People who might never have known who their biological mother or father was will have that opportunity now that a B.C. Supreme Court judge has declared unconstitutional the legislation that denied donor offspring the same rights as adoptees. The ruling will make British Columbia the first province in Canada to ban anonymity for sperm and egg donors.
Last year plenty of attention was paid to the release of Wikiscanner, a tool from Virgil Griffith that connected the IP addresses of Wikipedia edits with the companies from which they came. This resulted in a few PR flare ups as people noticed some questionable editing by biased parties. Griffith has now upgraded Wikiscanner to do even more (and renamed it to Wikiwatcher). While the revelations probably won't be as surprising, it will allow some way of connecting those who may have edited at home to their employers
Promether marks the end of surveillance and brings about a new era of online privacy,security, and anonymity. By merging blockchain technology, decentralized networks, and state-of-the-art encryption, Promether gives power and control back to the users.
An EPFL laboratory has developed Datashare Network, a decentralized search engine paired with a secure messaging system that allows investigative journalists to exchange information securely and anonymously.
So, you're probably asking yourself "just where do I get this nifty tool?". Ah yes, well, it seems the author of this tool had the foresight to make sure he/she was truly anonymous. First you need to install the i2p software. But don't worry, its not spyw
While the BitTorrent ecosystem is filled with uncertainty and doubt, researchers at Delft University of Technology have released the first version of their anonymous and decentralized BitTorrent network. "Tribler makes BitTorrent anonymous and impossible to shut down," lead researcher Prof. Pouwelse says.
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
On 1 April 2005, with the implementation of the Human Fertilisation and Embryology Authority (Disclosure of Donor Information) Regulations 2004, United Kingdom law was changed to allow children born through gamete donation to access details identifying the donor. Drawing on trends in adoption law, the decision to abolish donor anonymity was strongly influenced by a discourse that asserted the ‘child's right to personal identity’. Through examination of the donor anonymity debate in the public realm, while adopting a social constructionist approach, this article discusses how donor anonymity has been defined as a social problem that requires a regulative response. It focuses on the child's ‘right to personal identity’ claims, and discusses the genetic essentialism behind these claims. By basing its assumptions on an adoption analogy, United Kingdom law ascribes a social meaning to the genetic relatedness between gamete donors and the offspring
L. Sweeney. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 5 (10):
557--570(2002)issn = 0218-4885,
publisher = World Scientific Publishing Co., Inc.,
address = River Edge, NJ, USA,.