Abstract :
How can standards working groups protect Internet users from pervasive monitoring, where users´ data are being massively collected, aggregated, and analyzed?
Keywords :
Internet; computer network security; protocols; ubiquitous computing; Internet protocols; Internet users; opportunistic security; pervasive monitoring; Computer security; Internet of things; Pervasive computing; Privacy; Protocols; Web browsers; Big Data; Internet protocols; Internet/Web technologies; opportunistic security; pervasive monitoring; security and privacy;