Special Issue | 30 January 2015The end of privacy

Photo illustration By William Duke / Photo by Ronald Hudson/Bigstock.com

Can you find all the information we’ve hidden in our cover and inside the issue? Search for an encrypted URL and decode it to find a key to the data!

As we shed more and more data, and more of it is collected and aggregated, new dilemmas arise. Read the full introduction to the 30 January special section on the end of privacy in Science. The content in this section is free access through February 5, 2015.


30 January 2015 | News


Facial recognition software could soon ID you in any photo.

William Duke

30 January 2015 | News

Risk of exposure

When new or dangerous infectious diseases strike, public health often trumps personal privacy.
30 January 2015 | News

Credit card study blows holes in anonymity

Attack suggests need for new data safeguards.
30 January 2015 | News

Breach of trust

After the Snowden revelations, U.S. mathematicians are questioning their long-standing ties with the secretive National Security Agency.

Slideshow: Privacy invasion

International Spy Museum


William Duke

30 January 2015 | News

Trust me, I'm a medical researcher

Scientists can no longer guarantee patients' privacy. they're looking for new ways to build trust.
30 January 2015 | News

Hiding in plain sight

Software lets you use location-based apps without revealing where you are.

30 January 2015 | News

When your voice betrays you

“Voiceprints” offer convenience and security, but they may pose privacy issues.

30 January 2015 | ScienceInsider

A famous Ebola patient who remained anonymous for 20 years

The first person to catch the virus in West Africa speaks out about the importance of privacy.

30 January 2015 | News

Camouflaging searches in a sea of fake queries

A browser extension masks your true interests with customized decoy questions.
30 January 2015 | News

Could your pacemaker be hackable?

Medical devices connected to the Internet are vulnerable to sabotage or data theft.
30 January 2015 | News

Game of drones

Unmanned aircraft may soon be everywhere; how they will affect privacy is still unclear.


30 January 2015 | Perspective

Control use of data to protect privacy

Protections based on notice and consent are increasingly impractical.
30 January 2015 | Perspective

What the "right to be forgotten" means for privacy in a digital age

The right to be forgotten should be situated within a broader debate on privacy protection.
30 January 2015 | Review

Privacy and human behavior in the age of information

The boundaries between privacy preservation and one-stop shopping or searching are malleable.
30 January 2015 | Report

Identity and privacy

Only a few pieces of additional data are necessary to uniquely identify a credit card user from credit card data.

William Duke


Related Items

Science Careers

Science Special Issues

More Special Issues >>