Table of contentsCover What will be discussed Privacy Violations Nigerian Scam Spam Why do I get spam? Anti-Spam Defenses HTML email Remote elements in HTML email Killing HTML email Killing Web Bugs Web Tracking Cookies Cookie Misuse Cookies - How to manage them Privoxy - An Anonymizing Proxy Email Encryption Public Key Cryptography An Encrypted Message PKI Problems and Defenses Creating and Revoking Keys Slide 21 Encrypting Files with gpg |
Author: Alexandros Papadopoulos E-mail: apapadop+stuco@cmu.edu Homepage: http://andrew.cmu.edu/~apapadop/stuco |