{"id":12332,"date":"2019-05-01T14:20:56","date_gmt":"2019-05-01T12:20:56","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/blogroll-digital-self-defense\/"},"modified":"2022-07-02T13:04:56","modified_gmt":"2022-07-02T11:04:56","slug":"blogroll-digital-self-defense","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/","title":{"rendered":"BlogRoll: Digital Self Defense"},"content":{"rendered":"<p><strong>About<\/strong><\/p>\n<p>Digital self-defense is a set of strategies to ensure protection of confidential personal electronic information that can be used to identify, contact, or locate and identify an individual in context. Personal information is often revealed in social networking sites leaving users subject to psychological manipulation that range from divulging confidential information to computer related crimes. Users must protect them selves and this requires taking an active role in guarding their own personal information and the links provided in this BlogRoll aims at informing users about Digital Defense tactics and to inspire them to take action to ensure a safe but shared digital world.<\/p>\n<p><strong>Linkzine<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/beautifulrising.org\/tool\/practice-digital-self-defence\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Practicing Digital Self Defense<\/a><\/li>\n<li><a href=\"https:\/\/ssd.eff.org\/en\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Tips, Tools and How-tos<\/a><\/li>\n<li><a href=\"https:\/\/www.privacy-handbuch.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Spurenarm Surfen<\/a><\/li>\n<li><a href=\"https:\/\/www.heise.de\/ct\/ausgabe\/2017-5-Mehr-Datenschutz-mit-wenig-Aufwand-3625563.html\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Die Privacy Checklist<\/a><\/li>\n<li><a href=\"http:\/\/www.extremetech.com\/internet\/180485-the-ultimate-guide-to-staying-anonymous-and-protecting-your-privacy-online\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Staying Anonymous<\/a><\/li>\n<li><a href=\"https:\/\/www.heise.de\/ct\/ausgabe\/2017-5-Mehr-Datenschutz-mit-wenig-Aufwand-3625563.html\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Die Digitale Selbstverteidigung<\/a><\/li>\n<li><a href=\"https:\/\/www.gi.de\/index.php?id=97&amp;tx_ttnews%5Btt_news%5D=1905&amp;cHash=8405e9bc3f869e7b251d326dd27113b4\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Es gibt nicht nur Google<br \/>\n<\/a><\/li>\n<li><a href=\"https:\/\/www.heise.de\/security\/meldung\/Mit-c-t-wissen-Ueberwachung-abwehren-Schnueffler-ausbremsen-2814693.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 \u00dcberwachung abwehren<br \/>\n<\/a><\/li>\n<li><a href=\"https:\/\/www.rit.edu\/security\/content\/digital-self-defense-training\" target=\"_blank\" rel=\"noopener noreferrer\">\u2022 Digital Self-Defense Training<br \/>\n<\/a><\/li>\n<\/ul>\n<p><strong>Author<\/strong><\/p>\n<p>Arthur Clay is an artist and collaborator who was born in New York and twitters between his life in Basel and a hectic world presence working between the borders of the arts, the sciences, and society. He has designed and implemented events focusing on creatively connecting art, science, and technology within diverse cultural contexts in many parts of the world. As founder and artistic director of the Digital Art Weeks of ETHZ (2005 -2015) his activities included developing and platforming projects that pioneer new technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Digital self-defense is a set of strategies to ensure protection of confidential personal electronic information that can be used to identify, contact, or locate and identify an individual in context. Personal information is often revealed in social networking sites leaving users subject to psychological manipulation that range from divulging confidential information to computer related [&hellip;]<\/p>\n","protected":false},"author":1832,"featured_media":10156,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4397,396],"tags":[4231],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BlogRoll: Digital Self Defense - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlogRoll: Digital Self Defense - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"About Digital self-defense is a set of strategies to ensure protection of confidential personal electronic information that can be used to identify, contact, or locate and identify an individual in context. Personal information is often revealed in social networking sites leaving users subject to psychological manipulation that range from divulging confidential information to computer related [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-01T12:20:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-02T11:04:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2016\/12\/s-i-ch-background.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"939\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"BlogRoll: Digital Self Defense\",\"datePublished\":\"2019-05-01T12:20:56+00:00\",\"dateModified\":\"2022-07-02T11:04:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\"},\"wordCount\":222,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"keywords\":[\"Digital Defence\"],\"articleSection\":[\"\u2022 Ressource \u2022\",\"Gesellschaft\"],\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\",\"name\":\"BlogRoll: Digital Self Defense - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2019-05-01T12:20:56+00:00\",\"dateModified\":\"2022-07-02T11:04:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlogRoll: Digital Self Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"News - Nachrichten - Nouvelles - Notizie\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/magazine.swissinformatics.org\/de\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlogRoll: Digital Self Defense - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/","og_locale":"de_DE","og_type":"article","og_title":"BlogRoll: Digital Self Defense - SI Digital Magazine","og_description":"About Digital self-defense is a set of strategies to ensure protection of confidential personal electronic information that can be used to identify, contact, or locate and identify an individual in context. Personal information is often revealed in social networking sites leaving users subject to psychological manipulation that range from divulging confidential information to computer related [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2019-05-01T12:20:56+00:00","article_modified_time":"2022-07-02T11:04:56+00:00","og_image":[{"width":1280,"height":939,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2016\/12\/s-i-ch-background.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@SIGesellschaft","twitter_site":"@SIGesellschaft","twitter_misc":{"Verfasst von":"","Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/"},"author":{"name":"","@id":""},"headline":"BlogRoll: Digital Self Defense","datePublished":"2019-05-01T12:20:56+00:00","dateModified":"2022-07-02T11:04:56+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/"},"wordCount":222,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"keywords":["Digital Defence"],"articleSection":["\u2022 Ressource \u2022","Gesellschaft"],"inLanguage":"de-DE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/","url":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/","name":"BlogRoll: Digital Self Defense - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2019-05-01T12:20:56+00:00","dateModified":"2022-07-02T11:04:56+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/de\/blogroll-digital-self-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"BlogRoll: Digital Self Defense"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"News - Nachrichten - Nouvelles - Notizie","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"","url":"https:\/\/magazine.swissinformatics.org\/de\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts\/12332"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/users\/1832"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/comments?post=12332"}],"version-history":[{"count":0,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts\/12332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/media\/10156"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/media?parent=12332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/categories?post=12332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/tags?post=12332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}