also log those queries, in order to improve their algorithms. Academic research on search queries has shown that they can provide valuable information on diverse topics including word and phrase similarity, topical seasonality and may even have potential for sociology, as well as providing a barometer of the popularity of many subjects. At the same time, individuals are rightly concerned about what the consequences of accidental leaking or deliberate sharing of this information may mean for their privacy. In this talk I will cover the applications which have benefited from mining query logs, the risks that privacy can be breached by sharing query logs, and current algorithms for mining logs in a way to prevent privacy breaches.
Parallel or distributed mining,Cluster-based data mining algorithms and systems,Grid-based data mining,lgorithms and systems;Peer-to-Peer based data mining algorithms and systems;Data mining algorithms and systems based on parallel hardware platforms
Data Mining vs Privacy. Large amount of data available in digital form. Statisticians query data to mine useful trends. Potential for privacy breaches. Stanford University course.
Privacy is a micro concern, i.e. it refers to individual database records, while data mining tools want to learn macro rules that hold for a large fraction of the database. Techniques that publish data while preserving the right balance between individual
How It Works TrackMeNot runs in Firefox as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and MSN. It hides users' actual search trails in a cloud of 'ghost' quer