[1] Sun-C': Umění války. B4U Publishing, Brno (2014). Přeložil Radim Pekárek.
[2] Drew Olano: With The Help Of Citizen Cartographers, Google Launches More Detailed Map Of North Korea. TechCrunch, (2013). URL https://techcrunch.com/2013/01/28/with-the-help-of-citizen-cartographers-google-launches-more-detailed-map-of-north-korea/. [Online; získáno 2020-07-19].
[3] Reuters Handbook of Journalism. Reuters (2009). URL https://www.trust.org/contentAsset/raw-data/652966ab-c90b-4252-b4a5-db8ed1d438ce/file.
[4] Valerij Gerasimov: Cennosť nauki v predvidenii. Vojenno-promyšlennyj kurjer, (2013)(8). URL https://vpk-news.ru/sites/default/files/pdf/VPK_08_476.pdf. [Online; získáno 2020-07-22].
[5] Valery Gerasimov: The Value of Science Is in the Foresight. Military Review, (2016). URL https://web.archive.org/web/20180129103740/https://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20160228_art008.pdf. [Online; archivováno 2018-01-29].
[6] Mark Galeotti: I'm Sorry for Creating the `Gerasimov Doctrine'. Foreign Policy, (2018). URL https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/. [Online; získáno 2020-07-22].
[7] Wikipedia contributors: Annexation of Crimea by the Russian Federation — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Annexation_of_Crimea_by_the_Russian_Federation&oldid=1029254203. [Online; accessed 19-June-2021].
[8] Wikipedia contributors: War in Donbas — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=War_in_Donbas&oldid=1028739552. [Online; accessed 19-June-2021].
[9] matjak (editor): Výroční zpráva Bezpečnostní informační služby za rok 2017. Bezpečnostní informační služba (2018). URL https://www.bis.cz/public/site/bis.cz/content/vyrocni-zpravy/2017-vz-cz.pdf. [Online; získáno 2020-07-22].
[10] matjak (editor): Výroční zpráva Bezpečnostní informační služby za rok 2018. Bezpečnostní informační služba (2019). URL https://www.bis.cz/public/site/bis.cz/content/vyrocni-zpravy/2018-vz-cz.pdf.pdf. [Online; získáno 2020-07-22].
[11] Ondřej Golis: Novinářka popsala, jak funguje ruská továrna na fake news. ‚Smrtí mi pak vyhrožovali i přátelé,` vzpomíná. iRozhlas.cz, (2019). URL https://www.irozhlas.cz/zpravy-domov/jessikka-aro-fake-news-dezinformace-rozhvor-trollove-finsko_1905050600_ogo. [Online; získáno 2020-07-22].
[12] Alexandra Alvarová: Průmysl lži. Propaganda, konspirace a dezinformační válka. Triton, Praha (2017). URL http://www.tridistri.cz/inshop/files/978-80-7553-492-7/prumysl\%20lzi_web_kap5.pdf. Ukázka [Online; získáno 2020-07-22].
[13] Redakce: Nový ruský způsob vedení války a Lotyšsko. Vojenské rozhledy, 23 (2014)(3):page 112–122. URL https://www.vojenskerozhledy.cz/kategorie/novy-rusky-zpusob-vedeni-valky-a-lotyssko. [Online; získáno 2020-07-22].
[14] Andrew Radin Raphael S. Cohen: Russia's Hostile Measures in Europe. RAND Corporation, Santa Monica (2019). URL https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1793/RAND_RR1793.pdf. [Online; získáno 2020-07-22].
[15] Wikipedia contributors: DeCSS — Wikipedia, The Free Encyclopedia (2018). URL https://en.wikipedia.org/w/index.php?title=DeCSS. [Online; accessed 24-July-2018].
[16] DVD Copy Control Ass'n, Inc. v. Bunner – Wikipedia (2017). URL https://en.wikipedia.org/w/index.php?title=DVD_Copy_Control_Ass\%27n,_Inc._v._Bunner. [Online; získáno 2018-07-24].
[17] Electronic Frontier Foundation: No Evidence DeCSS Was a Trade Secret When Bunner Published. EFFector, (2004)(279). URL https://www.eff.org/effector/17/7.
[18] Frances Kerry David Alexander, Phillip Stewart: Leaked U.S. video shows deaths of Reuters' Iraqi staers. Reuters.com, (2010). URL https://www.reuters.com/article/us-iraq-usa-journalists/leaked-u-s-video-shows-deaths-of-reuters-iraqi-staffers-idUSTRE6344FW20100406. [Online; získáno 2020-07-22].
[19] Wikipedia contributors: Chelsea Manning — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Chelsea_Manning. [Online; accessed 22-July-2020].
[20] Listina základních práv a svobod (1992, 1993, 1998). URL https://www.psp.cz/docs/laws/listina.html.
[21] Aleksandr Isajevič Solženicyn: Souostroví Gulag: 1918-1956: pokus o umělecké pojednání. OK Centrum, Praha, 2., upr. vyd., v ok centru a v Čsfr 1. edition (1990).
[22] Jaroslav Kmenta: Lidé z BIS tlačili na podnikatele, za prolomené šifrování nabízeli peníze. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/lide-z-bis-tlacili-na-podnikatele-za-prolomene-sifrovani-nabizeli-penize.A100912_210704_domaci_mad. [Online; získáno 2019-11-29].
[23] Jaroslav Kmenta: Podnikatel dokázal přelstít důstojníky BIS, kteří ho tlačili ke spolupráci. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/podnikatel-dokazal-prelstit-dustojniky-bis-kteri-ho-tlacili-ke-spolupraci.A100913_205808_domaci_abr. [Online; získáno 2019-11-29].
[24] jš: Poslanci zpovídali šéfa BIS, kvůli údajnému vydírání soukromé rmy. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/poslanci-zpovidali-sefa-bis-kvuli-udajnemu-vydirani-soukrome-firmy.A101012_151146_domaci_js. [Online; získáno 2019-11-29].
[25] Wikipedia contributors: F. W. Winterbotham — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=F._W._Winterbotham\#The_Ultra_Secret. [Online; accessed 2-January-2020].
[26] Jon Kelly Ian Shoesmith: The Coventry Blitz 'conspiracy'. BBC News, (2010). URL https://www.bbc.com/news/uk-11486219. [Online; získáno 2020-01-02].
[27] Sabina Slonková: Poslední výstřel Hynka Vlase. Neovlivní, (2018). URL https://neovlivni.cz/posledni-vystrel-hynka-vlase/.
[28] James Bamford: The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization. Penguin Books (1983). ISBN 0140067485,9780140067484. URL http://gen.lib.rus.ec/book/index.php?md5=9e171adb7b345c0ef60875ad21a9a330.
[29] Greg Miller: `The intelligence coup of the century'. Washington Post, (2020). URL https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/. [Online; získáno 2020-02-12].
[30] Wayne Madsen: Crypto AG: The NSA's Trojan Whore? Covert Action Quarterly, (1998)(63). URL https://web.archive.org/web/20190815054754/http://covertactionmagazine.com/wp-content/uploads/2018/08/CAQ63.pdf. [Online; archivováno 2019-08-15].
[31] Gordon Corera: How NSA and GCHQ spied on the Cold War world. BBC News, (2015). URL https://www.bbc.com/news/uk-33676028. [Online; získáno 2020-01-03].
[32] Peter Avritch: Why the NSA Called Me After Midnight and Requested My Source Code. Medium.com, (2018). URL https://medium.com/datadriveninvestor/why-the-nsa-called-me-after-midnight-and-requested-my-source-code-f7076c59ab3d. [Online; získáno 2019-12-01].
[33] Niekt0: Alzheimer. URL http://hysteria.cz/niekt0/alzheimer/.
[34] Ivor Kollár: Forensic RAM dump image analyser. Master's thesis, Charles University in Prague Charles University in Prague, Faculty of Mathematics and Physics, Prague (2010). URL http://hysteria.cz/niekt0/foriana/doc/foriana.pdf. [Online; získáno 2020-01-02].
[35] Esther Addley: How the rape claims against Julian Assange sparked an information war. The Guardian, (2010). URL https://www.theguardian.com/media/2010/dec/07/rape-claims-julian-assange. [Online; získáno 2020-01-03].
[36] Julian Assange: Sweden drops rape investigation. BBC News, (2019). URL https://www.bbc.com/news/world-europe-50473792. [Online; získáno 2020-01-03].
[37] AbcLinuxu poradna: Dotaz: Jak nejlépe smazat HDD, kdyby přišla policie? URL https://www.abclinuxu.cz/poradna/linux/show/274489. [Online; získáno 2020-01-02].
[38] ČTK/Šulová Kateřina: výtvarník David Brudňák vystupující pod jménem Roman Týc alias David Hons, policista, policisté, zatčení, zatčený. ČTK, (2010). URL http://multimedia.ctk.cz/foto/index?documentID=3480933. [Online; získáno 2020-07-23].
[39] ČTK Lidovky.cz: Policie zatkla člena Ztohoven a zabavila upravené občanky. Lidovky.cz, (2010). URL https://www.lidovky.cz/kultura/policie-zatkla-clena-ztohoven-a-zabavila-upravene-obcanky.A100618_155416_ln_kultura_mev. [Online; získáno 2020-07-23].
[40] (autor neuveden): Ztohoven nespáchali změnou občanek trestný čin. ČT24.cz, (2011). URL https://ct24.ceskatelevize.cz/domaci/1202163-ztohoven-nespachali-zmenou-obcanek-trestny-cin. [Online; získáno 2020-07-23].
[41] ČTK: Ztohoven změnou fotograí na občankách nespáchali ani přestupek. Týden.cz, (2010). URL https://www.tyden.cz/rubriky/domaci/ztohoven-zmenou-fotografii-na-obcankach-nespachali-ani-prestupek_238140.html. [Online; získáno 2020-07-23].
[42] (autor neuveden): Ztohoven varuje prostřednictvím Občana K. ČT24.cz, (2010). URL https://ct24.ceskatelevize.cz/kultura/1335055-ztohoven-varuje-prostrednictvim-obcana-k. [Online; získáno 2020-07-23].
[43] Eyedea Recognition s. r. o.: Eyedentity - Forenzní software pro rozpoznávání obličejů. URL https://eyedea.ai/cs/eyedentity/. [Online; získáno 2020-07-23].
[44] Luděk Rašek: Elektronické cestovní doklady, Elektronické cestovní doklady, část 1. Crypto-World, 8 (2006)(10). URL http://crypto-world.info/casop8/crypto10_06.pdf. [Online; získáno 2020-07-23].
[45] Luděk Rašek: Elektronické cestovní doklady, Elektronické cestovní doklady, část 1. Crypto-World, 8 (2006)(11). URL http://crypto-world.info/casop8/crypto11_06.pdf. [Online; získáno 2020-07-23].
[46] Filip Pospíšil: Sejmou nám otisky, sejmou. A2, (2006)(09). URL https://www.advojka.cz/archiv/2006/9/sejmou-nam-otisky-sejmou. [Online; získáno 2020-07-23].
[47] Jiří Straus a kol.: Kriminalistická taktika. Vydavatelství a nakladatelství Aleš Čeněk, Plzeň, 2. rozšířené vydání edition (2008).
[48] Helen Pidd: Facebook facial recognition software violates privacy laws, says Germany. The Guardian, (2011). URL https://www.theguardian.com/technology/2011/aug/03/facebook-facial-recognition-privacy-germany. [Online; získáno 2020-07-25].
[49] Megan Geuss: Facebook Facial Recognition: Its Quiet Rise and Dangerous Future. PCWorld, (2011). URL https://www.pcworld.com/article/226228/Facerec.html. [Online; získáno 2020-07-25].
[50] Kurt Opsahl: Facebook's Eroding Privacy Policy: A Timeline. Electronic Frontier Foundation (4 2010). URL https://www.eff.org/deeplinks/2010/04/facebook-timeline.
[51] Kay Yin: Apple's updated Photos app recognizes thousands of objects, scenes and facial expressions. Medium.com, (2016). URL https://web.archive.org/web/20170302022740/https://medium.com/@iosight/behind-apples-advanced-computer-vision-for-photos-app-41f3f617d31c. [Online; archivováno 2017-03-02].
[52] Michal Trško a TASR: Hackerom heslo nbusr123 nedokázali. SME, (2011). URL https://domov.sme.sk/c/6180039/hackerom-heslo-nbusr123-nedokazali.html. [Online; získáno 2020-07-26].
[53] Anonymous: Narodny Bezpecnostny Urad pwn3d. Blackhole.sk, (2006). URL https://web.archive.org/web/20120909081925/http://blackhole.sk/node/442. [Online; archivováno 2012-09-09].
[54] Tomáš Bella: Hackeri o NBÚ: heslo nbusr123 stále funguje. SME, (2006). URL https://www.sme.sk/c/2818624/hackeri-o-nbu-heslo-nbusr123-stale-funguje.html. [Online; získáno 2020-07-26].
[55] André Årnes (Editor): Digital Forensics. Wiley, 1 edition (2018). ISBN 1119262380, 978-1119262381. URL http://gen.lib.rus.ec/book/index.php?md5=2b01f3ef9d6a0503f58b10ce844e77c8.
[56] Paul Reedy: Interpol review of digital evidence 2016 - 2019. Forensic Science International: Synergy, (2020). ISSN 2589-871X. doi: 1 0 . 1 0 1 6 / j . f s i s y n . 2 0 2 0 . 0 1 . 0 1 5. URL http://www.sciencedirect.com/science/article/pii/S2589871X20300152.
[57] Tomáš Vymětal: Computer forensics. Diplomová práce, Masarykova univerzita, Fakulta informatiky, Brno (2010). URL https://is.muni.cz/th/hkz29/Diplomka.pdf. [Online; získáno 2020-07-25].
[58] Marco Nicoletti and Massimo Bernaschi: Forensic Analysis of Microsoft Skype for Business. Digital Investigation, 29 (2019). doi: 1 0 . 1 0 1 6 / j . d i i n . 2 0 1 9 . 0 3 . 0 1 2. URL https://www.researchgate.net/publication/332224615_Forensic_Analysis_of_Microsoft_Skype_for_Business. [Online; získáno 2020-07-23].
[59] Tina Parciak Reiner Creutzburg, Knut Bellin: Client-side Skype Forensics - An Overview. In Proceedings of SPIE - The International Society for Optical Engineering (03 2013). doi:10.1117/12.2007757. URL https://www.researchgate.net/publication/258332808_Client-side_Skype_Forensics_-_An_Overview. [Online; získáno 2020-07-23].
[60] anonym: dastych reloaded. Prielom, (2003)(20). URL http://prielom.webatlas.cz/20/index.html\#6. [Online; získáno 2018-07-31].
[61] Saša Uhlová: Příběh policejních agentů: byl plánovaný útok na vlak jejich nápad? Deník Referendum, (2016). URL http://denikreferendum.cz/clanek/22971-pribeh-policejnich-agentu-byl-planovany-utok-na-vlak-jejich-napad. [Online; získáno 2018-04-11].
[62] Hana Čápová: Hrozí nám levicoví teroristé? Respekt, (2016). URL https://www.respekt.cz/tydenik/2016/23/hrozi-nam-levicovi-teroriste. [Online; získáno 2020-07-29].
[63] Saša Uhlová: Vrchní soud osvobodil údajné teroristy. Rozsudek je pravomocný. A2larm.cz, (2018). URL https://denikalarm.cz/2018/03/vrchni-soud-osvobodil-udajne-teroristy-rozsudek-je-pravomocny/. [Online; získáno 2018-04-09].
[64] Ivana Svobodová: Jak se zrodil terorista. Respekt, (2019). URL https://www.respekt.cz/tydenik/2019/4/jak-se-zrodil-senior-terorista. [Online; získáno 2020-07-29].
[65] ČTK mag: Vrchní soud potvrdil důchodci Baldovi čtyři roky za teroristický útok na vlaky. iRozhlas.cz, (2019). URL https://www.irozhlas.cz/zpravy-domov/balda-senior-teroristicky-utok-utok-na-vlak_1904161114_nkr. [Online; získáno 2020-07-29].
[66] Pavel Šplíchal Jan Bělíček: Rozhovor se zadrženým v akci Fénix. A2larm.cz, (2015). URL https://denikalarm.cz/2015/05/ozbrojene-prepadeni-unos-a-loupez-v-rezii-policie-cr/. [Online; získáno 2020-07-27].
[67] Marek Pokorný Lukáš Prchal, Lukáš Werner: Za ušatého traktoristu aktivista platit nebude. Soud zrušil pokutu za zesměšňování Šlachty a policie. Aktualne.cz, (2016). URL https://zpravy.aktualne.cz/domaci/za-usateho-traktoristu-aktivista-platit-nebude-soud-pokutu-z/r\~d39d736e710d11e683920025900fea04/. [Online; získáno 2020-07-27].
[68] Jan Janka: Znalecký posudek z oboru Kybernetika odvětví Výpočetní technika (09 2015). URL https://zeleny.noblogs.org/files/2018/03/Janka-3316-10.pdf. [Online; získáno 2020-07-26].
[69] Tomáš Zelený: Rozšifrovali moji rádcové? A2larm.cz, (2018). URL https://denikalarm.cz/2018/04/rozsifrovali-moji-radcove/. [Online; získáno 2020-07-26].
[70] Wikipedia contributors: Key disclosure law — Wikipedia, The Free Encyclopedia (2018). URL https://en.wikipedia.org/w/index.php?title=Key_disclosure_law. [Online; accessed 31-July-2018].
[71] Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier: Defeating Encrypted and Deniable File Systems: TrueCrypt V5.1a and the Case of the Tattling OS and Applications. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, page 7:1–7:7. USENIX Association, Berkeley, CA, USA (2008). URL https://www.schneier.com/paper-truecrypt-dfs.pdf.
[72] Egon Bondy: Mníšek. Vylitý nočník. Nakladatelství Akropolis, Praha (2009).
[73] Alice Růžičková: Alternativní kultura: příběh české společnosti 1945-1989, chapter Originální Videojournal. Pokus o "samizdatovou televizi"., page 475–485. NLN, Nakladatelství Lidové noviny (2001).
[74] Wikipedia contributors: Criticism of Huawei — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Criticism_of_Huawei. [Online; accessed 27-July-2020].
[75] David Kravetz: An Intentional Mistake: The Anatomy of Google's Wi-Fi Sning Debacle. Wired, (2012). URL https://www.wired.com/2012/05/google-wifi-fcc-investigation/. [Online; získáno 2020-07-27].
[76] Jemima Kiss: Google admits collecting Wi-Fi data through Street View cars. The Guardian, (2010). URL https://www.theguardian.com/technology/2010/may/15/google-admits-storing-private-data. [Online; získáno 2020-07-27].
[77] Charlie Osborne: Shodan: The IoT search engine for watching sleeping kids and bedroom antics. ZDnet.com, (2016). URL https://www.zdnet.com/article/shodan-the-iot-search-engine-which-shows-us-sleeping-kids-and-how-we-throw-away-our-privacy/. [Online; získáno 2020-07-27].
[78] Jan Vobořil: Data Retention Reloaded: zkušenosti, problémy a aplikační praxe: sborník z workshopu konaného dne 23.4.2013 v Brně, chapter Využívání provozních a lokalizačních údajů ze strany oprávněných orgánů, zejména Policie ČR. Masarykova univerzita, Brno (2013). URL http://science.law.muni.cz/knihy/monografie/Data_retention_reloaded.pdf. [Online; získáno 2020-07-27].
[79] Ivana Svobodová: Shniješ zaživa. Hrozby chodily učiteli z fakultního počítače, napětí ve škole roste. Respekt, (2010). URL https://www.respekt.cz/tydenik/2010/47/shnijes-zaziva. [Online; získáno 2020-07-27].
[80] Zuzana Taušová: Profesor lozoe, který vyhrožoval kolegovi smrtí, dostal výpověď. iDnes.cz, (2013). URL https://www.idnes.cz/brno/zpravy/profesor-horyna-dostal-vypoved.A130425_1921250_brno-zpravy_mav. [Online; získáno 2020-07-27].
[81] Ondrej Mikle: Onion routing v p2p sieťach - TOR. Root.cz, (2006). URL https://www.root.cz/clanky/onion-routing-v-p2p-sietach-tor/. [Online; získáno 2020-07-28].
[82] No Secrets. Julian Assange's mission for total transparency. New Yorker, (2010). URL https://www.newyorker.com/magazine/2010/06/07/no-secrets. [Online; získáno 2020-07-27].
[83] Kim Zetter: WikiLeaks Was Launched With Documents Intercepted From Tor. Wired, (2010). URL https://www.wired.com/2010/06/wikileaks-documents/. [Online; získáno 2020-07-27].
[84] Wikipedia contributors: Tor (anonymity network) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Tor_(anonymity_network). [Online; accessed 28-July-2020].
[85] Patrick Gray: The hack of the year. The Sydney Morning Herald, (2007). URL https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html. [Online; získáno 2020-07-28].
[86] Pierluigi Paganini: 7 VPN services left data of millions of users exposed online. SecurityAairs.co, (2020). URL https://securityaffairs.co/wordpress/106181/data-breach/7-vpn-data-leak.html. [Online; získáno 2020-07-28].
[87] Eli Pariser: The Filter Bubble: What the Internet Is Hiding from You. Penguin Press HC, The, 1st ptg edition (2011). ISBN 1594203008,9781594203008,9781101515129. URL http://gen.lib.rus.ec/book/index.php?md5=270a9aa7ef50fd61fdc22c71fdbbecce.
[88] Tomas Jirsik and Pavel Celeda: Identifying Operating System Using Flow-Based Trac Fingerprinting. volume 8846 (09 2014). doi: 1 0 . 1 0 0 7 / 9 7 8 - 3 - 3 1 9 - 1 3 4 8 8 - 8 _7. URL https://is.muni.cz/publication/1196642/os-detection-paper-eunice2014.pdf. [Online; získáno 2020-07-28].
[89] Dominik Herrmann, Christian Banse, and Hannes Federrath: Behavior-based tracking: Exploiting characteristic patterns in DNS trac. Computers and Security, (2013). doi:10.1016/j.cose.2013.03.012. URL https://svs.informatik.uni-hamburg.de/publications/2013/2013-04-10HBF_Behavior-based-tracking-with-dns-traffic.pdf. [Online; získáno 2020-07-28].
[90] Susan Landau Whiteld Die: Privacy on the Line. The Politics of Wiretapping and Encryption. The MIT Press (1998).
[91] Kevin Poulsen: PayPal Freezes WikiLeaks Account. Wired, (2010). URL https://www.wired.com/2010/12/paypal-wikileaks/. [Online; získáno 2020-07-28].
[92] Wikipedia contributors: United States diplomatic cables leak — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=United_States_diplomatic_cables_leak. [Online; accessed 28-July-2020].
[93] Hsinchun Chen: Dark Web – Exploring and Data Mining the Dark Side of the Web. Springer (2012).
[94] Wikipedia contributors: Heartbleed — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Heartbleed. [Online; accessed 29-July-2020].
[95] Russell Brandom: Here's how to use the CIA's `weeping angel' smart TV hack. The Verge, (2017). URL https://www.theverge.com/2017/4/25/15421326/smart-tv-hacking-cia-samsung-weeping-angel-vulnerability. [Online; získáno 2020-07-29].
[96] Rani Molla: How Amazon's Ring is creating a surveillance network with video doorbells. Vox, (2020). URL https://www.vox.com/2019/9/5/20849846/amazon-ring-explainer-video-doorbell-hacks. [Online; získáno 2020-07-29].
[97] Wikipedia contributors: Intel Management Engine — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=968503203. [Online; accessed 29-July-2020].
[98] Maxim Goryachy Mark Ermolov: Disabling Intel ME 11 via undocumented mode. Positive Technologies, (2017). URL http://blog.ptsecurity.com/2017/08/disabling-intel-me.html. [Online; získáno 2020-07-29].
[99] persmule: Neutralize ME rmware on SandyBridge and IvyBridge platforms. hardenedlinux.github.io, (2016). URL https://hardenedlinux.github.io/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html. [Online; získáno 2020-07-29].
[100] Fritz Riemann: Základní formy strachu. Portál, Praha (2003).
[101] Honza Šípek: Stopy našich dní. A2, (2013)(02). URL https://www.advojka.cz/archiv/2013/2/stopy-nasich-dni.
[102] Wikipedia contributors: Acta Diurna — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Acta_Diurna&oldid=1007786168. [Online; accessed 4-March-2021].
[103] Bohuslav Blažek: Venkov, města, média. Slon, Praha (1998).
[104] Wikisource: Works of Martin Luther, with introductions and notes, Volume 1/Disputation on Indulgences — Wikisource, (2018). URL https://en.wikisource.org/w/index.php?title=Works_of_Martin_Luther,_with_introductions_and_notes,_Volume_1/Disputation_on_Indulgences&oldid=8873717. [Online; accessed 4-March-2021].
[105] Wikipedia contributors: Common Sense — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Common_Sense&oldid=999942745. [Online; accessed 4-March-2021].
[106] Upton Sinclair: The Jungle. Doubleday, Page and Co., New York (1906). URL https://archive.org/details/historyofstandar00tarbuoft.
[107] Wikipedia contributors: The Jungle — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=The_Jungle&oldid=1010306881. [Online; accessed 5-March-2021].
[108] Ida Tarbell: The History of the Standard Oil Company. McClure, Phillips and Co. (1904). URL https://archive.org/details/historyofstandar00tarbuoft.
[109] Edward L. Bernays: Crystallizing public opinion. Liveright Publishing Corporation (1923). URL https://archive.org/details/in.ernet.dli.2015.1607.
[110] Wikipedia contributors: Crystallizing Public Opinion — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Crystallizing_Public_Opinion&oldid=1006448226. [Online; accessed 3-August-2021].
[111] Edward Bernays: Propaganda. Liveright, rst edition edition (1928). URL http://gen.lib.rus.ec/book/index.php?md5=cf4223a2a2bf894b12a0cd510b30818d.
[112] Howard W. Cutler Edward L. Bernays: The Engineering of Consent. University of Oklahoma Press, 3. print. edition (1969). ISBN 9780806103280, 0806103280. URL http://gen.lib.rus.ec/book/index.php?md5=812fe97493b127d69ec1734a23b4885f.
[113] Wikipedia contributors: Ivy Lee — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Ivy_Lee&oldid=1034515925. [Online; accessed 3-August-2021].
[114] Sheldon Rampton John Stauber: Toxic Sludge is Good For You: Lies, Damn Lies and the Public Relations Industry. Common Courage Press, 1st edition (2002). ISBN 9781567510607, 9781567510614, 9781841199542, 1567510604, 1567510612, 1841199540. URL http://gen.lib.rus.ec/book/index.php?md5=375addae70540289d25d437d3db8a71d.
[115] Edward L. Bernays: The Engineering of Consent. The ANNALS of the American Academy of Political and Social Science, 250 (1947)(1):page 113–120. doi:10.1177/000271624725000116. URL https://web.archive.org/web/20120813014102/http://gromitinc.com/lego/Library/Engineering_of_consent.pdf. [Online; archivováno 2012-08-13].
[116] Tomáš Vrba: Alternativní kultura: příběh české společnosti 1945-1989, chapter Nezávislé písemnictví a svobodné myšlení, page 265–305. Nakladatelství Lidové noviny, Praha (2001).
[117] Marek Švehla: Šiklová: Naučila jsem se koukat za sebe. Respekt, (2015). URL https://www.respekt.cz/tydenik/2015/26/naucila-jsem-se-koukat-za-sebe. [Online; získáno 2021-03-04].
[118] Radek Schovánek: Zakázané knihy pro Čechy skutečně platila CIA. Blog Echo24.cz, (2015). URL https://echo24.cz/a/itP5G/zakazane-knihy-pro-cechy-skutecne-platila-cia. [Online; získáno 2021-03-04].
[119] Wikipedia contributors: FBI Index — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=FBI_Index&oldid=1008594480. [Online; accessed 6-March-2021].
[120] Wikipedia contributors: Internment of Japanese Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_Japanese_Americans&oldid=1010568243. [Online; accessed 6-March-2021].
[121] Wikipedia contributors: Internment of Italian Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_Italian_Americans&oldid=1004838349. [Online; accessed 6-March-2021].
[122] Wikipedia contributors: Internment of German Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_German_Americans&oldid=999616731. [Online; accessed 6-March-2021].
[123] Wikipedia contributors: House Un-American Activities Committee — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=House_Un-American_Activities_Committee&oldid=1010314217. [Online; accessed 6-March-2021].
[124] Wikipedia contributors: Palmer Raids — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Palmer_Raids&oldid=1010598909. [Online; accessed 6-March-2021].
[125] Wikipedia contributors: J. Edgar Hoover — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=J._Edgar_Hoover&oldid=1008003095. [Online; accessed 6-March-2021].
[126] Jennifer Latson: Walt Disney, Ronald Reagan and the Fear of Hollywood Communism. Time, (2014). URL https://time.com/3513597/huac-hollywood-hearings/. [Online; získáno 2021-03-06].
[127] Wikipedia contributors: Hollywood blacklist — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Hollywood_blacklist&oldid=1010212722. [Online; accessed 6-March-2021].
[128] Richard A. Schwartz: How the Film and Television Blacklists Worked. Film and History Annual For 1999, (1999). URL https://comptalk.fiu.edu/blacklist.htm. [Online; získáno 2021-03-06].
[129] Wikipedia contributors: Bartley Crum — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Bartley_Crum&oldid=1012985783. [Online; accessed 19-June-2021].
[130] Joyce Evans: Celluloid Mushroom Clouds: Hollywood And Atomic Bomb (Critical Studies in Communication and in the Cultural Industries). Westview Press (1999). ISBN 0813391415,9780813391410. URL http://gen.lib.rus.ec/book/index.php?md5=af40b0ce2e984aa17bc4bf312ddde821.
[131] Wikipedia contributors: Charlie Chaplin — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Charlie_Chaplin&oldid=1030740478. [Online; accessed 28-June-2021].
[132] Wikipedia contributors: John Henry Faulk — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=John_Henry_Faulk&oldid=1026430041. [Online; accessed 28-June-2021].
[133] John Henry Faulk: Fear on Trial. University of Texas Press, 1st university of texas press ed. / edition (1983;2014). ISBN 029272442X. URL http://gen.lib.rus.ec/book/index.php?md5=EC89FEB069D415082A65A184A95D18B6.
[134] Wikipedia contributors: Operation Trust — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Operation_Trust&oldid=1027017737. [Online; accessed 28-June-2021].
[135] Wikipedia contributors: COINTELPRO — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=COINTELPRO&oldid=1028441304. [Online; accessed 28-June-2021].
[136] Wikipedia contributors: John Lennon — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=John_Lennon&oldid=1030747781. [Online; accessed 28-June-2021].
[137] Wikipedia contributors: Phil Ochs — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Phil_Ochs&oldid=1030725985. [Online; accessed 28-June-2021].
[138] Antonino D'Ambrosio: The bitter tears of Johnny Cash. Salon, (2009). URL https://www.salon.com/2009/11/09/johnny_cash_2/. [Online; získáno 2021-03-06].
[139] Rob Collins: Portrait of a Populist. Oklahoma Gazette, (2004). URL https://www.woodyguthrie.org/merchandise/oklahomagazette.htm. [Online; získáno 2021-03-06].
[140] Daniel Povolný: Operativní technika v rukou StB. Úřad dokumentace a vyšetřování zločinů komunismu, Praha (2001). URL http://www.policie.cz/soubor/operativni-technika-v-rukou-stb-nejen-steny-mely-usi-pdf.aspx. [Online; získáno 2020-07-26].
[141] Alojz Lorenc: Ministerstvo strachu? Neskartované vzpomínky generála Lorence. Tatrapress, Bratislava (1992). ISBN 80-85260-19-0.
[142] Karel Hofer Jiří F. Pilous: Akce Norbert. URL https://web.archive.org/web/20041106120750/http://svedectvi.host.sk/svedek/norbert1.html. [Online; archivováno 2004-11-06].
[143] Jiří Gruntorád: Akce Norbert. Securitas Imperii, (1994)(2). URL https://web.archive.org/web/20150404233033/http://www.policie.cz/soubor/securitas-imperii-2-pdf.aspx. [Online; archivováno 2015-04-04].
[144] Wikipedia contributors: Electrical telegraph — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Electrical_telegraph&oldid=1036777360. [Online; accessed 3-August-2021].
[145] Zuzana Hronová: Morseovka nás zachránila před koncentrákem i před popravou, říká místostarosta skautů. Aktualne.cz, (2016). URL https://magazin.aktualne.cz/v-oddile-me-vedl-foglar-zazil-jsem-gestapo-i-11-let-zalare-z/r\~19c98780271511e69966002590604f2e/. [Online; získáno 2023-01-03].
[146] CBS/AP: Ex-senator and Vietnam POW who blinked "torture"in Morse code dies. CBS News, (2014). URL https://www.cbsnews.com/news/jeremiah-denton-ex-senator-and-vietnam-pow-who-blinked-torture-in-morse-code-dies-at-89/. [Online; získáno 2023-01-03].
[147] Wikipedie: Vernamova šifra — Wikipedie: Otevřená encyklopedie (2022). URL https://cs.wikipedia.org/w/index.php?title=Vernamova_%C5%A1ifra. [Online; navštíveno 4. 01. 2023].
[148] Pavel Vondruška: Cesta kryptologie do nového tisíciletí: Od zákopové války k asymetrické kryptograi. ComputerWorld, (2000)(38). URL https://friedo.szm.sk/krypto/CW/Cesta3.htm. [Online; získáno 2023-01-04].
[149] Wikipedia contributors: Telephone — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Telephone&oldid=1035889049. [Online; accessed 3-August-2021].
[150] Wikipedia contributors: Fax — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Fax&oldid=1033692357. [Online; accessed 3-August-2021].
[151] Wikipedia contributors: UUCP — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=UUCP&oldid=1026632358. [Online; accessed 3-August-2021].
[152] Stewart Brand: Founding Father. Wired, (2001). URL https://www.wired.com/2001/03/baran/. [Online; získáno 2021-08-04].
[153] Wikipedia contributors: List of nuclear close calls — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=List_of_nuclear_close_calls&oldid=1036024867. [Online; accessed 4-August-2021].
[154] Paul Baran: On Distributed Communications: I. Introduction to Distributed Communications Networks. Technical Report RM-3420-PR, RAND Corporation, Santa Monica, California (08 1964). URL https://www.rand.org/content/dam/rand/pubs/research_memoranda/2006/RM3420.pdf. [Online; získáno 2021-08-04].
[155] Wikipedia contributors: DARPA — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=DARPA&oldid=1036446321. [Online; accessed 4-August-2021].
[156] Wikipedia contributors: Project AGILE — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Project_AGILE&oldid=1034626350. [Online; accessed 4-August-2021].
[157] John Marko: An Internet Pioneer Ponders the Next Revolution. The New York Times, (1999). URL https://archive.nytimes.com/www.nytimes.com/library/tech/99/12/biztech/articles/122099outlook-bobb.html. [Online; získáno 2021-08-05].
[158] J. C. R. Licklider: Man-Computer Symbiosis. IRE Transactions on Human Factors in Electronics, HFE-1 (1960):page 4–11. URL https://groups.csail.mit.edu/medg/people/psz/Licklider.html. [Online; získáno 2021-08-05].
[159] Mitch Waldrop: DARPA and The Internet Revolution. DARPA, 50 (2008):page 1958–2008. URL https://www.darpa.mil/attachments/%282O15%29%20Global%20Nav%20-%20About%20Us%20-%20History%20-%20Resources%20-%2050th%20-%20Internet%20%28Approved%29.pdf. [Online; získáno 2021-08-05].
[160] M. Mitchell Waldrop: The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal. Viking Adult, rst edition edition (2001). ISBN 9780670899760,0670899763. URL http://gen.lib.rus.ec/book/index.php?md5=112c711da66e5d603beb8f8c55ef14f3.
[161] Matthew Lyon Katie Hafner: Where Wizards Stay Up Late: The Origins of the Internet. Touchstone, 1 edition (1998). ISBN 0-684-87216-1. URL http://gen.lib.rus.ec/book/index.php?md5=6977f247ed68781223e7a7baf470d697.
[162] Janet Abbate: Inventing the Internet. Inside technology. The MIT Press, 1st edition (1999). ISBN 0262011727, 0585077975, 9780585077970, 9780262011723. URL http://gen.lib.rus.ec/book/index.php?md5=b5898935a43a513d9d629b198321c0ce.
[163] Petr Krčmář: Návštěva v TTC: dřív se tu distribuovaly noviny, dnes internet. Root.cz, (2015). URL https://www.root.cz/clanky/navsteva-v-ttc-driv-se-tu-distribuovaly-noviny-dnes-internet/. [Online; získáno 2021-08-05].
[164] Petr Krčmář: Na návštěvě v srdci českého internetu NIX.CZ. Root.cz, (2010). URL https://www.root.cz/clanky/na-navsteve-v-srdci-ceskeho-internetu-nix-cz/. [Online; získáno 2021-08-05].
[165] David Slížek: Seznam otevřel Kokuru. Teď ho čeká stěhování 30 tun hardwaru. Lupa.cz, (2015). URL https://www.lupa.cz/clanky/seznam-otevrel-kokuru-ted-ho-ceka-stehovani-30-tun-hardwaru/. [Online; získáno 2021-08-05].
[166] Jan Sedlák: Cloud v obci za ostnatými dráty. Podívejte se, jak vypadá nové státní datacentrum v Zelenči. Lupa.cz, (2021). URL https://www.lupa.cz/clanky/cloud-v-obci-za-ostnatymi-draty-podivejte-se-jak-vypada-nove-statni-datacentrum-v-zelenci/. [Online; získáno 2021-08-05].
[167] Wikipedia contributors: Internet censorship in Russia — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Internet_censorship_in_Russia. [Online; accessed 27-November-2022].
[168] Wikipedia contributors: Great Firewall — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Great_Firewall. [Online; accessed 27-November-2022].
[169] Steven Levy: Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition. O'Reilly Media (2010). ISBN 978-1-4493-8839-3. URL http://gen.lib.rus.ec/book/index.php?md5=9bdce81c0fecafb78984df21eb2e0a0f.
[170] Wikipedia contributors: Usenet — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Usenet&oldid=1031619825. [Online; accessed 3-August-2021].
[171] Bruce Sterling: The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books (1992). ISBN 9780553080582,0-553-08058-X,0-553-56370-X. URL http://gen.lib.rus.ec/book/index.php?md5=7757d2f09ac305ee062856e4197efb4e.
[172] David Baierle: Seznam českých a slovenských BBS ke dni 01. 03. 1998 (03 1998). URL https://www.sac.sk/download/text/bbs-csk.zip. [Online; získáno 2022-07-28].
[173] David Baierle: Pár slov o historii seznamu... LANtaNet.cz. URL https://web.archive.org/web/20070704120641/http://info.lantanet.cz/bbscsk/historie.html. [Online; archivováno 2007-07-04].
[174] Jiří Peterka: Historie českého internetu: BBS, alias Bulletin Board System. Živě.cz, (2005). URL https://www.earchiv.cz/b05/b0701002.php3. [Online; získáno 2022-07-28].
[175] Patrick Zandl: Historie českého Internetu (12.). Lupa.cz, (2004). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-12/. [Online; získáno 2022-07-28].
[176] Sancho: Jak umírají BBS. lowlevel.cz, (2004). URL https://www.lowlevel.cz/log/cats/vsehochut/Jak%20um%C3%ADraj%C3%AD%20BBS.html. [Online; získáno 2022-07-28].
[177] Petr Matoušek: Legendární Inma BBS byla odpojena. Lupa.cz, (2002). URL https://www.lupa.cz/clanky/legendarni-infima-bbs-byla-odpojena/. [Online; získáno 2022-07-28].
[178] Patrick Zandl: Legenda zemřela: Inma BBS byla denitivně odpojena. Technet.cz, (2002). URL https://www.idnes.cz/technet/internet/legenda-zemrela-infima-bbs-byla-definitivne-odpojena.A020702_5077183_sw_internet. [Online; získáno 2022-07-28].
[179] Patrick Zandl: Historie českého Internetu (11.). Lupa.cz, (2004). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-11/. [Online; získáno 2022-07-28].
[180] Ivo Lukačovič: Seznam jsem založil vlastně náhodou (2007). URL https://www.video.muni.cz/public/Seznam/Lukacovic.avi. [Online; získáno 2022-07-28].
[181] Phil Lapsley: Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell. Grove Press (2013). ISBN 080212061X,9780802120618. URL http://gen.lib.rus.ec/book/index.php?md5=8490a3843acf00f9c0a1608c07e8a569.
[182] Ron Rosenbaum: Secrets of the Little Blue Box. Esquire, (1971). URL http://www.lospadres.info/thorg/lbb.html. [Online; získáno 2022-07-27].
[183] Gina Smith Steve Wozniak: iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It. W. W. Norton and Company, 1st edition (2006). ISBN 0393061434,9780393061437. URL http://gen.lib.rus.ec/book/index.php?md5=665fafb71118e227cc172ce4c3276ab8.
[184] Phone Phreaking - textles.com. URL http://textfiles.com/phreak/. [Online; získáno 2022-07-27].
[185] The Origins of Phreaking. Blacklisted! 411, 6 (2004)(2). URL https://garydrobson.com/2014/06/03/the-origins-of-phreaking/. [Online; získáno 2022-07-28].
[186] Wikipedia contributors: Phreaking — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Phreaking. [Online; accessed 9-June-2021].
[187] Supernigger: Phrack Pro-Phile. Phrack, (1992)(12). URL https://phrack.org/issues/41/3. [Online; získáno 2022-07-27].
[188] Emmanuel Goldstein: The Best of 2600: A Hacker Odyssey Collectors Editon. 1 edition (2009). ISBN 9780470458532,0470458534,9780470474693. URL http://gen.lib.rus.ec/book/index.php?md5=f525f5c4631b780ef8ec96ba091a38fc.
[189] Jack Baritch: Encyclopedia Britannica, chapter 2600: The Hacker Quarterly. URL https://www.britannica.com/topic/2600-The-Hacker-Quarterly. [Online; získáno 2022-07-27].
[190] Honza Šípek: Zásek do živýho. eldar.cz (1999, 2012). URL https://eldar.cz/kangaroo/zasek_do_zivyho/. [Online].
[191] Aston: Žert se zvrhnul v hnusný čin. Neviditelný pes, (1997). URL https://web.archive.org/web/19970617152517/http://pes.eunet.cz/97/08/0222ind.htm. [Online; archivováno 1997-06-17].
[192] Electronic Frontier Foundation: Bernstein v. US Department of Justice. URL https://www.eff.org/cases/bernstein-v-us-dept-justice. [Online; získáno 2021-06-28].
[193] Daniel J. Bernstein: Bernstein v. United States. URL https://cr.yp.to/export.html. [Online; získáno 2021-06-28].
[194] Patrick Zandl: Historie českého Internetu (9.). Lupa.cz, (2003). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-9/. [Online; získáno 2022-07-28].
[195] Cli Stoll: Kukaččí vejce. Skutečný příběh honby za špiónem v bludišti počítačových sítí. Mladá fronta (1997).
[196] John Marko Katie Hafner: Cyberpunk. Outlaws and Hackers on the Computer Frontier. Simon and Schuster (1991). ISBN 0671683225,9780671683221. URL http://gen.lib.rus.ec/book/index.php?md5=6f1d3fd0e1480eee907a90cf31ae4ff4.
[197] Anja Drephal: The KGB Hack: 30 Years Later (12 2019). URL https://media.ccc.de/v/36c3-11031-the_kgb_hack_30_years_later. Záznam přednášky. [Online, získáno 2023-01-18].
[198] Wikipedia contributors: Markus Hess — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Markus_Hess. [Online; accessed 18-January-2023].
[199] Jon A. Rochlis Mark W. Eichin: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. Technical report, Massachusetts Institute of Technology (1988). URL https://www.mit.edu/people/eichin/virus/main.html. [Online; získáno 2023-01-18].
[200] Eugene H. Spaord: The Internet Worm Program: An Analysis. Technical report, Purdue University (1988). URL https://spaf.cerias.purdue.edu/tech-reps/823.pdf. [Online; získáno 2023-01-18].
[201] Wikipedia contributors: Botnet — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Botnet. [Online; accessed 19-January-2023].
[202] David Balaban: The 8 biggest botnets of all time. CyberNews, (2022). URL https://cybernews.com/security/the-8-biggest-botnets-of-all-time/. [Online; získáno 2023-01-19].
[203] Dancho Danchev: Study nds the average price for renting a botnet. ZDnet.com, (2010). URL https://www.zdnet.com/article/study-finds-the-average-price-for-renting-a-botnet/. [Online; získáno 2023-01-19].
[204] Shaun Nichols: Oh cool, tech service prices are plummeting. And by tech services, we mean botnet rentals and stolen credit cards. The Register, (2020). URL https://www.theregister.com/2020/05/27/criminal_services_cheaper/. [Online; získáno 2023-01-19].
[205] David Polesný: CZ.NIC je na stopě botnetu vytvořeného z napadených routerů. Živě.cz, (2015). URL https://www.zive.cz/bleskovky/cznic-je-na-stope-botnetu-vytvoreneho-z-napadenych-routeru/sc-4-a-178414/default.aspx. [Online; získáno 2023-01-19].
[206] Kenney Lu Tim Yeh, Dove Chiu: Persirai: New IoT Botnet Targets IP Cameras. Technical report, Trend Micro (05 2017). URL https://www.trendmicro.com/en_us/research/17/e/persirai-new-internet-things-iot-botnet-targets-ip-cameras.html. [Online; získáno 2023-01-19].
[207] Thomas Shaddack: Schizmatrix Today. Sociální sítě, komunikační technologie a uživateli vytvářený obsah. URL https://eldar.cz/mozek/mirror/schismatrixtoday-cz.html.
[208] Milan Kundera: Nechovejte se tu jako doma, příteli. Atlantis, Brno (2006). ISBN 978-80-7108-279-8.
[209] Pavel Tomek: Mobilní historie: milníky ve vývoji mobilní komunikace. Mobility, (2005)(11). URL https://www.mobilmania.cz/clanky/mobilni-historie-milniky-ve-vyvoji-mobilni-komunikace/sc-3-a-1111658/default.aspx. [Online; získáno 2020-02-13].
[210] Everett M. Rogers: Diusion of Innovations, 5th Edition. Free Press, 5th edition (2003). ISBN 0743222091,9780743222099. URL http://gen.lib.rus.ec/book/index.php?md5=069d09abbe784ef40f5a829f0b9e41fb.
[211] Wikipedia contributors: Diusion of innovations — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=Diffusion_of_innovations. [Online; accessed 13-February-2020].
[212] Emmanuel Goldstein: The Best of 2600: A Hacker Odyssey. Wiley Publishing, Indianapolis (2008). ISBN 9780470294192,0470294191. URL http://gen.lib.rus.ec/book/index.php?md5=ae8f55427bfb1450bbd63aae75e7dc0f.
[213] Tomáš Volyňský Přemysl Souček: Robert: Umím vyrábět věčné telefonní karty. Mobil.cz, (2001). URL https://www.idnes.cz/mobil/tech-trendy/robert-umim-vyrabet-vecne-telefonni-karty.A010531_0033610_mob_prakticky. [Online; získáno 2021-06-09].
[214] [autor neuveden]: Jak se okrádaly telefonní automaty. Mobil.cz, (2002). URL https://www.idnes.cz/mobil/tech-trendy/jak-se-okradaly-telefonni-automaty.A020626_5072325_mob_tech. [Online; získáno 2021-06-09].
[215] Martin Bajtler: Žižkovská dominanta je prázdná, před demolicí se ještě část věže pronajme. iDnes.cz, (2020). URL https://www.idnes.cz/praha/zpravy/telekomunikacni-budova-zizkov-vyklizena-ceka-na-demolici.A200625_555496_praha-zpravy_rsr. [Online; získáno 2020-09-22].
[216] Wikipedia contributors: NATO phonetic alphabet — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=NATO_phonetic_alphabet&oldid=967441669. [Online; accessed 2-August-2020].
[217] Christian Huitema: A Bůh stvořil Internet. Mladá fronta, Praha (1996). ISBN 80-204-0576-3.
[218] Wikipedie: TCP/IP — Wikipedie: Otevřená encyklopedie (2021). URL https://cs.wikipedia.org/w/index.php?title=TCP/IP&oldid=20045616. [Online; získáno 9. 06. 2021].
[219] reuters: Data Outage Disrupts Northwest Flights. Los Angeles Times, (2000). URL https://www.latimes.com/archives/la-xpm-2000-mar-22-fi-11345-story.html. [Online; získáno 2023-01-17].
[220] Ondřej Malý: Petr Kadaník (Rtyně.net): Stavbu optiky brzdí jenom úřady a byrokracie. Lupa.cz, (2019). URL https://www.lupa.cz/clanky/petr-kadanik-rtyne-net-stavbu-optiky-brzdi-jenom-urady-a-byrokracie/. [Online; získáno 2023-01-17].
[221] Jakub Dvořák: Vyšel seznam nejpoužívanějších hesel. Pokud tam najdete své, změňte ho. Technet.cz, (2020). URL https://www.idnes.cz/technet/software/hesla-password-hruba-sila-123456-silne-heslo-nordpass-bezpecnost-overeni.A201119_130347_software_dvr. [Online; získáno 2021-07-03].
[222] NordPass: Top 200 most commonpasswords of the year 2020 (2020). URL https://nordpass.com/most-common-passwords-list/. [Online; získáno 2021-07-03].
[223] Edvard Rejthar: Jak se Češi s hesly popásají. Blog zaměstnanců CZ.NIC, (2016). URL https://blog.nic.cz/2016/12/15/jak-se-cesi-s-hesly-popasaji/. [Online; získáno 2021-07-03].
[224] Faraz Ahmed, M. Shaq, and Alex Liu: The Internet is for Porn: Measurement and Analysis of Online Adult Trac. In 2016 IEEE 36th International Conference on Distributed Computing Systems, page 88–97 (06 2016). doi: 1 0 . 1 1 0 9 / I C D C S . 2 0 1 6 . 81. URL https://www.cse.msu.edu/\~farazah/adult_icdcs16.pdf. [Online; získáno 2021-07-03].
[225] Simon Singh: Kniha kódů a šifer. Dokořán a Argo, Praha (2003).
[226] Karel Burda: Kryptograe okolo nás. CZ.NIC, Praha (2019). URL https://knihy.nic.cz/files/edice/Kryptografie_okolo_nas.pdf.
[227] Wikipedie: Algoritmus — Wikipedie: Otevřená encyklopedie (2020). URL https://cs.wikipedia.org/w/index.php?title=Algoritmus&oldid=18612439. [Online; navštíveno 31. 07. 2020].
[228] Vlastimil Klima: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006). URL https://eprint.iacr.org/2006/105.
[229] C. E. Shannon: Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (1949)(4):page 656–715. doi:10.1002/j.1538-7305.1949.tb00928.x. URL https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
[230] Wikipedia contributors: Hardware random number generator — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Hardware_random_number_generator&oldid=1021859597. [Online; accessed 3-July-2021].
[231] Richard Chirgwin: FreeBSD abandoning hardware randomness. The Register, (2013). URL https://www.theregister.com/2013/12/09/freebsd_abandoning_hardware_randomness/. [Online; získáno 2021-07-03].
[232] Wikipedia contributors: Regulation of Investigatory Powers Act 2000 — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Regulation_of_Investigatory_Powers_Act_2000. [Online; accessed 3-July-2021].
[233] Lenka Kadeřávková: Ruzyňský anonym jde na pět let za mříže. Novinky.cz, (2003). URL https://www.novinky.cz/krimi/clanek/ruzynsky-anonym-jde-na-pet-let-za-mrize-259884. [Online; získáno 2020-08-01].
[234] Wikipedia contributors: Tinder (app) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Tinder_(app). [Online; accessed 6-July-2020].
[235] has: Případ Klausovy SMS policie odložila. iDnes.cz, (2003). URL https://www.idnes.cz/zpravy/domaci/pripad-klausovy-sms-policie-odlozila.A030120_161321_krimi_has. [Online; získáno 2020-07-06].
[236] red ČTK: Klaus zahodil mobil fotografa MF DNES. iDnes.cz, (2000). URL https://www.idnes.cz/zpravy/domaci/klaus-zahodil-mobil-fotografa-mf-dnes.A001120_004916_volby2000_jkl. [Online; získáno 2020-07-06].
[237] Howard Rheingold: Smart Mobs: The Next Social Revolution (2003). ISBN 978-0738208619. URL http://gen.lib.rus.ec/book/index.php?md5=0a03780fa661315c90af47c8a45f910d.
[238] Veronika Šmídová Michaela Těšínská: Pozor, jede revizor, varuje aplikace. Ubohé, zlobí se dopravní podniky. Lidovky.cz, (2013). URL https://www.lidovky.cz/domov/pozor-jede-revizor-varuje-aplikace-farebandit-ubohe-zlobi-se-dopravni-podniky.A130227_222629_ln_domov_vs. [Online; získáno 2020-08-01].
[239] Wikipedia contributors: OhmyNews — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=OhmyNews. [Online; accessed 6-July-2020].
[240] Roberto Saviano: Maimed by the Mob. Time, (2008). URL http://content.time.com/time/world/article/0,8599,1721992,00.html. [Online; získáno 2020-07-03].
[241] Liam Collins: Russia Gives Lessons in Electronic Warfare. Association of the United States Army Footer menu Association of the United States Army Footer menu Association of the United States Army, (2018). URL https://www.ausa.org/articles/russia-gives-lessons-electronic-warfare. [Online; získáno 2021-02-08].
[242] Dmytro Vlasov Raphael Satter: Ukraine soldiers bombarded by `pinpoint propaganda' texts. Associated Press, (2017). URL https://apnews.com/9a564a5f64e847d1a50938035ea64b8f/Ukraine-soldiers-bombarded-by-’pinpoint-propaganda’-texts. [Online; získáno 2021-02-08].
[243] Yuri Lapaiev: Ukraine as Clandestine Testing Ground for Russian Electronic Warfare. Eurasia Daily Monitor, 15 (2018). URL https://jamestown.org/program/ukraine-as-clandestine-testing-ground-for-russian-electronic-warfare/. [Online; získáno 2021-02-08].
[244] Joseph Trevithick: Russia Breaks into US Soldiers' iPhones in Apparent Hybrid Warfare Attacks. The Drive, (2017). URL https://www.thedrive.com/the-war-zone/14867/russia-breaks-into-us-soldiers-iphones-in-apparent-hybrid-warfare-attacks. [Online; získáno 2021-02-08].
[245] Ondřej Nováček: Jak připlouvali kapříci. Poslechněte si část "legendárních"fotbalových odposlechů. ČT Sport, (2015). URL https://sport.ceskatelevize.cz/clanek/fotbal/jak-priplouvali-kaprici-poslechnete-si-cast-legendarnich-fotbalovych-odposlechu/5bdba64f0d663b6fe8aa72d8. [Online; získáno 2023-01-12].
[246] Jaroslav Kmenta: Vašík dá napapat, až Jára předá kapříky. iDnes.cz, (2004). URL https://www.idnes.cz/zpravy/domaci/vasik-da-napapat-az-jara-preda-kapriky.A041222_214255_domaci_fri. [Online; získáno 2023-01-12].
[247] Karel Felt: Největší korupční aféra v českém fotbale slaví deset let. (2014). URL https://www.sport.cz/clanek/fotbal-ceska-1-liga-nejvetsi-korupcni-afera-v-ceskem-fotbale-slavi-deset-let-571352. [Online; získáno 2023-01-12].
[248] Miloslav Novák: Ivánku, kamaráde... Od vypuknutí úplatkářské aféry uplynulo 10 let. iDnes.cz, (2014). URL https://www.idnes.cz/fotbal/prvni-liga/deset-let-od-vypuknuti-korupcni-afery-ve-fotbale-synot-zizkov.A140429_170919_fotbal_min. [Online; získáno 2023-01-12].
[249] Karel Felt: Zejda: Odposlechy nic nedokazují. Sport, (2004). URL https://www.sport.cz/clanek/fotbal-ceska-1-liga-zejda-odposlechy-nic-nedokazuji-44133. [Online; získáno 2023-01-12].
[250] Ladislav Čumba: Čtvrtníček, Lábus a lidská existence. A2, (2006). URL https://www.advojka.cz/archiv/2006/2/ctvrtnicek-labus-a-lidska-existence. [Online; získáno 2023-01-12].
[251] Jindřiška Bláhová: Ivánku, kamaráde, můžeš se dívat? Fotbalové dokumenty nejen pro fanoušky. Respekt, (2020). URL https://www.respekt.cz/agenda/ivanku-kamarade-muzes-se-divat-fotbalove-dokumenty-nejen-pro-fanousky. [Online; získáno 2023-01-12].
[252] ČTK iDnes: Odposlechy s Horníkem pobavily i soudkyni. iDnes.cz, (2006). URL https://www.idnes.cz/fotbal/prvni-liga/odposlechy-s-hornikem-pobavily-i-soudkyni.A060118_161443_fotbal_min. [Online; získáno 2023-01-12].
[253] Robert Malecký: Novinka v odposleších u kauzy Jany Nečasové? Nikoli. Nejvyšší soud rybaření kritizuje už roky. Hlídací pes, (2020). URL https://hlidacipes.org/novinka-v-odposlesich-u-kauzy-jany-necasove-nikoli-nejvyssi-soud-rybareni-kritizuje-uz-roky/. [Online; získáno 2020-07-03].
[254] Jiří Růžek: V labyrintu zpravodajských služeb. Šulc–Švarc, Praha (2014).
[255] Albert-László Barabási Marta C. González, César A. Hidalgo: Understanding individual human mobility patterns. Nature, 453 (2006):page 779–782. URL https://barabasi.com/media/pub_imports/files/250.pdf. [Online; získáno 2020-08-02].
[256] Vodafone: Law Enforcement Disclosure Report. URL https://web.archive.org/web/20140607232443/http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html. [Online; archivováno 2014-06-07]].
[257] Juliette Garside: Vodafone reveals existence of secret wires that allow state surveillance. The Guardian, (2014). URL https://www.theguardian.com/business/2014/jun/06/vodafone-reveals-secret-wires-allowing-state-surveillance. [Online; získáno 2020-08-05]].
[258] Thomas Shaddack: Kapesní práskači. Stu, (2003). URL https://eldar.cz/mozek/mirror/pocketnarcs.htm.
[259] Wikipedia contributors: Wi-Fi positioning system — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Wi-Fi_positioning_system&oldid=1014075537. [Online; accessed 27-March-2021].
[260] Feng Hong, Yongtuo Zhang, Zhao Zhang, Meiyu Wei, Yuan Feng, and Zhongwen Guo: WaP: Indoor localization and tracking using WiFi-Assisted Particle lter. page 210–217 (09 2014). doi: 1 0 . 1 1 0 9 / L C N . 2 0 1 4 . 6 9 2 5 7 7 4. URL https://www.researchgate.net/profile/Feng-Hong-10/publication/286669860_WaP_Indoor_localization_and_tracking_using_WiFi-Assisted_Particle_filter/links/56947d3108aeab58a9a2f351/WaP-Indoor-localization-and-tracking-using-WiFi-Assisted-Particle-filter.pdf. [Online; získáno 2021-03-27].
[261] India bans TikTok, WeChat and dozens more Chinese apps. BBC News, (2020). URL https://www.bbc.com/news/technology-53225720. [Online; získáno 2021-03-29].
[262] Matt Haldane: TikTok has ocially pulled out of Hong Kong, but you can still use it if you try. South China Morning Post, (2020). URL https://www.scmp.com/abacus/tech/article/3092574/tiktok-has-officially-pulled-out-hong-kong-you-can-still-use-it-if-you. [Online; získáno 2021-03-29].
[263] David McCabe Mike Isaac: TikTok Wins Reprieve From U.S. Ban. The New York Times, (2020). URL https://www.nytimes.com/2020/09/27/technology/tiktok-ban-ruling-app.html. [Online; získáno 2021-03-29].
[264] Naomi Xu Elegant: TikTok is becoming inaccessible in more markets. Tech-savvy users are nding workarounds. Fortune, (2020). URL https://fortune.com/2020/07/13/tiktok-ban-workaround/. [Online; získáno 2021-02-08].
[265] Did a TV news show cause lots of Amazon's Alexa devices to try to order doll houses? URL https://skeptics.stackexchange.com/questions/36637/did-a-tv-news-show-cause-lots-of-amazons-alexa-devices-to-try-to-order-doll-hou. [Online; získáno 2021-03-29].
[266] Shaun Nichols: TV anchor says live on-air 'Alexa, order me a dollhouse' – guess what happens next. The Register, (2017). URL https://www.theregister.com/2017/01/07/tv_anchor_says_alexa_buy_me_a_dollhouse_and_she_does/. [Online; získáno 2021-03-29].
[267] Holger Bleich: Alexa, Who Has Access to My Data? c't, (2018). URL https://www.heise.de/downloads/18/2/5/6/5/3/9/6/ct.0119.016-018_engl.pdf. [Online; získáno 2021-04-01].
[268] Zack Whittaker: Amazon says government demands for user data spiked by 800% in 2020. TechCrunch, (2021). URL https://techcrunch.com/2021/02/01/amazon-government-demands-spiked/. [Online; získáno 2021-04-01].
[269] Sidney Fusell: Meet the Star Witness: Your Smart Speaker. Wired, (2020). URL https://www.wired.com/story/star-witness-your-smart-speaker/. [Online; získáno 2021-03-29].
[270] Lily Hay Newman: How to Block the Ultrasonic Signals You Didn't Know Were Tracking You. Wired, (2016). URL https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/. [Online; získáno 2021-04-04].
[271] D. Arp, E. Quiring, C. Wressnegger, and K. Rieck: Privacy Threats through Ultrasonic Side Channels on Mobile Devices. In 2017 IEEE European Symposium on Security and Privacy (EuroS P), page 35–47 (2017). doi:10.1109/EuroSP.2017.33. URL https://web.archive.org/web/20170510110459/http://christian.wressnegger.info/content/projects/sidechannels/2017-eurosp.pdf. [Online; archivováno 2017-05-10].
[272] Wikipedia contributors: Video Encoded Invisible Light — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Video_Encoded_Invisible_Light&oldid=959878543. [Online; accessed 3-April-2021].
[273] Graham Cluley: La Liga ned €250,000 after Android app spied on football fans. Hot for Security, (2019). URL https://hotforsecurity.bitdefender.com/blog/la-liga-fined-e250000-after-android-app-spied-on-football-fans-21332.html. [Online; získáno 2021-03-31].
[274] Sam Biddle: WikiLeaks Dump Shows CIA Could Turn Smart TVs into Listening Devices. The Intercept, (2017). URL https://theintercept.com/2017/03/07/wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices/. [Online; získáno 2021-03-31].
[275] Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh: Mobile Device Identication via Sensor Fingerprinting (2014). URL https://crypto.stanford.edu/gyrophone/sensor_id.pdf. [Online; získáno 2021-04-08].
[276] Kif Leswing: A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note. Business Insider, (2018). URL https://www.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1. [Online; získáno 2021-03-31].
[277] Henk Van Ess: Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram. (2019). URL https://www.bellingcat.com/news/uk-and-europe/2019/03/19/locating-the-netherlands-most-wanted-criminal-by-scrutinising-instagram/. [Online; získáno 2021-04-04].
[278] Qin Xie: Coronavirus: Couple wrongly ned £1,700 after posting holiday snaps from last year amid lockdown. Independent, (2020). URL https://www.independent.co.uk/life-style/coronavirus-australia-lockdown-fine-holiday-photos-a9463906.html. [Online; získáno 2021-04-08].
[279] Tara C. Mahadevan: Australian Couple Fined Thousands for Posting Old Vacation Photos During Quarantine. Complex.com, (2020). URL https://www.complex.com/life/2020/04/australia-couple-fined-thousands-for-posting-old-vacation-photos-quarantine. [Online; získáno 2021-04-08].
[280] Levi Parsons: Husband and wife are ned more than $3,000 for ńon-essentialtravel after being reported to police for posting year-old holiday snaps on Facebook. Daily Mail Australia, (2020). URL https://www.dailymail.co.uk/news/article-8213591/Police-fine-Victorian-couple-non-essential-travel-shared-old-photos-Facebook.html. [Online; získáno 2021-04-08].
[281] Daniel Stach: Jiří Straus, forenzní biomechanik, kriminalista. Hyde Park Civilizace, Česká televize, (2012). URL https://www.ceskatelevize.cz/porady/10441294653-hyde-park-civilizace/212411058091006-jiri-straus. [Online; získáno 2021-04-04].
[282] Wikipedia contributors: Gait analysis — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Gait_analysis&oldid=1014320399. [Online; accessed 3-April-2021].
[283] Nanyang Technological University: Study nds that hackers could guess your phone PIN using its sensor data. Phys.org, (2017). URL https://phys.org/news/2017-12-hackers-pin-sensor.html. [Online; získáno 2021-04-04].
[284] David Berend, Bernhard Jungk, and Shivam Bhasin: There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. Cryptology ePrint Archive, Report 2017/1169 (2017). URL https://eprint.iacr.org/2017/1169. [Online; získáno 2021-04-04].
[285] Yan Michalevsky, Dan Boneh, Yan Michalevsky, Dan Boneh, and Gabi Nakibly: Gyrophone: Recognizing Speech from Gyroscope Signals. In In USENIX conference on Security Symposium, 2014, page 1053–1067. URL https://crypto.stanford.edu/gyrophone/files/gyromic.pdf. [Online; získáno 2021-04-08].
[286] Lukasz Olejnik: Stealing sensitive browser data with the W3C Ambient Light Sensor API. blog.lukaszolejnik.com, (2017). URL https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/. [Online; získáno 2021-04-08].
[287] Lukasz Olejnik: Shedding light on web privacy impact assessment: A case study of the Ambient Light Sensor API. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), page 310–313. IEEE (2020). URL https://lukaszolejnik.com/SheddingLightWebPrivacyImpactAssessmentIWPE20.pdf. [Online; získáno 2021-04-08].
[288] Petr Šourek Petra Kultová: Jak naše každodenní rozhodování ovlivňují robotičtí dramaturgové internetu čili algoritmy? Akcent, Český rozhlas Vltava, (2020). URL https://vltava.rozhlas.cz/jak-nase-kazdodenni-rozhodovani-ovlivnuji-roboticti-dramaturgove-internetu-cili-8294466. [Online; získáno 2021-04-04].
[289] Jackie Dove: How to control your iOS app permissions. Digital Trends, (2021). URL https://www.digitaltrends.com/mobile/how-to-control-ios-app-permissions/. [Online; získáno 2021-04-04].
[290] Tim Brookes: How to Check and Tighten All Your iPhone's Privacy Settings. How-To Geek, (2019). URL https://www.howtogeek.com/424624/how-to-check-and-tighten-all-your-iphones-privacy-settings/. [Online; získáno 2021-04-04].
[291] fs: Ultimátní příručka pro soukromí na Androidu. ComputerWorld, (2020). URL https://computerworld.cz/internet-a-komunikace/ultimatni-prirucka-pro-soukromi-na-androidu-56116. [Online; získáno 2021-04-04].
[292] Wikipedia contributors: Closed platform — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Closed_platform&oldid=1016452669. [Online; accessed 8-April-2021].
[293] Hope King: This startup uses battery life to determine credit scores. CNN, (2016). URL https://money.cnn.com/2016/08/24/technology/lenddo-smartphone-battery-loan/index.html. [Online; získáno 2020-07-12].
[294] Jay Stanley: Why Don't We Have More Privacy When We Use A Credit Card? ACLU blog, (2019). URL https://www.aclu.org/blog/privacy-technology/consumer-privacy/why-dont-we-have-more-privacy-when-we-use-credit-card. [Online; získáno 2021-04-04].
[295] Charles Duhigg: What Does Your Credit-Card Company Know About You? The New York Times Magazine, (2009). URL https://www.nytimes.com/2009/05/17/magazine/17credit-t.html?_r=0. [Online; získáno 2021-04-04].
[296] Rob Wile: How A Manhattan Jeweler Wound Up With Gold Bars Filled With Tungsten. Business Insider, (2012). URL https://www.businessinsider.com/tungsten-filled-gold-bars-found-in-new-york-2012-9. [Online; získáno 2021-04-04].
[297] agentury: Biggest gold fraud breaks in China: 83 tons of gold bars used as loan collateral turned out to be copper. The Free Press Journal, (2020). URL https://www.freepressjournal.in/business/biggest-gold-fraud-breaks-in-china-83-tons-of-gold-bars-used-as-loan-collateral-turned-out-to-copper. [Online; získáno 2021-04-04].
[298] Albert-László Barabási: Bursts. The Hidden Pattern Behind Everything We Do. Dutton, New York (2010).
[299] Constance L. Hays: What Wal-Mart Knows About Customers' Habits. The New York Times, (2004). URL https://www.nytimes.com/2004/11/14/business/yourmoney/what-walmart-knows-about-customers-habits.html. [Online; získáno 2014-02-20].
[300] Charles Duhigg: How Companies Learn Your Secrets. New York Times Magazine, (2012). URL http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. [Online; získáno 2014-02-20].
[301] Lukáš Erben: Děrné štítky a holokaust (2013). URL http://www.root.cz/serialy/derne-stitky-a-holocaust/. [Online; získáno 2014-02-20].
[302] Wikipedia: IBM and the Holocaust — Wikipedia, The Free Encyclopedia (2014). URL https://en.wikipedia.org/w/index.php?title=IBM_and_the_Holocaust. [Online; získáno 2014-02-20].
[303] [autor neuveden]: Co s archivy StB: Otevřít, nebo spálit? Rozhovor Listů s Radkem Schovánkem. Britské listy, (2001). URL http://www.britskelisty.cz/0104/20010424f.html. [Online; získáno 2014-02-21].
[304] Julia Angwin: How the Stasi Spied on Social Networks (02 2014). URL https://juliaangwin.com/how-the-stasi-spied-on-social-networks/. [Online; získáno 2014-02-21].
[305] Albert-László Barabási: V pavučině sítí. Paseka (2005).
[306] Philip K. Dick: Minority report. Mladá fronta, Praha (2002).
[307] Systém pro rozpoznávání RZ (SPZ) vozidel – LOOK (2014). URL http://www.hisys.cz/CS/Nase-nabidka/Vyvoj-software/LOOK.
[308] Petr Dostál: Policejní informační systémy a jejich využití v trestním řízení [online] (2008). URL https://is.muni.cz/th/uruoz/bakal_pr11.pdf. [Online; získáno 2014-02-24].
[309] Kalee Thompson: The Santa Cruz Experiment: Can a City's Crime Be Predicted and Prevented? Popular Science, (2011). URL https://www.popsci.com/science/article/2011-10/santa-cruz-experiment/. [Online; získáno 2014-02-20].
[310] Ondřej Skalník: Budoucnost policejní práce aneb dá se kriminalita předpovídat? (11 2011). URL https://www.policista.cz/clanky/reportaz/budoucnost-policejni-prace-aneb-da-se-kriminalita-predpovidat-848/. [Online; získáno 2014-02-20].
[311] Matt Stroud: The minority report: Chicago's new police computer predicts crimes, but is it racist? The Verge, (2014). URL https://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist. [Online; získáno 2014-02-20].
[312] David M. Hureau Andrew V. Papachristos, Anthony A. Braga: Social Networks and the Risk of Gunshot Injury. Journal of Urban Health: Bulletin of the New York Academy of Medicine, 89 (2012)(6):page 992–1003. doi:10.1007/s11524-012-9703-9. [Online; získáno 2014-02-20].
[313] Anthony A. Braga Andrew V. Papachristos, David M. Hureau: The Corner and the Crew: The Inuence of Geography and Social Networks on Gang Violence. American Sociological Review, 78 (2013)(3):page 417–447. doi:10.1177/0003122413486800. URL http://asr.sagepub.com/content/78/3/417. [Online; získáno 2014-02-20].
[314] Richard Pastore: Chicago Police Department Uses IT to Fight Crime, Wins Grand CIO Enterprise Value Award 2004 (02 2004). URL http://www.cio.com/article/print/32107. [Online; získáno 2014-02-20].
[315] Whet Moser: The Small Social Networks at the Heart of Chicago Violence. Chicago Magazine, (2013). URL http://www.chicagomag.com/city-life/December-2013/The-Small-Social-Networks-at-the-Heart-of-Chicago-Violence/. [Online; získáno 2014-02-20].
[316] Rosemary Regina Sobol Jeremy Gorner: Chicago police use 'heat list' as strategy to prevent violence. Chicago Tribune, (2013). URL http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list. [Online; získáno 2014-02-20].
[317] Simon Griths Caroline Clay, Stephen Dalzell: IBM i2 Defense and National Security Intelligence demo. URL http://www.youtube.com/watch?v=LlJyXRnrBNk. [Online; získáno 2014-02-20].
[318] William Binney Jesselyn Radack, Thomas Drake: Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime. (12 2012). URL https://media.ccc.de/v/29c3-5338-en-enemies_of_the_state_h264. Záznam přednášky. [Online, získáno 2014-02-21].
[319] Arthur Holland Michel: There Are Spying Eyes Everywhere—and Now They Share a Brain. Wired, (2021). URL https://www.wired.com/story/there-are-spying-eyes-everywhere-and-now-they-share-a-brain/. [Online; získáno 2021-02-07].
[320] Honza Šípek: Ví policie, kdo vás zavraždí? A2, (2014)(5). URL https://www.advojka.cz/archiv/2014/5/vi-policie-kdo-vas-zavrazdi.
[321] Marcia Hofman Rainey Reitman: In Data Portability Deathmatch, Users Lose Out. Electronic Frontier Foundation, (2010). URL https://www.eff.org/deeplinks/2010/11/data-portability-deathmatch-user-lose-out. [Online; získáno 2021-03-13].
[322] Facebook: Statistics (2011). URL https://web.archive.org/web/20110430004639/http://www.facebook.com/press/info.php?statistics. [Online; archivováno 2011-04-30].
[323] Stefan Berteau: Facebook's Misrepresentation of Beacon's Threat to Privacy: Tracking users who opt out or are not logged in. CA Security Advisor Research Blog, (2007). URL https://web.archive.org/web/20080212015544/http://community.ca.com/blogs/securityadvisor/archive/2007/11/29/facebook-s-misrepresentation-of-beacon-s-threat-to-privacy-tracking-users-who-opt-out-or-are-not-logged-in.aspx. [Online; získáno 2021-03-13].
[324] Wikipedia contributors: Facebook Beacon — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Facebook_Beacon&oldid=1009633650. [Online; accessed 13-March-2021].
[325] Lars Backstrom, Eric Sun, and Cameron Marlow: Find me if you can: Improving geographical prediction with social and spatial proximity. In WWW 2010: Proceeding of the 19th international conference on World Wide Web. ACM, ACM, New York, NY, USA (2010). URL https://web.archive.org/web/20111218181116/http://cameronmarlow.com/media/backstrom-geographical-prediction_0.pdf. [Online; archivováno 2011-12-18].
[326] Robert M. Bond, Christopher J. Fariss, Jason J. Jones, Adam D.I. Kramer, Cameron Marlow, Jaime E. Settle, and James H. Fowler: A 61-million-person experiment in social inuence and political mobilization. Nature, 489 (2012)(7415):page 295–298. doi:10.1038/nature11421. URL http://cameronmarlow.com/media/massive_turnout.pdf. [Online; archivováno 2017-09-10].
[327] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic: The Role of Social Networks in Information Diusion. In Proceedings of the ACM Conference on the World Wide Web. Lyon, France (2012). URL https://web.archive.org/web/20170910012152/http://cameronmarlow.com/media/bakshy-the_role-2012b.pdf. [Online; archivováno 2017-09-10].
[328] Andrei Petre Tim Ross, Victor Jack: Who is Călin Georgescu, the far-right TikTok star leading the Romanian election race? Politico, (11). URL https://www.politico.eu/article/calin-georgescu-romania-elections-far-right-tiktok-nato-skeptic-russia-ukraine-exports/. [Online; získáno 2025-04-02].
[329] Josef Šlerka: Rumunsko: Kampaň na TikToku kandidátovi krajní pravice (skoro) vyhrála prezidentské volby. Investigace.cz, (2024). URL https://www.investigace.cz/rumunsko-tiktok-volby-prezident.
[330] Stephen McGrath: Romania’s top court annuls rst round of presidential vote won by far-right candidate. Associated Press, (2024). URL https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b. [Online; získáno 2025-05-07].
[331] Wikipedia contributors: 2024–2025 Romanian election annulment protests — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=2024%E2%80%932025_Romanian_election_annulment_protests. [Online; accessed 7-May-2025].
[332] Matei Vrabie: KOMANDA KREMLIN: The Russian machine behind Călin Georgescu. EDMO – European Digital Media Observatory, (2024). URL https://edmo.eu/publications/komanda-kremlin-the-russian-machine-behind-calin-georgescu/. [Online; získáno 2025-04-02].
[333] Wikipedia contributors: Accusations of Russian interference in the 2024 Romanian presidential election — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Accusations_of_Russian_interference_in_the_2024_Romanian_presidential_election. [Online; accessed 7-May-2025].
[334] Wikipedia contributors: Twitter under Elon Musk — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Twitter_under_Elon_Musk. [Online; accessed 9-May-2025].
[335] Wikipedia contributors: Twitter Files — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Twitter_Files. [Online; accessed 9-May-2025].
[336] Micah Lee: Elon Musk Is Taking Aim at Journalists. I’m One of Them. The Intercept, (2022). URL https://theintercept.com/2022/12/16/elon-musk-twitter-suspended-journalists/. [Online; získáno 2025-05-10].
[337] Micah Lee: Elon Musk Is Still Silencing the Journalists He Banned From Twitter. The Intercept, (2022). URL https://theintercept.com/2022/12/20/elon-musk-twitter-banned-journalists/. [Online; získáno 2025-05-10].
[338] Wikipedia contributors: December 2022 Twitter suspensions — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=December_2022_Twitter_suspensions. [Online; accessed 9-May-2025].
[339] Timothy Graham and Mark Andrejevic: A computational analysis of potential algorithmic bias on platform X during the 2024 US election (11 2024). URL https://eprints.qut.edu.au/253211/.
[340] Julia Musto: NASA terminating USD 420 million in contracts not aligned with its new priorities. The Independent, (2025). URL https://www.independent.co.uk/space/nasa-contract-termination-trump-doge-b2721477.html. [Online; získáno 2025-05-16].
[341] Miranda Nazzaro: TikTok CEO meets with Trump at Mar-a-Lago. The Hill, (2024). URL https://thehill.com/homenews/5043098-tiktok-ceo-meets-with-trump-at-mar-a-lago/. [Online; získáno 2025-05-10].
[342] Ali Swenson: Trump, a populist president, is anked by tech billionaires at his inauguration. Associated Press, (2025). URL https://apnews.com/article/trump-inauguration-tech-billionaires-zuckerberg-musk-wealth-0896bfc3f50d941d62cebc3074267ecd. [Online; získáno 2025-05-10].
[343] Bobby Allyn Huo Jingnan, Shannon Bond: Meta says it will end fact-checking as Silicon Valley prepares for Trump. NPR, (2025). URL https://www.npr.org/2025/01/07/nx-s1-5251151/meta-fact-checking-mark-zuckerberg-trump. [Online; získáno 2025-05-16].
[344] Lee Moran: Google's Donald Trump-Inspired Move Has Critics Navigating Outrage. Hupost, (2025). URL https://www.huffpost.com/entry/criticism-of-google-donald-trump_n_6798a090e4b00b4be59ac02f. [Online; získáno 2025-05-16].
[345] Wikipedia contributors: Dunbar's number — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Dunbar%27s_number. [Online; accessed 28-March-2025].
[346] Wikipedia contributors: Meme — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Meme. [Online; accessed 28-March-2025].
[347] Richard Dawkins: Sobecký gen. Mladá fronta, Praha (1998).
[348] Stacy Cowley Aaron Smith, Laurie Segall: Facebook reaches one billion users. CNN Bussines, (2012). URL https://money.cnn.com/2012/10/04/technology/facebook-billion-users/index.html. [Online; získáno 2025-04-02].
[349] Sean Davis: We Cracked The Code On How The Facebook News Feed Algorithm Works. The Federalist, (2014). URL https://thefederalist.com/2014/02/20/we-cracked-the-code-on-how-the-facebook-news-feed-algorithm-works/. [Online; získáno 2025-04-02].
[350] Casey Johnston: Is Facebook “broken on purpose” to sell promoted posts? Ars Technica, (2012). URL https://arstechnica.com/information-technology/2012/11/is-facebook-broken-on-purpose-to-sell-promoted-posts. [Online; získáno 2025-04-01].
[351] Adam Alter: Neodolatelné. Vzestup návykových technologií a byznys se závislostí. Host – vydavatelství, Brno (2018).
[352] Kevin P. Yancey and Burr Settles: A Sleeping, Recovering Bandit Algorithm for Optimizing Recurring Notications. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD '20, page 3008–3016. Association for Computing Machinery, New York, NY, USA (2020). ISBN 9781450379984. doi:10.1145/3394486.3403351. URL https://research.duolingo.com/papers/yancey.kdd20.pdf.
[353] Ben Cohen: The Only App That Always Wins the Battle for Your Attention. The Wall Street Journal, (2024). URL https://www.wsj.com/tech/personal-tech/duolingo-streaks-notifications-app-spanish-bc87d6e4. [Online; získáno 2024-06-16].
[354] Laura Elin Pigott: Social media rewires young minds – here’s how. The Conversation, (2025). URL https://theconversation.com/social-media-rewires-young-minds-heres-how-243120. [Online; získáno 2025-03-27].
[355] Phil Reed: Thwarting the Social Media Algorithm with Behavioural Science. Psychology Today, (03). URL https://www.psychologytoday.com/us/blog/digital-world-real-world/202503/thwarting-the-social-media-algorithm-with-behavioural-science. [Online; získáno 2025-03-27].
[356] Rob Henderson: The Science Behind What Tinder Is Doing to Your Brain. Psychology Today, (2018). URL https://www.psychologytoday.com/us/blog/after-service/201805/the-science-behind-what-tinder-is-doing-to-your-brain. [Online; získáno 2025-03-27].
[357] Nisha Syed Nasser, Hamed Sharifat, Aida Abdul Rashid, et al.: Cue-Reactivity Among Young Adults With Problematic Instagram Use in Response to Instagram-Themed Risky Behavior Cues: A Pilot fMRI Study. Frontiers in Psychology, 11 (2020). ISSN 1664-1078. doi: 1 0 . 3 3 8 9 / f p s y g . 2 0 2 0 . 5 5 6 0 60. URL https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2020.556060.
[358] Wikipedia contributors: Attention economy — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Attention_economy. [Online; accessed 27-March-2025].
[359] Santiago Giraldo-Luque, Pedro Afanador, and Cristina Fernández-Rovira: The Struggle for Human Attention: Between the Abuse of Social Media and Digital Wellbeing. Healthcare, 8 (2020):page 497. doi: 1 0 . 3 3 9 0 / h e a l t h c a r e 8 0 4 0 4 97. URL https://pmc.ncbi.nlm.nih.gov/articles/PMC7712353/pdf/healthcare-08-00497.pdf.
[360] Jane Dwivedi-Yu, Yi-Chia Wang, Lijing Qin, Cristian Canton-Ferrer, and Alon Y. Halevy: Aective Signals in a Social Media Recommender System. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD ’22, page 2831–2841. ACM (August 2022). doi:10.1145/3534678.3539054. URL https://dl.acm.org/doi/pdf/10.1145/3485447.3512131.
[361] Leif Sigerson and Cecilia Cheng: Scales for measuring user engagement with social network sites: A systematic review of psychometric properties. Computers in Human Behavior, 83 (2018):page 87–105. ISSN 0747-5632. doi: 1 0 . 1 0 1 6 / j . c h b . 2 0 1 8 . 0 1 . 0 23. URL https://www.sciencedirect.com/science/article/pii/S0747563218300293.
[362] Eli Pariser: The Filter Bubble: What the Internet Is Hiding from You. Penguin Press (2011). ISBN 1594203008,9781594203008,9781101515129. URL http://gen.lib.rus.ec/book/index.php?md5=270a9aa7ef50fd61fdc22c71fdbbecce.
[363] Matteo Cinelli, Gianmarco De Francisci Morales, Alessandro Galeazzi, Walter Quattrociocchi, and Michele Starnini: The echo chamber eect on social media. Proceedings of the National Academy of Sciences, 118 (2021)(9):page e2023301118. doi:10.1073/pnas.2023301118. URL https://www.pnas.org/doi/pdf/10.1073/pnas.2023301118.
[364] Ray Jiang, Silvia Chiappa, Tor Lattimore, András György, and Pushmeet Kohli: Degenerate Feedback Loops in Recommender Systems. In Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, AIES ’19. ACM (January 2019). doi:10.1145/3306618.3314288. URL https://arxiv.org/pdf/1902.10730.
[365] Dimitris Kalimeris, Smriti Bhagat, Shankar Kalyanaraman, and Udi Weinsberg: Preference Amplication in Recommender Systems. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, KDD '21, page 805–815. Association for Computing Machinery, New York, NY, USA (2021). ISBN 9781450383325. doi:10.1145/3447548.3467298. URL https://dl.acm.org/doi/pdf/10.1145/3447548.3467298.
[366] Hunt Allcott, Luca Braghieri, Sarah Eichmeyer, and Matthew Gentzkow: The Welfare Eects of Social Media. American Economic Review, 110 (2020)(3):page 629–76. doi: 1 0 . 1 2 5 7 / a e r . 2 0 1 9 0 6 5 8. URL https://pubs.aeaweb.org/doi/pdfplus/10.1257/aer.20190658.
[367] Minzhu Zhao & Nicola Shaughnessy Kaitlyn Regehr, Caitlin Shaughnessy: Safer Scrolling: How algorithms popularise and gamify online hate and misogyny for young people (01 2024). URL {https://www.ascl.org.uk/ASCL/media/ASCL/Help%20and%20advice/Inclusion/Safer-scrolling.pdf}.
[368] Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, et al.: Reshares on social media amplify political news but do not detectably aect beliefs or opinions. Science, 381 (2023)(6656):page 404–408. doi:10.1126/science.add8424. URL https://www.science.org/doi/abs/10.1126/science.add8424.
[369] Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, Hunt Allcott, et al.: How do social media feed algorithms aect attitudes and behavior in an election campaign? Science, 381 (2023)(6656):page 398–404. doi:10.1126/science.abp9364. URL https://www.science.org/doi/abs/10.1126/science.abp9364.
[370] Sandra González-Bailón, David Lazer, Pablo Barberá, Meiqing Zhang, Hunt Allcott, et al.: Asymmetric ideological segregation in exposure to political news on Facebook. Science, 381 (2023)(6656):page 392–398. doi:10.1126/science.ade7138. URL https://www.science.org/doi/abs/10.1126/science.ade7138.
[371] Chhandak Bagchi, Filippo Menczer, Jennifer Lundquist, Monideepa Tarafdar, Anthony Paik, and Przemyslaw Grabowicz: Social media algorithms can curb misinformation, but do they? (September 2024). doi: 1 0 . 5 2 8 1 / z e n o d o. 1 3 7 8 7 9 81. URL https://zenodo.org/records/13787981/files/Social_media_algorithms_can_curb_misinformation_but_do_they_pdf.pdf.
[372] Oliver Marsh and Mark Scott: The Musk Eect: X's impact on Germany’s election. URL https://algorithmwatch.org/en/wp-content/uploads/2025/02/The-Musk-Effect_-Xs-impact-on-German-election.pdf. [Online; získáno 2025-03-28].
[373] Evropská Unie: NAŘÍZENÍ NAŘÍZENÍ EVROPSKÉHO PARLAMENTU A RADY (EU) 2022/2065 ze dne 19. října 2022 o jednotném trhu digitálních služeb a o změně směrnice 2000/31/ES (nařízení o digitálních službách) (10 2022). URL https://eur-lex.europa.eu/legal-content/CS/TXT/PDF/?uri=CELEX:32022R2065.
[374] Algorithm Watch: A guide to the Digital Services Act, the EU’s new law to rein in Big Tech. Algorithm Watch blog, (2022). URL https://algorithmwatch.org/en/dsa-explained/. [Online; získáno 2025-05-16].
[375] ČTK: EU podle NYT chystá pro Muskovu síť X pokutu přes miliardu dolarů. České noviny, (2025). URL https://www.ceskenoviny.cz/zpravy/eu-chysta-pro-muskovu-sit-x-pokutu-pres-miliardu-dolaru-pise-nyt/2656625. [Online; získáno 2025-05-16].
[376] Honza Šípek: Algoritmy sociálních sítí jsou novou taktickou zbraní. (2025). URL https://denikalarm.cz/2025/05/algoritmy-socialnich-siti-jsou-novou-taktickou-zbrani/.
[377] Jan Cibulka: Operátor z vašeho mobilu zjistí víc, než tušíte. Nic z toho vám ale neřekne. iRozhlas.cz, (2018). URL https://www.irozhlas.cz/komentare/co-o-vas-vime-je-tajne-i-pro-vas_1802151325_cib. [Online; získáno 2019-11-25].
[378] Aleš Pospíšil: Velký bratr vás sleduje 24/7, banky si klienty mohou proklepnout dle TelcoScore. E15.cz, (2018). URL https://www.e15.cz/finexpert/pujcujeme-si/velky-bratr-vas-sleduje-24-7-banky-si-klienty-mohou-proklepnout-dle-telcoscore-1341152. [Online; získáno 2019-11-25].
[379] Iuridicum Remedium: Vítězové Cen Velkého Bratra za rok 2017 (2018). URL https://bigbrotherawards.cz/vitezove-cen-velkeho-bratra-za-rok-2017/. [Online; získáno 2019-11-25].
[380] KT Global Business Group: Credit scoring solution based on telecom data (2019). URL https://corp.kt.com/eng/attach/area/A000000561/C000003656v5.pdf. [Online; získáno 2019-11-25].
[381] European Consumer Centre France: Cash payment limitations (01 2018). URL https://www.europe-consommateurs.eu/en/consumer-topics/financial-services-insurance/banking/means-of-payment/cash-payment-limitations/. [Online; získáno 2019-11-29].
[382] Glenn Greenwald: How Covert Agents Inltrate the Internet to Manipulate, Deceive, and Destroy Reputations. The Intercept, (2014). URL https://theintercept.com/2014/02/24/jtrig-manipulation/. [Online; získáno 2019-12-09].
[383] GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations. URL https://edwardsnowden.com/docs/doc/the-art-of-deception-training-for-a-new.pdf. [Online; získáno 2019-12-09].
[384] Ladislav Bittman: Mezinárodní dezinformace: černá propaganda, aktivní opatření a tajné akce. Mladá fronta, Praha (2000).
[385] Sam Cutler: How Chinese spy app allows ocials to harvest personal data. The Guardian, 07 (2019). URL https://www.theguardian.com/world/2019/jul/02/how-chinese-spy-app-allows-officials-to-harvest-personal-data. [Online; získáno 2019-12-09].
[386] Magdaléna Sikorová: Home Credit analyzuje Big Data díky nejmodernějším technologiím i s pomocí studentů. EkonTech.cz, (2018). URL https://www.ekontech.cz/clanek/home-credit-analyzuje-big-data-diky-nejmodernejsim-technologiim-pomoci-studentu. [Online; získáno 2019-11-25].
[387] Martin Petříček: Air Bank v Německu a Zonky na Západě i Východě, plánuje Šmejc. iDnes.cz, (2018). URL https://www.idnes.cz/ekonomika/podniky/jiri-smejc-home-credit-air-bank-petr-kellner.A180406_101708_ekoakcie_ane. [Online; získáno 2019-07-09].
[388] Sarah Zheng: Coming to a cinema near you – Chinese debtors `reel of shame'. South China Morning Post, (2018). URL https://www.scmp.com/news/china/society/article/2146733/coming-cinema-near-you-chinese-debtors-reel-shame. [Online; získáno 2020-01-02].
[389] Jeremy Bentham: The Panopticon Writings. Wo Es War. Verso (1995). ISBN 1859840833,9781859840832. URL http://gen.lib.rus.ec/book/index.php?md5=697E27300C8115C3D7C38E0DE47205B6.
[390] Shoshana Zubo: The Age of Surveillance Capitalism. The ght for a human future at the new frontier of power. PublicAairs Books (2018). ISBN 9781610395700. URL http://gen.lib.rus.ec/book/index.php?md5=ac68d3686a1fd9f06e8aae3a3f9599cb.
[391] Jaron Lanier: Komu patří budoucnost? Nejste zákazníkem internetových rem: jste jejich produktem. Dokořán a Argo, Praha (2016).
[392] Thomas Shaddack: Žluté zrcadlo. Živel, (2020)(40).
[393] Pavel D. Petr Š.: Coronavirus - call to action. URL https://www.meetup.com/keboolacz/events/269374140/. [Online; získáno 2021-02-26].
[394] Amnesty International: Europe: Amnesty International highlights human rights priorities for state responses to COVID-19. URL https://www.amnesty.org/en/latest/news/2020/04/europe-amnesty-international-highlights-human-rights-priorities/. [Online; získáno 2021-02-26].
[395] Matouš Lázňovský Pavel Kasík: Migranti jsou pro nás poslové špatných zpráv, říká slavný sociolog. iDnes.cz, (2015). URL https://www.idnes.cz/technet/veda/zygmunt-bauman-rozhovor-sociolog-uprchlici-migrace-technologie-modernita-stesti.A150826_151023_veda_mla. [Online; získáno 2021-02-26].
[396] Honza Šípek: 11. září na steroidech. A2, (2020)(12). URL https://www.advojka.cz/archiv/2020/12/11-zari-na-steroidech.
[397] et al. Yulia Balakhonova, Mikhail Rubin: Novy Mir. A Guide to Russian Media in the Times of Total Censorship. Proekt.media, (2022). URL https://www.proekt.media/en/guide-en/russian-media-after-war-en/. [Online; získáno 2023-01-03].
[398] Honza Šípek: Zatčen na Hedvábné stezce. A2, (2013)(22). URL https://www.advojka.cz/archiv/2013/22/zatcen-na-hedvabne-stezce.
[399] Ewen MacAskill Glenn Greenwald: NSA Prism program taps in to user data of Apple, Google and others. The Guardian, (2013). URL http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data. [Online; získáno 2013-07-03].
[400] Lucy Madison: Obama defends "narrow"surveillance programs. CBS News, (2013). URL https://www.cbsnews.com/news/obama-defends-narrow-surveillance-programs/. [Online; získáno 2013-07-03].
[401] Julian Borger et al. Ewen MacAskill: Mastering the internet: how GCHQ set out to spy on the world wide web. The Guardian, (2013). URL http://www.guardian.co.uk/uk/2013/jun/21/gchq-mastering-the-internet. [Online; získáno 2013-07-03].
[402] Glenn Greenwald: NSA collecting phone records of millions of Verizon customers daily. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order. [Online; získáno 2020-08-06]].
[403] Glenn Greenwald: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books (2014). ISBN 162779073X,9781627790734. URL http://gen.lib.rus.ec/book/index.php?md5=745187f139261b101015bc23d2c412db.
[404] Wikipedia contributors: Laura Poitras — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Laura_Poitras&oldid=964888994. [Online; accessed 8-August-2020].
[405] Edward Snowden: Nesmazatelné záznamy. Alpress, Frýdek-Místek (2020).
[406] Wikipedia contributors: Air gap (networking) — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Air_gap_(networking). [Online; accessed 3-January-2023].
[407] Wikipedia contributors: Stuxnet — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Stuxnet. [Online; accessed 3-January-2023].
[408] Wikipedia contributors: Tempest (codename) — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Tempest_(codename)&oldid=1073264081. [Online; accessed 3-January-2023].
[409] Jenny List: TEMPEST Comes To GNU Radio. Hackaday.com, (2020). URL https://hackaday.com/2020/05/14/tempest-comes-to-gnu-radio/. [Online; získáno 2023-01-03].
[410] Jaroslav Spurný: Tajemství Jaromíra Nohavici. Respekt, (2006). URL https://www.respekt.cz/tydenik/2006/22/tajemstvi-jaromira-nohavici. [Online; získáno 2020-07-12].
[411] Violet Blue: Anger mounts after Facebook's 'shadow proles' leak in bug. ZDnet.com, (2013). URL https://www.zdnet.com/article/anger-mounts-after-facebooks-shadow-profiles-leak-in-bug/. [Online; získáno 2013-07-03].
[412] Patrick Zandl: František Vrabel: Newstin šel od vojenských technologií ke zpravodajství. Lupa.cz, (2009). URL http://www.lupa.cz/clanky/frantisek-vrabel-newstin-vojenske-zpravodajstvi/. [Online; získáno 2013-07-02].
[413] (anonymní autor): Nebezpečí měřitelnosti sociálních médií. JedenBod, (2011). URL https://jedenbod.cz/1234-nebezpeci-meritelnosti-socialnich-medii.html. [Online; získáno 2013-07-03].
[414] Wikipedia contributors: IPhone — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=IPhone. [Online; accessed 12-July-2020].
[415] Wikipedia contributors: ICloud leaks of celebrity photos — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=ICloud_leaks_of_celebrity_photos&oldid=971779585. [Online; accessed 8-August-2020].
[416] Glenn Greenwald Laura Poitras: NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things' – video. The Guardian, (2013). URL https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video. [Online; získáno 2020-08-16].
[417] Wikipedia contributors: Evo Morales grounding incident — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Evo_Morales_grounding_incident&oldid=970362965. [Online; accessed 14-August-2020].
[418] Wikipedia contributors: Global surveillance disclosures (2013–present) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Global_surveillance_disclosures_(2013%E2%80%93present)&oldid=968419491. [Online; accessed 13-August-2020].
[419] Joby Warrick Ellen Nakashima: For NSA chief, terrorist threat drives passion to `collect it all'. Washington Post, (2013). URL https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html. [Online; získáno 2020-08-09].
[420] Wikipedia contributors: Caedite eos. Novit enim Dominus qui sunt eius. — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Caedite_eos._Novit_enim_Dominus_qui_sunt_eius.&oldid=971483857. [Online; accessed 8-August-2020].
[421] Wikipedia contributors: Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008&oldid=969408433. [Online; accessed 6-August-2020].
[422] Spencer Ackerman Glenn Greenwald: NSA collected US email records in bulk for more than two years under Obama. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama. [Online; získáno 2020-08-21].
[423] Prezidenta USA podepisuje automat, Obama na dálku parafoval i zákon. iDnes.cz, (2011). URL https://www.idnes.cz/zpravy/zahranicni/prezidenta-usa-podepisuje-automat-obama-na-dalku-parafoval-i-zakon.A110627_210320_zahranicni_stf. [Online; získáno 2020-08-07]].
[424] Wikipedia contributors: Upstream collection — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Upstream_collection. [Online; accessed 21-August-2020].
[425] Craig Timberg: NSA paying U.S. companies for access to communications networks. Washington Post, (2013). URL https://www.washingtonpost.com/world/national-security/nsa-paying-us-companies-for-access-to-communications-networks/2013/08/29/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html. [Online; získáno 2020-08-21].
[426] Saikat Datta: NSA used private rms to snoop on India. Hindustan Times, (2014). URL https://www.hindustantimes.com/india/nsa-used-private-firms-to-snoop-on-india/story-GOFHqXssJIOewA7FqPqJyL.html. [Online; získáno 2020-08-21].
[427] Julia Angwin et al.: NSA Spying Relies on AT and T's `Extreme Willingness to Help'. ProPublica, (2015). URL https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help. [Online; získáno 2020-08-21].
[428] Henrik Moltke Ryan Gallagher: Titanpointe The NSA's Spy Hub in New York, Hidden in Plain Sight. The Intercept, (2016). URL https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/. [Online; získáno 2020-08-21].
[429] Barton Gellman: Dark mirror : Edward Snowden and the American Surveillance State. PENGUIN PRESS (2020). ISBN 2019049573, 2019049574, 9781594206016, 9780698153394. URL http://gen.lib.rus.ec/book/index.php?md5=34A1491F4BDC9248D016AF3A095D9B47.
[430] Frank Konkel: The Details About the CIA's Deal With Amazon. The Atlantic, (2014). URL https://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-cias-deal-with-amazon/374632/. [Online; získáno 2020-08-28].
[431] Laura Poitras Barton Gellman: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post, (2013). URL www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html. [Online; získáno 2020-08-21].
[432] Glenn Greenwald: XKeyscore: NSA tool collects 'nearly everything a user does on the internet'. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. [Online; získáno 2020-08-06]].
[433] Wikipedia contributors: ECHELON — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=ECHELON&oldid=971908652. [Online; accessed 13-August-2020].
[434] Holger Stark Laura Poitras, Marcel Rosenbach: US Intelligence Watches Germany Closely. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html. [Online; získáno 2020-08-28].
[435] Fidelius Schmid et al Laura Poitras, Marcel Rosenbach: How the NSA Targets Germany and Europe. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html. [Online; získáno 2020-08-07]].
[436] Submarine Cable Map. URL https://www.submarinecablemap.com/\#/landing-point/bude-united-kingdom. [Online; získáno 2020-08-13].
[437] Juliette Garside James Ball, Luke Harding: BT and Vodafone among telecoms companies passing details to GCHQ. The Guardian, (2013). URL https://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq. [Online; získáno 2020-08-21].
[438] Nick Hopkins et al. Ewen MacAskill, Julian Borger: GCHQ taps bre-optic cables for secret access to world's communications. The Guardian, (2013). URL https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa. [Online; získáno 2020-08-13].
[439] Huib Modderkolk Steven Derix: NSA hielp Nederland met onderzoek naar herkomst 1,8 miljoen. NRC Handelsblad, (2014). URL https://www.nrc.nl/nieuws/2014/02/08/nsa-hielp-nederland-met-onderzoek-naar-herkomst-18-miljoen-a1427343. [Online; získáno 2020-08-28].
[440] Wikipedia contributors: DE-CIX — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=DE-CIX&oldid=961752108. [Online; accessed 9-August-2020].
[441] Douglas Busvine: Internet operator challenges network tapping by German spy agency. Reuters, (2018). URL https://www.reuters.com/article/us-germany-surveillance/internet-operator-challenges-network-tapping-by-german-spy-agency-idUSKCN1ML2FU. [Online; získáno 2020-08-21].
[442] (autor neuveden): German Intelligence Used NSA Spy Program. Der Spiegel, (2013). URL https://www.spiegel.de/international/germany/german-intelligence-agencies-used-nsa-spying-program-a-912173.html. [Online; získáno 2020-08-07]].
[443] Hubert Gude et al. Jacob Appelbaum, Nikolas Blome: The NSA's Secret Spy Hub in Berlin. Der Spiegel, (2013). URL https://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html. [Online; získáno 2020-08-21].
[444] Holger Stark Laura Poitras, Marcel Rosenbach: How America Spies on Europe and the UN. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/secret-nsa-documents-show-how-the-us-spies-on-europe-and-the-un-a-918625.html. [Online; získáno 2020-08-21].
[445] James Bamford: Every Move You Make. Foreign Policy, (2016). URL https://foreignpolicy.com/2016/09/07/every-move-you-make-obama-nsa-security-surveillance-spying-intelligence-snowden/. [Online; získáno 2020-08-13].
[446] Glen Greenwald James Ball, Julian Borger: Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, (2013). URL https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security. [Online; získáno 2020-08-21].
[447] Glenn Greenwald Ryan Gallagher: How the NSA Plans to Infect `Millions' of Computers with Malware. The Intercept, (2014). URL https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/. [Online; získáno 2020-08-05].
[448] redakce: Documents Reveal Top NSA Hacking Unit. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. [Online; získáno 2020-08-21].
[449] Bruce Schneier: Attacking Tor: how the NSA targets users' online anonymity. The Guardian, (2013). URL https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity. [Online; získáno 2020-08-05]].
[450] Christian Stöcker Jacob Appelbaum, Judith Horchert: Catalog Advertises NSA Toolbox. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html. [Online; získáno 2020-08-28].
[451] Marcel Rosenbach et al. Jacob Appelbaum, Laura Poitras: Documents Reveal Top NSA Hacking Unit. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. [Online; získáno 2020-08-28].
[452] Jacob Appelbaum: To Protect And Infect, Part 2 (12 2013). URL https://media.ccc.de/v/30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob. Záznam přednášky. [Online; získáno 2020-08-28].
[453] James Bamford: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say). Wired, (2013). URL https://www.wired.com/2012/03/ff-nsadatacenter/. [Online; získáno 2012-04-19].
[454] Cisco: The Zettabyte Era—Trends and Analysis (05 2013). URL https://web.archive.org/web/20120202211853/http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/VNI_Hyperconnectivity_WP.pdf. [Online; archivováno 2012-02-02].
[455] Wikipedia contributors: Internet trac — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Internet_traffic. [Online; získáno 2013-07-01].
[456] Wikipedia contributors: Zettabyte Era — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Zettabyte_Era&oldid=966493493. [Online; accessed 20-August-2020].
[457] Henry Kenyon: Work commences on 1B dollars NSA 'spy' center. Defense Systems, (2011). URL https://defensesystems.com/Articles/2011/01/07/NSA-spy-cyber-intelligence-data-center-Utah.aspx. [Online; získáno 2020-08-20].
[458] James Bamford: NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar. Wired, (2013). URL https://www.wired.com/2013/06/general-keith-alexander-cyberwar/. [Online; získáno 2013-07-02].
[459] Susan Page Peter Eisler: 3 NSA veterans speak out on whistle-blower: We told you so. USA Today, (2013). URL https://eu.usatoday.com/story/news/politics/2013/06/16/snowden-whistleblower-nsa-officials-roundtable/2428809/. [Online; získáno 2013-07-06].
[460] Julia Angwin: Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Times Books, 0 edition (2014). ISBN 0805098070,9780805098075. URL http://gen.lib.rus.ec/book/index.php?md5=e9fa22c723a5cb5260c3285a5e83fc96.
[461] xkucf: Týden bez Googlu. ABClinuxu.cz, (2012). URL https://www.abclinuxu.cz/blog/xkucf03/2012/9/tyden-bez-googlu. [Online; získáno 2013-06-30].
[462] Franta: Týden bez Googlu – vyhodnocení. Kinderporno.cz, (2012). URL http://kinderporno.cz/d/node/868. [Online; získáno 2013-06-30].
[463] Electronic Frontier Foundation: Opt out of PRISM, the NSA's global data surveillance program. URL http://prism-break.org/. [Online; získáno 2013-06-29].
[464] Wikipedia contributors: The Pirate Bay trial — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=The_Pirate_Bay_trial&oldid=966996563. [Online; accessed 8-August-2020].
[465] Martin Vyleťal: Jiří Srstka (Dilia): Uložto.cz nám jednostranně vypovědělo smlouvu. Lupa.cz, (2013). URL http://www.lupa.cz/clanky/jiri-srstka-dilia-ulozto-cz-nam-jednostranne-vypovedelo-smlouvu/. [Online; získáno 2013-06-30].
[466] Michal Krsek: Vzniká propojovací uzel v Brně. Lupa.cz, (2006). URL https://www.lupa.cz/clanky/vznika-propojovaci-uzel-v-brne/. [Online; získáno 2020-08-28].
[467] Petr Krčmář: Když vypadne Google, rozbije se internet. Root.cz, (2016). URL https://www.root.cz/clanky/kdyz-vypadne-google-rozbije-se-internet/. [Online; získáno 2020-08-28].
[468] Stefan Schuster (ed.): Mass Surveillance - Part I Risks Opportunities and Mitigation Strategies. Technical report, STOA - Science and Technology Options Assessment, Brussels (01 2015). doi: 1 0 . 2 8 6 1 / 2 6 9 6 1 9. URL https://www.europarl.europa.eu/RegData/etudes/STUD/2015/527409/EPRS_STU%282015%29527409_REV1_EN.pdf. [Online; získáno 2020-08-21].
[469] Jaroslav Krejčí: Devět let Linuxu na přerovské základní škole. LinuxExpres.cz, (2012). URL https://www.linuxexpres.cz/business/devet-let-linuxu-na-prerovske-zakladni-skole. [Online; získáno 2013-07-01].
[470] Rastislav Guľaš: Ministerstvo vnútra navrhuje zakázať používanie anonymizérov a uchovávať údaje používateľov verejných internetových fór. Inet.sk, (2009). URL https://archiv.inet.sk/8135-8135ministerstvo-vnutra-navrhuje-zakazat-pouzivanie-anonymizerov-a-uchovavat-udaje-pouzivatelov-verejnych-internetovych-for.html. [Online; získáno 2013-07-04].
[471] Jakub Mikuláš: Cypherpunkeři: Stav diskuze a prostředků digitální kryptograe. (2011). URL https://jedenbod.cz/uploads/2011/12/Crypto.pdf. [Online; získáno 2020-08-21].
[472] Honza Šípek: Co dělat pro PRISM? A2, (2013)(15). URL https://www.advojka.cz/archiv/2013/15/co-delat-po-prism.
[473] Václav Cílek (ed.) (editor): Něco se muselo stát: Nová kniha proměn, chapter Co dělat po PRISM?, page 120–127. Novela Bohemica (2014).
[474] Hacking Team: Remote Control System. Whitepaper. (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/RCS.pdf. [Online; získáno 2015-07-15].
[475] Hacking Team: RCS Remote Mobile Infection. Whitepaper (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/RMI.pdf. [Online; získáno 2015-07-15].
[476] Věstník veřejných zakázek: Posílení kapacity české policie v boji proti korupci a hospodářské kriminalitě, Systém pro monitoring internetu. URL https://www.vestnikverejnychzakazek.cz/en-US/Form/Display/75585. [Online; získáno 2015-07-15].
[477] Daniel Dočekal: Policie ČR: Šmírovací software jsme koupili, ale vše je tajné, nic neřekneme. URL http://www.lupa.cz/clanky/policie-cr-smirovaci-software-jsme-koupili-ale-vse-je-tajne-nic-nerekneme/. [Online; získáno 2015-07-13].
[478] Policie ČR David Schön: Použití sledovacího softwaru (2015). URL http://www.policie.cz/clanek/pouziti-sledovaciho-softwaru.aspx. [Online; získáno 2015-07-13].
[479] vb: Policie se ‚nabourává` lidem do počítačů. ‚Je to v pořádku`. Echo24, (2015). URL https://www.echo24.cz/a/iKwpB/policie-se-nabourava-lidem-do-pocitacu-je-to-v-poradku. [Online; získáno 2015-07-15].
[480] Petr Hájek: Odhalení WikiLeaks: Stát fízluje Protiproud a další média. Desítky miliónů za speciální viry. Americké a české tajné služby v bratrském objetí. Hrůza ze svobodných lidí. Nedáme se! Protiproud: Kontrarevoluční magazín Petra Hájka, (2015). URL https://web.archive.org/web/20171010160137/http://www.protiproud.cz/politika/1802-odhaleni-wikileaks-stat-fizluje-protiproud-a-dalsi-media-desitky-milionu-za-specialni-viry-americke-a-ceske-tajne-sluzby-v-bratrskem-objeti-hruza-ze-svobodnych-lidi-nedame-se.htm. [Online; archivováno 2017-10-10].
[481] Richard Hiller: URL Exploit. URL http://nat.brmlab.cz:9065//sql/supcz/5052/comments.txt. [Online; získáno 2015-07-15].
[482] Hacking Team: RCS Network Injector. Datasheet. (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/Network\%20Injector.pdf. [Online; získáno 2015-07-15].
[483] Alex Frazer Ian E. Muller, Amit Serper: Breaking Down the Hacking Team Attack Operation. URL https://www.cybereason.com/blog/breaking-down-the-hacking-team-attack-operation. [Online; získáno 2015-07-15].
[484] brmlab: Hacked Team - Data processing. URL https://brmlab.cz/event/hackedteam. [Online; získáno 2015-07-13].
[485] Claudio Agosti: I worked at HackingTeam, my emails were leaked to WikiLeaks and I'm ok with that. Expost, (2015). URL https://medium.com/expost-magazine/i-worked-at-hackingteam-my-emails-were-leaked-to-wikileaks-and-i-m-ok-with-that-f8f28b0584fe. [Online; získáno 2015-07-15].
[486] Zdrojový kód RCS. URL https://github.com/hackedteam/rcs-common/blob/master/lib/rcs-common/evidence/file.rb. [Online; získáno 2015-07-15].
[487] WikiLeaks - The Hackingteam Archive. URL https://wikileaks.org/hackingteam/emails/?q=academic&m0from=\%40bull.cz&mto=&title=¬itle=&date=&nofrom=¬o=&count=50&sort=0\#searchresult. [Online; získáno 2015-07-15].
[488] Tomáš Hlavsa: BULL CZ: Exploit development partner - intro. URL https://wikileaks.org/hackingteam/emails/emailid/436428. [Online; získáno 2015-07-15].
[489] experimentálního vývoje a inovací Informační systém výzkumu: Speciální softwarový balíček (2013). URL http://www.isvav.cz/resultDetail.do?rowId=RIV\%2F68407700\%3A21240\%2F13\%3A00228412!RIV15-MSM-21240___. [Online; získáno 2015-07-15].
[490] Tomáš Hlavsa: Re: R: BULL: RCS - acceptance criteria. URL https://wikileaks.org/hackingteam/emails/emailid/437403. [Online; získáno 2015-07-15].
[491] Honza Šípek: Česká policie používá malware. A2, (2015)(15). URL https://www.advojka.cz/archiv/2015/15/ceska-policie-pouziva-malware.
[492] Wikipedia contributors: Warrant canary — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=Warrant_canary. [Online; accessed 5-December-2019].
[493] Riseup.net: Canary Statement (2019). URL https://riseup.net/en/canary. [Online; získáno 2019-12-06].
[494] Ondřej Profant Honza Šípek: Velký webový test. A2, (2013). URL https://www.advojka.cz/archiv/2013/7/velky-webovy-test.
[495] Honza Šípek: Nenápadné černé skříňky. A2, (2017)(2). URL https://www.advojka.cz/archiv/2017/2/nenapadne-cerne-skrinky.
[496] Honza Šípek: Pod svícnem tma. Vláda schválila zákon o Vojenském zpravodajství. A2larm.cz, (2020). URL https://a2larm.cz/2020/03/pod-svicnem-tma-do-vlady-jde-zakon-o-vojenskem-zpravodajstvi/.
[497] Honza Šípek: Vojenské zpravodajství: dohled nad internetem má umetenou cestu. A2larm.cz, (2020). URL https://denikalarm.cz/2020/11/vojenske-zpravodajstvi-dohled-nad-internetem-ma-umetenou-cestu/. [Online; získáno 2021-02-26].
[498] Thomas Shaddack: Mění se jen „jak“. A2, (2020)(2). URL https://www.advojka.cz/archiv/2020/2/meni-se-jen-jak.
[499] Jan Hrach: Od umělého neuronu k ChatGPT. URL https://www.youtube.com/watch?v=o9TwtMywEuI.
[500] Yuval Abraham: ‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza. +972 Magazine, (2004). URL https://www.972mag.com/lavender-ai-israeli-army-gaza/. [Online; získáno 2025-08-23].
[501] Sébastien Roblin: Military AI vanquishes human ghter pilot in F-16 simulation. How scared should we be? NBC News, (2020). URL https://www.nbcnews.com/think/opinion/military-ai-vanquishes-human-fighter-pilot-f-16-simulation-how-ncna1238773. [Online; získáno 2025-08-23].
[502] Thomas Shaddack: Doba dronová. A2, (2024). URL https://www.advojka.cz/archiv/2024/9/doba-dronova. [Online; získáno 2025-08-23].
[503] Thomas Shaddack: Bitcoin: Bez vlád i bankéřů. A2, (2013)(03). URL https://www.advojka.cz/archiv/2013/3/bitcoin-bez-vlad-i-bez-bankeru.
[504] Chris Anderson: Makers. The New Industrial Revolution. Crown Business, New York (2012). ISBN 978-0-307-72095-5.
[505] Ondřej Ne: Zakázané technologie: Zkázonosný molding. Ikarie, (1995)(2).
[506] Wikipedia: Serapeum — Wikipedia (2016). URL https://en.wikipedia.org/w/index.php?title=Serapeum. [Online; získáno 2016-11-05].
[507] Wikipedia: Library of Alexandria — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Library_of_Alexandria. [Online; accessed 19-November-2016].
[508] Tim Berners-Lee; Robert Cailliau; Jean-François Gro; Bernd Pollermann: World-Wide Web: The Information Universe. Internet Research, 2 (1992)(1):page 52–58. URL https://www.w3.org/History/1992/ENRAP/Article_9202.pdf. [Online, získáno 2016-11-18].
[509] Wikipedia: Academic publishing — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Academic_publishing. [Online; accessed 17-November-2016].
[510] Vincent Larivière, Stefanie Haustein, and Philippe Mongeon: The Oligopoly of Academic Publishers in the Digital Era. PLOS ONE, 10 (2015)(6):page 1–15. doi:10.1371/journal.pone.0127502. URL http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0127502.
[511] Michael S. Rosenwald: This student put 50 million stolen research articles online. And they're free. Washington Post, (2016). URL https://www.washingtonpost.com/local/this-student-put-50-million-stolen-research-articles-online-and-theyre-free/2016/03/30/7714ffb4-eaf7-11e5-b0fd-073d5930a7b7_story.html?tid=sm_fb. [Online; získáno 2016-11-18].
[512] Pavel Jungwirth: Volný přístup. Respekt, 17 (2013). URL https://www.respekt.cz/tydenik/2013/17/volny-pristup.
[513] Wikipedia: Aaron Swartz — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Aaron_Swartz. [Online; accessed 15-November-2016].
[514] Noam Scheiber: The Inside Story of Why Aaron Swartz Broke Into MIT and JSTOR. New Republic, (2013). URL https://newrepublic.com/article/112418/aaron-swartz-suicide-why-he-broke-jstor-and-mit. [Online; získáno 2016-11-18].
[515] Justin Peters: The Idealist: Aaron Swartz and the Rise of Free Culture on the Internet. Scribner (2016). ISBN 1476767726,9781476767727. URL http://gen.lib.rus.ec/book/index.php?md5=b93692189b33dc5c95a9c4a0b66c4dd9.
[516] Christopher Kelty: The disappearing virtual library. Al Jazeera, (2012). URL http://www.aljazeera.com/indepth/opinion/2012/02/2012227143813304790.html. Retr. 2016-11-17.
[517] John Bohannon: The frustrated science student behind Sci-Hub. Science, (2016). doi: 1 0 . 1 1 2 6 / s c i e n c e . a a f 5 6 75. URL http://www.sciencemag.org/news/2016/04/alexandra-elbakyan-founded-sci-hub-thwart-journal-paywalls. [Online; získáno 2016-11-18].
[518] Ernesto: Sci-Hub Tears Down Academia's “Illegal” Copyright Paywalls. TorrentFreak, (2015). URL https://torrentfreak.com/sci-hub-tears-down-academias-illegal-copyright-paywalls-150627/. [Online; získáno 2016-11-18].
[519] John Bohannon: Who's downloading pirated papers? Everyone. Science, (2016). doi: 1 0 . 1 1 2 6 / s c i e n c e . a a f 5 6 64. URL http://www.sciencemag.org/news/2016/04/whos-downloading-pirated-papers-everyone.
[520] Honza Šípek: Stínoví knihovníci. A2, (2016)(24). URL https://www.advojka.cz/archiv/2016/24/stinovi-knihovnici.
[521] Honza Šípek: Eskalátor 2. A2, (2013)(16). URL https://www.advojka.cz/archiv/2013/16/eskalator-2.
[522] Daniela Drtinová: Vachek: Politici jsou strašidla. Zastupitelská demokracie je u konce, bude to maso. DVTV, (2019). URL https://video.aktualne.cz/dvtv/vachek-politici-jsou-strasidla-zastupitelska-demokracie-je-u/r~13cb97cee7a111e9a24cac1f6b220ee8/. [Online; získáno 2026-02-13].
[523] Eric S. Raymond: The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary. O'Reilly (feb 1999). ISBN 0-596-00108-8. URL https://monoskop.org/images/e/e0/Raymond_Eric_S_The_Cathedral_and_the_Bazaar_rev_ed.pdf.
[524] Richard M. Stallman Sam Williams: Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution. Free Software Foundation (2010). ISBN 0983159211. URL https://static.fsf.org/nosvn/faif-2.0.pdf.
[525] Wikipedia contributors: PeerTube — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=PeerTube. [Online; accessed 21-August-2025].
[526] Jiří Eischmann: Vhsky.cz: česká alternativa k YouTube postavená na PeerTube. Sešívaný blog, (2024). URL https://blog.eischmann.cz/2024/12/20/vhsky-cz-ceska-alternativa-k-youtube-postavena-na-peertube/. [Online; získáno 2025-04-11].
[527] Wikipedia contributors: Fediverse — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Fediverse\#Adoption. [Online; accessed 11-April-2025].
[528] Radka Typltová: Facebook cenzuruje už i předpověď počasí: Lajky podvodně skrze povodně? Info.cz, (2024). URL https://www.info.cz/zpravodajstvi-a-komentare/facebook-cenzuruje-uz-i-predpoved-pocasi-lajky-podvodne-skrze-povodne. [Online; získáno 2026-01-20].
[529] Brianna Sacks: Facebook is blocking emergency warnings as wildres roar through West. Washington Post, (2024). URL https://web.archive.org/web/20241004230059/https://www.washingtonpost.com/climate-environment/2024/09/10/facebook-is-blocking-emergency-warnings-wildfires-roar-through-west/. [Online; archivováno 2024-10-04].
[530] Jakub Jetmar: Žádný podcast neexistuje. deliberace.lol, (2024). URL https://jetmarjakub.substack.com/p/zadny-podcast-neexistuje. [Online; získáno 2025-08-19].
[531] Wikipedia contributors: Eugen Rochko — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Eugen_Rochko. [Online; accessed 6-January-2026].
[532] Sean Tilley: One Mammoth of a Job: An Interview with Eugen Rochko of Mastodon. Medium, (2018). URL https://medium.com/we-distribute/one-mammoth-of-a-job-an-interview-with-eugen-rochko-of-mastodon-23b159d6796a. [Online; získáno 2026-01-06].
[533] Wikipedia contributors: Network eect — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Network_effect. [Online; accessed 10-January-2026].
[534] Lukáš Falteisek: Biologické čtvrtky: Ohrožené jizvy v krajině - přednáška (10 2013). URL https://www.youtube.com/watch?v=uhhV2LG1S5k.
[535] Wikipedia contributors: Acquisition of Twitter by Elon Musk — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Acquisition_of_Twitter_by_Elon_Musk. [Online; accessed 20-January-2026].
[536] Savio Sciancalepore and Roberto Di Pietro: SOS - Securing Open Skies. CoRR, abs/1809.09026 (2018). URL http://arxiv.org/abs/1809.09026.
[537] Laura Gozzi: Nato strengthens defences after Russian drones shot down over Poland. BBC, (2025). URL https://www.bbc.com/news/articles/c0lkz2n34z6o. [Online; získáno 2026-01-19].
[538] Jan Hrach: Passive emitter tracking. Master's thesis, Univerzita Karlova, Matematicko-fyzikální fakulta (2019). URL https://jenda.hrach.eu/dipl.pdf.
[539] Wikipedia contributors: Jack Sweeney — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Jack_Sweeney. [Online; accessed 20-January-2026].
[540] Ramishah Maruf: Elon Musk oered a Florida teen $5,000 to delete a Twitter account tracking his jet. It wasn’t enough. CNN, (2022). URL https://edition.cnn.com/2022/01/30/business/elon-musk-private-jet-twitter/index.html. [Online; získáno 2026-01-20].
[541] Wikipedia contributors: ElonJet — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=ElonJet. [Online; accessed 20-January-2026].
[542] Kevin Collier Jason Abbruzzese and Phil Helsel: Twitter suspends journalists who have been covering Elon Musk and the company. NBC News, (2022). URL https://www.nbcnews.com/tech/social-media/twitter-suspends-journalists-covering-elon-musk-company-rcna62032. [Online; získáno 2026-01-20].
[543] Taylor Hatmaker: Elon Musk just brought an infamous neo-Nazi back to Twitter. TechCrunch, (2022). URL https://techcrunch.com/2022/12/02/elon-musk-nazis-kanye-twitter-andrew-anglin/. [Online; získáno 2026-02-06].
[544] Tom Gerken: Twitter blocks users from sharing Mastodon links. BBC, (2022). URL https://www.bbc.com/news/technology-63999452. [Online; získáno 2026-02-06].
[545] Josh Nicholas: Elon Musk drove more than a million people to Mastodon – but many aren’t sticking around. The Guardian, (2023). URL https://www.theguardian.com/news/datablog/2023/jan/08/elon-musk-drove-more-than-a-million-people-to-mastodon-but-many-arent-sticking-around. [Online; získáno 2026-02-06].
[546] Matt Haldane: Chinese social media users are ocking to the decentralised Mastodon platform to nd community amid crackdown at home. South China Morning Post, (2022). URL https://www.scmp.com/tech/tech-trends/article/3192843/chinese-social-media-users-are-flocking-decentralised-mastodon. [Online; získáno 2026-02-13].
[547] Ian Johnston: Twitter rival Mastodon rejects funding to preserve nonprot status. Ars Technica, (2022). URL https://arstechnica.com/tech-policy/2022/12/twitter-rival-mastodon-rejects-funding-to-preserve-nonprofit-status/. [Online; získáno 2026-02-06].
[548] Zoë Schier: How Mastodon made friends with Meta. Platformer, (2024). URL https://www.platformer.news/mastodon-interview-eugen-rochko-meta-bluesky-threads-federation/. [Online; získáno 2026-02-06].
[549] Eugen Rochko: Mastodon forms new U.S. non-prot. Mastodon Blog, (2024). URL https://blog.joinmastodon.org/2024/04/mastodon-forms-new-u.s.-non-profit/. [Online; získáno 2026-02-06].
[550] Will Oremus Naomi Nix: Move fast and beat Musk: The inside story of how Meta built Threads. The Washington Post, (2023). URL https://web.archive.org/web/20230801085537/https://www.washingtonpost.com/technology/2023/07/29/meta-threads-mark-zuckerberg-rival-twitter-musk/. [Online; archivováno 2023-07-29].
[551] David Morley: Monthly stats for Mastodon (02 2026). URL https://mastodon.fediverse.observer/stats&months=48. [Online; získáno 2026-02-06].
[552] Wikipedia contributors: ActivityPub — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=ActivityPub. [Online; accessed 5-February-2026].
[553] Wikipedia contributors: Christine Lemmer-Webber — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Christine_Lemmer-Webber. [Online; accessed 5-February-2026].
[554] Tolulope Oshinowo, Sohyeon Hwang, Amy X. Zhang, and Andrés Monroy-Hernández: Seeing the Politics of Decentralized Social Media Protocols (2025). URL https://arxiv.org/pdf/2505.22962v1.
[555] Wikipedia contributors: Persecution of transgender people under the second Trump administration — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Persecution_of_transgender_people_under_the_second_Trump_administration. [Online; accessed 5-February-2026].
[556] Iridicum Remedium: Byly rozdány Ceny Velkého bratra za rok 2022. Big Brother Awards, (2023). URL https://bigbrotherawards.cz/2023/03/23/byly-rozdany-ceny-velkeho-bratra-za-rok-2022/. [Online; získáno 2025-08-24].
[557] David F. Carr: Since election day in the US, usage of the Bluesky app is more than 500% higher in the US and over 350% higher in the UK. Similarweb Blog, (2024). URL https://www.similarweb.com/blog/insights/social-media-news/bluesky-sustained-growth/. [Online; získáno 2026-02-06].
[558] Will Oremus: Bluesky, a trendy rival to X, nally opens to the public. The Washington Post, (2024). URL https://web.archive.org/web/20240206145533/https://www.washingtonpost.com/technology/2024/02/06/bluesky-launch-public-jay-graber/. [Online; archivováno 2026-02-06].
[559] Mike Masnick: Protocols, Not Platforms: A Technological Approach to Free Speech. Knight First Amendment Institute, Columbia University, (2019). URL https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech. [Online; získáno 2026-02-06].
[560] Christine Lemmer-Webber: How decentralized is Bluesky really? Dusty Cloud, (2024). URL https://dustycloud.org/blog/how-decentralized-is-bluesky/. [Online; získáno 2026-02-06].
[561] Christine Lemmer-Webber: Re: Re: Bluesky and Decentralization. Dusty Cloud, (2024). URL https://dustycloud.org/blog/re-re-bluesky-decentralization/. [Online; získáno 2026-02-06].
[562] Wikipedia contributors: 2025 Turkish protests — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=2025_Turkish_protests. [Online; accessed 6-February-2026].
[563] SCF: Bluesky restricts access to 72 accounts in Turkey amid government pressure. Stockholm Center for Freedom, (2025). URL https://stockholmcf.org/bluesky-restricts-access-to-72-accounts-in-turkey-amid-government-pressure/. [Online; získáno 2026-02-06].
[564] Human Rights Watch Article19, Freedom of Expression Association: Joint Open Letter to Social Media Companies on Censorship in Türkiye. Human Rights Watch, (2025). URL https://www.hrw.org/news/2025/05/08/joint-open-letter-social-media-companies-censorship-turkiye. [Online; získáno 2026-02-06].
[565] Ana Valens: Mastodon is crumbling—and many blame its creator. Daily Dot, (2021). URL https://www.dailydot.com/news/mastodon-fediverse-eugen-rochko/. [Online; získáno 2025-08-23].
[566] Eugen Rochko: Trump's new social media platform found using Mastodon code. Mastodon Blog, (2021). URL https://blog.joinmastodon.org/2021/10/trumps-new-social-media-platform-found-using-mastodon-code/. [Online; získáno 2025-08-24].
[567] Adi Robertson: Trump’s social network has 30 days to stop breaking the rules of its software license. The Verge, (2021). URL https://www.theverge.com/2021/10/22/22740354/trump-truth-social-network-spac-mastodon-license-software-freedom-conservancy. [Online; získáno 2025-08-24].
[568] Wikipedia contributors: Pittsburgh synagogue shooting — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Pittsburgh_synagogue_shooting. [Online; accessed 13-February-2026].
[569] Wikipedia contributors: Gab (social network) — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/wiki/Gab_(social_network)\#2018_Pittsburgh_synagogue_shooting. [Online; accessed 13-February-2026].
[570] Ben Makuch: The Nazi-Free Alternative to Twitter Is Now Home to the Biggest Far Right Social Network. Vice, (07). URL https://www.vice.com/en/article/the-nazi-free-alternative-to-twitter-is-now-home-to-the-biggest-far-right-social-network/. [Online; získáno 2026-02-13].
[571] Eugen Rochko: Gab switches to Mastodon's code. Mastodon Blog, (2019). URL https://blog.joinmastodon.org/2019/07/statement-on-gabs-fork-of-mastodon/. [Online; získáno 2026-02-13].
[572] Chris Stokel-Walker: Why The Computer Company Raspberry Pi’s New Hire Caused A Social Media Firestorm. BuzzFeed News, (2022). URL https://www.buzzfeednews.com/article/chrisstokelwalker/raspberry-pi-hired-ex-cop-mastodon-controversy. [Online; získáno 2026-02-13].
[573] John Prott: The Raspberry Pi social media incident shows some Mastodon admins need more moderation chops. Medium, (2022). URL https://medium.com/@jmproffitt/the-raspberry-pi-social-media-incident-shows-some-mastodon-admins-need-more-moderation-chops-afa3b00be90b. [Online; získáno 2026-02-13].
[574] Em: The revolution will not happen on the platforms owned by the oppressors. (08 2025). URL https://infosec.exchange/@Em0nM4stodon/115073758078532419. [Online; získáno 2026-02-13].
[575] Jakub Cabal: Přehled českých Mastodon serverů 2025. JakubCabal.cz, (2025). URL https://jakubcabal.cz/blog/20251225-prehled-ceskych-mastodon-serveru/. [Online; získáno 2026-02-13].
[576] Morten: Reverzní inženýři všech zemí, spojte se! Živel, 16. URL http://zivel.net/archiv?magazin=18&kapitola=310.
[577] Shaddack: Červ nikdy nespí. Živel, 22. URL http://www.zivel.net/archiv?magazin=24&kapitola=392.
[578] Shaddack: Od paprskometu k laseru. Živel, 19. URL http://zivel.net/archiv?magazin=21&kapitola=337.
[579] Shaddack: Rizika a realita RFID čipů. Živel, 27. URL https://eldar.cz/mozek/mirror/nightmares-RFID3b.html.
Všechny zdroje naleznete na https://eldar.cz/kniha/zdroje.
Narozen v plce sedmdesátých let. Od dětství vysedává před počítači všech typ. Vystudoval chemickou prmyslovku v Křemencově ulici v Praze. Už své první články publikoval s velkým ohlasem na BBS. Dnes je autorem několika tisíc hesel ve Wikipedii od exotických materiál přes korozi ve vesmíru až po rzné strategie PR. Posbíral gigantickou sbírku elektronických knih, pracuje z domova, většinu svého bdělého času tráví před počítačem a na Internetu. Odpočívá s pájkou, 3D tiskárnou, soustruhem a chemickými baňkami. Programátor a hacker (v pvodním slova smyslu, coby člověk, který se detailně vrtá v technologiích), nyní pracuje jako expert v mezinárodní rmě Maurice Ward & Co. Věnuje se technologiím, Internetu a jejich politickým souvislostem. [576] Publikoval série popularizačních článk v časopisech Stu, Živel [577, 578, 579, 258] a A2, z nichž některé se staly základem této knihy. Na dovolenou jel do Černobylu.
shaddack@shaddack.mauriceward.com
Narozen začátkem let osmdesátých. Na gymnáziu z okouzelní hackerskou komunitou napsal sérii článk a elektronicky vydanou knihu Zásek do živýho. Pět let pracoval v nezávislém studentském Rádiu Akropolis, kde uváděl pořady Dračí studna a Jitro kouzelník, v nichž byl Shaddack několikrát hostem. Přes dvacet let se stará o internetový server Eldar.cz, na němž provozuje i své vlastní weby od soukromých zápisk až po zpravodajský agregátor. Nedostudoval žurnalistiku na FSV UK, ani humanitní studia na FHS UK, zato absolvoval katedru dokumentární tvorby na FAMU, kde později učil. Natočil jedenáct dokumentárních lm, z nichž většinu dal na web k volnému stažení. Dlouhodobě píše o hackerské komunitě, do knihy Kmeny napsal kapitolu Hackeři kouzlo modré obrazovky, kapitolami přispěl do knih Václava Cílka (ed.) Něco se muselo stát a Nové ostrovy. Tato kniha začala vznikat před lety jako vedlejší produkt jeho rozhovor se Shaddackem pro dokument Souboj s mozkem. ( http://eldar.cz/mozek) Natáčí lmy, píše, málo programuje a hodně fotí.
klokanek@eldar.cz
[1] Sun-C': Umění války. B4U Publishing, Brno (2014). Přeložil Radim Pekárek.
[2] Drew Olano: With The Help Of Citizen Cartographers, Google Launches More Detailed Map Of North Korea. TechCrunch, (2013). URL https://techcrunch.com/2013/01/28/with-the-help-of-citizen-cartographers-google-launches-more-detailed-map-of-north-korea/. [Online; získáno 2020-07-19].
[3] Reuters Handbook of Journalism. Reuters (2009). URL https://www.trust.org/contentAsset/raw-data/652966ab-c90b-4252-b4a5-db8ed1d438ce/file.
[4] Valerij Gerasimov: Cennosť nauki v predvidenii. Vojenno-promyšlennyj kurjer, (2013)(8). URL https://vpk-news.ru/sites/default/files/pdf/VPK_08_476.pdf. [Online; získáno 2020-07-22].
[5] Valery Gerasimov: The Value of Science Is in the Foresight. Military Review, (2016). URL https://web.archive.org/web/20180129103740/https://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20160228_art008.pdf. [Online; archivováno 2018-01-29].
[6] Mark Galeotti: I'm Sorry for Creating the `Gerasimov Doctrine'. Foreign Policy, (2018). URL https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/. [Online; získáno 2020-07-22].
[7] Wikipedia contributors: Annexation of Crimea by the Russian Federation — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Annexation_of_Crimea_by_the_Russian_Federation&oldid=1029254203. [Online; accessed 19-June-2021].
[8] Wikipedia contributors: War in Donbas — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=War_in_Donbas&oldid=1028739552. [Online; accessed 19-June-2021].
[9] matjak (editor): Výroční zpráva Bezpečnostní informační služby za rok 2017. Bezpečnostní informační služba (2018). URL https://www.bis.cz/public/site/bis.cz/content/vyrocni-zpravy/2017-vz-cz.pdf. [Online; získáno 2020-07-22].
[10] matjak (editor): Výroční zpráva Bezpečnostní informační služby za rok 2018. Bezpečnostní informační služba (2019). URL https://www.bis.cz/public/site/bis.cz/content/vyrocni-zpravy/2018-vz-cz.pdf.pdf. [Online; získáno 2020-07-22].
[11] Ondřej Golis: Novinářka popsala, jak funguje ruská továrna na fake news. ‚Smrtí mi pak vyhrožovali i přátelé,` vzpomíná. iRozhlas.cz, (2019). URL https://www.irozhlas.cz/zpravy-domov/jessikka-aro-fake-news-dezinformace-rozhvor-trollove-finsko_1905050600_ogo. [Online; získáno 2020-07-22].
[12] Alexandra Alvarová: Průmysl lži. Propaganda, konspirace a dezinformační válka. Triton, Praha (2017). URL http://www.tridistri.cz/inshop/files/978-80-7553-492-7/prumysl\%20lzi_web_kap5.pdf. Ukázka [Online; získáno 2020-07-22].
[13] Redakce: Nový ruský způsob vedení války a Lotyšsko. Vojenské rozhledy, 23 (2014)(3):page 112–122. URL https://www.vojenskerozhledy.cz/kategorie/novy-rusky-zpusob-vedeni-valky-a-lotyssko. [Online; získáno 2020-07-22].
[14] Andrew Radin Raphael S. Cohen: Russia's Hostile Measures in Europe. RAND Corporation, Santa Monica (2019). URL https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1793/RAND_RR1793.pdf. [Online; získáno 2020-07-22].
[15] Wikipedia contributors: DeCSS — Wikipedia, The Free Encyclopedia (2018). URL https://en.wikipedia.org/w/index.php?title=DeCSS. [Online; accessed 24-July-2018].
[16] DVD Copy Control Ass'n, Inc. v. Bunner – Wikipedia (2017). URL https://en.wikipedia.org/w/index.php?title=DVD_Copy_Control_Ass\%27n,_Inc._v._Bunner. [Online; získáno 2018-07-24].
[17] Electronic Frontier Foundation: No Evidence DeCSS Was a Trade Secret When Bunner Published. EFFector, (2004)(279). URL https://www.eff.org/effector/17/7.
[18] Frances Kerry David Alexander, Phillip Stewart: Leaked U.S. video shows deaths of Reuters' Iraqi staers. Reuters.com, (2010). URL https://www.reuters.com/article/us-iraq-usa-journalists/leaked-u-s-video-shows-deaths-of-reuters-iraqi-staffers-idUSTRE6344FW20100406. [Online; získáno 2020-07-22].
[19] Wikipedia contributors: Chelsea Manning — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Chelsea_Manning. [Online; accessed 22-July-2020].
[20] Listina základních práv a svobod (1992, 1993, 1998). URL https://www.psp.cz/docs/laws/listina.html.
[21] Aleksandr Isajevič Solženicyn: Souostroví Gulag: 1918-1956: pokus o umělecké pojednání. OK Centrum, Praha, 2., upr. vyd., v ok centru a v Čsfr 1. edition (1990).
[22] Jaroslav Kmenta: Lidé z BIS tlačili na podnikatele, za prolomené šifrování nabízeli peníze. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/lide-z-bis-tlacili-na-podnikatele-za-prolomene-sifrovani-nabizeli-penize.A100912_210704_domaci_mad. [Online; získáno 2019-11-29].
[23] Jaroslav Kmenta: Podnikatel dokázal přelstít důstojníky BIS, kteří ho tlačili ke spolupráci. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/podnikatel-dokazal-prelstit-dustojniky-bis-kteri-ho-tlacili-ke-spolupraci.A100913_205808_domaci_abr. [Online; získáno 2019-11-29].
[24] jš: Poslanci zpovídali šéfa BIS, kvůli údajnému vydírání soukromé rmy. iDnes.cz, (2010). URL https://www.idnes.cz/zpravy/domaci/poslanci-zpovidali-sefa-bis-kvuli-udajnemu-vydirani-soukrome-firmy.A101012_151146_domaci_js. [Online; získáno 2019-11-29].
[25] Wikipedia contributors: F. W. Winterbotham — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=F._W._Winterbotham\#The_Ultra_Secret. [Online; accessed 2-January-2020].
[26] Jon Kelly Ian Shoesmith: The Coventry Blitz 'conspiracy'. BBC News, (2010). URL https://www.bbc.com/news/uk-11486219. [Online; získáno 2020-01-02].
[27] Sabina Slonková: Poslední výstřel Hynka Vlase. Neovlivní, (2018). URL https://neovlivni.cz/posledni-vystrel-hynka-vlase/.
[28] James Bamford: The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization. Penguin Books (1983). ISBN 0140067485,9780140067484. URL http://gen.lib.rus.ec/book/index.php?md5=9e171adb7b345c0ef60875ad21a9a330.
[29] Greg Miller: `The intelligence coup of the century'. Washington Post, (2020). URL https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/. [Online; získáno 2020-02-12].
[30] Wayne Madsen: Crypto AG: The NSA's Trojan Whore? Covert Action Quarterly, (1998)(63). URL https://web.archive.org/web/20190815054754/http://covertactionmagazine.com/wp-content/uploads/2018/08/CAQ63.pdf. [Online; archivováno 2019-08-15].
[31] Gordon Corera: How NSA and GCHQ spied on the Cold War world. BBC News, (2015). URL https://www.bbc.com/news/uk-33676028. [Online; získáno 2020-01-03].
[32] Peter Avritch: Why the NSA Called Me After Midnight and Requested My Source Code. Medium.com, (2018). URL https://medium.com/datadriveninvestor/why-the-nsa-called-me-after-midnight-and-requested-my-source-code-f7076c59ab3d. [Online; získáno 2019-12-01].
[33] Niekt0: Alzheimer. URL http://hysteria.cz/niekt0/alzheimer/.
[34] Ivor Kollár: Forensic RAM dump image analyser. Master's thesis, Charles University in Prague Charles University in Prague, Faculty of Mathematics and Physics, Prague (2010). URL http://hysteria.cz/niekt0/foriana/doc/foriana.pdf. [Online; získáno 2020-01-02].
[35] Esther Addley: How the rape claims against Julian Assange sparked an information war. The Guardian, (2010). URL https://www.theguardian.com/media/2010/dec/07/rape-claims-julian-assange. [Online; získáno 2020-01-03].
[36] Julian Assange: Sweden drops rape investigation. BBC News, (2019). URL https://www.bbc.com/news/world-europe-50473792. [Online; získáno 2020-01-03].
[37] AbcLinuxu poradna: Dotaz: Jak nejlépe smazat HDD, kdyby přišla policie? URL https://www.abclinuxu.cz/poradna/linux/show/274489. [Online; získáno 2020-01-02].
[38] ČTK/Šulová Kateřina: výtvarník David Brudňák vystupující pod jménem Roman Týc alias David Hons, policista, policisté, zatčení, zatčený. ČTK, (2010). URL http://multimedia.ctk.cz/foto/index?documentID=3480933. [Online; získáno 2020-07-23].
[39] ČTK Lidovky.cz: Policie zatkla člena Ztohoven a zabavila upravené občanky. Lidovky.cz, (2010). URL https://www.lidovky.cz/kultura/policie-zatkla-clena-ztohoven-a-zabavila-upravene-obcanky.A100618_155416_ln_kultura_mev. [Online; získáno 2020-07-23].
[40] (autor neuveden): Ztohoven nespáchali změnou občanek trestný čin. ČT24.cz, (2011). URL https://ct24.ceskatelevize.cz/domaci/1202163-ztohoven-nespachali-zmenou-obcanek-trestny-cin. [Online; získáno 2020-07-23].
[41] ČTK: Ztohoven změnou fotograí na občankách nespáchali ani přestupek. Týden.cz, (2010). URL https://www.tyden.cz/rubriky/domaci/ztohoven-zmenou-fotografii-na-obcankach-nespachali-ani-prestupek_238140.html. [Online; získáno 2020-07-23].
[42] (autor neuveden): Ztohoven varuje prostřednictvím Občana K. ČT24.cz, (2010). URL https://ct24.ceskatelevize.cz/kultura/1335055-ztohoven-varuje-prostrednictvim-obcana-k. [Online; získáno 2020-07-23].
[43] Eyedea Recognition s. r. o.: Eyedentity - Forenzní software pro rozpoznávání obličejů. URL https://eyedea.ai/cs/eyedentity/. [Online; získáno 2020-07-23].
[44] Luděk Rašek: Elektronické cestovní doklady, Elektronické cestovní doklady, část 1. Crypto-World, 8 (2006)(10). URL http://crypto-world.info/casop8/crypto10_06.pdf. [Online; získáno 2020-07-23].
[45] Luděk Rašek: Elektronické cestovní doklady, Elektronické cestovní doklady, část 1. Crypto-World, 8 (2006)(11). URL http://crypto-world.info/casop8/crypto11_06.pdf. [Online; získáno 2020-07-23].
[46] Filip Pospíšil: Sejmou nám otisky, sejmou. A2, (2006)(09). URL https://www.advojka.cz/archiv/2006/9/sejmou-nam-otisky-sejmou. [Online; získáno 2020-07-23].
[47] Jiří Straus a kol.: Kriminalistická taktika. Vydavatelství a nakladatelství Aleš Čeněk, Plzeň, 2. rozšířené vydání edition (2008).
[48] Helen Pidd: Facebook facial recognition software violates privacy laws, says Germany. The Guardian, (2011). URL https://www.theguardian.com/technology/2011/aug/03/facebook-facial-recognition-privacy-germany. [Online; získáno 2020-07-25].
[49] Megan Geuss: Facebook Facial Recognition: Its Quiet Rise and Dangerous Future. PCWorld, (2011). URL https://www.pcworld.com/article/226228/Facerec.html. [Online; získáno 2020-07-25].
[50] Kurt Opsahl: Facebook's Eroding Privacy Policy: A Timeline. Electronic Frontier Foundation (4 2010). URL https://www.eff.org/deeplinks/2010/04/facebook-timeline.
[51] Kay Yin: Apple's updated Photos app recognizes thousands of objects, scenes and facial expressions. Medium.com, (2016). URL https://web.archive.org/web/20170302022740/https://medium.com/@iosight/behind-apples-advanced-computer-vision-for-photos-app-41f3f617d31c. [Online; archivováno 2017-03-02].
[52] Michal Trško a TASR: Hackerom heslo nbusr123 nedokázali. SME, (2011). URL https://domov.sme.sk/c/6180039/hackerom-heslo-nbusr123-nedokazali.html. [Online; získáno 2020-07-26].
[53] Anonymous: Narodny Bezpecnostny Urad pwn3d. Blackhole.sk, (2006). URL https://web.archive.org/web/20120909081925/http://blackhole.sk/node/442. [Online; archivováno 2012-09-09].
[54] Tomáš Bella: Hackeri o NBÚ: heslo nbusr123 stále funguje. SME, (2006). URL https://www.sme.sk/c/2818624/hackeri-o-nbu-heslo-nbusr123-stale-funguje.html. [Online; získáno 2020-07-26].
[55] André Årnes (Editor): Digital Forensics. Wiley, 1 edition (2018). ISBN 1119262380, 978-1119262381. URL http://gen.lib.rus.ec/book/index.php?md5=2b01f3ef9d6a0503f58b10ce844e77c8.
[56] Paul Reedy: Interpol review of digital evidence 2016 - 2019. Forensic Science International: Synergy, (2020). ISSN 2589-871X. doi:10.1016/j.fsisyn.2020.01.015. URL http://www.sciencedirect.com/science/article/pii/S2589871X20300152.
[57] Tomáš Vymětal: Computer forensics. Diplomová práce, Masarykova univerzita, Fakulta informatiky, Brno (2010). URL https://is.muni.cz/th/hkz29/Diplomka.pdf. [Online; získáno 2020-07-25].
[58] Marco Nicoletti and Massimo Bernaschi: Forensic Analysis of Microsoft Skype for Business. Digital Investigation, 29 (2019). doi: 1 0 . 1 0 1 6 / j . d i i n . 2 0 1 9 . 0 3 . 0 1 2. URL https://www.researchgate.net/publication/332224615_Forensic_Analysis_of_Microsoft_Skype_for_Business. [Online; získáno 2020-07-23].
[59] Tina Parciak Reiner Creutzburg, Knut Bellin: Client-side Skype Forensics - An Overview. In Proceedings of SPIE - The International Society for Optical Engineering (03 2013). doi: 1 0 . 1 1 1 7 / 1 2 . 2 0 0 7 7 5 7. URL https://www.researchgate.net/publication/258332808_Client-side_Skype_Forensics_-_An_Overview. [Online; získáno 2020-07-23].
[60] anonym: dastych reloaded. Prielom, (2003)(20). URL http://prielom.webatlas.cz/20/index.html\#6. [Online; získáno 2018-07-31].
[61] Saša Uhlová: Příběh policejních agentů: byl plánovaný útok na vlak jejich nápad? Deník Referendum, (2016). URL http://denikreferendum.cz/clanek/22971-pribeh-policejnich-agentu-byl-planovany-utok-na-vlak-jejich-napad. [Online; získáno 2018-04-11].
[62] Hana Čápová: Hrozí nám levicoví teroristé? Respekt, (2016). URL https://www.respekt.cz/tydenik/2016/23/hrozi-nam-levicovi-teroriste. [Online; získáno 2020-07-29].
[63] Saša Uhlová: Vrchní soud osvobodil údajné teroristy. Rozsudek je pravomocný. A2larm.cz, (2018). URL https://denikalarm.cz/2018/03/vrchni-soud-osvobodil-udajne-teroristy-rozsudek-je-pravomocny/. [Online; získáno 2018-04-09].
[64] Ivana Svobodová: Jak se zrodil terorista. Respekt, (2019). URL https://www.respekt.cz/tydenik/2019/4/jak-se-zrodil-senior-terorista. [Online; získáno 2020-07-29].
[65] ČTK mag: Vrchní soud potvrdil důchodci Baldovi čtyři roky za teroristický útok na vlaky. iRozhlas.cz, (2019). URL https://www.irozhlas.cz/zpravy-domov/balda-senior-teroristicky-utok-utok-na-vlak_1904161114_nkr. [Online; získáno 2020-07-29].
[66] Pavel Šplíchal Jan Bělíček: Rozhovor se zadrženým v akci Fénix. A2larm.cz, (2015). URL https://denikalarm.cz/2015/05/ozbrojene-prepadeni-unos-a-loupez-v-rezii-policie-cr/. [Online; získáno 2020-07-27].
[67] Marek Pokorný Lukáš Prchal, Lukáš Werner: Za ušatého traktoristu aktivista platit nebude. Soud zrušil pokutu za zesměšňování Šlachty a policie. Aktualne.cz, (2016). URL https://zpravy.aktualne.cz/domaci/za-usateho-traktoristu-aktivista-platit-nebude-soud-pokutu-z/r\~d39d736e710d11e683920025900fea04/. [Online; získáno 2020-07-27].
[68] Jan Janka: Znalecký posudek z oboru Kybernetika odvětví Výpočetní technika (09 2015). URL https://zeleny.noblogs.org/files/2018/03/Janka-3316-10.pdf. [Online; získáno 2020-07-26].
[69] Tomáš Zelený: Rozšifrovali moji rádcové? A2larm.cz, (2018). URL https://denikalarm.cz/2018/04/rozsifrovali-moji-radcove/. [Online; získáno 2020-07-26].
[70] Wikipedia contributors: Key disclosure law — Wikipedia, The Free Encyclopedia (2018). URL https://en.wikipedia.org/w/index.php?title=Key_disclosure_law. [Online; accessed 31-July-2018].
[71] Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier: Defeating Encrypted and Deniable File Systems: TrueCrypt V5.1a and the Case of the Tattling OS and Applications. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, page 7:1–7:7. USENIX Association, Berkeley, CA, USA (2008). URL https://www.schneier.com/paper-truecrypt-dfs.pdf.
[72] Egon Bondy: Mníšek. Vylitý nočník. Nakladatelství Akropolis, Praha (2009).
[73] Alice Růžičková: Alternativní kultura: příběh české společnosti 1945-1989, chapter Originální Videojournal. Pokus o "samizdatovou televizi"., page 475–485. NLN, Nakladatelství Lidové noviny (2001).
[74] Wikipedia contributors: Criticism of Huawei — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Criticism_of_Huawei. [Online; accessed 27-July-2020].
[75] David Kravetz: An Intentional Mistake: The Anatomy of Google's Wi-Fi Sning Debacle. Wired, (2012). URL https://www.wired.com/2012/05/google-wifi-fcc-investigation/. [Online; získáno 2020-07-27].
[76] Jemima Kiss: Google admits collecting Wi-Fi data through Street View cars. The Guardian, (2010). URL https://www.theguardian.com/technology/2010/may/15/google-admits-storing-private-data. [Online; získáno 2020-07-27].
[77] Charlie Osborne: Shodan: The IoT search engine for watching sleeping kids and bedroom antics. ZDnet.com, (2016). URL https://www.zdnet.com/article/shodan-the-iot-search-engine-which-shows-us-sleeping-kids-and-how-we-throw-away-our-privacy/. [Online; získáno 2020-07-27].
[78] Jan Vobořil: Data Retention Reloaded: zkušenosti, problémy a aplikační praxe: sborník z workshopu konaného dne 23.4.2013 v Brně, chapter Využívání provozních a lokalizačních údajů ze strany oprávněných orgánů, zejména Policie ČR. Masarykova univerzita, Brno (2013). URL http://science.law.muni.cz/knihy/monografie/Data_retention_reloaded.pdf. [Online; získáno 2020-07-27].
[79] Ivana Svobodová: Shniješ zaživa. Hrozby chodily učiteli z fakultního počítače, napětí ve škole roste. Respekt, (2010). URL https://www.respekt.cz/tydenik/2010/47/shnijes-zaziva. [Online; získáno 2020-07-27].
[80] Zuzana Taušová: Profesor lozoe, který vyhrožoval kolegovi smrtí, dostal výpověď. iDnes.cz, (2013). URL https://www.idnes.cz/brno/zpravy/profesor-horyna-dostal-vypoved.A130425_1921250_brno-zpravy_mav. [Online; získáno 2020-07-27].
[81] Ondrej Mikle: Onion routing v p2p sieťach - TOR. Root.cz, (2006). URL https://www.root.cz/clanky/onion-routing-v-p2p-sietach-tor/. [Online; získáno 2020-07-28].
[82] No Secrets. Julian Assange's mission for total transparency. New Yorker, (2010). URL https://www.newyorker.com/magazine/2010/06/07/no-secrets. [Online; získáno 2020-07-27].
[83] Kim Zetter: WikiLeaks Was Launched With Documents Intercepted From Tor. Wired, (2010). URL https://www.wired.com/2010/06/wikileaks-documents/. [Online; získáno 2020-07-27].
[84] Wikipedia contributors: Tor (anonymity network) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Tor_(anonymity_network). [Online; accessed 28-July-2020].
[85] Patrick Gray: The hack of the year. The Sydney Morning Herald, (2007). URL https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html. [Online; získáno 2020-07-28].
[86] Pierluigi Paganini: 7 VPN services left data of millions of users exposed online. SecurityAairs.co, (2020). URL https://securityaffairs.co/wordpress/106181/data-breach/7-vpn-data-leak.html. [Online; získáno 2020-07-28].
[87] Eli Pariser: The Filter Bubble: What the Internet Is Hiding from You. Penguin Press HC, The, 1st ptg edition (2011). ISBN 1594203008,9781594203008,9781101515129. URL http://gen.lib.rus.ec/book/index.php?md5=270a9aa7ef50fd61fdc22c71fdbbecce.
[88] Tomas Jirsik and Pavel Celeda: Identifying Operating System Using Flow-Based Trac Fingerprinting. volume 8846 (09 2014). doi:10.1007/978-3-319-13488-8_7. URL https://is.muni.cz/publication/1196642/os-detection-paper-eunice2014.pdf. [Online; získáno 2020-07-28].
[89] Dominik Herrmann, Christian Banse, and Hannes Federrath: Behavior-based tracking: Exploiting characteristic patterns in DNS trac. Computers and Security, (2013). doi:10.1016/j.cose.2013.03.012. URL https://svs.informatik.uni-hamburg.de/publications/2013/2013-04-10HBF_Behavior-based-tracking-with-dns-traffic.pdf. [Online; získáno 2020-07-28].
[90] Susan Landau Whiteld Die: Privacy on the Line. The Politics of Wiretapping and Encryption. The MIT Press (1998).
[91] Kevin Poulsen: PayPal Freezes WikiLeaks Account. Wired, (2010). URL https://www.wired.com/2010/12/paypal-wikileaks/. [Online; získáno 2020-07-28].
[92] Wikipedia contributors: United States diplomatic cables leak — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=United_States_diplomatic_cables_leak. [Online; accessed 28-July-2020].
[93] Hsinchun Chen: Dark Web – Exploring and Data Mining the Dark Side of the Web. Springer (2012).
[94] Wikipedia contributors: Heartbleed — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Heartbleed. [Online; accessed 29-July-2020].
[95] Russell Brandom: Here's how to use the CIA's `weeping angel' smart TV hack. The Verge, (2017). URL https://www.theverge.com/2017/4/25/15421326/smart-tv-hacking-cia-samsung-weeping-angel-vulnerability. [Online; získáno 2020-07-29].
[96] Rani Molla: How Amazon's Ring is creating a surveillance network with video doorbells. Vox, (2020). URL https://www.vox.com/2019/9/5/20849846/amazon-ring-explainer-video-doorbell-hacks. [Online; získáno 2020-07-29].
[97] Wikipedia contributors: Intel Management Engine — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=968503203. [Online; accessed 29-July-2020].
[98] Maxim Goryachy Mark Ermolov: Disabling Intel ME 11 via undocumented mode. Positive Technologies, (2017). URL http://blog.ptsecurity.com/2017/08/disabling-intel-me.html. [Online; získáno 2020-07-29].
[99] persmule: Neutralize ME rmware on SandyBridge and IvyBridge platforms. hardenedlinux.github.io, (2016). URL https://hardenedlinux.github.io/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html. [Online; získáno 2020-07-29].
[100] Fritz Riemann: Základní formy strachu. Portál, Praha (2003).
[101] Honza Šípek: Stopy našich dní. A2, (2013)(02). URL https://www.advojka.cz/archiv/2013/2/stopy-nasich-dni.
[102] Wikipedia contributors: Acta Diurna — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Acta_Diurna&oldid=1007786168. [Online; accessed 4-March-2021].
[103] Bohuslav Blažek: Venkov, města, média. Slon, Praha (1998).
[104] Wikisource: Works of Martin Luther, with introductions and notes, Volume 1/Disputation on Indulgences — Wikisource, (2018). URL https://en.wikisource.org/w/index.php?title=Works_of_Martin_Luther,_with_introductions_and_notes,_Volume_1/Disputation_on_Indulgences&oldid=8873717. [Online; accessed 4-March-2021].
[105] Wikipedia contributors: Common Sense — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Common_Sense&oldid=999942745. [Online; accessed 4-March-2021].
[106] Upton Sinclair: The Jungle. Doubleday, Page and Co., New York (1906). URL https://archive.org/details/historyofstandar00tarbuoft.
[107] Wikipedia contributors: The Jungle — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=The_Jungle&oldid=1010306881. [Online; accessed 5-March-2021].
[108] Ida Tarbell: The History of the Standard Oil Company. McClure, Phillips and Co. (1904). URL https://archive.org/details/historyofstandar00tarbuoft.
[109] Edward L. Bernays: Crystallizing public opinion. Liveright Publishing Corporation (1923). URL https://archive.org/details/in.ernet.dli.2015.1607.
[110] Wikipedia contributors: Crystallizing Public Opinion — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Crystallizing_Public_Opinion&oldid=1006448226. [Online; accessed 3-August-2021].
[111] Edward Bernays: Propaganda. Liveright, rst edition edition (1928). URL http://gen.lib.rus.ec/book/index.php?md5=cf4223a2a2bf894b12a0cd510b30818d.
[112] Howard W. Cutler Edward L. Bernays: The Engineering of Consent. University of Oklahoma Press, 3. print. edition (1969). ISBN 9780806103280, 0806103280. URL http://gen.lib.rus.ec/book/index.php?md5=812fe97493b127d69ec1734a23b4885f.
[113] Wikipedia contributors: Ivy Lee — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Ivy_Lee&oldid=1034515925. [Online; accessed 3-August-2021].
[114] Sheldon Rampton John Stauber: Toxic Sludge is Good For You: Lies, Damn Lies and the Public Relations Industry. Common Courage Press, 1st edition (2002). ISBN 9781567510607, 9781567510614, 9781841199542, 1567510604, 1567510612, 1841199540. URL http://gen.lib.rus.ec/book/index.php?md5=375addae70540289d25d437d3db8a71d.
[115] Edward L. Bernays: The Engineering of Consent. The ANNALS of the American Academy of Political and Social Science, 250 (1947)(1):page 113–120. doi: 1 0 . 1 1 7 7 / 0 0 0 2 7 1 6 2 4 7 2 5 0 0 0 1 1 6. URL https://web.archive.org/web/20120813014102/http://gromitinc.com/lego/Library/Engineering_of_consent.pdf. [Online; archivováno 2012-08-13].
[116] Tomáš Vrba: Alternativní kultura: příběh české společnosti 1945-1989, chapter Nezávislé písemnictví a svobodné myšlení, page 265–305. Nakladatelství Lidové noviny, Praha (2001).
[117] Marek Švehla: Šiklová: Naučila jsem se koukat za sebe. Respekt, (2015). URL https://www.respekt.cz/tydenik/2015/26/naucila-jsem-se-koukat-za-sebe. [Online; získáno 2021-03-04].
[118] Radek Schovánek: Zakázané knihy pro Čechy skutečně platila CIA. Blog Echo24.cz, (2015). URL https://echo24.cz/a/itP5G/zakazane-knihy-pro-cechy-skutecne-platila-cia. [Online; získáno 2021-03-04].
[119] Wikipedia contributors: FBI Index — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=FBI_Index&oldid=1008594480. [Online; accessed 6-March-2021].
[120] Wikipedia contributors: Internment of Japanese Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_Japanese_Americans&oldid=1010568243. [Online; accessed 6-March-2021].
[121] Wikipedia contributors: Internment of Italian Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_Italian_Americans&oldid=1004838349. [Online; accessed 6-March-2021].
[122] Wikipedia contributors: Internment of German Americans — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Internment_of_German_Americans&oldid=999616731. [Online; accessed 6-March-2021].
[123] Wikipedia contributors: House Un-American Activities Committee — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=House_Un-American_Activities_Committee&oldid=1010314217. [Online; accessed 6-March-2021].
[124] Wikipedia contributors: Palmer Raids — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Palmer_Raids&oldid=1010598909. [Online; accessed 6-March-2021].
[125] Wikipedia contributors: J. Edgar Hoover — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=J._Edgar_Hoover&oldid=1008003095. [Online; accessed 6-March-2021].
[126] Jennifer Latson: Walt Disney, Ronald Reagan and the Fear of Hollywood Communism. Time, (2014). URL https://time.com/3513597/huac-hollywood-hearings/. [Online; získáno 2021-03-06].
[127] Wikipedia contributors: Hollywood blacklist — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Hollywood_blacklist&oldid=1010212722. [Online; accessed 6-March-2021].
[128] Richard A. Schwartz: How the Film and Television Blacklists Worked. Film and History Annual For 1999, (1999). URL https://comptalk.fiu.edu/blacklist.htm. [Online; získáno 2021-03-06].
[129] Wikipedia contributors: Bartley Crum — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Bartley_Crum&oldid=1012985783. [Online; accessed 19-June-2021].
[130] Joyce Evans: Celluloid Mushroom Clouds: Hollywood And Atomic Bomb (Critical Studies in Communication and in the Cultural Industries). Westview Press (1999). ISBN 0813391415,9780813391410. URL http://gen.lib.rus.ec/book/index.php?md5=af40b0ce2e984aa17bc4bf312ddde821.
[131] Wikipedia contributors: Charlie Chaplin — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Charlie_Chaplin&oldid=1030740478. [Online; accessed 28-June-2021].
[132] Wikipedia contributors: John Henry Faulk — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=John_Henry_Faulk&oldid=1026430041. [Online; accessed 28-June-2021].
[133] John Henry Faulk: Fear on Trial. University of Texas Press, 1st university of texas press ed. / edition (1983;2014). ISBN 029272442X. URL http://gen.lib.rus.ec/book/index.php?md5=EC89FEB069D415082A65A184A95D18B6.
[134] Wikipedia contributors: Operation Trust — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Operation_Trust&oldid=1027017737. [Online; accessed 28-June-2021].
[135] Wikipedia contributors: COINTELPRO — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=COINTELPRO&oldid=1028441304. [Online; accessed 28-June-2021].
[136] Wikipedia contributors: John Lennon — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=John_Lennon&oldid=1030747781. [Online; accessed 28-June-2021].
[137] Wikipedia contributors: Phil Ochs — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Phil_Ochs&oldid=1030725985. [Online; accessed 28-June-2021].
[138] Antonino D'Ambrosio: The bitter tears of Johnny Cash. Salon, (2009). URL https://www.salon.com/2009/11/09/johnny_cash_2/. [Online; získáno 2021-03-06].
[139] Rob Collins: Portrait of a Populist. Oklahoma Gazette, (2004). URL https://www.woodyguthrie.org/merchandise/oklahomagazette.htm. [Online; získáno 2021-03-06].
[140] Daniel Povolný: Operativní technika v rukou StB. Úřad dokumentace a vyšetřování zločinů komunismu, Praha (2001). URL http://www.policie.cz/soubor/operativni-technika-v-rukou-stb-nejen-steny-mely-usi-pdf.aspx. [Online; získáno 2020-07-26].
[141] Alojz Lorenc: Ministerstvo strachu? Neskartované vzpomínky generála Lorence. Tatrapress, Bratislava (1992). ISBN 80-85260-19-0.
[142] Karel Hofer Jiří F. Pilous: Akce Norbert. URL https://web.archive.org/web/20041106120750/http://svedectvi.host.sk/svedek/norbert1.html. [Online; archivováno 2004-11-06].
[143] Jiří Gruntorád: Akce Norbert. Securitas Imperii, (1994)(2). URL https://web.archive.org/web/20150404233033/http://www.policie.cz/soubor/securitas-imperii-2-pdf.aspx. [Online; archivováno 2015-04-04].
[144] Wikipedia contributors: Electrical telegraph — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Electrical_telegraph&oldid=1036777360. [Online; accessed 3-August-2021].
[145] Zuzana Hronová: Morseovka nás zachránila před koncentrákem i před popravou, říká místostarosta skautů. Aktualne.cz, (2016). URL https://magazin.aktualne.cz/v-oddile-me-vedl-foglar-zazil-jsem-gestapo-i-11-let-zalare-z/r\~19c98780271511e69966002590604f2e/. [Online; získáno 2023-01-03].
[146] CBS/AP: Ex-senator and Vietnam POW who blinked "torture"in Morse code dies. CBS News, (2014). URL https://www.cbsnews.com/news/jeremiah-denton-ex-senator-and-vietnam-pow-who-blinked-torture-in-morse-code-dies-at-89/. [Online; získáno 2023-01-03].
[147] Wikipedie: Vernamova šifra — Wikipedie: Otevřená encyklopedie (2022). URL https://cs.wikipedia.org/w/index.php?title=Vernamova_%C5%A1ifra. [Online; navštíveno 4. 01. 2023].
[148] Pavel Vondruška: Cesta kryptologie do nového tisíciletí: Od zákopové války k asymetrické kryptograi. ComputerWorld, (2000)(38). URL https://friedo.szm.sk/krypto/CW/Cesta3.htm. [Online; získáno 2023-01-04].
[149] Wikipedia contributors: Telephone — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Telephone&oldid=1035889049. [Online; accessed 3-August-2021].
[150] Wikipedia contributors: Fax — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Fax&oldid=1033692357. [Online; accessed 3-August-2021].
[151] Wikipedia contributors: UUCP — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=UUCP&oldid=1026632358. [Online; accessed 3-August-2021].
[152] Stewart Brand: Founding Father. Wired, (2001). URL https://www.wired.com/2001/03/baran/. [Online; získáno 2021-08-04].
[153] Wikipedia contributors: List of nuclear close calls — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=List_of_nuclear_close_calls&oldid=1036024867. [Online; accessed 4-August-2021].
[154] Paul Baran: On Distributed Communications: I. Introduction to Distributed Communications Networks. Technical Report RM-3420-PR, RAND Corporation, Santa Monica, California (08 1964). URL https://www.rand.org/content/dam/rand/pubs/research_memoranda/2006/RM3420.pdf. [Online; získáno 2021-08-04].
[155] Wikipedia contributors: DARPA — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=DARPA&oldid=1036446321. [Online; accessed 4-August-2021].
[156] Wikipedia contributors: Project AGILE — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Project_AGILE&oldid=1034626350. [Online; accessed 4-August-2021].
[157] John Marko: An Internet Pioneer Ponders the Next Revolution. The New York Times, (1999). URL https://archive.nytimes.com/www.nytimes.com/library/tech/99/12/biztech/articles/122099outlook-bobb.html. [Online; získáno 2021-08-05].
[158] J. C. R. Licklider: Man-Computer Symbiosis. IRE Transactions on Human Factors in Electronics, HFE-1 (1960):page 4–11. URL https://groups.csail.mit.edu/medg/people/psz/Licklider.html. [Online; získáno 2021-08-05].
[159] Mitch Waldrop: DARPA and The Internet Revolution. DARPA, 50 (2008):page 1958–2008. URL https://www.darpa.mil/attachments/%282O15%29%20Global%20Nav%20-%20About%20Us%20-%20History%20-%20Resources%20-%2050th%20-%20Internet%20%28Approved%29.pdf. [Online; získáno 2021-08-05].
[160] M. Mitchell Waldrop: The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal. Viking Adult, rst edition edition (2001). ISBN 9780670899760,0670899763. URL http://gen.lib.rus.ec/book/index.php?md5=112c711da66e5d603beb8f8c55ef14f3.
[161] Matthew Lyon Katie Hafner: Where Wizards Stay Up Late: The Origins of the Internet. Touchstone, 1 edition (1998). ISBN 0-684-87216-1. URL http://gen.lib.rus.ec/book/index.php?md5=6977f247ed68781223e7a7baf470d697.
[162] Janet Abbate: Inventing the Internet. Inside technology. The MIT Press, 1st edition (1999). ISBN 0262011727, 0585077975, 9780585077970, 9780262011723. URL http://gen.lib.rus.ec/book/index.php?md5=b5898935a43a513d9d629b198321c0ce.
[163] Petr Krčmář: Návštěva v TTC: dřív se tu distribuovaly noviny, dnes internet. Root.cz, (2015). URL https://www.root.cz/clanky/navsteva-v-ttc-driv-se-tu-distribuovaly-noviny-dnes-internet/. [Online; získáno 2021-08-05].
[164] Petr Krčmář: Na návštěvě v srdci českého internetu NIX.CZ. Root.cz, (2010). URL https://www.root.cz/clanky/na-navsteve-v-srdci-ceskeho-internetu-nix-cz/. [Online; získáno 2021-08-05].
[165] David Slížek: Seznam otevřel Kokuru. Teď ho čeká stěhování 30 tun hardwaru. Lupa.cz, (2015). URL https://www.lupa.cz/clanky/seznam-otevrel-kokuru-ted-ho-ceka-stehovani-30-tun-hardwaru/. [Online; získáno 2021-08-05].
[166] Jan Sedlák: Cloud v obci za ostnatými dráty. Podívejte se, jak vypadá nové státní datacentrum v Zelenči. Lupa.cz, (2021). URL https://www.lupa.cz/clanky/cloud-v-obci-za-ostnatymi-draty-podivejte-se-jak-vypada-nove-statni-datacentrum-v-zelenci/. [Online; získáno 2021-08-05].
[167] Wikipedia contributors: Internet censorship in Russia — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Internet_censorship_in_Russia. [Online; accessed 27-November-2022].
[168] Wikipedia contributors: Great Firewall — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Great_Firewall. [Online; accessed 27-November-2022].
[169] Steven Levy: Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition. O'Reilly Media (2010). ISBN 978-1-4493-8839-3. URL http://gen.lib.rus.ec/book/index.php?md5=9bdce81c0fecafb78984df21eb2e0a0f.
[170] Wikipedia contributors: Usenet — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Usenet&oldid=1031619825. [Online; accessed 3-August-2021].
[171] Bruce Sterling: The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books (1992). ISBN 9780553080582,0-553-08058-X,0-553-56370-X. URL http://gen.lib.rus.ec/book/index.php?md5=7757d2f09ac305ee062856e4197efb4e.
[172] David Baierle: Seznam českých a slovenských BBS ke dni 01. 03. 1998 (03 1998). URL https://www.sac.sk/download/text/bbs-csk.zip. [Online; získáno 2022-07-28].
[173] David Baierle: Pár slov o historii seznamu... LANtaNet.cz. URL https://web.archive.org/web/20070704120641/http://info.lantanet.cz/bbscsk/historie.html. [Online; archivováno 2007-07-04].
[174] Jiří Peterka: Historie českého internetu: BBS, alias Bulletin Board System. Živě.cz, (2005). URL https://www.earchiv.cz/b05/b0701002.php3. [Online; získáno 2022-07-28].
[175] Patrick Zandl: Historie českého Internetu (12.). Lupa.cz, (2004). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-12/. [Online; získáno 2022-07-28].
[176] Sancho: Jak umírají BBS. lowlevel.cz, (2004). URL https://www.lowlevel.cz/log/cats/vsehochut/Jak%20um%C3%ADraj%C3%AD%20BBS.html. [Online; získáno 2022-07-28].
[177] Petr Matoušek: Legendární Inma BBS byla odpojena. Lupa.cz, (2002). URL https://www.lupa.cz/clanky/legendarni-infima-bbs-byla-odpojena/. [Online; získáno 2022-07-28].
[178] Patrick Zandl: Legenda zemřela: Inma BBS byla denitivně odpojena. Technet.cz, (2002). URL https://www.idnes.cz/technet/internet/legenda-zemrela-infima-bbs-byla-definitivne-odpojena.A020702_5077183_sw_internet. [Online; získáno 2022-07-28].
[179] Patrick Zandl: Historie českého Internetu (11.). Lupa.cz, (2004). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-11/. [Online; získáno 2022-07-28].
[180] Ivo Lukačovič: Seznam jsem založil vlastně náhodou (2007). URL https://www.video.muni.cz/public/Seznam/Lukacovic.avi. [Online; získáno 2022-07-28].
[181] Phil Lapsley: Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell. Grove Press (2013). ISBN 080212061X,9780802120618. URL http://gen.lib.rus.ec/book/index.php?md5=8490a3843acf00f9c0a1608c07e8a569.
[182] Ron Rosenbaum: Secrets of the Little Blue Box. Esquire, (1971). URL http://www.lospadres.info/thorg/lbb.html. [Online; získáno 2022-07-27].
[183] Gina Smith Steve Wozniak: iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It. W. W. Norton and Company, 1st edition (2006). ISBN 0393061434,9780393061437. URL http://gen.lib.rus.ec/book/index.php?md5=665fafb71118e227cc172ce4c3276ab8.
[184] Phone Phreaking - textles.com. URL http://textfiles.com/phreak/. [Online; získáno 2022-07-27].
[185] The Origins of Phreaking. Blacklisted! 411, 6 (2004)(2). URL https://garydrobson.com/2014/06/03/the-origins-of-phreaking/. [Online; získáno 2022-07-28].
[186] Wikipedia contributors: Phreaking — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Phreaking. [Online; accessed 9-June-2021].
[187] Supernigger: Phrack Pro-Phile. Phrack, (1992)(12). URL https://phrack.org/issues/41/3. [Online; získáno 2022-07-27].
[188] Emmanuel Goldstein: The Best of 2600: A Hacker Odyssey Collectors Editon. 1 edition (2009). ISBN 9780470458532,0470458534,9780470474693. URL http://gen.lib.rus.ec/book/index.php?md5=f525f5c4631b780ef8ec96ba091a38fc.
[189] Jack Baritch: Encyclopedia Britannica, chapter 2600: The Hacker Quarterly. URL https://www.britannica.com/topic/2600-The-Hacker-Quarterly. [Online; získáno 2022-07-27].
[190] Honza Šípek: Zásek do živýho. eldar.cz (1999, 2012). URL https://eldar.cz/kangaroo/zasek_do_zivyho/. [Online].
[191] Aston: Žert se zvrhnul v hnusný čin. Neviditelný pes, (1997). URL https://web.archive.org/web/19970617152517/http://pes.eunet.cz/97/08/0222ind.htm. [Online; archivováno 1997-06-17].
[192] Electronic Frontier Foundation: Bernstein v. US Department of Justice. URL https://www.eff.org/cases/bernstein-v-us-dept-justice. [Online; získáno 2021-06-28].
[193] Daniel J. Bernstein: Bernstein v. United States. URL https://cr.yp.to/export.html. [Online; získáno 2021-06-28].
[194] Patrick Zandl: Historie českého Internetu (9.). Lupa.cz, (2003). URL https://www.lupa.cz/clanky/historie-ceskeho-internetu-9/. [Online; získáno 2022-07-28].
[195] Cli Stoll: Kukaččí vejce. Skutečný příběh honby za špiónem v bludišti počítačových sítí. Mladá fronta (1997).
[196] John Marko Katie Hafner: Cyberpunk. Outlaws and Hackers on the Computer Frontier. Simon and Schuster (1991). ISBN 0671683225,9780671683221. URL http://gen.lib.rus.ec/book/index.php?md5=6f1d3fd0e1480eee907a90cf31ae4ff4.
[197] Anja Drephal: The KGB Hack: 30 Years Later (12 2019). URL https://media.ccc.de/v/36c3-11031-the_kgb_hack_30_years_later. Záznam přednášky. [Online, získáno 2023-01-18].
[198] Wikipedia contributors: Markus Hess — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Markus_Hess. [Online; accessed 18-January-2023].
[199] Jon A. Rochlis Mark W. Eichin: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. Technical report, Massachusetts Institute of Technology (1988). URL https://www.mit.edu/people/eichin/virus/main.html. [Online; získáno 2023-01-18].
[200] Eugene H. Spaord: The Internet Worm Program: An Analysis. Technical report, Purdue University (1988). URL https://spaf.cerias.purdue.edu/tech-reps/823.pdf. [Online; získáno 2023-01-18].
[201] Wikipedia contributors: Botnet — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Botnet. [Online; accessed 19-January-2023].
[202] David Balaban: The 8 biggest botnets of all time. CyberNews, (2022). URL https://cybernews.com/security/the-8-biggest-botnets-of-all-time/. [Online; získáno 2023-01-19].
[203] Dancho Danchev: Study nds the average price for renting a botnet. ZDnet.com, (2010). URL https://www.zdnet.com/article/study-finds-the-average-price-for-renting-a-botnet/. [Online; získáno 2023-01-19].
[204] Shaun Nichols: Oh cool, tech service prices are plummeting. And by tech services, we mean botnet rentals and stolen credit cards. The Register, (2020). URL https://www.theregister.com/2020/05/27/criminal_services_cheaper/. [Online; získáno 2023-01-19].
[205] David Polesný: CZ.NIC je na stopě botnetu vytvořeného z napadených routerů. Živě.cz, (2015). URL https://www.zive.cz/bleskovky/cznic-je-na-stope-botnetu-vytvoreneho-z-napadenych-routeru/sc-4-a-178414/default.aspx. [Online; získáno 2023-01-19].
[206] Kenney Lu Tim Yeh, Dove Chiu: Persirai: New IoT Botnet Targets IP Cameras. Technical report, Trend Micro (05 2017). URL https://www.trendmicro.com/en_us/research/17/e/persirai-new-internet-things-iot-botnet-targets-ip-cameras.html. [Online; získáno 2023-01-19].
[207] Thomas Shaddack: Schizmatrix Today. Sociální sítě, komunikační technologie a uživateli vytvářený obsah. URL https://eldar.cz/mozek/mirror/schismatrixtoday-cz.html.
[208] Milan Kundera: Nechovejte se tu jako doma, příteli. Atlantis, Brno (2006). ISBN 978-80-7108-279-8.
[209] Pavel Tomek: Mobilní historie: milníky ve vývoji mobilní komunikace. Mobility, (2005)(11). URL https://www.mobilmania.cz/clanky/mobilni-historie-milniky-ve-vyvoji-mobilni-komunikace/sc-3-a-1111658/default.aspx. [Online; získáno 2020-02-13].
[210] Everett M. Rogers: Diusion of Innovations, 5th Edition. Free Press, 5th edition (2003). ISBN 0743222091,9780743222099. URL http://gen.lib.rus.ec/book/index.php?md5=069d09abbe784ef40f5a829f0b9e41fb.
[211] Wikipedia contributors: Diusion of innovations — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=Diffusion_of_innovations. [Online; accessed 13-February-2020].
[212] Emmanuel Goldstein: The Best of 2600: A Hacker Odyssey. Wiley Publishing, Indianapolis (2008). ISBN 9780470294192,0470294191. URL http://gen.lib.rus.ec/book/index.php?md5=ae8f55427bfb1450bbd63aae75e7dc0f.
[213] Tomáš Volyňský Přemysl Souček: Robert: Umím vyrábět věčné telefonní karty. Mobil.cz, (2001). URL https://www.idnes.cz/mobil/tech-trendy/robert-umim-vyrabet-vecne-telefonni-karty.A010531_0033610_mob_prakticky. [Online; získáno 2021-06-09].
[214] [autor neuveden]: Jak se okrádaly telefonní automaty. Mobil.cz, (2002). URL https://www.idnes.cz/mobil/tech-trendy/jak-se-okradaly-telefonni-automaty.A020626_5072325_mob_tech. [Online; získáno 2021-06-09].
[215] Martin Bajtler: Žižkovská dominanta je prázdná, před demolicí se ještě část věže pronajme. iDnes.cz, (2020). URL https://www.idnes.cz/praha/zpravy/telekomunikacni-budova-zizkov-vyklizena-ceka-na-demolici.A200625_555496_praha-zpravy_rsr. [Online; získáno 2020-09-22].
[216] Wikipedia contributors: NATO phonetic alphabet — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=NATO_phonetic_alphabet&oldid=967441669. [Online; accessed 2-August-2020].
[217] Christian Huitema: A Bůh stvořil Internet. Mladá fronta, Praha (1996). ISBN 80-204-0576-3.
[218] Wikipedie: TCP/IP — Wikipedie: Otevřená encyklopedie (2021). URL https://cs.wikipedia.org/w/index.php?title=TCP/IP&oldid=20045616. [Online; získáno 9. 06. 2021].
[219] reuters: Data Outage Disrupts Northwest Flights. Los Angeles Times, (2000). URL https://www.latimes.com/archives/la-xpm-2000-mar-22-fi-11345-story.html. [Online; získáno 2023-01-17].
[220] Ondřej Malý: Petr Kadaník (Rtyně.net): Stavbu optiky brzdí jenom úřady a byrokracie. Lupa.cz, (2019). URL https://www.lupa.cz/clanky/petr-kadanik-rtyne-net-stavbu-optiky-brzdi-jenom-urady-a-byrokracie/. [Online; získáno 2023-01-17].
[221] Jakub Dvořák: Vyšel seznam nejpoužívanějších hesel. Pokud tam najdete své, změňte ho. Technet.cz, (2020). URL https://www.idnes.cz/technet/software/hesla-password-hruba-sila-123456-silne-heslo-nordpass-bezpecnost-overeni.A201119_130347_software_dvr. [Online; získáno 2021-07-03].
[222] NordPass: Top 200 most commonpasswords of the year 2020 (2020). URL https://nordpass.com/most-common-passwords-list/. [Online; získáno 2021-07-03].
[223] Edvard Rejthar: Jak se Češi s hesly popásají. Blog zaměstnanců CZ.NIC, (2016). URL https://blog.nic.cz/2016/12/15/jak-se-cesi-s-hesly-popasaji/. [Online; získáno 2021-07-03].
[224] Faraz Ahmed, M. Shaq, and Alex Liu: The Internet is for Porn: Measurement and Analysis of Online Adult Trac. In 2016 IEEE 36th International Conference on Distributed Computing Systems, page 88–97 (06 2016). doi: 1 0 . 1 1 0 9 / I C D C S . 2 0 1 6 . 81. URL https://www.cse.msu.edu/\~farazah/adult_icdcs16.pdf. [Online; získáno 2021-07-03].
[225] Simon Singh: Kniha kódů a šifer. Dokořán a Argo, Praha (2003).
[226] Karel Burda: Kryptograe okolo nás. CZ.NIC, Praha (2019). URL https://knihy.nic.cz/files/edice/Kryptografie_okolo_nas.pdf.
[227] Wikipedie: Algoritmus — Wikipedie: Otevřená encyklopedie (2020). URL https://cs.wikipedia.org/w/index.php?title=Algoritmus&oldid=18612439. [Online; navštíveno 31. 07. 2020].
[228] Vlastimil Klima: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006). URL https://eprint.iacr.org/2006/105.
[229] C. E. Shannon: Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (1949)(4):page 656–715. doi:10.1002/j.1538-7305.1949.tb00928.x. URL https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
[230] Wikipedia contributors: Hardware random number generator — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Hardware_random_number_generator&oldid=1021859597. [Online; accessed 3-July-2021].
[231] Richard Chirgwin: FreeBSD abandoning hardware randomness. The Register, (2013). URL https://www.theregister.com/2013/12/09/freebsd_abandoning_hardware_randomness/. [Online; získáno 2021-07-03].
[232] Wikipedia contributors: Regulation of Investigatory Powers Act 2000 — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Regulation_of_Investigatory_Powers_Act_2000. [Online; accessed 3-July-2021].
[233] Lenka Kadeřávková: Ruzyňský anonym jde na pět let za mříže. Novinky.cz, (2003). URL https://www.novinky.cz/krimi/clanek/ruzynsky-anonym-jde-na-pet-let-za-mrize-259884. [Online; získáno 2020-08-01].
[234] Wikipedia contributors: Tinder (app) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Tinder_(app). [Online; accessed 6-July-2020].
[235] has: Případ Klausovy SMS policie odložila. iDnes.cz, (2003). URL https://www.idnes.cz/zpravy/domaci/pripad-klausovy-sms-policie-odlozila.A030120_161321_krimi_has. [Online; získáno 2020-07-06].
[236] red ČTK: Klaus zahodil mobil fotografa MF DNES. iDnes.cz, (2000). URL https://www.idnes.cz/zpravy/domaci/klaus-zahodil-mobil-fotografa-mf-dnes.A001120_004916_volby2000_jkl. [Online; získáno 2020-07-06].
[237] Howard Rheingold: Smart Mobs: The Next Social Revolution (2003). ISBN 978-0738208619. URL http://gen.lib.rus.ec/book/index.php?md5=0a03780fa661315c90af47c8a45f910d.
[238] Veronika Šmídová Michaela Těšínská: Pozor, jede revizor, varuje aplikace. Ubohé, zlobí se dopravní podniky. Lidovky.cz, (2013). URL https://www.lidovky.cz/domov/pozor-jede-revizor-varuje-aplikace-farebandit-ubohe-zlobi-se-dopravni-podniky.A130227_222629_ln_domov_vs. [Online; získáno 2020-08-01].
[239] Wikipedia contributors: OhmyNews — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=OhmyNews. [Online; accessed 6-July-2020].
[240] Roberto Saviano: Maimed by the Mob. Time, (2008). URL http://content.time.com/time/world/article/0,8599,1721992,00.html. [Online; získáno 2020-07-03].
[241] Liam Collins: Russia Gives Lessons in Electronic Warfare. Association of the United States Army Footer menu Association of the United States Army Footer menu Association of the United States Army, (2018). URL https://www.ausa.org/articles/russia-gives-lessons-electronic-warfare. [Online; získáno 2021-02-08].
[242] Dmytro Vlasov Raphael Satter: Ukraine soldiers bombarded by `pinpoint propaganda' texts. Associated Press, (2017). URL https://apnews.com/9a564a5f64e847d1a50938035ea64b8f/Ukraine-soldiers-bombarded-by-’pinpoint-propaganda’-texts. [Online; získáno 2021-02-08].
[243] Yuri Lapaiev: Ukraine as Clandestine Testing Ground for Russian Electronic Warfare. Eurasia Daily Monitor, 15 (2018). URL https://jamestown.org/program/ukraine-as-clandestine-testing-ground-for-russian-electronic-warfare/. [Online; získáno 2021-02-08].
[244] Joseph Trevithick: Russia Breaks into US Soldiers' iPhones in Apparent Hybrid Warfare Attacks. The Drive, (2017). URL https://www.thedrive.com/the-war-zone/14867/russia-breaks-into-us-soldiers-iphones-in-apparent-hybrid-warfare-attacks. [Online; získáno 2021-02-08].
[245] Ondřej Nováček: Jak připlouvali kapříci. Poslechněte si část "legendárních"fotbalových odposlechů. ČT Sport, (2015). URL https://sport.ceskatelevize.cz/clanek/fotbal/jak-priplouvali-kaprici-poslechnete-si-cast-legendarnich-fotbalovych-odposlechu/5bdba64f0d663b6fe8aa72d8. [Online; získáno 2023-01-12].
[246] Jaroslav Kmenta: Vašík dá napapat, až Jára předá kapříky. iDnes.cz, (2004). URL https://www.idnes.cz/zpravy/domaci/vasik-da-napapat-az-jara-preda-kapriky.A041222_214255_domaci_fri. [Online; získáno 2023-01-12].
[247] Karel Felt: Největší korupční aféra v českém fotbale slaví deset let. (2014). URL https://www.sport.cz/clanek/fotbal-ceska-1-liga-nejvetsi-korupcni-afera-v-ceskem-fotbale-slavi-deset-let-571352. [Online; získáno 2023-01-12].
[248] Miloslav Novák: Ivánku, kamaráde... Od vypuknutí úplatkářské aféry uplynulo 10 let. iDnes.cz, (2014). URL https://www.idnes.cz/fotbal/prvni-liga/deset-let-od-vypuknuti-korupcni-afery-ve-fotbale-synot-zizkov.A140429_170919_fotbal_min. [Online; získáno 2023-01-12].
[249] Karel Felt: Zejda: Odposlechy nic nedokazují. Sport, (2004). URL https://www.sport.cz/clanek/fotbal-ceska-1-liga-zejda-odposlechy-nic-nedokazuji-44133. [Online; získáno 2023-01-12].
[250] Ladislav Čumba: Čtvrtníček, Lábus a lidská existence. A2, (2006). URL https://www.advojka.cz/archiv/2006/2/ctvrtnicek-labus-a-lidska-existence. [Online; získáno 2023-01-12].
[251] Jindřiška Bláhová: Ivánku, kamaráde, můžeš se dívat? Fotbalové dokumenty nejen pro fanoušky. Respekt, (2020). URL https://www.respekt.cz/agenda/ivanku-kamarade-muzes-se-divat-fotbalove-dokumenty-nejen-pro-fanousky. [Online; získáno 2023-01-12].
[252] ČTK iDnes: Odposlechy s Horníkem pobavily i soudkyni. iDnes.cz, (2006). URL https://www.idnes.cz/fotbal/prvni-liga/odposlechy-s-hornikem-pobavily-i-soudkyni.A060118_161443_fotbal_min. [Online; získáno 2023-01-12].
[253] Robert Malecký: Novinka v odposleších u kauzy Jany Nečasové? Nikoli. Nejvyšší soud rybaření kritizuje už roky. Hlídací pes, (2020). URL https://hlidacipes.org/novinka-v-odposlesich-u-kauzy-jany-necasove-nikoli-nejvyssi-soud-rybareni-kritizuje-uz-roky/. [Online; získáno 2020-07-03].
[254] Jiří Růžek: V labyrintu zpravodajských služeb. Šulc–Švarc, Praha (2014).
[255] Albert-László Barabási Marta C. González, César A. Hidalgo: Understanding individual human mobility patterns. Nature, 453 (2006):page 779–782. URL https://barabasi.com/media/pub_imports/files/250.pdf. [Online; získáno 2020-08-02].
[256] Vodafone: Law Enforcement Disclosure Report. URL https://web.archive.org/web/20140607232443/http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html. [Online; archivováno 2014-06-07]].
[257] Juliette Garside: Vodafone reveals existence of secret wires that allow state surveillance. The Guardian, (2014). URL https://www.theguardian.com/business/2014/jun/06/vodafone-reveals-secret-wires-allowing-state-surveillance. [Online; získáno 2020-08-05]].
[258] Thomas Shaddack: Kapesní práskači. Stu, (2003). URL https://eldar.cz/mozek/mirror/pocketnarcs.htm.
[259] Wikipedia contributors: Wi-Fi positioning system — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Wi-Fi_positioning_system&oldid=1014075537. [Online; accessed 27-March-2021].
[260] Feng Hong, Yongtuo Zhang, Zhao Zhang, Meiyu Wei, Yuan Feng, and Zhongwen Guo: WaP: Indoor localization and tracking using WiFi-Assisted Particle lter. page 210–217 (09 2014). doi:10.1109/LCN.2014.6925774. URL https://www.researchgate.net/profile/Feng-Hong-10/publication/286669860_WaP_Indoor_localization_and_tracking_using_WiFi-Assisted_Particle_filter/links/56947d3108aeab58a9a2f351/WaP-Indoor-localization-and-tracking-using-WiFi-Assisted-Particle-filter.pdf. [Online; získáno 2021-03-27].
[261] India bans TikTok, WeChat and dozens more Chinese apps. BBC News, (2020). URL https://www.bbc.com/news/technology-53225720. [Online; získáno 2021-03-29].
[262] Matt Haldane: TikTok has ocially pulled out of Hong Kong, but you can still use it if you try. South China Morning Post, (2020). URL https://www.scmp.com/abacus/tech/article/3092574/tiktok-has-officially-pulled-out-hong-kong-you-can-still-use-it-if-you. [Online; získáno 2021-03-29].
[263] David McCabe Mike Isaac: TikTok Wins Reprieve From U.S. Ban. The New York Times, (2020). URL https://www.nytimes.com/2020/09/27/technology/tiktok-ban-ruling-app.html. [Online; získáno 2021-03-29].
[264] Naomi Xu Elegant: TikTok is becoming inaccessible in more markets. Tech-savvy users are nding workarounds. Fortune, (2020). URL https://fortune.com/2020/07/13/tiktok-ban-workaround/. [Online; získáno 2021-02-08].
[265] Did a TV news show cause lots of Amazon's Alexa devices to try to order doll houses? URL https://skeptics.stackexchange.com/questions/36637/did-a-tv-news-show-cause-lots-of-amazons-alexa-devices-to-try-to-order-doll-hou. [Online; získáno 2021-03-29].
[266] Shaun Nichols: TV anchor says live on-air 'Alexa, order me a dollhouse' – guess what happens next. The Register, (2017). URL https://www.theregister.com/2017/01/07/tv_anchor_says_alexa_buy_me_a_dollhouse_and_she_does/. [Online; získáno 2021-03-29].
[267] Holger Bleich: Alexa, Who Has Access to My Data? c't, (2018). URL https://www.heise.de/downloads/18/2/5/6/5/3/9/6/ct.0119.016-018_engl.pdf. [Online; získáno 2021-04-01].
[268] Zack Whittaker: Amazon says government demands for user data spiked by 800% in 2020. TechCrunch, (2021). URL https://techcrunch.com/2021/02/01/amazon-government-demands-spiked/. [Online; získáno 2021-04-01].
[269] Sidney Fusell: Meet the Star Witness: Your Smart Speaker. Wired, (2020). URL https://www.wired.com/story/star-witness-your-smart-speaker/. [Online; získáno 2021-03-29].
[270] Lily Hay Newman: How to Block the Ultrasonic Signals You Didn't Know Were Tracking You. Wired, (2016). URL https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/. [Online; získáno 2021-04-04].
[271] D. Arp, E. Quiring, C. Wressnegger, and K. Rieck: Privacy Threats through Ultrasonic Side Channels on Mobile Devices. In 2017 IEEE European Symposium on Security and Privacy (EuroS P), page 35–47 (2017). doi: 1 0 . 1 1 0 9 / E u r o S P. 2 0 1 7 . 3 3. URL https://web.archive.org/web/20170510110459/http://christian.wressnegger.info/content/projects/sidechannels/2017-eurosp.pdf. [Online; archivováno 2017-05-10].
[272] Wikipedia contributors: Video Encoded Invisible Light — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Video_Encoded_Invisible_Light&oldid=959878543. [Online; accessed 3-April-2021].
[273] Graham Cluley: La Liga ned €250,000 after Android app spied on football fans. Hot for Security, (2019). URL https://hotforsecurity.bitdefender.com/blog/la-liga-fined-e250000-after-android-app-spied-on-football-fans-21332.html. [Online; získáno 2021-03-31].
[274] Sam Biddle: WikiLeaks Dump Shows CIA Could Turn Smart TVs into Listening Devices. The Intercept, (2017). URL https://theintercept.com/2017/03/07/wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices/. [Online; získáno 2021-03-31].
[275] Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh: Mobile Device Identication via Sensor Fingerprinting (2014). URL https://crypto.stanford.edu/gyrophone/sensor_id.pdf. [Online; získáno 2021-04-08].
[276] Kif Leswing: A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note. Business Insider, (2018). URL https://www.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1. [Online; získáno 2021-03-31].
[277] Henk Van Ess: Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram. (2019). URL https://www.bellingcat.com/news/uk-and-europe/2019/03/19/locating-the-netherlands-most-wanted-criminal-by-scrutinising-instagram/. [Online; získáno 2021-04-04].
[278] Qin Xie: Coronavirus: Couple wrongly ned £1,700 after posting holiday snaps from last year amid lockdown. Independent, (2020). URL https://www.independent.co.uk/life-style/coronavirus-australia-lockdown-fine-holiday-photos-a9463906.html. [Online; získáno 2021-04-08].
[279] Tara C. Mahadevan: Australian Couple Fined Thousands for Posting Old Vacation Photos During Quarantine. Complex.com, (2020). URL https://www.complex.com/life/2020/04/australia-couple-fined-thousands-for-posting-old-vacation-photos-quarantine. [Online; získáno 2021-04-08].
[280] Levi Parsons: Husband and wife are ned more than $3,000 for ńon-essentialtravel after being reported to police for posting year-old holiday snaps on Facebook. Daily Mail Australia, (2020). URL https://www.dailymail.co.uk/news/article-8213591/Police-fine-Victorian-couple-non-essential-travel-shared-old-photos-Facebook.html. [Online; získáno 2021-04-08].
[281] Daniel Stach: Jiří Straus, forenzní biomechanik, kriminalista. Hyde Park Civilizace, Česká televize, (2012). URL https://www.ceskatelevize.cz/porady/10441294653-hyde-park-civilizace/212411058091006-jiri-straus. [Online; získáno 2021-04-04].
[282] Wikipedia contributors: Gait analysis — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Gait_analysis&oldid=1014320399. [Online; accessed 3-April-2021].
[283] Nanyang Technological University: Study nds that hackers could guess your phone PIN using its sensor data. Phys.org, (2017). URL https://phys.org/news/2017-12-hackers-pin-sensor.html. [Online; získáno 2021-04-04].
[284] David Berend, Bernhard Jungk, and Shivam Bhasin: There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. Cryptology ePrint Archive, Report 2017/1169 (2017). URL https://eprint.iacr.org/2017/1169. [Online; získáno 2021-04-04].
[285] Yan Michalevsky, Dan Boneh, Yan Michalevsky, Dan Boneh, and Gabi Nakibly: Gyrophone: Recognizing Speech from Gyroscope Signals. In In USENIX conference on Security Symposium, 2014, page 1053–1067. URL https://crypto.stanford.edu/gyrophone/files/gyromic.pdf. [Online; získáno 2021-04-08].
[286] Lukasz Olejnik: Stealing sensitive browser data with the W3C Ambient Light Sensor API. blog.lukaszolejnik.com, (2017). URL https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/. [Online; získáno 2021-04-08].
[287] Lukasz Olejnik: Shedding light on web privacy impact assessment: A case study of the Ambient Light Sensor API. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), page 310–313. IEEE (2020). URL https://lukaszolejnik.com/SheddingLightWebPrivacyImpactAssessmentIWPE20.pdf. [Online; získáno 2021-04-08].
[288] Petr Šourek Petra Kultová: Jak naše každodenní rozhodování ovlivňují robotičtí dramaturgové internetu čili algoritmy? Akcent, Český rozhlas Vltava, (2020). URL https://vltava.rozhlas.cz/jak-nase-kazdodenni-rozhodovani-ovlivnuji-roboticti-dramaturgove-internetu-cili-8294466. [Online; získáno 2021-04-04].
[289] Jackie Dove: How to control your iOS app permissions. Digital Trends, (2021). URL https://www.digitaltrends.com/mobile/how-to-control-ios-app-permissions/. [Online; získáno 2021-04-04].
[290] Tim Brookes: How to Check and Tighten All Your iPhone's Privacy Settings. How-To Geek, (2019). URL https://www.howtogeek.com/424624/how-to-check-and-tighten-all-your-iphones-privacy-settings/. [Online; získáno 2021-04-04].
[291] fs: Ultimátní příručka pro soukromí na Androidu. ComputerWorld, (2020). URL https://computerworld.cz/internet-a-komunikace/ultimatni-prirucka-pro-soukromi-na-androidu-56116. [Online; získáno 2021-04-04].
[292] Wikipedia contributors: Closed platform — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Closed_platform&oldid=1016452669. [Online; accessed 8-April-2021].
[293] Hope King: This startup uses battery life to determine credit scores. CNN, (2016). URL https://money.cnn.com/2016/08/24/technology/lenddo-smartphone-battery-loan/index.html. [Online; získáno 2020-07-12].
[294] Jay Stanley: Why Don't We Have More Privacy When We Use A Credit Card? ACLU blog, (2019). URL https://www.aclu.org/blog/privacy-technology/consumer-privacy/why-dont-we-have-more-privacy-when-we-use-credit-card. [Online; získáno 2021-04-04].
[295] Charles Duhigg: What Does Your Credit-Card Company Know About You? The New York Times Magazine, (2009). URL https://www.nytimes.com/2009/05/17/magazine/17credit-t.html?_r=0. [Online; získáno 2021-04-04].
[296] Rob Wile: How A Manhattan Jeweler Wound Up With Gold Bars Filled With Tungsten. Business Insider, (2012). URL https://www.businessinsider.com/tungsten-filled-gold-bars-found-in-new-york-2012-9. [Online; získáno 2021-04-04].
[297] agentury: Biggest gold fraud breaks in China: 83 tons of gold bars used as loan collateral turned out to be copper. The Free Press Journal, (2020). URL https://www.freepressjournal.in/business/biggest-gold-fraud-breaks-in-china-83-tons-of-gold-bars-used-as-loan-collateral-turned-out-to-copper. [Online; získáno 2021-04-04].
[298] Albert-László Barabási: Bursts. The Hidden Pattern Behind Everything We Do. Dutton, New York (2010).
[299] Constance L. Hays: What Wal-Mart Knows About Customers' Habits. The New York Times, (2004). URL https://www.nytimes.com/2004/11/14/business/yourmoney/what-walmart-knows-about-customers-habits.html. [Online; získáno 2014-02-20].
[300] Charles Duhigg: How Companies Learn Your Secrets. New York Times Magazine, (2012). URL http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. [Online; získáno 2014-02-20].
[301] Lukáš Erben: Děrné štítky a holokaust (2013). URL http://www.root.cz/serialy/derne-stitky-a-holocaust/. [Online; získáno 2014-02-20].
[302] Wikipedia: IBM and the Holocaust — Wikipedia, The Free Encyclopedia (2014). URL https://en.wikipedia.org/w/index.php?title=IBM_and_the_Holocaust. [Online; získáno 2014-02-20].
[303] [autor neuveden]: Co s archivy StB: Otevřít, nebo spálit? Rozhovor Listů s Radkem Schovánkem. Britské listy, (2001). URL http://www.britskelisty.cz/0104/20010424f.html. [Online; získáno 2014-02-21].
[304] Julia Angwin: How the Stasi Spied on Social Networks (02 2014). URL https://juliaangwin.com/how-the-stasi-spied-on-social-networks/. [Online; získáno 2014-02-21].
[305] Albert-László Barabási: V pavučině sítí. Paseka (2005).
[306] Philip K. Dick: Minority report. Mladá fronta, Praha (2002).
[307] Systém pro rozpoznávání RZ (SPZ) vozidel – LOOK (2014). URL http://www.hisys.cz/CS/Nase-nabidka/Vyvoj-software/LOOK.
[308] Petr Dostál: Policejní informační systémy a jejich využití v trestním řízení [online] (2008). URL https://is.muni.cz/th/uruoz/bakal_pr11.pdf. [Online; získáno 2014-02-24].
[309] Kalee Thompson: The Santa Cruz Experiment: Can a City's Crime Be Predicted and Prevented? Popular Science, (2011). URL https://www.popsci.com/science/article/2011-10/santa-cruz-experiment/. [Online; získáno 2014-02-20].
[310] Ondřej Skalník: Budoucnost policejní práce aneb dá se kriminalita předpovídat? (11 2011). URL https://www.policista.cz/clanky/reportaz/budoucnost-policejni-prace-aneb-da-se-kriminalita-predpovidat-848/. [Online; získáno 2014-02-20].
[311] Matt Stroud: The minority report: Chicago's new police computer predicts crimes, but is it racist? The Verge, (2014). URL https://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist. [Online; získáno 2014-02-20].
[312] David M. Hureau Andrew V. Papachristos, Anthony A. Braga: Social Networks and the Risk of Gunshot Injury. Journal of Urban Health: Bulletin of the New York Academy of Medicine, 89 (2012)(6):page 992–1003. doi:10.1007/s 11524-012-9703-9. [Online; získáno 2014-02-20].
[313] Anthony A. Braga Andrew V. Papachristos, David M. Hureau: The Corner and the Crew: The Inuence of Geography and Social Networks on Gang Violence. American Sociological Review, 78 (2013)(3):page 417–447. doi:10.1177/0003122413486800. URL http://asr.sagepub.com/content/78/3/417. [Online; získáno 2014-02-20].
[314] Richard Pastore: Chicago Police Department Uses IT to Fight Crime, Wins Grand CIO Enterprise Value Award 2004 (02 2004). URL http://www.cio.com/article/print/32107. [Online; získáno 2014-02-20].
[315] Whet Moser: The Small Social Networks at the Heart of Chicago Violence. Chicago Magazine, (2013). URL http://www.chicagomag.com/city-life/December-2013/The-Small-Social-Networks-at-the-Heart-of-Chicago-Violence/. [Online; získáno 2014-02-20].
[316] Rosemary Regina Sobol Jeremy Gorner: Chicago police use 'heat list' as strategy to prevent violence. Chicago Tribune, (2013). URL http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list. [Online; získáno 2014-02-20].
[317] Simon Griths Caroline Clay, Stephen Dalzell: IBM i2 Defense and National Security Intelligence demo. URL http://www.youtube.com/watch?v=LlJyXRnrBNk. [Online; získáno 2014-02-20].
[318] William Binney Jesselyn Radack, Thomas Drake: Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime. (12 2012). URL https://media.ccc.de/v/29c3-5338-en-enemies_of_the_state_h264. Záznam přednášky. [Online, získáno 2014-02-21].
[319] Arthur Holland Michel: There Are Spying Eyes Everywhere—and Now They Share a Brain. Wired, (2021). URL https://www.wired.com/story/there-are-spying-eyes-everywhere-and-now-they-share-a-brain/. [Online; získáno 2021-02-07].
[320] Honza Šípek: Ví policie, kdo vás zavraždí? A2, (2014)(5). URL https://www.advojka.cz/archiv/2014/5/vi-policie-kdo-vas-zavrazdi.
[321] Marcia Hofman Rainey Reitman: In Data Portability Deathmatch, Users Lose Out. Electronic Frontier Foundation, (2010). URL https://www.eff.org/deeplinks/2010/11/data-portability-deathmatch-user-lose-out. [Online; získáno 2021-03-13].
[322] Facebook: Statistics (2011). URL https://web.archive.org/web/20110430004639/http://www.facebook.com/press/info.php?statistics. [Online; archivováno 2011-04-30].
[323] Stefan Berteau: Facebook's Misrepresentation of Beacon's Threat to Privacy: Tracking users who opt out or are not logged in. CA Security Advisor Research Blog, (2007). URL https://web.archive.org/web/20080212015544/http://community.ca.com/blogs/securityadvisor/archive/2007/11/29/facebook-s-misrepresentation-of-beacon-s-threat-to-privacy-tracking-users-who-opt-out-or-are-not-logged-in.aspx. [Online; získáno 2021-03-13].
[324] Wikipedia contributors: Facebook Beacon — Wikipedia, The Free Encyclopedia (2021). URL https://en.wikipedia.org/w/index.php?title=Facebook_Beacon&oldid=1009633650. [Online; accessed 13-March-2021].
[325] Lars Backstrom, Eric Sun, and Cameron Marlow: Find me if you can: Improving geographical prediction with social and spatial proximity. In WWW 2010: Proceeding of the 19th international conference on World Wide Web. ACM, ACM, New York, NY, USA (2010). URL https://web.archive.org/web/20111218181116/http://cameronmarlow.com/media/backstrom-geographical-prediction_0.pdf. [Online; archivováno 2011-12-18].
[326] Robert M. Bond, Christopher J. Fariss, Jason J. Jones, Adam D.I. Kramer, Cameron Marlow, Jaime E. Settle, and James H. Fowler: A 61-million-person experiment in social inuence and political mobilization. Nature, 489 (2012)(7415):page 295–298. doi: 1 0 . 1 0 3 8 / n a t u r e 1 1 4 21. URL http://cameronmarlow.com/media/massive_turnout.pdf. [Online; archivováno 2017-09-10].
[327] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic: The Role of Social Networks in Information Diusion. In Proceedings of the ACM Conference on the World Wide Web. Lyon, France (2012). URL https://web.archive.org/web/20170910012152/http://cameronmarlow.com/media/bakshy-the_role-2012b.pdf. [Online; archivováno 2017-09-10].
[328] Andrei Petre Tim Ross, Victor Jack: Who is Călin Georgescu, the far-right TikTok star leading the Romanian election race? Politico, (11). URL https://www.politico.eu/article/calin-georgescu-romania-elections-far-right-tiktok-nato-skeptic-russia-ukraine-exports/. [Online; získáno 2025-04-02].
[329] Josef Šlerka: Rumunsko: Kampaň na TikToku kandidátovi krajní pravice (skoro) vyhrála prezidentské volby. Investigace.cz, (2024). URL https://www.investigace.cz/rumunsko-tiktok-volby-prezident.
[330] Stephen McGrath: Romania’s top court annuls rst round of presidential vote won by far-right candidate. Associated Press, (2024). URL https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b. [Online; získáno 2025-05-07].
[331] Wikipedia contributors: 2024–2025 Romanian election annulment protests — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=2024%E2%80%932025_Romanian_election_annulment_protests. [Online; accessed 7-May-2025].
[332] Matei Vrabie: KOMANDA KREMLIN: The Russian machine behind Călin Georgescu. EDMO – European Digital Media Observatory, (2024). URL https://edmo.eu/publications/komanda-kremlin-the-russian-machine-behind-calin-georgescu/. [Online; získáno 2025-04-02].
[333] Wikipedia contributors: Accusations of Russian interference in the 2024 Romanian presidential election — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Accusations_of_Russian_interference_in_the_2024_Romanian_presidential_election. [Online; accessed 7-May-2025].
[334] Wikipedia contributors: Twitter under Elon Musk — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Twitter_under_Elon_Musk. [Online; accessed 9-May-2025].
[335] Wikipedia contributors: Twitter Files — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Twitter_Files. [Online; accessed 9-May-2025].
[336] Micah Lee: Elon Musk Is Taking Aim at Journalists. I’m One of Them. The Intercept, (2022). URL https://theintercept.com/2022/12/16/elon-musk-twitter-suspended-journalists/. [Online; získáno 2025-05-10].
[337] Micah Lee: Elon Musk Is Still Silencing the Journalists He Banned From Twitter. The Intercept, (2022). URL https://theintercept.com/2022/12/20/elon-musk-twitter-banned-journalists/. [Online; získáno 2025-05-10].
[338] Wikipedia contributors: December 2022 Twitter suspensions — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=December_2022_Twitter_suspensions. [Online; accessed 9-May-2025].
[339] Timothy Graham and Mark Andrejevic: A computational analysis of potential algorithmic bias on platform X during the 2024 US election (11 2024). URL https://eprints.qut.edu.au/253211/.
[340] Julia Musto: NASA terminating USD 420 million in contracts not aligned with its new priorities. The Independent, (2025). URL https://www.independent.co.uk/space/nasa-contract-termination-trump-doge-b2721477.html. [Online; získáno 2025-05-16].
[341] Miranda Nazzaro: TikTok CEO meets with Trump at Mar-a-Lago. The Hill, (2024). URL https://thehill.com/homenews/5043098-tiktok-ceo-meets-with-trump-at-mar-a-lago/. [Online; získáno 2025-05-10].
[342] Ali Swenson: Trump, a populist president, is anked by tech billionaires at his inauguration. Associated Press, (2025). URL https://apnews.com/article/trump-inauguration-tech-billionaires-zuckerberg-musk-wealth-0896bfc3f50d941d62cebc3074267ecd. [Online; získáno 2025-05-10].
[343] Bobby Allyn Huo Jingnan, Shannon Bond: Meta says it will end fact-checking as Silicon Valley prepares for Trump. NPR, (2025). URL https://www.npr.org/2025/01/07/nx-s1-5251151/meta-fact-checking-mark-zuckerberg-trump. [Online; získáno 2025-05-16].
[344] Lee Moran: Google's Donald Trump-Inspired Move Has Critics Navigating Outrage. Hupost, (2025). URL https://www.huffpost.com/entry/criticism-of-google-donald-trump_n_6798a090e4b00b4be59ac02f. [Online; získáno 2025-05-16].
[345] Wikipedia contributors: Dunbar's number — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Dunbar%27s_number. [Online; accessed 28-March-2025].
[346] Wikipedia contributors: Meme — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Meme. [Online; accessed 28-March-2025].
[347] Richard Dawkins: Sobecký gen. Mladá fronta, Praha (1998).
[348] Stacy Cowley Aaron Smith, Laurie Segall: Facebook reaches one billion users. CNN Bussines, (2012). URL https://money.cnn.com/2012/10/04/technology/facebook-billion-users/index.html. [Online; získáno 2025-04-02].
[349] Sean Davis: We Cracked The Code On How The Facebook News Feed Algorithm Works. The Federalist, (2014). URL https://thefederalist.com/2014/02/20/we-cracked-the-code-on-how-the-facebook-news-feed-algorithm-works/. [Online; získáno 2025-04-02].
[350] Casey Johnston: Is Facebook “broken on purpose” to sell promoted posts? Ars Technica, (2012). URL https://arstechnica.com/information-technology/2012/11/is-facebook-broken-on-purpose-to-sell-promoted-posts. [Online; získáno 2025-04-01].
[351] Adam Alter: Neodolatelné. Vzestup návykových technologií a byznys se závislostí. Host – vydavatelství, Brno (2018).
[352] Kevin P. Yancey and Burr Settles: A Sleeping, Recovering Bandit Algorithm for Optimizing Recurring Notications. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD '20, page 3008–3016. Association for Computing Machinery, New York, NY, USA (2020). ISBN 9781450379984. doi:10.1145/3394486.3403351. URL https://research.duolingo.com/papers/yancey.kdd20.pdf.
[353] Ben Cohen: The Only App That Always Wins the Battle for Your Attention. The Wall Street Journal, (2024). URL https://www.wsj.com/tech/personal-tech/duolingo-streaks-notifications-app-spanish-bc87d6e4. [Online; získáno 2024-06-16].
[354] Laura Elin Pigott: Social media rewires young minds – here’s how. The Conversation, (2025). URL https://theconversation.com/social-media-rewires-young-minds-heres-how-243120. [Online; získáno 2025-03-27].
[355] Phil Reed: Thwarting the Social Media Algorithm with Behavioural Science. Psychology Today, (03). URL https://www.psychologytoday.com/us/blog/digital-world-real-world/202503/thwarting-the-social-media-algorithm-with-behavioural-science. [Online; získáno 2025-03-27].
[356] Rob Henderson: The Science Behind What Tinder Is Doing to Your Brain. Psychology Today, (2018). URL https://www.psychologytoday.com/us/blog/after-service/201805/the-science-behind-what-tinder-is-doing-to-your-brain. [Online; získáno 2025-03-27].
[357] Nisha Syed Nasser, Hamed Sharifat, Aida Abdul Rashid, et al.: Cue-Reactivity Among Young Adults With Problematic Instagram Use in Response to Instagram-Themed Risky Behavior Cues: A Pilot fMRI Study. Frontiers in Psychology, 11 (2020). ISSN 1664-1078. doi:10.3389/fpsyg.2020.556060. URL https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2020.556060.
[358] Wikipedia contributors: Attention economy — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Attention_economy. [Online; accessed 27-March-2025].
[359] Santiago Giraldo-Luque, Pedro Afanador, and Cristina Fernández-Rovira: The Struggle for Human Attention: Between the Abuse of Social Media and Digital Wellbeing. Healthcare, 8 (2020):page 497. doi:10.3390/healthcare8040497. URL https://pmc.ncbi.nlm.nih.gov/articles/PMC7712353/pdf/healthcare-08-00497.pdf.
[360] Jane Dwivedi-Yu, Yi-Chia Wang, Lijing Qin, Cristian Canton-Ferrer, and Alon Y. Halevy: Aective Signals in a Social Media Recommender System. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD ’22, page 2831–2841. ACM (August 2022). doi:10.1145/3534678.3539054. URL https://dl.acm.org/doi/pdf/10.1145/3485447.3512131.
[361] Leif Sigerson and Cecilia Cheng: Scales for measuring user engagement with social network sites: A systematic review of psychometric properties. Computers in Human Behavior, 83 (2018):page 87–105. ISSN 0747-5632. doi:10.1016/j.chb.2018.01.023. URL https://www.sciencedirect.com/science/article/pii/S0747563218300293.
[362] Eli Pariser: The Filter Bubble: What the Internet Is Hiding from You. Penguin Press (2011). ISBN 1594203008,9781594203008,9781101515129. URL http://gen.lib.rus.ec/book/index.php?md5=270a9aa7ef50fd61fdc22c71fdbbecce.
[363] Matteo Cinelli, Gianmarco De Francisci Morales, Alessandro Galeazzi, Walter Quattrociocchi, and Michele Starnini: The echo chamber eect on social media. Proceedings of the National Academy of Sciences, 118 (2021)(9):page e2023301118. doi: 1 0 . 1 0 7 3 / p n a s . 2 0 2 3 3 0 1 1 18. URL https://www.pnas.org/doi/pdf/10.1073/pnas.2023301118.
[364] Ray Jiang, Silvia Chiappa, Tor Lattimore, András György, and Pushmeet Kohli: Degenerate Feedback Loops in Recommender Systems. In Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, AIES ’19. ACM (January 2019). doi:10.1145/3306618.3314288. URL https://arxiv.org/pdf/1902.10730.
[365] Dimitris Kalimeris, Smriti Bhagat, Shankar Kalyanaraman, and Udi Weinsberg: Preference Amplication in Recommender Systems. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, KDD '21, page 805–815. Association for Computing Machinery, New York, NY, USA (2021). ISBN 9781450383325. doi:10.1145/3447548.3467298. URL https://dl.acm.org/doi/pdf/10.1145/3447548.3467298.
[366] Hunt Allcott, Luca Braghieri, Sarah Eichmeyer, and Matthew Gentzkow: The Welfare Eects of Social Media. American Economic Review, 110 (2020)(3):page 629–76. doi: 1 0 . 1 2 5 7 / a e r . 2 0 1 9 0 6 5 8. URL https://pubs.aeaweb.org/doi/pdfplus/10.1257/aer.20190658.
[367] Minzhu Zhao & Nicola Shaughnessy Kaitlyn Regehr, Caitlin Shaughnessy: Safer Scrolling: How algorithms popularise and gamify online hate and misogyny for young people (01 2024). URL {https://www.ascl.org.uk/ASCL/media/ASCL/Help%20and%20advice/Inclusion/Safer-scrolling.pdf}.
[368] Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, et al.: Reshares on social media amplify political news but do not detectably aect beliefs or opinions. Science, 381 (2023)(6656):page 404–408. doi:10.1126/science.add8424. URL https://www.science.org/doi/abs/10.1126/science.add8424.
[369] Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, Hunt Allcott, et al.: How do social media feed algorithms aect attitudes and behavior in an election campaign? Science, 381 (2023)(6656):page 398–404. doi:10.1126/science.abp9364. URL https://www.science.org/doi/abs/10.1126/science.abp9364.
[370] Sandra González-Bailón, David Lazer, Pablo Barberá, Meiqing Zhang, Hunt Allcott, et al.: Asymmetric ideological segregation in exposure to political news on Facebook. Science, 381 (2023)(6656):page 392–398. doi:10.1126/science.ade7138. URL https://www.science.org/doi/abs/10.1126/science.ade7138.
[371] Chhandak Bagchi, Filippo Menczer, Jennifer Lundquist, Monideepa Tarafdar, Anthony Paik, and Przemyslaw Grabowicz: Social media algorithms can curb misinformation, but do they? (September 2024). doi:10.5281/zenodo.13787981. URL https://zenodo.org/records/13787981/files/Social_media_algorithms_can_curb_misinformation_but_do_they_pdf.pdf.
[372] Oliver Marsh and Mark Scott: The Musk Eect: X's impact on Germany’s election. URL https://algorithmwatch.org/en/wp-content/uploads/2025/02/The-Musk-Effect_-Xs-impact-on-German-election.pdf. [Online; získáno 2025-03-28].
[373] Evropská Unie: NAŘÍZENÍ NAŘÍZENÍ EVROPSKÉHO PARLAMENTU A RADY (EU) 2022/2065 ze dne 19. října 2022 o jednotném trhu digitálních služeb a o změně směrnice 2000/31/ES (nařízení o digitálních službách) (10 2022). URL https://eur-lex.europa.eu/legal-content/CS/TXT/PDF/?uri=CELEX:32022R2065.
[374] Algorithm Watch: A guide to the Digital Services Act, the EU’s new law to rein in Big Tech. Algorithm Watch blog, (2022). URL https://algorithmwatch.org/en/dsa-explained/. [Online; získáno 2025-05-16].
[375] ČTK: EU podle NYT chystá pro Muskovu síť X pokutu přes miliardu dolarů. České noviny, (2025). URL https://www.ceskenoviny.cz/zpravy/eu-chysta-pro-muskovu-sit-x-pokutu-pres-miliardu-dolaru-pise-nyt/2656625. [Online; získáno 2025-05-16].
[376] Honza Šípek: Algoritmy sociálních sítí jsou novou taktickou zbraní. (2025). URL https://denikalarm.cz/2025/05/algoritmy-socialnich-siti-jsou-novou-taktickou-zbrani/.
[377] Jan Cibulka: Operátor z vašeho mobilu zjistí víc, než tušíte. Nic z toho vám ale neřekne. iRozhlas.cz, (2018). URL https://www.irozhlas.cz/komentare/co-o-vas-vime-je-tajne-i-pro-vas_1802151325_cib. [Online; získáno 2019-11-25].
[378] Aleš Pospíšil: Velký bratr vás sleduje 24/7, banky si klienty mohou proklepnout dle TelcoScore. E15.cz, (2018). URL https://www.e15.cz/finexpert/pujcujeme-si/velky-bratr-vas-sleduje-24-7-banky-si-klienty-mohou-proklepnout-dle-telcoscore-1341152. [Online; získáno 2019-11-25].
[379] Iuridicum Remedium: Vítězové Cen Velkého Bratra za rok 2017 (2018). URL https://bigbrotherawards.cz/vitezove-cen-velkeho-bratra-za-rok-2017/. [Online; získáno 2019-11-25].
[380] KT Global Business Group: Credit scoring solution based on telecom data (2019). URL https://corp.kt.com/eng/attach/area/A000000561/C000003656v5.pdf. [Online; získáno 2019-11-25].
[381] European Consumer Centre France: Cash payment limitations (01 2018). URL https://www.europe-consommateurs.eu/en/consumer-topics/financial-services-insurance/banking/means-of-payment/cash-payment-limitations/. [Online; získáno 2019-11-29].
[382] Glenn Greenwald: How Covert Agents Inltrate the Internet to Manipulate, Deceive, and Destroy Reputations. The Intercept, (2014). URL https://theintercept.com/2014/02/24/jtrig-manipulation/. [Online; získáno 2019-12-09].
[383] GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations. URL https://edwardsnowden.com/docs/doc/the-art-of-deception-training-for-a-new.pdf. [Online; získáno 2019-12-09].
[384] Ladislav Bittman: Mezinárodní dezinformace: černá propaganda, aktivní opatření a tajné akce. Mladá fronta, Praha (2000).
[385] Sam Cutler: How Chinese spy app allows ocials to harvest personal data. The Guardian, 07 (2019). URL https://www.theguardian.com/world/2019/jul/02/how-chinese-spy-app-allows-officials-to-harvest-personal-data. [Online; získáno 2019-12-09].
[386] Magdaléna Sikorová: Home Credit analyzuje Big Data díky nejmodernějším technologiím i s pomocí studentů. EkonTech.cz, (2018). URL https://www.ekontech.cz/clanek/home-credit-analyzuje-big-data-diky-nejmodernejsim-technologiim-pomoci-studentu. [Online; získáno 2019-11-25].
[387] Martin Petříček: Air Bank v Německu a Zonky na Západě i Východě, plánuje Šmejc. iDnes.cz, (2018). URL https://www.idnes.cz/ekonomika/podniky/jiri-smejc-home-credit-air-bank-petr-kellner.A180406_101708_ekoakcie_ane. [Online; získáno 2019-07-09].
[388] Sarah Zheng: Coming to a cinema near you – Chinese debtors `reel of shame'. South China Morning Post, (2018). URL https://www.scmp.com/news/china/society/article/2146733/coming-cinema-near-you-chinese-debtors-reel-shame. [Online; získáno 2020-01-02].
[389] Jeremy Bentham: The Panopticon Writings. Wo Es War. Verso (1995). ISBN 1859840833,9781859840832. URL http://gen.lib.rus.ec/book/index.php?md5=697E27300C8115C3D7C38E0DE47205B6.
[390] Shoshana Zubo: The Age of Surveillance Capitalism. The ght for a human future at the new frontier of power. PublicAairs Books (2018). ISBN 9781610395700. URL http://gen.lib.rus.ec/book/index.php?md5=ac68d3686a1fd9f06e8aae3a3f9599cb.
[391] Jaron Lanier: Komu patří budoucnost? Nejste zákazníkem internetových rem: jste jejich produktem. Dokořán a Argo, Praha (2016).
[392] Thomas Shaddack: Žluté zrcadlo. Živel, (2020)(40).
[393] Pavel D. Petr Š.: Coronavirus - call to action. URL https://www.meetup.com/keboolacz/events/269374140/. [Online; získáno 2021-02-26].
[394] Amnesty International: Europe: Amnesty International highlights human rights priorities for state responses to COVID-19. URL https://www.amnesty.org/en/latest/news/2020/04/europe-amnesty-international-highlights-human-rights-priorities/. [Online; získáno 2021-02-26].
[395] Matouš Lázňovský Pavel Kasík: Migranti jsou pro nás poslové špatných zpráv, říká slavný sociolog. iDnes.cz, (2015). URL https://www.idnes.cz/technet/veda/zygmunt-bauman-rozhovor-sociolog-uprchlici-migrace-technologie-modernita-stesti.A150826_151023_veda_mla. [Online; získáno 2021-02-26].
[396] Honza Šípek: 11. září na steroidech. A2, (2020)(12). URL https://www.advojka.cz/archiv/2020/12/11-zari-na-steroidech.
[397] et al. Yulia Balakhonova, Mikhail Rubin: Novy Mir. A Guide to Russian Media in the Times of Total Censorship. Proekt.media, (2022). URL https://www.proekt.media/en/guide-en/russian-media-after-war-en/. [Online; získáno 2023-01-03].
[398] Honza Šípek: Zatčen na Hedvábné stezce. A2, (2013)(22). URL https://www.advojka.cz/archiv/2013/22/zatcen-na-hedvabne-stezce.
[399] Ewen MacAskill Glenn Greenwald: NSA Prism program taps in to user data of Apple, Google and others. The Guardian, (2013). URL http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data. [Online; získáno 2013-07-03].
[400] Lucy Madison: Obama defends "narrow"surveillance programs. CBS News, (2013). URL https://www.cbsnews.com/news/obama-defends-narrow-surveillance-programs/. [Online; získáno 2013-07-03].
[401] Julian Borger et al. Ewen MacAskill: Mastering the internet: how GCHQ set out to spy on the world wide web. The Guardian, (2013). URL http://www.guardian.co.uk/uk/2013/jun/21/gchq-mastering-the-internet. [Online; získáno 2013-07-03].
[402] Glenn Greenwald: NSA collecting phone records of millions of Verizon customers daily. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order. [Online; získáno 2020-08-06]].
[403] Glenn Greenwald: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books (2014). ISBN 162779073X,9781627790734. URL http://gen.lib.rus.ec/book/index.php?md5=745187f139261b101015bc23d2c412db.
[404] Wikipedia contributors: Laura Poitras — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Laura_Poitras&oldid=964888994. [Online; accessed 8-August-2020].
[405] Edward Snowden: Nesmazatelné záznamy. Alpress, Frýdek-Místek (2020).
[406] Wikipedia contributors: Air gap (networking) — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Air_gap_(networking). [Online; accessed 3-January-2023].
[407] Wikipedia contributors: Stuxnet — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Stuxnet. [Online; accessed 3-January-2023].
[408] Wikipedia contributors: Tempest (codename) — Wikipedia, The Free Encyclopedia (2022). URL https://en.wikipedia.org/w/index.php?title=Tempest_(codename)&oldid=1073264081. [Online; accessed 3-January-2023].
[409] Jenny List: TEMPEST Comes To GNU Radio. Hackaday.com, (2020). URL https://hackaday.com/2020/05/14/tempest-comes-to-gnu-radio/. [Online; získáno 2023-01-03].
[410] Jaroslav Spurný: Tajemství Jaromíra Nohavici. Respekt, (2006). URL https://www.respekt.cz/tydenik/2006/22/tajemstvi-jaromira-nohavici. [Online; získáno 2020-07-12].
[411] Violet Blue: Anger mounts after Facebook's 'shadow proles' leak in bug. ZDnet.com, (2013). URL https://www.zdnet.com/article/anger-mounts-after-facebooks-shadow-profiles-leak-in-bug/. [Online; získáno 2013-07-03].
[412] Patrick Zandl: František Vrabel: Newstin šel od vojenských technologií ke zpravodajství. Lupa.cz, (2009). URL http://www.lupa.cz/clanky/frantisek-vrabel-newstin-vojenske-zpravodajstvi/. [Online; získáno 2013-07-02].
[413] (anonymní autor): Nebezpečí měřitelnosti sociálních médií. JedenBod, (2011). URL https://jedenbod.cz/1234-nebezpeci-meritelnosti-socialnich-medii.html. [Online; získáno 2013-07-03].
[414] Wikipedia contributors: IPhone — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=IPhone. [Online; accessed 12-July-2020].
[415] Wikipedia contributors: ICloud leaks of celebrity photos — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=ICloud_leaks_of_celebrity_photos&oldid=971779585. [Online; accessed 8-August-2020].
[416] Glenn Greenwald Laura Poitras: NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things' – video. The Guardian, (2013). URL https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video. [Online; získáno 2020-08-16].
[417] Wikipedia contributors: Evo Morales grounding incident — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Evo_Morales_grounding_incident&oldid=970362965. [Online; accessed 14-August-2020].
[418] Wikipedia contributors: Global surveillance disclosures (2013–present) — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Global_surveillance_disclosures_(2013%E2%80%93present)&oldid=968419491. [Online; accessed 13-August-2020].
[419] Joby Warrick Ellen Nakashima: For NSA chief, terrorist threat drives passion to `collect it all'. Washington Post, (2013). URL https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html. [Online; získáno 2020-08-09].
[420] Wikipedia contributors: Caedite eos. Novit enim Dominus qui sunt eius. — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Caedite_eos._Novit_enim_Dominus_qui_sunt_eius.&oldid=971483857. [Online; accessed 8-August-2020].
[421] Wikipedia contributors: Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008&oldid=969408433. [Online; accessed 6-August-2020].
[422] Spencer Ackerman Glenn Greenwald: NSA collected US email records in bulk for more than two years under Obama. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama. [Online; získáno 2020-08-21].
[423] Prezidenta USA podepisuje automat, Obama na dálku parafoval i zákon. iDnes.cz, (2011). URL https://www.idnes.cz/zpravy/zahranicni/prezidenta-usa-podepisuje-automat-obama-na-dalku-parafoval-i-zakon.A110627_210320_zahranicni_stf. [Online; získáno 2020-08-07]].
[424] Wikipedia contributors: Upstream collection — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Upstream_collection. [Online; accessed 21-August-2020].
[425] Craig Timberg: NSA paying U.S. companies for access to communications networks. Washington Post, (2013). URL https://www.washingtonpost.com/world/national-security/nsa-paying-us-companies-for-access-to-communications-networks/2013/08/29/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html. [Online; získáno 2020-08-21].
[426] Saikat Datta: NSA used private rms to snoop on India. Hindustan Times, (2014). URL https://www.hindustantimes.com/india/nsa-used-private-firms-to-snoop-on-india/story-GOFHqXssJIOewA7FqPqJyL.html. [Online; získáno 2020-08-21].
[427] Julia Angwin et al.: NSA Spying Relies on AT and T's `Extreme Willingness to Help'. ProPublica, (2015). URL https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help. [Online; získáno 2020-08-21].
[428] Henrik Moltke Ryan Gallagher: Titanpointe The NSA's Spy Hub in New York, Hidden in Plain Sight. The Intercept, (2016). URL https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/. [Online; získáno 2020-08-21].
[429] Barton Gellman: Dark mirror : Edward Snowden and the American Surveillance State. PENGUIN PRESS (2020). ISBN 2019049573, 2019049574, 9781594206016, 9780698153394. URL http://gen.lib.rus.ec/book/index.php?md5=34A1491F4BDC9248D016AF3A095D9B47.
[430] Frank Konkel: The Details About the CIA's Deal With Amazon. The Atlantic, (2014). URL https://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-cias-deal-with-amazon/374632/. [Online; získáno 2020-08-28].
[431] Laura Poitras Barton Gellman: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post, (2013). URL www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html. [Online; získáno 2020-08-21].
[432] Glenn Greenwald: XKeyscore: NSA tool collects 'nearly everything a user does on the internet'. The Guardian, (2013). URL https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. [Online; získáno 2020-08-06]].
[433] Wikipedia contributors: ECHELON — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=ECHELON&oldid=971908652. [Online; accessed 13-August-2020].
[434] Holger Stark Laura Poitras, Marcel Rosenbach: US Intelligence Watches Germany Closely. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html. [Online; získáno 2020-08-28].
[435] Fidelius Schmid et al Laura Poitras, Marcel Rosenbach: How the NSA Targets Germany and Europe. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html. [Online; získáno 2020-08-07]].
[436] Submarine Cable Map. URL https://www.submarinecablemap.com/\#/landing-point/bude-united-kingdom. [Online; získáno 2020-08-13].
[437] Juliette Garside James Ball, Luke Harding: BT and Vodafone among telecoms companies passing details to GCHQ. The Guardian, (2013). URL https://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq. [Online; získáno 2020-08-21].
[438] Nick Hopkins et al. Ewen MacAskill, Julian Borger: GCHQ taps bre-optic cables for secret access to world's communications. The Guardian, (2013). URL https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa. [Online; získáno 2020-08-13].
[439] Huib Modderkolk Steven Derix: NSA hielp Nederland met onderzoek naar herkomst 1,8 miljoen. NRC Handelsblad, (2014). URL https://www.nrc.nl/nieuws/2014/02/08/nsa-hielp-nederland-met-onderzoek-naar-herkomst-18-miljoen-a1427343. [Online; získáno 2020-08-28].
[440] Wikipedia contributors: DE-CIX — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=DE-CIX&oldid=961752108. [Online; accessed 9-August-2020].
[441] Douglas Busvine: Internet operator challenges network tapping by German spy agency. Reuters, (2018). URL https://www.reuters.com/article/us-germany-surveillance/internet-operator-challenges-network-tapping-by-german-spy-agency-idUSKCN1ML2FU. [Online; získáno 2020-08-21].
[442] (autor neuveden): German Intelligence Used NSA Spy Program. Der Spiegel, (2013). URL https://www.spiegel.de/international/germany/german-intelligence-agencies-used-nsa-spying-program-a-912173.html. [Online; získáno 2020-08-07]].
[443] Hubert Gude et al. Jacob Appelbaum, Nikolas Blome: The NSA's Secret Spy Hub in Berlin. Der Spiegel, (2013). URL https://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html. [Online; získáno 2020-08-21].
[444] Holger Stark Laura Poitras, Marcel Rosenbach: How America Spies on Europe and the UN. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/secret-nsa-documents-show-how-the-us-spies-on-europe-and-the-un-a-918625.html. [Online; získáno 2020-08-21].
[445] James Bamford: Every Move You Make. Foreign Policy, (2016). URL https://foreignpolicy.com/2016/09/07/every-move-you-make-obama-nsa-security-surveillance-spying-intelligence-snowden/. [Online; získáno 2020-08-13].
[446] Glen Greenwald James Ball, Julian Borger: Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, (2013). URL https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security. [Online; získáno 2020-08-21].
[447] Glenn Greenwald Ryan Gallagher: How the NSA Plans to Infect `Millions' of Computers with Malware. The Intercept, (2014). URL https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/. [Online; získáno 2020-08-05].
[448] redakce: Documents Reveal Top NSA Hacking Unit. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. [Online; získáno 2020-08-21].
[449] Bruce Schneier: Attacking Tor: how the NSA targets users' online anonymity. The Guardian, (2013). URL https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity. [Online; získáno 2020-08-05]].
[450] Christian Stöcker Jacob Appelbaum, Judith Horchert: Catalog Advertises NSA Toolbox. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html. [Online; získáno 2020-08-28].
[451] Marcel Rosenbach et al. Jacob Appelbaum, Laura Poitras: Documents Reveal Top NSA Hacking Unit. Der Spiegel, (2013). URL https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. [Online; získáno 2020-08-28].
[452] Jacob Appelbaum: To Protect And Infect, Part 2 (12 2013). URL https://media.ccc.de/v/30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob. Záznam přednášky. [Online; získáno 2020-08-28].
[453] James Bamford: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say). Wired, (2013). URL https://www.wired.com/2012/03/ff-nsadatacenter/. [Online; získáno 2012-04-19].
[454] Cisco: The Zettabyte Era—Trends and Analysis (05 2013). URL https://web.archive.org/web/20120202211853/http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/VNI_Hyperconnectivity_WP.pdf. [Online; archivováno 2012-02-02].
[455] Wikipedia contributors: Internet trac — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Internet_traffic. [Online; získáno 2013-07-01].
[456] Wikipedia contributors: Zettabyte Era — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=Zettabyte_Era&oldid=966493493. [Online; accessed 20-August-2020].
[457] Henry Kenyon: Work commences on 1B dollars NSA 'spy' center. Defense Systems, (2011). URL https://defensesystems.com/Articles/2011/01/07/NSA-spy-cyber-intelligence-data-center-Utah.aspx. [Online; získáno 2020-08-20].
[458] James Bamford: NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar. Wired, (2013). URL https://www.wired.com/2013/06/general-keith-alexander-cyberwar/. [Online; získáno 2013-07-02].
[459] Susan Page Peter Eisler: 3 NSA veterans speak out on whistle-blower: We told you so. USA Today, (2013). URL https://eu.usatoday.com/story/news/politics/2013/06/16/snowden-whistleblower-nsa-officials-roundtable/2428809/. [Online; získáno 2013-07-06].
[460] Julia Angwin: Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Times Books, 0 edition (2014). ISBN 0805098070,9780805098075. URL http://gen.lib.rus.ec/book/index.php?md5=e9fa22c723a5cb5260c3285a5e83fc96.
[461] xkucf: Týden bez Googlu. ABClinuxu.cz, (2012). URL https://www.abclinuxu.cz/blog/xkucf03/2012/9/tyden-bez-googlu. [Online; získáno 2013-06-30].
[462] Franta: Týden bez Googlu – vyhodnocení. Kinderporno.cz, (2012). URL http://kinderporno.cz/d/node/868. [Online; získáno 2013-06-30].
[463] Electronic Frontier Foundation: Opt out of PRISM, the NSA's global data surveillance program. URL http://prism-break.org/. [Online; získáno 2013-06-29].
[464] Wikipedia contributors: The Pirate Bay trial — Wikipedia, The Free Encyclopedia (2020). URL https://en.wikipedia.org/w/index.php?title=The_Pirate_Bay_trial&oldid=966996563. [Online; accessed 8-August-2020].
[465] Martin Vyleťal: Jiří Srstka (Dilia): Uložto.cz nám jednostranně vypovědělo smlouvu. Lupa.cz, (2013). URL http://www.lupa.cz/clanky/jiri-srstka-dilia-ulozto-cz-nam-jednostranne-vypovedelo-smlouvu/. [Online; získáno 2013-06-30].
[466] Michal Krsek: Vzniká propojovací uzel v Brně. Lupa.cz, (2006). URL https://www.lupa.cz/clanky/vznika-propojovaci-uzel-v-brne/. [Online; získáno 2020-08-28].
[467] Petr Krčmář: Když vypadne Google, rozbije se internet. Root.cz, (2016). URL https://www.root.cz/clanky/kdyz-vypadne-google-rozbije-se-internet/. [Online; získáno 2020-08-28].
[468] Stefan Schuster (ed.): Mass Surveillance - Part I Risks Opportunities and Mitigation Strategies. Technical report, STOA - Science and Technology Options Assessment, Brussels (01 2015). doi:10.2861/269619. URL https://www.europarl.europa.eu/RegData/etudes/STUD/2015/527409/EPRS_STU%282015%29527409_REV1_EN.pdf. [Online; získáno 2020-08-21].
[469] Jaroslav Krejčí: Devět let Linuxu na přerovské základní škole. LinuxExpres.cz, (2012). URL https://www.linuxexpres.cz/business/devet-let-linuxu-na-prerovske-zakladni-skole. [Online; získáno 2013-07-01].
[470] Rastislav Guľaš: Ministerstvo vnútra navrhuje zakázať používanie anonymizérov a uchovávať údaje používateľov verejných internetových fór. Inet.sk, (2009). URL https://archiv.inet.sk/8135-8135ministerstvo-vnutra-navrhuje-zakazat-pouzivanie-anonymizerov-a-uchovavat-udaje-pouzivatelov-verejnych-internetovych-for.html. [Online; získáno 2013-07-04].
[471] Jakub Mikuláš: Cypherpunkeři: Stav diskuze a prostředků digitální kryptograe. (2011). URL https://jedenbod.cz/uploads/2011/12/Crypto.pdf. [Online; získáno 2020-08-21].
[472] Honza Šípek: Co dělat pro PRISM? A2, (2013)(15). URL https://www.advojka.cz/archiv/2013/15/co-delat-po-prism.
[473] Václav Cílek (ed.) (editor): Něco se muselo stát: Nová kniha proměn, chapter Co dělat po PRISM?, page 120–127. Novela Bohemica (2014).
[474] Hacking Team: Remote Control System. Whitepaper. (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/RCS.pdf. [Online; získáno 2015-07-15].
[475] Hacking Team: RCS Remote Mobile Infection. Whitepaper (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/RMI.pdf. [Online; získáno 2015-07-15].
[476] Věstník veřejných zakázek: Posílení kapacity české policie v boji proti korupci a hospodářské kriminalitě, Systém pro monitoring internetu. URL https://www.vestnikverejnychzakazek.cz/en-US/Form/Display/75585. [Online; získáno 2015-07-15].
[477] Daniel Dočekal: Policie ČR: Šmírovací software jsme koupili, ale vše je tajné, nic neřekneme. URL http://www.lupa.cz/clanky/policie-cr-smirovaci-software-jsme-koupili-ale-vse-je-tajne-nic-nerekneme/. [Online; získáno 2015-07-13].
[478] Policie ČR David Schön: Použití sledovacího softwaru (2015). URL http://www.policie.cz/clanek/pouziti-sledovaciho-softwaru.aspx. [Online; získáno 2015-07-13].
[479] vb: Policie se ‚nabourává` lidem do počítačů. ‚Je to v pořádku`. Echo24, (2015). URL https://www.echo24.cz/a/iKwpB/policie-se-nabourava-lidem-do-pocitacu-je-to-v-poradku. [Online; získáno 2015-07-15].
[480] Petr Hájek: Odhalení WikiLeaks: Stát fízluje Protiproud a další média. Desítky miliónů za speciální viry. Americké a české tajné služby v bratrském objetí. Hrůza ze svobodných lidí. Nedáme se! Protiproud: Kontrarevoluční magazín Petra Hájka, (2015). URL https://web.archive.org/web/20171010160137/http://www.protiproud.cz/politika/1802-odhaleni-wikileaks-stat-fizluje-protiproud-a-dalsi-media-desitky-milionu-za-specialni-viry-americke-a-ceske-tajne-sluzby-v-bratrskem-objeti-hruza-ze-svobodnych-lidi-nedame-se.htm. [Online; archivováno 2017-10-10].
[481] Richard Hiller: URL Exploit. URL http://nat.brmlab.cz:9065//sql/supcz/5052/comments.txt. [Online; získáno 2015-07-15].
[482] Hacking Team: RCS Network Injector. Datasheet. (2011). URL https://ht.transparencytoolkit.org/rcs-dev\%5cshare/Documentation/Whitepapers/Network\%20Injector.pdf. [Online; získáno 2015-07-15].
[483] Alex Frazer Ian E. Muller, Amit Serper: Breaking Down the Hacking Team Attack Operation. URL https://www.cybereason.com/blog/breaking-down-the-hacking-team-attack-operation. [Online; získáno 2015-07-15].
[484] brmlab: Hacked Team - Data processing. URL https://brmlab.cz/event/hackedteam. [Online; získáno 2015-07-13].
[485] Claudio Agosti: I worked at HackingTeam, my emails were leaked to WikiLeaks and I'm ok with that. Expost, (2015). URL https://medium.com/expost-magazine/i-worked-at-hackingteam-my-emails-were-leaked-to-wikileaks-and-i-m-ok-with-that-f8f28b0584fe. [Online; získáno 2015-07-15].
[486] Zdrojový kód RCS. URL https://github.com/hackedteam/rcs-common/blob/master/lib/rcs-common/evidence/file.rb. [Online; získáno 2015-07-15].
[487] WikiLeaks - The Hackingteam Archive. URL https://wikileaks.org/hackingteam/emails/?q=academic&m0from=\%40bull.cz&mto=&title=¬itle=&date=&nofrom=¬o=&count=50&sort=0\#searchresult. [Online; získáno 2015-07-15].
[488] Tomáš Hlavsa: BULL CZ: Exploit development partner - intro. URL https://wikileaks.org/hackingteam/emails/emailid/436428. [Online; získáno 2015-07-15].
[489] experimentálního vývoje a inovací Informační systém výzkumu: Speciální softwarový balíček (2013). URL http://www.isvav.cz/resultDetail.do?rowId=RIV\%2F68407700\%3A21240\%2F13\%3A00228412!RIV15-MSM-21240___. [Online; získáno 2015-07-15].
[490] Tomáš Hlavsa: Re: R: BULL: RCS - acceptance criteria. URL https://wikileaks.org/hackingteam/emails/emailid/437403. [Online; získáno 2015-07-15].
[491] Honza Šípek: Česká policie používá malware. A2, (2015)(15). URL https://www.advojka.cz/archiv/2015/15/ceska-policie-pouziva-malware.
[492] Wikipedia contributors: Warrant canary — Wikipedia, The Free Encyclopedia (2019). URL https://en.wikipedia.org/w/index.php?title=Warrant_canary. [Online; accessed 5-December-2019].
[493] Riseup.net: Canary Statement (2019). URL https://riseup.net/en/canary. [Online; získáno 2019-12-06].
[494] Ondřej Profant Honza Šípek: Velký webový test. A2, (2013). URL https://www.advojka.cz/archiv/2013/7/velky-webovy-test.
[495] Honza Šípek: Nenápadné černé skříňky. A2, (2017)(2). URL https://www.advojka.cz/archiv/2017/2/nenapadne-cerne-skrinky.
[496] Honza Šípek: Pod svícnem tma. Vláda schválila zákon o Vojenském zpravodajství. A2larm.cz, (2020). URL https://a2larm.cz/2020/03/pod-svicnem-tma-do-vlady-jde-zakon-o-vojenskem-zpravodajstvi/.
[497] Honza Šípek: Vojenské zpravodajství: dohled nad internetem má umetenou cestu. A2larm.cz, (2020). URL https://denikalarm.cz/2020/11/vojenske-zpravodajstvi-dohled-nad-internetem-ma-umetenou-cestu/. [Online; získáno 2021-02-26].
[498] Thomas Shaddack: Mění se jen „jak“. A2, (2020)(2). URL https://www.advojka.cz/archiv/2020/2/meni-se-jen-jak.
[499] Jan Hrach: Od umělého neuronu k ChatGPT. URL https://www.youtube.com/watch?v=o9TwtMywEuI.
[500] Yuval Abraham: ‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza. +972 Magazine, (2004). URL https://www.972mag.com/lavender-ai-israeli-army-gaza/. [Online; získáno 2025-08-23].
[501] Sébastien Roblin: Military AI vanquishes human ghter pilot in F-16 simulation. How scared should we be? NBC News, (2020). URL https://www.nbcnews.com/think/opinion/military-ai-vanquishes-human-fighter-pilot-f-16-simulation-how-ncna1238773. [Online; získáno 2025-08-23].
[502] Thomas Shaddack: Doba dronová. A2, (2024). URL https://www.advojka.cz/archiv/2024/9/doba-dronova. [Online; získáno 2025-08-23].
[503] Thomas Shaddack: Bitcoin: Bez vlád i bankéřů. A2, (2013)(03). URL https://www.advojka.cz/archiv/2013/3/bitcoin-bez-vlad-i-bez-bankeru.
[504] Chris Anderson: Makers. The New Industrial Revolution. Crown Business, New York (2012). ISBN 978-0-307-72095-5.
[505] Ondřej Ne: Zakázané technologie: Zkázonosný molding. Ikarie, (1995)(2).
[506] Wikipedia: Serapeum — Wikipedia (2016). URL https://en.wikipedia.org/w/index.php?title=Serapeum. [Online; získáno 2016-11-05].
[507] Wikipedia: Library of Alexandria — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Library_of_Alexandria. [Online; accessed 19-November-2016].
[508] Tim Berners-Lee; Robert Cailliau; Jean-François Gro; Bernd Pollermann: World-Wide Web: The Information Universe. Internet Research, 2 (1992)(1):page 52–58. URL https://www.w3.org/History/1992/ENRAP/Article_9202.pdf. [Online, získáno 2016-11-18].
[509] Wikipedia: Academic publishing — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Academic_publishing. [Online; accessed 17-November-2016].
[510] Vincent Larivière, Stefanie Haustein, and Philippe Mongeon: The Oligopoly of Academic Publishers in the Digital Era. PLOS ONE, 10 (2015)(6):page 1–15. doi:10.1371/journal.pone.0127502. URL http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0127502.
[511] Michael S. Rosenwald: This student put 50 million stolen research articles online. And they're free. Washington Post, (2016). URL https://www.washingtonpost.com/local/this-student-put-50-million-stolen-research-articles-online-and-theyre-free/2016/03/30/7714ffb4-eaf7-11e5-b0fd-073d5930a7b7_story.html?tid=sm_fb. [Online; získáno 2016-11-18].
[512] Pavel Jungwirth: Volný přístup. Respekt, 17 (2013). URL https://www.respekt.cz/tydenik/2013/17/volny-pristup.
[513] Wikipedia: Aaron Swartz — Wikipedia, The Free Encyclopedia (2016). URL https://en.wikipedia.org/w/index.php?title=Aaron_Swartz. [Online; accessed 15-November-2016].
[514] Noam Scheiber: The Inside Story of Why Aaron Swartz Broke Into MIT and JSTOR. New Republic, (2013). URL https://newrepublic.com/article/112418/aaron-swartz-suicide-why-he-broke-jstor-and-mit. [Online; získáno 2016-11-18].
[515] Justin Peters: The Idealist: Aaron Swartz and the Rise of Free Culture on the Internet. Scribner (2016). ISBN 1476767726,9781476767727. URL http://gen.lib.rus.ec/book/index.php?md5=b93692189b33dc5c95a9c4a0b66c4dd9.
[516] Christopher Kelty: The disappearing virtual library. Al Jazeera, (2012). URL http://www.aljazeera.com/indepth/opinion/2012/02/2012227143813304790.html. Retr. 2016-11-17.
[517] John Bohannon: The frustrated science student behind Sci-Hub. Science, (2016). doi: 1 0 . 1 1 2 6 / s c i e n c e . a a f 5 6 75. URL http://www.sciencemag.org/news/2016/04/alexandra-elbakyan-founded-sci-hub-thwart-journal-paywalls. [Online; získáno 2016-11-18].
[518] Ernesto: Sci-Hub Tears Down Academia's “Illegal” Copyright Paywalls. TorrentFreak, (2015). URL https://torrentfreak.com/sci-hub-tears-down-academias-illegal-copyright-paywalls-150627/. [Online; získáno 2016-11-18].
[519] John Bohannon: Who's downloading pirated papers? Everyone. Science, (2016). doi: 1 0 . 1 1 2 6 / s c i e n c e . a a f 5 6 64. URL http://www.sciencemag.org/news/2016/04/whos-downloading-pirated-papers-everyone.
[520] Honza Šípek: Stínoví knihovníci. A2, (2016)(24). URL https://www.advojka.cz/archiv/2016/24/stinovi-knihovnici.
[521] Honza Šípek: Eskalátor 2. A2, (2013)(16). URL https://www.advojka.cz/archiv/2013/16/eskalator-2.
[522] Daniela Drtinová: Vachek: Politici jsou strašidla. Zastupitelská demokracie je u konce, bude to maso. DVTV, (2019). URL https://video.aktualne.cz/dvtv/vachek-politici-jsou-strasidla-zastupitelska-demokracie-je-u/r~13cb97cee7a111e9a24cac1f6b220ee8/. [Online; získáno 2026-02-13].
[523] Eric S. Raymond: The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary. O'Reilly (feb 1999). ISBN 0-596-00108-8. URL https://monoskop.org/images/e/e0/Raymond_Eric_S_The_Cathedral_and_the_Bazaar_rev_ed.pdf.
[524] Richard M. Stallman Sam Williams: Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution. Free Software Foundation (2010). ISBN 0983159211. URL https://static.fsf.org/nosvn/faif-2.0.pdf.
[525] Wikipedia contributors: PeerTube — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=PeerTube. [Online; accessed 21-August-2025].
[526] Jiří Eischmann: Vhsky.cz: česká alternativa k YouTube postavená na PeerTube. Sešívaný blog, (2024). URL https://blog.eischmann.cz/2024/12/20/vhsky-cz-ceska-alternativa-k-youtube-postavena-na-peertube/. [Online; získáno 2025-04-11].
[527] Wikipedia contributors: Fediverse — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Fediverse\#Adoption. [Online; accessed 11-April-2025].
[528] Radka Typltová: Facebook cenzuruje už i předpověď počasí: Lajky podvodně skrze povodně? Info.cz, (2024). URL https://www.info.cz/zpravodajstvi-a-komentare/facebook-cenzuruje-uz-i-predpoved-pocasi-lajky-podvodne-skrze-povodne. [Online; získáno 2026-01-20].
[529] Brianna Sacks: Facebook is blocking emergency warnings as wildres roar through West. Washington Post, (2024). URL https://web.archive.org/web/20241004230059/https://www.washingtonpost.com/climate-environment/2024/09/10/facebook-is-blocking-emergency-warnings-wildfires-roar-through-west/. [Online; archivováno 2024-10-04].
[530] Jakub Jetmar: Žádný podcast neexistuje. deliberace.lol, (2024). URL https://jetmarjakub.substack.com/p/zadny-podcast-neexistuje. [Online; získáno 2025-08-19].
[531] Wikipedia contributors: Eugen Rochko — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Eugen_Rochko. [Online; accessed 6-January-2026].
[532] Sean Tilley: One Mammoth of a Job: An Interview with Eugen Rochko of Mastodon. Medium, (2018). URL https://medium.com/we-distribute/one-mammoth-of-a-job-an-interview-with-eugen-rochko-of-mastodon-23b159d6796a. [Online; získáno 2026-01-06].
[533] Wikipedia contributors: Network eect — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Network_effect. [Online; accessed 10-January-2026].
[534] Lukáš Falteisek: Biologické čtvrtky: Ohrožené jizvy v krajině - přednáška (10 2013). URL https://www.youtube.com/watch?v=uhhV2LG1S5k.
[535] Wikipedia contributors: Acquisition of Twitter by Elon Musk — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Acquisition_of_Twitter_by_Elon_Musk. [Online; accessed 20-January-2026].
[536] Savio Sciancalepore and Roberto Di Pietro: SOS - Securing Open Skies. CoRR, abs/1809.09026 (2018). URL http://arxiv.org/abs/1809.09026.
[537] Laura Gozzi: Nato strengthens defences after Russian drones shot down over Poland. BBC, (2025). URL https://www.bbc.com/news/articles/c0lkz2n34z6o. [Online; získáno 2026-01-19].
[538] Jan Hrach: Passive emitter tracking. Master's thesis, Univerzita Karlova, Matematicko-fyzikální fakulta (2019). URL https://jenda.hrach.eu/dipl.pdf.
[539] Wikipedia contributors: Jack Sweeney — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Jack_Sweeney. [Online; accessed 20-January-2026].
[540] Ramishah Maruf: Elon Musk oered a Florida teen $5,000 to delete a Twitter account tracking his jet. It wasn’t enough. CNN, (2022). URL https://edition.cnn.com/2022/01/30/business/elon-musk-private-jet-twitter/index.html. [Online; získáno 2026-01-20].
[541] Wikipedia contributors: ElonJet — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=ElonJet. [Online; accessed 20-January-2026].
[542] Kevin Collier Jason Abbruzzese and Phil Helsel: Twitter suspends journalists who have been covering Elon Musk and the company. NBC News, (2022). URL https://www.nbcnews.com/tech/social-media/twitter-suspends-journalists-covering-elon-musk-company-rcna62032. [Online; získáno 2026-01-20].
[543] Taylor Hatmaker: Elon Musk just brought an infamous neo-Nazi back to Twitter. TechCrunch, (2022). URL https://techcrunch.com/2022/12/02/elon-musk-nazis-kanye-twitter-andrew-anglin/. [Online; získáno 2026-02-06].
[544] Tom Gerken: Twitter blocks users from sharing Mastodon links. BBC, (2022). URL https://www.bbc.com/news/technology-63999452. [Online; získáno 2026-02-06].
[545] Josh Nicholas: Elon Musk drove more than a million people to Mastodon – but many aren’t sticking around. The Guardian, (2023). URL https://www.theguardian.com/news/datablog/2023/jan/08/elon-musk-drove-more-than-a-million-people-to-mastodon-but-many-arent-sticking-around. [Online; získáno 2026-02-06].
[546] Matt Haldane: Chinese social media users are ocking to the decentralised Mastodon platform to nd community amid crackdown at home. South China Morning Post, (2022). URL https://www.scmp.com/tech/tech-trends/article/3192843/chinese-social-media-users-are-flocking-decentralised-mastodon. [Online; získáno 2026-02-13].
[547] Ian Johnston: Twitter rival Mastodon rejects funding to preserve nonprot status. Ars Technica, (2022). URL https://arstechnica.com/tech-policy/2022/12/twitter-rival-mastodon-rejects-funding-to-preserve-nonprofit-status/. [Online; získáno 2026-02-06].
[548] Zoë Schier: How Mastodon made friends with Meta. Platformer, (2024). URL https://www.platformer.news/mastodon-interview-eugen-rochko-meta-bluesky-threads-federation/. [Online; získáno 2026-02-06].
[549] Eugen Rochko: Mastodon forms new U.S. non-prot. Mastodon Blog, (2024). URL https://blog.joinmastodon.org/2024/04/mastodon-forms-new-u.s.-non-profit/. [Online; získáno 2026-02-06].
[550] Will Oremus Naomi Nix: Move fast and beat Musk: The inside story of how Meta built Threads. The Washington Post, (2023). URL https://web.archive.org/web/20230801085537/https://www.washingtonpost.com/technology/2023/07/29/meta-threads-mark-zuckerberg-rival-twitter-musk/. [Online; archivováno 2023-07-29].
[551] David Morley: Monthly stats for Mastodon (02 2026). URL https://mastodon.fediverse.observer/stats&months=48. [Online; získáno 2026-02-06].
[552] Wikipedia contributors: ActivityPub — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=ActivityPub. [Online; accessed 5-February-2026].
[553] Wikipedia contributors: Christine Lemmer-Webber — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/w/index.php?title=Christine_Lemmer-Webber. [Online; accessed 5-February-2026].
[554] Tolulope Oshinowo, Sohyeon Hwang, Amy X. Zhang, and Andrés Monroy-Hernández: Seeing the Politics of Decentralized Social Media Protocols (2025). URL https://arxiv.org/pdf/2505.22962v1.
[555] Wikipedia contributors: Persecution of transgender people under the second Trump administration — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Persecution_of_transgender_people_under_the_second_Trump_administration. [Online; accessed 5-February-2026].
[556] Iridicum Remedium: Byly rozdány Ceny Velkého bratra za rok 2022. Big Brother Awards, (2023). URL https://bigbrotherawards.cz/2023/03/23/byly-rozdany-ceny-velkeho-bratra-za-rok-2022/. [Online; získáno 2025-08-24].
[557] David F. Carr: Since election day in the US, usage of the Bluesky app is more than 500% higher in the US and over 350% higher in the UK. Similarweb Blog, (2024). URL https://www.similarweb.com/blog/insights/social-media-news/bluesky-sustained-growth/. [Online; získáno 2026-02-06].
[558] Will Oremus: Bluesky, a trendy rival to X, nally opens to the public. The Washington Post, (2024). URL https://web.archive.org/web/20240206145533/https://www.washingtonpost.com/technology/2024/02/06/bluesky-launch-public-jay-graber/. [Online; archivováno 2026-02-06].
[559] Mike Masnick: Protocols, Not Platforms: A Technological Approach to Free Speech. Knight First Amendment Institute, Columbia University, (2019). URL https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech. [Online; získáno 2026-02-06].
[560] Christine Lemmer-Webber: How decentralized is Bluesky really? Dusty Cloud, (2024). URL https://dustycloud.org/blog/how-decentralized-is-bluesky/. [Online; získáno 2026-02-06].
[561] Christine Lemmer-Webber: Re: Re: Bluesky and Decentralization. Dusty Cloud, (2024). URL https://dustycloud.org/blog/re-re-bluesky-decentralization/. [Online; získáno 2026-02-06].
[562] Wikipedia contributors: 2025 Turkish protests — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=2025_Turkish_protests. [Online; accessed 6-February-2026].
[563] SCF: Bluesky restricts access to 72 accounts in Turkey amid government pressure. Stockholm Center for Freedom, (2025). URL https://stockholmcf.org/bluesky-restricts-access-to-72-accounts-in-turkey-amid-government-pressure/. [Online; získáno 2026-02-06].
[564] Human Rights Watch Article19, Freedom of Expression Association: Joint Open Letter to Social Media Companies on Censorship in Türkiye. Human Rights Watch, (2025). URL https://www.hrw.org/news/2025/05/08/joint-open-letter-social-media-companies-censorship-turkiye. [Online; získáno 2026-02-06].
[565] Ana Valens: Mastodon is crumbling—and many blame its creator. Daily Dot, (2021). URL https://www.dailydot.com/news/mastodon-fediverse-eugen-rochko/. [Online; získáno 2025-08-23].
[566] Eugen Rochko: Trump's new social media platform found using Mastodon code. Mastodon Blog, (2021). URL https://blog.joinmastodon.org/2021/10/trumps-new-social-media-platform-found-using-mastodon-code/. [Online; získáno 2025-08-24].
[567] Adi Robertson: Trump’s social network has 30 days to stop breaking the rules of its software license. The Verge, (2021). URL https://www.theverge.com/2021/10/22/22740354/trump-truth-social-network-spac-mastodon-license-software-freedom-conservancy. [Online; získáno 2025-08-24].
[568] Wikipedia contributors: Pittsburgh synagogue shooting — Wikipedia, The Free Encyclopedia (2026). URL https://en.wikipedia.org/w/index.php?title=Pittsburgh_synagogue_shooting. [Online; accessed 13-February-2026].
[569] Wikipedia contributors: Gab (social network) — Wikipedia, The Free Encyclopedia (2025). URL https://en.wikipedia.org/wiki/Gab_(social_network)\#2018_Pittsburgh_synagogue_shooting. [Online; accessed 13-February-2026].
[570] Ben Makuch: The Nazi-Free Alternative to Twitter Is Now Home to the Biggest Far Right Social Network. Vice, (07). URL https://www.vice.com/en/article/the-nazi-free-alternative-to-twitter-is-now-home-to-the-biggest-far-right-social-network/. [Online; získáno 2026-02-13].
[571] Eugen Rochko: Gab switches to Mastodon's code. Mastodon Blog, (2019). URL https://blog.joinmastodon.org/2019/07/statement-on-gabs-fork-of-mastodon/. [Online; získáno 2026-02-13].
[572] Chris Stokel-Walker: Why The Computer Company Raspberry Pi’s New Hire Caused A Social Media Firestorm. BuzzFeed News, (2022). URL https://www.buzzfeednews.com/article/chrisstokelwalker/raspberry-pi-hired-ex-cop-mastodon-controversy. [Online; získáno 2026-02-13].
[573] John Prott: The Raspberry Pi social media incident shows some Mastodon admins need more moderation chops. Medium, (2022). URL https://medium.com/@jmproffitt/the-raspberry-pi-social-media-incident-shows-some-mastodon-admins-need-more-moderation-chops-afa3b00be90b. [Online; získáno 2026-02-13].
[574] Em: The revolution will not happen on the platforms owned by the oppressors. (08 2025). URL https://infosec.exchange/@Em0nM4stodon/115073758078532419. [Online; získáno 2026-02-13].
[575] Jakub Cabal: Přehled českých Mastodon serverů 2025. JakubCabal.cz, (2025). URL https://jakubcabal.cz/blog/20251225-prehled-ceskych-mastodon-serveru/. [Online; získáno 2026-02-13].
[576] Morten: Reverzní inženýři všech zemí, spojte se! Živel, 16. URL http://zivel.net/archiv?magazin=18&kapitola=310.
[577] Shaddack: Červ nikdy nespí. Živel, 22. URL http://www.zivel.net/archiv?magazin=24&kapitola=392.
[578] Shaddack: Od paprskometu k laseru. Živel, 19. URL http://zivel.net/archiv?magazin=21&kapitola=337.
[579] Shaddack: Rizika a realita RFID čipů. Živel, 27. URL https://eldar.cz/mozek/mirror/nightmares-RFID3b.html.